Relationship of Data and Funder Practice (Appendixes)
Appendix C: Committee Sound-bytes, Impetus
Deep Context: My approach to data is “deep context”; I see value in understanding what is beneath the data. I think context is what helps determine future courses of action, which result in systemic solutions.
Equity: Interested in data statistics and intersection with equity. A lot of mechanisms are designed in ways that are undermining indigenous communities. We can’t even do data collection without alienating people. Data is important, but how do we gather it without using it against people. The process has to look different from what it is now. Interested to learn how to do this.
Census: In terms of data, we need some kind of census on artists. Is there a toolkit that grantmakers can use to take a snapshot of artists in our region? A way to get data on different kinds of populations—some places with less artists. And some ways to evaluate the big picture?
Cultural Integrity: Equitable Grantmaking Report Released a study on equitable grantmaking in her region. The report underscores the inequity. The committee came up with a good list of questions about gathering demographic data.
Consistency: How to get data/statistics /specifics. Artist surveys from applicants changed the equity portion of our program. Is there a way to make the survey consistent—get other orgs to use it.
Relevance: Data and statistics critique—by the time we capture information, so much change happens, and is the data relevant?
Access: Data data data—how is arts a driver and what does it do beyond that. Artists want access to data.
Commonalities: Proposal to using a common survey. less repeated work; each organization has a unique code in the URL that ensures they can look at their own program’s responses; additionally the full set of data across programs could be queried or reported on, which would start to get at the sort of “artist census” that came up in discussion today; I could imagine that organizations would also want the ability perhaps to tack on a few specific questions of their own, but the group benefit would be that core set of questions that all organizations would have in their survey.
Purpose: How can data help us advance the field as a whole? Our focus on Individual Artists might be a good place to start, but in my opinion is only part of the “arts ecosystem” and artists can’t thrive if the ecosystem isn’t strong. Why is data collection important? I think we need to make a strong case for how it is helpful to the population we are trying to help (do artists find it helpful?). Can the tool/data collected be used broadly by many? How can it be used by all arts advocates to advance the field in terms of legislation, policy, budgeting, shaping agendas, building community, etc. What data IS being collected and by whom? Why and for what end purpose? Are there already good tools in place? I know there have also been comments/discussions about the pros/cons to using data to tie the arts to economic vitality…
Utility: It would be helpful in my own work to hear why and how other grantmakers use data. I’m particularly interested in how grantmakers are using data to measure racial equity and geographic engagement goals. I also wonder about using quantitative vs qualitative data re: equity and engagement efforts.
Appendix D: List of Resources
|Best Practices for Collecting Data||Demographic categories||http://culturaldata.force.com/Resources/articles/Article/Inclusive-Demographics-Questions-for-Surveys|
|Best Practices for Collecting Data||Categorization of race on forms||https://www.pewresearch.org/fact-tank/2015/06/18/census-considers-new-approach-to-asking-about-race-by-not-using-the-term-at-all/|
|Best Practices for Collecting Data||Categorization of race on forms||https://www.pewresearch.org/fact-tank/2014/03/14/u-s-census-looking-at-big-changes-in-how-it-asks-about-race-and-ethnicity/|
|Best Practices for Collecting Data||Gender questions||http://www.practicemakesprogress.org/blog/2015/9/18/asking-about-gender-on-online-forms|
|Best Practices for Collecting Data||Sexuality Survey||https://www.hrc.org/resources/collecting-transgender-inclusive-gender-data-in-workplace-and-other-surveys|
|Best Practices for Collecting Data||Resource Links||https://www.arts.gov/artistic-fields/research-analysis/arts-data-profiles/arts-data-profile-22|
|Best Practices for Collecting Data||Resource Links||http://www.d5coalition.org/wp-content/uploads/2015/12/Tips-for-data-collection-12.8.151.pdf|
|How do you Analyze Data?||Createquity||Existing Research||https://www.facebook.com/Createquity||A think tank and online publication investigating the most important issues in the arts. Createquity is no longer active but is a useful archived resource.|
|How do you Analyze Data?||Cultural Research Network||Existing Research||http://culturalresearchnetwork.org/||An open resource-sharing community of practice for anyone involved in arts-and-culture-related research. Our network emphasizes the practice and process of current research, and the opportunities to inform that active work among peers, academics, and fellow professionals. Our collaborative platform provides opportunities to explore project or professional connections, methodological challenges, technological innovations, standards and practices, and shared infrastructure.|
|How do you Analyze Data?||Google Scholar||Existing Research||https://scholar.google.com/intl/en/scholar/about.html||Can be a good resource for researching the latest questions scholars are asking in the field. You can peruse abstracts and identify how you may want to structure a process for putting theory into practice.|
|How do you Analyze Data?||Los Angeles County Department of Arts & Culture Cultural Equity and Inclusion Initiative: Literature Review||Existing Research||https://www.lacountyarts.org/article/cultural-equity-and-inclusion-initiative-literature-review||This literature review provides background information on how others have addressed how to improve diversity, cultural equity, and inclusion in the arts and culture sector, with a particular focus on boards of directors, the arts and culture workforce, audiences and programming, and culturally specific arts organizations.|
|How do you Analyze Data?||National LGBTQ Task Force||Demographics||https://www.thetaskforce.org/||The National LGBTQ Task Force advances full freedom, justice and equality for LGBTQ people.|
|How do you Analyze Data?||Advancing Culturally-responsive and Equitable (ACE) Evaluation Network||Evaluators||https://expandingthebench.org/ace/||A database for ACE Evaluation Network members and Evaluation Funders to search for new partners in evaluation. The database includes the professional profiles of diverse evaluators, who are available to pursue evaluation contracts and other related work.|
|Data Security||Digital Impact||Data Inventory||https://digitalimpact.io/toolkit/worksheets/digital-data-inventory/||Are you just beginning to take stock of your organization's digital data management? This simple one-page inventory is an easy place to start.||Digital Impact helps social sector practitioners to use digital resources safely, ethically, and effectively toward mission.|
|Data Security||Digital Impact||Digital Data Governance Workbook||https://digitalimpact.io/toolkit/worksheets/digital-data-governance-workbook/||Do you want to motivate your organization to take on responsible data governance, but don’t know where to begin? This workbook is a starter kit designed to help organizations practice safe, ethical and responsible data governance that reflects their values and supports their mission.|
|Data Security||Digital Impact||Data For Mission||https://digitalimpact.io/toolkit/worksheets/data-for-mission/||Most organizations are awash in digital data. This worksheet will help you focus on the data you need to achieve your mission, and how to get it.|
|Data Security||Digital Impact||Organizational Policy Inventory||https://digitalimpact.io/toolkit/worksheets/organizational-policy-inventory/||This worksheet will help you understand the gaps in your organization's digital policy suite.|
|Data Security||Digital Impact||Digital Organizational Chart||https://digitalimpact.io/toolkit/worksheets/digital-org-chart/||Use this worksheet to draw your organization's current staff and board structure, including committees, to identify who is responsible for digital data, and for digital skills and capacity.|
|Data Security||Digital Impact||Proposal Development Guide||https://digitalimpact.io/toolkit/worksheets/guide-to-proposal-development/||This checklist will help you incorporate good digital data management and governance practices into your program planning and fund development proposals.|
|Data Security||Digital Impact||Proposal Review Guide||https://digitalimpact.io/toolkit/worksheets/proposal-review-guide/||This tool is designed for reviewers of grant applications that involve the significant use or development of digital data or tools.|
|Data Security||Digital Impact||How To Hire A Data Expert||https://digitalimpact.io/toolkit/worksheets/engagement-guidelines/||These guidelines will help your nonprofit or foundation shape a productive working relationship with external data experts (volunteers or contractors).|
|Data Security||Digital Impact||Four Principles To Guide Civil Society’s Use Of Digital Data:||https://digitalimpact.io/toolkit/digital-data/four-principles/||
|Data Security||Digital Impact||Templates||https://digitalimpact.io/toolkit/templates/||This section provides templates with sample language you can use to inform your organization’s policy choices. Within each category you will find sample language help you move through the decision-making process more quickly and provide you with sample language that can help you articulate your organization’s values. Use these to inform your staff and board discussions as you create policies. You should consult with a lawyer before finalizing official organizational policies. Privacy, Intellectual Property, Terms of Service, Vendor Contracts, Consent for Data, Database Licenses, Data Philosophies|
|Data Security||Federal Communications Commission||Cyberplanner||https://www.fcc.gov/cyberplanner||Small Biz Cyber Planner 2.0, an online resource to help small businesses create customized cybersecurity plans. Use this tool to create and save a custom cyber security plan for your company, choosing from a menu of expert advice to address your specific business needs and concerns.|
|Data Security||Foundant Technologies||Trick Or Treat? Banish Your Cybersecurity Fears||https://resources.foundant.com/education-webinars-for-grantmakers/trick-or-treat-banish-your-cybersecurity-fears||During this on-demand webinar we dispel the murkiness around cybersecurity and give you tools to keep from getting tricked!|
|Data Security||Foundant Technologies||The Funder’s Role In Collecting, Tracking, And Using Data||https://resources.foundant.com/education-webinars-for-grantmakers/the-funder-s-role-in-collecting-tracking-and-using-data||This on-demand webinar focuses on the funder’s role in collecting, tracking, and using data from the real-world perspective of three Foundant clients in a funder role. They discuss initiatives their organizations have undertaken (i.e., preferred/required outcomes, scorecards, capacity grants, etc.) to better impact their own data collection and usage, as well as that of their grantees.|
|Data Security||Foundant Technologies||Data Security, Foundant, And You||https://resources.foundant.com/education-webinars-for-grantmakers/data-security-foundant-and-you-4||high level overview of some common security frameworks, how to assess your needs as an organization, and how to create action items you can take away and implement immediately. They also discuss some of the measures Foundant Technologies takes to keep your data secure.|
|Data Security||Information Commissioner's Office||Data Protection Self Assessment||https://ico.org.uk/for-organisations/data-protection-self-assessment/||This self assessment toolkit has been created with small organisations in mind. It will be most helpful to small to medium sized organisations from the private, public and third sectors. Use our checklists to assess your compliance with data protection law and find out what you need to do to make sure you are keeping people’s personal data secure. Once you have completed each self assessment checklist a short report will be created suggesting practical actions you can take and providing links to additional guidance you could read that will help you improve your data protection compliance.||The UK’s independent authority set up to uphold information rights in the public interest, promoting openness by public bodies and data privacy for individuals.|
|Data Security||National Council Of Nonprofits||Cybersecurity For Nonprofits||https://www.councilofnonprofits.org/tools-resources/cybersecurity-nonprofits||If your nonprofit engages in any of the three activities below, it’s time to get serious about taking steps to address cybersecurity risks. Does your nonprofit: Conduct e-commerce, store and transfer identifiable information, collect information on preferences and habits of any stakeholders.|
|Data Security||Nonprofit Technology Network (Nten)||Assessing Risk: How To Protect Your Most Valuable Data||https://www.nten.org/article/assessing-risk-protect-valuable-data/||The Nonprofit Technology Network (NTEN) suggests that the first step in assessing your nonprofit’s data risks is to take inventory of all the data your nonprofit collects and identify where it is stored. NTEN offers a template assessment tool;|
|Data Security||Principles For Digital Development||Principles For Digital Development||https://digitalprinciples.org/principles/||The Principles for Digital Development are nine living guidelines designed to help development practitioners to integrate best practices into technology-enabled programs and are intended to be updated and refined over time.|
|Data Security||Responsible Data||Responsible Data Resource List||https://responsibledata.io/2019/03/28/responsible-data-resource-list/||This list of resources (formerly known as the “Responsible Data Hackpad)” is curated and maintained by MERL Tech and The Engine Room. It is a collection of Responsible Data-related resources, including examples of discussions, case studies, policies, and more. If you would like to see other resources added to the list, please note them in the comments or get in touch.|
|Data Security||Responsible Data||Handk book of the Modern Development Specialist, Being, a Complete, Illustrated Guide to Responsible Data Usage, Manners, and General Deportment||https://responsibledata.io/resources/handbook/||This book is offered as a first attempt to understand what responsible data means in the context of international development programming. We have taken a broad view of development, opting not to be prescriptive about who the perfect “target audience” for this effort is within the space. We also anticipate that some of the methods and lessons here may have resonance for related fields and practitioners. This book builds on a number of resources and strategies developed in academia, human rights and advocacy, but aims to focus on international development practitioners.|
|Data Security||Roundtable Technology||Shared Template - Risk Analysis - Information Identification And Classification||https://docs.google.com/spreadsheets/d/1L1FP-ePpPLcrkYKKQkuLdFHV6xj9Y-k6z4jaBQKxgKE/edit#gid=0||RoundTable Technology’s risk assessment template helps organizations identify potential risks and safeguards for their data.|
|Data Security||Roundtable Technology||Ten Steps to Cybersecurity Maturity||https://www.roundtabletechnology.com/cybersecurity/cybersecurity-resource/||Self guided assessments|
|Data Security||Tech Impact Idealware||What Nonprofits Need To Know About Security: A Practical Guide To Managing Risk||https://www.idealware.org/reports/nonprofits-need-know-security-practical-guide-managing-risk/||Is your organization doing enough to secure its most important data? In our new report, we cut through the fear and uncertainty to provide clear guidance. We’ll show you how to assess your risk, explain the basic protections, and discuss building a culture that values security.|
|Data Security||Tech Impact Idealware||Nonprofit Technology Policy Workbook||https://www.idealware.org/reports/nptechpolicyworkbook||We created this workbook to help you think through specific policies to manage your nonprofit’s risk. It contains prompts to help you create and document policies for the acceptable use of technology and networks, personal devices for work, how to provide IT guidance to “accidental techies,” how to respond to an IT incident, and how to recover your technology after a major disaster.|
|Data Security||Technology Association Of Grantmakers||Cybersecurity Essentials For Philanthropy||https://www.tagtech.org/page/cybersecurity||Through the Cybersecurity Essentials for Philanthropy series, TAG aims to reduce your organization’s risk. The practices and suggestions shared here are those of your peers at philanthropic organizations throughout North America. Their on-the-ground knowledge forms the basis for an invaluable set of best practices.||The Technology Association of Grantmakers (TAG) is a non-profit membership organization that promotes the power of technology to advance the goals of the philanthropic sector.|
|Data Security||Techsoup||Cybersecurity In The Nonprofit Sector||https://www.techsoup.org/support/articles-and-how-tos/microsoft-releases-cybersecurity-and-privacy-guidelines||Through its partners TechSoup and NTEN, Microsoft recently conducted a survey among a selection of nonprofits to get a clearer picture of their cybersecurity. The results showed that nonprofits are falling short in several key areas.|
|Data Security||The National Institute Of Standards And Technology (Nist)||NIST Releases Update To Cybersecurity Framework||https://www.nist.gov/news-events/news/2017/01/nist-releases-update-cybersecurity-framework||The US National Institute of Standards and Technology (NIST) Cybersecurity Framework to help your nonprofit identify risks, and make management decisions to mitigate those risks. This framework is not intended to be a one-size-fits-all approach but to allow organizations to manage cybersecurity risks in a cost-effective way, based on their own environment and needs.|