Kim Snyder

RoundTable Technology is dedicated to creating a roadmap for companies to succeed through technology. Kim fits right in with over 20 years of experience with data systems, business analysis and change management, not to mention accolades as an Agile Coach, a certified PMP (Project Management Professional) and a ACP (Agile Certified Professional). Kim has recently completed the CIPP/US certification as an Information Privacy Professional. Kim is definitely a people person. She’s all about communication and she acts as the conscience of the company, making sure we complete projects, meet deadlines and exceed the expectations of our customers each and every time.

2 min read

Adopting a Culture of Cybersecurity, A Necessary Step

Cybersecurity is critical to the success of any organization and can mean the difference between a secure organization that protects data or one that unwittingly leaves a door open for malicious actors.

Read More

1 min read

Lily Pads & Artificial Intelligence - Explaining Exponential Growth

{% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False, hidden_controls=False, loop=False, muted=False, full_width=False, width='854', height='479',...
Read More

Benefit vs. Complexity Prioritization - What do do first?

There are always more things to do than we have time for. How do we decide which tasks to focus on? One tool that can be helpful is the benefit vs complexity matrix. This matrix helps us to prioritize our tasks based on two factors: how beneficial the...

Read More
compliance checklist featured image

2 min read

NY SHIELD Act Compliance Checklist for Nonprofits

The New York SHIELD Act (“SHIELD”), which went into effect in 2020, provides needed clarity around what constitutes reasonable data security. The use of the word reasonable serves a legal purpose; terms like “reasonable cause” or “reasonable doubt” are...

Read More
cybersecurity and data privacy featured image

3 min read

A Crucial First Step in any Data Privacy Program

It’s not an exaggeration to say that the relationship between data privacy and cybersecurity is a symbiotic one. Data privacy depends upon cybersecurity.

Read More
nonprofit technology priority burger

2 min read

The Importance of Prioritization for Nonprofit Technology

It's no secret that technology has had a profound impact on the nonprofit sector. From fundraising to program delivery, technology has made it possible for nonprofits to do more with less.

However, not all organizations are able to take advantage of this...

Read More

1 min read

What is Personal Information in Data Privacy?

Data Privacy regulations require that we protect the privacy of people whose data we collect.

So, what does that mean?

Read More

4 min read

Building Data Ethics into Data Management - The Bright Side of Scary

This article was written co-operatively by RoundTable Technology's Kim Snyder and LA Tech4Good's Rachel Whaley.

Yes, there are a few looming, scary reasons why nonprofit professionals are rethinking their relationship with their own data. The first is...

Read More
choosing a vpn for nonprofits

2 min read

Choosing a VPN for Your Nonprofit

Today, just installing anti-malware software and a firewall on your computer isn’t enough to keep you safe as you use the internet. Nowadays, a hacker can intercept messages sent to and from your computer and steal the data they contain. This is why you...

Read More

1 min read

Writing User Stories - Explaining Nonprofit Technology

When describing the technology solutions we need, it’s natural to feel like we need to “talk tech”, or describe our needs through the lens of technology.

Instead, we recommend “thinking in stories” -- user stories.

Read More