BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//www.ndano.org//NONSGML kigkonsult.se iCalcreator 2.30.10//
CALSCALE:GREGORIAN
METHOD:PUBLISH
UID:f591df08-dd47-42e0-a25d-42587d4770d3
X-WR-CALDESC:<b>Presenter:</b> TechImpact\n<b>Cost:</b> Free\n\n<b><a href=
 'https://offers.techimpact.org/training/intro-to-tech-policies?utm_campaig
 n=Idealware%20Integration&utm_medium=email&_hsmi=91912385&_hsenc=p2ANqtz-8
 WiRo15WEpl1jt8xp4D3AzyAE-UIicsui6cb-0ikUM09e38DV_Jucc79u1CYW8MjeLhFEGODgwC
 TIlJVLFCIMwSV07ew&utm_content=91912385&utm_source=hs_email' target='_blank
 ' rel='noreferrer noopener'>REGISTER</a></b>\n\nAre you providing guidance
  to help staff members avoid scams\, malicious software\, and the inapprop
 riate handling of data? Do staffers use their personal phones or computers
  to do work? If you don’t have written policies—and regular training to en
 sure that people understand those policies—your organization may be facing
  bigger risks than you think. This session will walk you through the quest
 ions you should consider as you develop policies to protect your nonprofit
 . Take home an in-depth policy workbook and sample policies.\n\nUpon compl
 etion of this webinar you should be able to:\n<ul><li>Understand what shou
 ld be in your Acceptable Use and IT Security policies.</li>\n<li>Weigh pro
 s and cons of different approaches to Bring Your Own Device.</li>\n<li>Get
  better at gaining staff support and compliance.</li></ul>
X-WR-RELCALID:d9dae1a99085d07c7db6ef77e87bd31e
X-WR-TIMEZONE:America/Chicago
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:STANDARD
TZNAME:CST
DTSTART:20191103T020000
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
RDATE:20201101T020000
RDATE:20211107T020000
END:STANDARD
BEGIN:DAYLIGHT
TZNAME:CDT
DTSTART:20200308T020000
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
RDATE:20210314T020000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:7e4ba747-6c64-40eb-8029-68ef1611e628
DTSTAMP:20260502T233753Z
DESCRIPTION:<b>Presenter:</b> TechImpact\n<b>Cost:</b> Free\n\n<b><a href='
 https://offers.techimpact.org/training/intro-to-tech-policies?utm_campaign
 =Idealware%20Integration&utm_medium=email&_hsmi=91912385&_hsenc=p2ANqtz-8W
 iRo15WEpl1jt8xp4D3AzyAE-UIicsui6cb-0ikUM09e38DV_Jucc79u1CYW8MjeLhFEGODgwCT
 IlJVLFCIMwSV07ew&utm_content=91912385&utm_source=hs_email' target='_blank'
  rel='noreferrer noopener'>REGISTER</a></b>\n\nAre you providing guidance 
 to help staff members avoid scams\, malicious software\, and the inappropr
 iate handling of data? Do staffers use their personal phones or computers 
 to do work? If you don’t have written policies—and regular training to ens
 ure that people understand those policies—your organization may be facing 
 bigger risks than you think. This session will walk you through the questi
 ons you should consider as you develop policies to protect your nonprofit.
  Take home an in-depth policy workbook and sample policies.\n\nUpon comple
 tion of this webinar you should be able to:\n<ul><li>Understand what shoul
 d be in your Acceptable Use and IT Security policies.</li>\n<li>Weigh pros
  and cons of different approaches to Bring Your Own Device.</li>\n<li>Get 
 better at gaining staff support and compliance.</li></ul>
DTSTART;TZID=America/Chicago:20200819T120000
DTEND;TZID=America/Chicago:20200819T130000
LOCATION:Webinar
SUMMARY:Intro to Tech Policies: Acceptable Use\, Security\, and BYOD
END:VEVENT
END:VCALENDAR
