SECURITY MEASURES
Protecting the church and its members
DEDICATED TO THE HIGHEST SECURITY MEASURES
A PCI-compliant processor, Vision2 is 100% committed to providing the strongest security measures to protect your givers’ data.
COLLECTS ONLY ESSENTIAL INFORMATION
In contrast to many giving platforms, Vision2 offers true Guest Checkout to minimize information collected from your members.
OPERATES AS PAYMENT PROCESSOR
Vision2 serves as the payment processor which eliminates the redirection of givers to a third-party website and possible security risks. This means your givers’ relationship and data remain with your church.
Plus, your givers can come directly to the church for support versus dealing with a payment processors’ support team that may take weeks to resolve an issue.
LIMITS ACCESS TO GIVERS’ DATA
Vision2 manages role-based access to data and changes so that neither data entry and communications roles nor Vision2 personnel can access payment method information in any readable, usable format.
CARRIES INSURANCE
In addition to designing the platform to protect the church and your givers, Vision2 takes the extra measure to carry insurance to cover losses in the unlikely event of a data breach. This is not standard practice across giving platforms.
SAFETY PROTOCOLS
PCI-CERTIFIED
Vision2 is PCI DSS Level 1-certified and undergoes independent annual audits to maintain certification.
DONATION CONTROLS / ANONYMOUS CASH
Gifts can’t be changed; a void is always required. Audit trails are created for vulnerable contributions not handled by our payment processing.
CREDIT CARD SCANNING AUTHORIZATION CHARGES
Stops inappropriate authorization activities after 5-6 attempts and multiple cards coming from the same IP address. Doesn’t slow down giving transactions as seen with captcha and other approaches.
ENHANCED ENCRYPTION (DATABASE)
Going beyond database encryption, Vision2 uniquely encrypts each bank account and individual credit card before your giver inputs their expiration date and CVV number.
PROTECTED TRANSACTION HISTORY
Ensures a record of all captured and recorded transactions and prevents the deletion of contribution data.
FRAUD PREVENTION
Automated individual reconciliation process prevents the generation of statements for NSF checks or ACHs, reducing IRS risk.
ACCESS CONTROL VIA USER ROLES
A variety of specific roles manage and control access to data and changes. (e.g. Data entry and communications roles cannot access giving records.)
PROTECTED PAYMENT METHOD DETAILS
No Vision2 personnel can access payment method information in any readable, usable format.
TWO-FACTOR AUTHENTICATION
Admin portal can be protected by enabling two-factor authentication.