Please update your browser

We have detected that you are using an outdated browser that will prevent you from using
certain features. An update is required to improve your browsing experience.

Use the links below to upgrade your existing browser

Hello, visitor.

Register Now

  • M&E data needs a secure home with easy access. Balancing these depends on several factors including: Accessibility which entails Clear protocols, user roles, formats, and good documentation make data readily available to authorized users; Security considerations such as Encryption, system updates, backups, and audit logs keep data safe from unauthorized access or loss; as well as Archiving which is aimed at ensuring stable data formats, secure physical storage, version control, and long-term planning to ensure data remains accessible for future generations.
    It is equally important to remember ethical considerations, data sharing agreements, and cost-effectiveness as part of the overall equation. By nailing these key aspects, your M&E data will be secure, accessible, and ready to inform future decisions and maximize project impact.

  • M&E data needs a secure home with easy access. Balancing these depends on several factors including: Accessibility which entails Clear protocols, user roles, formats, and good documentation make data readily available to authorized users; Security considerations such as Encryption, system updates, backups, and audit logs keep data safe from unauthorized access or loss; as well as Archiving which is aimed at ensuring stable data formats, secure physical storage, version control, and long-term planning to ensure data remains accessible for future generations.
    It is equally important to remember ethical considerations, data sharing agreements, and cost-effectiveness as part of the overall equation. By nailing these key aspects, your M&E data will be secure, accessible, and ready to inform future decisions and maximize project impact.

  • M&E data needs a secure home with easy access. Balancing these depends on several factors including: Accessibility which entails Clear protocols, user roles, formats, and good documentation make data readily available to authorized users; Security considerations such as Encryption, system updates, backups, and audit logs keep data safe from unauthorized access or loss; as well as Archiving which is aimed at ensuring stable data formats, secure physical storage, version control, and long-term planning to ensure data remains accessible for future generations.
    It is equally important to remember ethical considerations, data sharing agreements, and cost-effectiveness as part of the overall equation. By nailing these key aspects, your M&E data will be secure, accessible, and ready to inform future decisions and maximize project impact.

  • M&E data needs a secure home with easy access. Balancing these depends on several factors including: Accessibility which entails Clear protocols, user roles, formats, and good documentation make data readily available to authorized users; Security considerations such as Encryption, system updates, backups, and audit logs keep data safe from unauthorized access or loss; as well as Archiving which is aimed at ensuring stable data formats, secure physical storage, version control, and long-term planning to ensure data remains accessible for future generations.
    It is equally important to remember ethical considerations, data sharing agreements, and cost-effectiveness as part of the overall equation. By nailing these key aspects, your M&E data will be secure, accessible, and ready to inform future decisions and maximize project impact.

  • M&E data needs a secure home with easy access. Balancing these depends on several factors including: Accessibility which entails Clear protocols, user roles, formats, and good documentation make data readily available to authorized users; Security considerations such as Encryption, system updates, backups, and audit logs keep data safe from unauthorized access or loss; as well as Archiving which is aimed at ensuring stable data formats, secure physical storage, version control, and long-term planning to ensure data remains accessible for future generations.
    It is equally important to remember ethical considerations, data sharing agreements, and cost-effectiveness as part of the overall equation. By nailing these key aspects, your M&E data will be secure, accessible, and ready to inform future decisions and maximize project impact.

    J
    1 Reply
  • M&E data needs a secure home with easy access. Balancing these depends on several factors including: Accessibility which entails Clear protocols, user roles, formats, and good documentation make data readily available to authorized users; Security considerations such as Encryption, system updates, backups, and audit logs keep data safe from unauthorized access or loss; as well as Archiving which is aimed at ensuring stable data formats, secure physical storage, version control, and long-term planning to ensure data remains accessible for future generations.
    It is equally important to remember ethical considerations, data sharing agreements, and cost-effectiveness as part of the overall equation. By nailing these key aspects, your M&E data will be secure, accessible, and ready to inform future decisions and maximize project impact.

  • M&E data needs a secure home with easy access. Balancing these depends on several factors including: Accessibility which entails Clear protocols, user roles, formats, and good documentation make data readily available to authorized users; Security considerations such as Encryption, system updates, backups, and audit logs keep data safe from unauthorized access or loss; as well as Archiving which is aimed at ensuring stable data formats, secure physical storage, version control, and long-term planning to ensure data remains accessible for future generations.
    It is equally important to remember ethical considerations, data sharing agreements, and cost-effectiveness as part of the overall equation. By nailing these key aspects, your M&E data will be secure, accessible, and ready to inform future decisions and maximize project impact.

  • M&E data needs a secure home with easy access. Balancing these depends on several factors including: Accessibility which entails Clear protocols, user roles, formats, and good documentation make data readily available to authorized users; Security considerations such as Encryption, system updates, backups, and audit logs keep data safe from unauthorized access or loss; as well as Archiving which is aimed at ensuring stable data formats, secure physical storage, version control, and long-term planning to ensure data remains accessible for future generations.
    It is equally important to remember ethical considerations, data sharing agreements, and cost-effectiveness as part of the overall equation. By nailing these key aspects, your M&E data will be secure, accessible, and ready to inform future decisions and maximize project impact.

  • So elaborate contribution here

  • So elaborate contribution here

  • So elaborate contribution here

  • Data should be we ll organized and safeguard, and the database should be accessible to only certain people.

  • Data management choices are critical because even before doing this course my data on the computer and even at work has been so clustered without rules on data management. But with this knowledge acquired I would like to start creating data management choices

  • Keeping data access to only authorized persons can also contribute to data security, confidentiality and data integrity. Proper archiving of data also makes it easy to access data when needed.

  • Data access and archival are critical components of the data management process in Monitoring and Evaluation (M&E). Here are key considerations for data access and archival in M&E:

    Data Access:

    User Permissions: Implement access controls to ensure that only authorized individuals have access to specific data sets. This helps maintain data confidentiality and privacy.
    Role-Based Access: Different roles within an organization may require different levels of data access. Tailor permissions based on the responsibilities and needs of users.
    Data Security:

    Encryption: Use encryption methods to secure data during transmission and storage, protecting it from unauthorized access.
    Firewalls and Intrusion Detection Systems: Implement security measures to safeguard against potential cyber threats and unauthorized access.
    Data Sharing Protocols:

    Data Sharing Agreements: Clearly define and establish data-sharing agreements with relevant stakeholders, ensuring that data is shared responsibly and in compliance with privacy regulations.
    Data Sharing Platforms: Use secure platforms and protocols for sharing data with external partners or stakeholders, especially when collaborating on projects.
    Archival of Raw Data:

    Long-Term Storage: Archive raw data in a secure and accessible manner for the long term, preserving it for potential future audits, evaluations, or research.
    Data Versioning: Implement version control for datasets, ensuring that changes and updates are tracked, documented, and archived appropriately.
    Metadata Documentation:

    Comprehensive Metadata: Document metadata thoroughly to provide context for the data. This includes information about data sources, collection methods, and any transformations made during the M&E process.
    Data Catalogs: Establish a data catalog that provides a comprehensive inventory of available datasets, facilitating easy discovery and access for authorized users.
    Data Archiving Practices:

    Regular Backups: Implement regular backup procedures to protect against data loss due to technical failures or unforeseen circumstances.
    Archiving Protocols: Define and follow protocols for archiving data, taking into account the retention periods required by relevant regulations and organizational policies.
    Data Retention Policies:

    Establish Policies: Develop clear data retention policies that outline how long different types of data will be retained and when it will be securely archived or deleted.
    Legal and Ethical Compliance: Ensure that data retention practices align with legal and ethical requirements, particularly concerning sensitive or personally identifiable information.
    Data Retrieval Processes:

    Search and Retrieval Mechanisms: Implement mechanisms for easy retrieval of archived data, allowing authorized users to access historical information efficiently.
    Documentation of Retrieval Processes: Document procedures for retrieving archived data to maintain transparency and consistency.

  • all data we must archived or no?

  • all data we must archived or no?

  • Data management: Systems and processes for storing, organizing and accessing data.

    Data security: Processes and systems for ensuring that data can only be added, accessed, changed or deleted by those with permission. Often, some people will have some data security permissions but not others. For example, they may be able to view the data but not delete it.

    Database: A system for storing, organizing and accessing data.

    Dataset: A collection of related data.

    Table: A common format for organizing and displaying data. Data in a table is arranged into rows and columns. Each column represents a type of data (a data field), while each row represents a record.

    Query: A request for data from a database

  • Consistency means that the same rules are used for every single piece of data. For example, if you decide that names should be recorded by first and last initials, make sure that every piece of data about names is recorded in this way.

    Logic means that there is a recognizable pattern to the naming and recording rules. Another person should be able to figure out why you have named or recorded your data in this particular way. For example, your team might decide to label each piece of budget data with the name of the department that the expense belongs to.

    Anonymity means that you are taking appropriate measures to protect the privacy and identity of those whose data you have collected. Data privacy rules can be very strict and vary based on location and circumstance. Pieces of data that could be used to identify an individual such as names, dates of birth, or address should be very tightly controlled.

    One way to ensure anonymity is to replace identifiable information with anonymous identification codes. This process is known as de-identification.

    For example, imagine that your group is working with a group of individuals who have contracted the HIV virus. If this list of individuals was released, your participants could suffer from social stigma or worse. So, instead of recording names in your data, you assign a unique identification number to each participant. Wherever you would record a participant’s name, you instead record their unique identification number. This way, if data is stolen or accidentally leaked, it would be much more difficult to identify your participants.

  • Data is stored so that in short term or long term that data might be used.
    The system that is being used being analogy or digital should be easily accessed by authorized users. Make should the data is filed properly so that user should not struggle to find it. For the data that will be used for more years that data need to be archive. so that after some years this data can still be accessed

  • Data can be uploaded and downloaded from nearly anywhere. Any person with the right software, hardware and account permissions can add new data or access existing data.
    Data can be easily accessed. Unlike data on a sheet of paper, the same data can be accessed by multiple people simultaneously.
    Data can be reorganized. All database solutions, whether they are a simple Excel spreadsheet or more complex software, allow you to sort and organize your data easily.
    Data can be prepared for data analysis. Some data storage and management systems allow you to do data visualization and analysis directly in the software. Others make it easy to export data to data analysis software.
    However, digital data management can also be expensive, complicated and can, if not implemented well, risk the security of your data. You will need to pay for software, hardware, updates and fixes. If your organization does not have several people on the team who are comfortable using this technology, you should consider starting with a simple, physical data management system.

  • Deciding on how your data is stored and accessed is an important aspect in data management.

    This helps to ensure that only people with the right permission accesses data so as to maintain high levels of confidentiality

  • Data Management System follows series of procedures, ranging from collection to Presentation. You cannot manage data if you collected nothing. What are you going to store? Therefore, all steps must be followed.
    Digital systems are mainly used to access, organize and archive data, with set guidelines. All guidelines must be adhered to, with the organization of ownership having absolute control over the data, but apply ethical principles as well.

  • Hi everyone! My name is Yeko Isaac from Uganda, East Africa. I am very excited to have enrolled in this course having completed and received a certificate of achievement in Planning for Monitoring and Evaluation and From data collection to data use.

    The experience was amazing and that explains why i have decided to enrol in this course.

    I am looking forward to learning new skills in this topic and i believe that this will make a difference in my organization.

    Thanks everyone in this team.

  • Data access and archival
    Data archiving is the process of storing structured and unstructured data for long-term preservation so that it can be accessed at any time when needed by an organization to be used for: Strategic analysis. Historical reference. Compliance requirements

    Data archiving is the practice of identifying data that is no longer active and moving it out of production systems into long-term storage systems. Archival data is stored so that at any time it can be brought back into service.

    What is archival access?
    Access is a set of activities that links primary source materials to the public. Archivists should be able to answer questions about specific collections, such as their sizes, date ranges, the existence of correspondence by individuals, research restrictions, and copyright status, among other issue

  • You can not just leave it open for the public to access data you have collected. Ethically, You will be breaching the Do No harm and beneficiaries of a specific project might be at risk of being following the information that might get leaked. Also, remember to be confidential about this information and allow access to those who can be trusted. Also, you are to set an aunthetication process for data access. Archiving data is important as information might be required later even if the project phases out. However, make sure the data is organized that it can be easily found when queried

  • Wow, this is complex 😂😂😂😂😂😂

  • From the notes, I understand that effective data management involves several key aspects: data format, data naming, data storage and recording using uniform rules and methods to ensure clarity and consistency, and data security using access magnetic archiving procedures. We need to take into account what data will be needed, the level of this data’s accessibility, and how to store and search the data in the future. Ethical aspects must not be overlooked while emphasising on the securing of data to protect privacy as well as create barriers against possible harms.

  • Acesso a Dados:
    Segurança da Informação: Garantir que apenas usuários autorizados tenham acesso aos dados, geralmente por meio de autenticação e controle de acesso baseado em funções.

    Políticas de Acesso: Estabelecer políticas claras sobre quem pode acessar quais tipos de dados e em que circunstâncias.

    Criptografia: Proteger dados sensíveis através de técnicas de criptografia para garantir que mesmo que os dados sejam interceptados, eles não possam ser lidos sem a chave correta.

    Monitoramento de Acesso: Implementar sistemas para monitorar quem acessa os dados e o que eles fazem com esses dados, a fim de detectar atividades suspeitas.

    Acesso Remoto: Assegurar que os dados possam ser acessados de forma segura a partir de locais remotos, sem comprometer a segurança.

    Arquivamento de Dados:
    Políticas de Retenção de Dados: Estabelecer políticas para determinar por quanto tempo os dados devem ser mantidos com base em requisitos legais, regulatórios e operacionais.

    Backup Regular: Realizar backups regulares dos dados para protegê-los contra perda devido a falhas de hardware, erro humano, desastres naturais ou cibernéticos.

    Gerenciamento de Espaço de Armazenamento: Implementar práticas para gerenciar eficientemente o espaço de armazenamento, como compressão de dados, deduplicação e arquivamento de dados menos utilizados.

    Indexação e Organização: Indexar e organizar os dados de forma que possam ser facilmente encontrados quando necessário.

    Migração de Dados: Periodicamente migrar dados para novos sistemas ou formatos para garantir sua acessibilidade a longo prazo, especialmente em face da obsolescência de tecnologia.

    Conformidade Regulatória: Garantir que o arquivamento de dados esteja em conformidade com regulamentações relevantes, como o Regulamento Geral de Proteção de Dados (GDPR) na União Europeia ou a Lei de Privacidade do Consumidor da Califórnia (CCPA) nos Estados Unidos

  • Data access and archival are critical components of data management that ensure data is accessible when needed and securely stored for future reference.

  • Data access and archival are critical components of data management that ensure data is accessible when needed and securely stored for future reference.

  • Applied in all data process that support for data quality management

  • There are three key Principles to consider in Data recording:

    • Consistency

    • Logic

    • Confidentiality
      Data infrastructure is a collection of tools and systems
      Data Security is a process and system for ensuring that data can only be accessed . changed, or deleted by those with permission.

  • Hi! my name is Ruot Gach i am very glad to join this is topic. the data access and data archive are the usefull terms for data management. Data access talk about the security and the privacy of controlling the data of individual not to share them with unauthorized person. The data can be access only by person with permission. The archive is way of storing and organizing the data in the safe place for longtime use. the data need to be stored by creating folders and the sub folders which will prevent the data loss and make easy to access data when needed. sometime for files the cabinet should locked with lockpad and it safe the accessibility of the data by any one.

  • Data Access and Archival: The Cornerstone of Effective M&E
    Data access and archival are fundamental components of a robust Monitoring and Evaluation (M&E) system. They ensure the information collected serves its purpose of program improvement, fosters transparency, and allows for future analysis. Here's why data access and archival are crucial for M&E:

    Benefits of Accessible Data:

    Improved Program Management: Easy access to data empowers program managers to track progress, identify areas for improvement, and make data-driven decisions to optimize program effectiveness.
    Enhanced Collaboration: Accessible data allows for collaboration among stakeholders, including donors, researchers, and implementing partners. This fosters knowledge sharing and facilitates the development of more impactful programs.
    Increased Transparency and Accountability: Accessible data promotes transparency by allowing stakeholders to see how programs are performing and how resources are being used. This builds trust and accountability.
    Importance of Data Archival:

    Long-Term Analysis: Archiving data allows for future analysis, even after program completion. This can be valuable for identifying long-term trends, evaluating program sustainability, and informing future program design.
    Meeting Donor Requirements: Many donors require data to be archived for a specific period. This ensures access for audits or future evaluations.
    Ethical Considerations: Data archival safeguards important information, especially when dealing with sensitive data. Proper archiving ensures responsible data management and protects participant privacy.
    Challenges and Considerations:

    Data Security: Data access should be controlled to ensure only authorized users can access sensitive information. Robust security measures are crucial for preventing data breaches.
    Data Storage Capacity: Long-term data storage requires adequate storage capacity and data management systems.
    Data Quality: Data archived for future use should be well-documented and cleaned to ensure its accuracy and interpretability for future analysts.
    Best Practices for Data Access and Archival:

    Develop Data Access Protocols: Establish clear guidelines on who can access data, under what circumstances, and what level of access is granted based on user roles.
    Invest in Data Archiving Solutions: Choose secure and reliable data storage solutions that meet your program's specific needs and comply with data privacy regulations.
    Data Documentation: Document your data collection process thoroughly, including data definitions, coding schemes, and any data cleaning procedures used. This ensures future users can understand the data and replicate analyses if needed.
    Regular Backups: Implement regular data backup protocols to prevent data loss in case of technical failures.

  • Access Permissions:

    Who should be able to access the data? This may include the M&E team, management team, specific staff members, or external stakeholders.
    Should certain people have access only to specific data? For instance, staff from different programs may require access to data relevant to their program area.
    Should different types of users have different levels of access? Some individuals may have permission to view data, while others have permission to edit or modify it.
    Data Security:

    How will data security be ensured to prevent unauthorized access? This could involve implementing measures such as user authentication, encryption, and access controls.
    What mechanisms will be in place to safeguard confidential or sensitive data? Protecting the privacy and confidentiality of individuals or groups described in the data is paramount.
    Search and Retrieval:

    How will data be searched and retrieved? This may involve utilizing search or query functions within data management software or maintaining a well-organized filing system with clear directories.
    Accessibility and ease of retrieval are crucial for efficient data management and decision-making processes.
    Archiving and Storage:

    When should data be archived and moved into long-term storage? Establishing guidelines for archiving data ensures that valuable information is retained for future reference and compliance with donor requirements.
    Considerations for long-term storage include the duration data should be retained, the format in which it should be stored, and provisions for data backup and disaster recovery.
    Ethical Considerations:

    Recognizing the ethical implications of data management is essential, particularly regarding the confidentiality and security of sensitive information.
    Ensuring that only authorized individuals have access to confidential data helps mitigate the risk of compromising the safety and privacy of individuals or groups described in the data.
    By addressing these questions and implementing appropriate policies, procedures, and technological solutions, organizations can effectively manage and safeguard their data, ensuring its accessibility, integrity, and security over time.

  • In an organization, it is very important to structure how data might be access and being stored mostly for a longer term. On data access, this is how to manage the people how needs to access the data and with the restrictions. In some cases, Others can be permitted to be viewer, editor or view and commentator depending on their roles and other cannot have either option for access. For example you cannot give a messenger or a guard to access the database and be an editor. Access and restrictions goes mostly in the same direction.

    On data archival, the organization need to make decisions for how long a particular set of data will be useful. for example in government agencies, some data is needed forever of which it can be a reference for other activities in future. In other dataset might be needed for a short period of time, for example project data of which its needed for the project life time and when it phase out it is kept for only few years and later it can be deleted if its allowed.

    All in all data access and archival are good components to look at as far as data management is needed within the organization Monitoring and Evaluation team

  • This topics is important in M&E to understand who is able to access data, type of data to be accessed, permission of accessing data. So this sub module will be helpful in my projects on how to access data and store for longtime (archive).

  • The Module was well understood and interesting. Data control is very important in project implementation

  • I particularly enjoyed the data security section of this because I work with sensitive data which I have to constantly get ethical approval before collecting

  • Every program has its specific system of data access and archival. There are some questions in this area such as who will access the data, access to some kind of data, to view or edit it, how the data should storage

  • If confidentialit information is accessed by unauthorized people, it causes harm to the project greatly

  • Data Access and archival is an important part in Data Management. Effective data access system ease up the M&E process by accessing required information on time with minimum effort. It further maintains the security of data as well.

  • Unauthorized access to data and information is not healthy for a project. Measures should be put in place to prevent such situations

  • What an interesting topic I am
    Actually learning a lot and I can't wait to use this information and grow my skills and knowledge

  • There is a lot that I am learning about data and I know that my mindset has changed with this new knowledge

    1 Reply
  • I also learnt a lot here

  • Lets continue to learn and strive

  • Consistency means that the same rules are used for every single piece of data. For example, if you decide that names should be recorded by first and last initials, make sure that every piece of data about names is recorded in this way.

    Logic means that there is a recognizable pattern to the naming and recording rules. Another person should be able to figure out why you have named or recorded your data in this particular way. For example, your team might decide to label each piece of budget data with the name of the department that the expense belongs to.

    Anonymity means that you are taking appropriate measures to protect the privacy and identity of those whose data you have collected. Data privacy rules can be very strict and vary based on location and circumstance. Pieces of data that could be used to identify an individual such as names, dates of birth, or address should be very tightly controlled.

  • Our data is stored in a secure platform whose users have a profile assigned to them by the administrator at the national level with an access code. It is a computer system that is hosted by the Azure website. The data once entered can be consulted by authorized personnel and are often available in paper version

  • Data storage and management, perhaps more than any other part of M&E, is associated with information technology (IT). There is a wide range of IT available for storing, organizing and accessing data.

    The simplest tool for storing data is a spreadsheet. This is a digital table, often created with software like Microsoft Excel. More complex databases are web-based, meaning the data can be accessed and managed fully online, and contain many different tables. Examples of larger-scale databases include Microsoft SQL Server, Oracle Database, Oracle Cloud and MySQL.

  • Access Control: Determine who should have access to the data based on their roles and responsibilities. It could be limited to specific teams, management personnel, or made accessible to all staff or even the public. Define access permissions based on the principle of least privilege, which means granting individuals access only to the data necessary for their work.
    Data Segmentation: Consider whether certain individuals or teams should have access to specific subsets of data. For example, staff from one program may require access to data from that particular program only, while others should have access to multiple programs. Implement appropriate access controls to enforce these restrictions.
    Different Levels of Access: Determine if different types of users should have different levels of access rights. Some users may need read-only access, while others may require permission to edit, modify, or delete data. Grant access rights accordingly, ensuring that sensitive data is protected from unauthorized modifications.
    Data Security: Establish measures to ensure data security and prevent unauthorized access. This can include physical security measures for physical records, such as locked filing cabinets, as well as digital security measures like strong passwords, encryption, firewalls, and access controls on digital databases. Regularly review and update security protocols to mitigate potential vulnerabilities.
    Search and Retrieval: Evaluate the search and query capabilities of your data management software. Ensure that it provides efficient search functionality to locate specific data within the system. If necessary, consider exporting data into other formats or maintaining a well-organized filing system with appropriate indexing for physical records.
    Archiving and Storage: Determine when data should be archived and moved to long-term storage. This decision may be influenced by factors such as available database capacity, regulatory requirements, and donor stipulations. Establish a clear archiving policy that defines the duration for which data should be retained and ensure compliance with relevant data retention regulations.
    Ethical Considerations: Safeguarding confidential data is critical for ethical reasons. Ensure that the storage location for confidential information is secure and accessible only to authorized personnel. Implement measures to protect sensitive data against unauthorized access, both in digital and physical formats, to mitigate potential risks to individuals or groups described in the data.

  • Who should be able to access the data? Just the M&E team? Just the management team? All of the staff? The public?
    Should certain people be able to access only some of the data? For example, should staff on one program be able to access data from another program?
    Should different types of people have different types of access? For example, you might decide that certain individuals can only view data, while others have permission to edit data.
    How will I ensure that only people with permission can access my data? Data security can be as low-tech as a key and a lock on a filing cabinet or as high-tech as data encryption on a digital database.
    How will data be searched? Does my data management software have a search or query function, or do I need to export my data into another format to search it? If my data is stored in a filing cabinet, is there a list of folders that directs the user to the correct data files?
    When should data be archived and moved into storage? If you have limited room in your database, you might consider moving old or out-of-date data into a long-term database. Many donors, for example, require that data be stored and available for 3-5 years following a project.

  • I totally agree with your sentiments.

  • Data security and maintenance are important, we should consider the integrity of the data. in the organization, we specified who accesses, what data access, and where can access it, and specified granted the permission to the organization staff member with their role and position.

  • It is important to recognize the need for clear and accurate data management. It makes things so much easier if other people who did not put a system together can still look at it with little to no guidance and understand how to use the system. I think that is the ultimate test of a good data management system.

Reply to Topic

Looks like your connection to PhilanthropyU was lost, please wait while we try to reconnect.