Security is our strength

The safety of children and their data is our priority. We use data encryption, automation, and robust security policies to protect our users and tools.

Review our Privacy Policy for more information.

If you have any questions or concerns regarding the Privacy Policy Agreement related to our website, please feel free to contact us at the following email, telephone number, or mailing address.

Email: [email protected]

Mailing Address:
Connect Our Kids
1069 W Broad St Ste 778
Falls Church, Virginia 22046

Minimal Case Data Collected

Our tools can be used with little or no case data. Because our tools are focused on aggregating public information, our tools do not collect significant amounts of data – unless you or your users enter such data.

d

Encryption everywhere

We use strong browser encryption, encrypt data at every stage of transit, store data only in encrypted storage systems, and implement strong processes and procedures for managing the encryption keys.

Review our Privacy Policy for more information.

We do not share private or case data

We are a non-profit that operates on the funds provided by our philanthropic partners. We are not incentivized, nor do our internal policies allow for any data sharing outside of the team you have authorized.

For the purposes of demonstrating the value of our services, and to help you understand your own metrics, we may share very limited aggregate anonymized usage data.

Review our Privacy Policy for more information.

Complete data exports and integrations available

Our tools offer complete data exports and automated report generation. Our goal is to support your mission of caring for foster children – and that includes providing complete portability of data into other systems. We encourage you to consider how we can help you automate tedious data entry and sharing processes.

Review our Privacy Policy for more information.

All data is in the U.S.

All data collected through our tools are stored in the United States. Family Connections data is stored in Google Cloud Central 1 Region located in Council Bluffs, Iowa. People Search and Impact Dashboard data is stored in AWS US-East-1 Region located in Northern Virginia.

Connect Our Kids personnel will never share case information with any party, even the account owner, and even when we are expressly asked to do so. You agree that under no circumstances will Connect Our Kids be considered a system of record for your case information, and under no circumstances can Connect Our Kids help you recover lost case information – except through the regular use of connectourkids.org and its Services. You agree that Connect Our Kids may collect and maintain anonymized information about the status and outcomes of each case you submit to connectourkids.org and its Services. Further, you agree that Connect Our Kids may report anonymized aggregate case status and outcome information for the purposes of advertising our services, and reporting information to our funders. Connect Our Kids shall make every effort to dissociate all reported anonymous and aggregate case information – except when you expressly request that we support you with non-anonymous or non-aggregate information.

Review our Privacy Policy for more information.

You are in control of your access

Each “Team” in Connect Our Kids tools is directly managed by one or more persons in your organization. Team members and their permissions are controlled by the “Team Managers.” Each child’s data is protected by fine-grain security controls, and your Team Managers can grant or revoke privileges instantly.

Integration with your user directory

We can offer your organization direct integration with your user directory servers. This allows your administrators to define their own methods of access control, including integrations with your existing policies and processes. Email [email protected] for more information.

Automated Systems Monitoring

We leverage advanced systems monitoring tools to ensure the configurations deployed are in compliance with our policies and industry best practices. These tools are automatically updated with the latest rules to ensure our continual advancing security posture at a systems level.

Automated Common Vulnerabilities and Exposures (CVE) detection

We leverage advanced code scanning tools to ensure that the code we produce is free of known CVE issues. These tools automatically review every version of the software that we produce, and are regularly updated with the latest vulnerability notifications.

Our tools are specifically designed to limit our own access to your data.

Our policies define “least privilege” access controls that limit cross-system access and the number of our internal operations team members that have the ability to affect access. We will never access your data unless we are directly serving your interests, at your direction.

We scale so you don’t have to

Our tools are specifically architected to achieve extreme scale. You do not have to worry about software security, upgrades, or maintenance. We focus on technology so you can focus on services for children in foster care. We allow all users to review our architecture documents. Simple contact [email protected]

My cart
Your cart is empty.

Looks like you haven't made a choice yet.