Kim Snyder

RoundTable Technology is dedicated to creating a roadmap for companies to succeed through technology. Kim fits right in with over 20 years of experience with data systems, business analysis and change management, not to mention accolades as an Agile Coach, a certified PMP (Project Management Professional) and a ACP (Agile Certified Professional). Kim has recently completed the CIPP/US certification as an Information Privacy Professional. Kim is definitely a people person. She’s all about communication and she acts as the conscience of the company, making sure we complete projects, meet deadlines and exceed the expectations of our customers each and every time.

2 min read

NY SHIELD Act Compliance Checklist for Nonprofits

The New York SHIELD Act (“SHIELD”), which went into effect in 2020, provides needed clarity around what constitutes reasonable data security. The use of the word reasonable serves a legal purpose; terms like “reasonable cause” or “reasonable doubt”...

Read More

3 min read

A Crucial First Step in any Data Privacy Program

It’s not an exaggeration to say that the relationship between data privacy and cybersecurity is a symbiotic one. Data privacy depends upon cybersecurity.

Read More

2 min read

The Importance of Prioritization for Nonprofit Technology

It's no secret that technology has had a profound impact on the nonprofit sector. From fundraising to program delivery, technology has made it possible for nonprofits to do more with less.

However, not all organizations are able to take advantage of this...

Read More

1 min read

What is Personal Information in Data Privacy?

Data Privacy regulations require that we protect the privacy of people whose data we collect.

So, what does that mean?

Read More

4 min read

Building Data Ethics into Data Management - The Bright Side of Scary

This article was written co-operatively by RoundTable Technology's Kim Snyder and LA Tech4Good's Rachel Whaley.

Yes, there are a few looming, scary reasons why nonprofit professionals are rethinking their relationship with their own data. The first is...

Read More

2 min read

Choosing a VPN for Your Nonprofit

Today, just installing anti-malware software and a firewall on your computer isn’t enough to keep you safe as you use the internet. Nowadays, a hacker can intercept messages sent to and from your computer and steal the data they contain. This is why you...

Read More

1 min read

Writing User Stories - Explaining Nonprofit Technology

When describing the technology solutions we need, it’s natural to feel like we need to “talk tech”, or describe our needs through the lens of technology.

Instead, we recommend “thinking in stories” -- user stories.

Read More

1 min read

2-Minute Training – Data Inventory

Listen as VP of Data Strategy, Kim Snyder outlines the questions you need to be asking within your organization to begin conducting a proper data inventory.

{% video_player "embed_player" overrideable=False, type='hsvideo2', hide_playlist=True,...
Read More

2 min read

NY SHIELD Act Compliance for Nonprofits

Let’s start with the good news.

States within the USA are starting to implement privacy regulations to protect our individual data. As individuals, this is good for us. As leaders of nonprofits, small businesses, or any entity that collects data as part...

Read More

2 min read

CompTIA ISAO Announces Members of its MSP Champions Council

May 27, 2021Cybersecurity, managed services market leaders add expertise in the fight against cyber threats

Read More