NGO Technology Organization Volunteer Code of Conduct
Nonprofit technology work is built on trust. As a volunteer with “NGO Technology Organization” (“NGO Tech” / “NGOTech.org), you may access systems, data, and organizations missions that are sensitive &/or personal. This Code of Conduct sets clear expectations so that our clients, partners, staff, and volunteers can work together safely, respectfully, and effectively. By volunteering with NGO Tech, you agree to follow this Code of Conduct at all times while representing or doing work for the organization.
1. Purpose and scope
This Code of Conduct:
Defines expectations for ethical, professional behavior by all technology volunteers.
Protects clients, beneficiaries, and partners by setting clear boundaries and responsibilities.
Supports our mission by aligning your work with NGO Tech’s values and legal obligations.
This Code applies to:
All volunteers (technical and non-technical) doing work under NGO Tech’s name.
All activities related to NGO Tech, including remote work, on-site work, events, meetings, and online spaces.
All interactions with clients, beneficiaries, staff, other volunteers, and third-party partners.
2. Our shared values
Respect and dignity: Treat everyone with respect, regardless of their role, background, identity, or technical skill level. Harassment, bullying, or degrading language or behavior are never acceptable.
Integrity and honesty: Be truthful about your skills, limitations, progress, and mistakes. Do not misrepresent yourself or NGO Tech.
Service and accountability: Put the needs of clients and beneficiaries at the center of your decisions. Take responsibility for your actions and their impact.
Equity and inclusion: Support equitable access to technology. Actively avoid language, behavior, or decisions that exclude, stereotype, or disadvantage groups.
Privacy and safety: Treat all information, especially personal and sensitive data, as something you are entrusted with, not something you own.
3. Professional conduct with clients
3.1 Respectful communication
Be patient and nonjudgmental: Technology can be intimidating. Avoid shaming, talking down, or expressing frustration at someone’s skill level.
Use plain language: Explain options, risks, and technical concepts in accessible terms so clients can make informed decisions.
Honor boundaries: Do not ask for or share personal information beyond what is necessary for the project.
3.2 Power dynamics and boundaries
Avoid exploitation: Never use your position to obtain money, favors, access, or special treatment from clients or beneficiaries.
No romantic or sexual conduct: Do not initiate or pursue romantic or sexual relationships with clients, beneficiaries, or anyone you support in a volunteer capacity.
Separate personal and professional roles: Use NGO Tech channels for NGO Tech work. Do not use volunteer relationships primarily to promote your own business, products, or services.
3.3 Cultural sensitivity
Learn before acting: Be curious and humble about the communities you serve. When unsure, ask staff for guidance rather than making assumptions.
Respect local norms and laws: Follow all applicable laws and policies in the jurisdictions where you and your clients are located.
Inclusive interactions: Avoid jokes, comments, or content about race, ethnicity, nationality, religion, gender, sexual orientation, disability, age, or any other identity.
4. Data protection, privacy, and security
As a technology volunteer, you may have access to sensitive data, including personal information, donor details, financial data, or information about vulnerable populations. That access carries serious responsibility.
4.1 Confidentiality
Confidential by default: Treat all client data, conversations, and project details as confidential unless clearly made public by the organization.
Need-to-know principle: Only access, use, or share data required to carry out your assigned tasks.
No unauthorized sharing: Do not share data with friends, family, on social media, or in portfolios/presentations without explicit written permission from NGO Tech.
4.2 Handling digital assets
Secure access: Use strong, unique passwords and (where available) multi-factor authentication for all systems and accounts related to NGO Tech.
Safe storage: Store files, backups, and credentials in approved, secure locations only (e.g., NGO Tech’s chosen password managers, cloud storage, or project tools).
Responsible disposal: Properly delete or return data and access credentials when your volunteer assignment ends or when asked.
4.3 Compliance with law and policy
Follow privacy and security laws: Comply with applicable data protection and cybersecurity laws and regulations relevant to your project (e.g., privacy laws in the client’s jurisdiction).
Respect third-party terms: Use software, APIs, and platforms according to their terms of service and licensing conditions.
Report incidents: Immediately report suspected data breaches, credential leaks, or security vulnerabilities to NGO Tech staff. Do not attempt to “quietly fix” serious issues on your own.
5. Use of technology and systems
5.1 Appropriate use
For mission-related work only: Use NGO Tech and client systems, accounts, and data solely to support agreed project goals.
No malicious activity: Never engage in hacking, unauthorized access, penetration testing, scraping, or any actions that could be seen as intrusive or harmful, unless it is explicitly part of an approved and documented scope of work.
No illegal content or actions: Do not use NGO Tech or client systems for any illegal, discriminatory, or abusive activities.
5.2 Quality and reliability
Work within your competence: Do not accept tasks that exceed your skills without clearly disclosing your level and getting appropriate support or supervision.
Document your work: Keep clear records of configurations, code, changes, and decisions so others can understand, support, and maintain your work after you leave.
Test before deployment: Follow NGO Tech’s and the client’s testing and review processes before deploying or modifying live systems.
5.3 Open-source and third-party tools
Respect licenses: Check and follow licenses for open-source libraries, tools, and content. Do not copy proprietary material without permission.
Transparency with clients: Let clients know what third-party tools, libraries, and services you are introducing, along with any associated costs, obligations, or data-sharing practices.
6. Conflicts of interest and representation
6.1 Conflicts of interest
Disclose conflicts early: Inform NGO Tech staff if you have a personal, financial, or other connection that might influence your work (e.g., you also consult for a competing organization, or a client is a close friend).
Avoid self-dealing: Do not steer clients toward your own business or paid services as a condition of support. Any outside work with a client must be separately and transparently arranged, and never implied to be part of NGO Tech’s volunteer services.
6.2 Representation of NGO Tech
Use the organization’s name responsibly: Do not speak on behalf of NGO Tech in public, in the media, or online without explicit permission from staff.
No unauthorized commitments: Do not make promises about funding, services, timelines, or capabilities on behalf of NGO Tech or clients without proper approval.
Professional online presence: When referencing your volunteer work publicly (e.g., LinkedIn, portfolio), describe it honestly and respect confidentiality and branding guidelines.
7. Harassment, discrimination, and safety
NGO Tech is committed to providing a safe and welcoming environment for everyone.
Zero tolerance for harassment: Any form of harassment—verbal, physical, visual, sexual, or digital—is prohibited. This includes unwelcome jokes, comments, advances, or content that creates a hostile or offensive environment.
No discrimination: Do not discriminate on the basis of race, color, ethnicity, nationality, language, religion, gender, gender identity or expression, sexual orientation, disability, age, socioeconomic status, or any other protected characteristic.
Respect physical and digital boundaries: Do not touch someone or access their devices or accounts without explicit permission.
Substance use: Do not be under the influence of drugs or alcohol while performing volunteer duties, operating equipment, or interacting with clients.
8. Remote work and digital communications
Many NGO Tech projects are remote or hybrid. The same standards apply online as in person.
Professional conduct online: Use respectful and clear language in emails, chat, video calls, and project tools. Avoid gossip, sarcasm that can be misread, or hostile comments.
Video meeting etiquette: Dress and behave appropriately for a professional environment. Be mindful of your background and surroundings.
Secure remote work: Use secure networks where possible, lock your devices, and follow NGO Tech’s cybersecurity guidelines when working from home or in public spaces.
9. Reporting concerns and violations
9.1 Speaking up
Duty to report: If you witness or experience behavior that may violate this Code, or notice security, privacy, or safety concerns, you are expected to report it to NGO Tech staff as soon as possible.
Good faith reports: You will not face retaliation for making a report in good faith, even if it turns out to be mistaken.
9.2 How issues are handled
Fair review: NGO Tech will review reported concerns and, where appropriate, investigate and take action, which may include coaching, reassignment, or ending the volunteer relationship.
Confidential handling: Reports will be handled as confidentially as possible, consistent with the need to investigate and take appropriate action.
Possible outcomes: Violations of this Code may result in changes to your responsibilities, suspension, or removal as a volunteer, and in serious cases may be escalated to authorities if required by law.
10. Acknowledgment
By serving as a volunteer with NGO Technology Organization, you affirm that:
You have read and understood this Volunteer Code of Conduct.
You agree to follow these standards in all activities connected to NGO Tech.
You understand that failure to comply may result in the end of your volunteer assignment and, in serious cases, other appropriate actions.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.