Managing the Use of Your ListBeing able to create (or buy), grow, update and enhance your database of contacts are all important steps along the road to successful direct mail-out.
But just as important is the way your database is used, who is allowed to view it, and maintaining the integrity of the information it contains.
This means your organisation needs to not only be aware of these types of issues, but have measures in place to prevent any problems arising.
Some List-Related Issues That can Arise
- Who has access to view the list?
The ability to view the contents of the database should be limited only to those who need to know.
Who those people are could vary in each organisation – it could be those in charge of fundraising and donations, a membership manager, volunteer co-ordinator, media and marketing manager, for example.
But the main thing to remember is that only the nominated people in your organisation have access to the database.
- Who has access to edit the list?
Not only are there issues related to privacy on this (as discussed above) but there could also be concerns about a duplication of work – if two people make changes or additions to the list separately – or inaccuracies being introduced if "just anyone" makes changes to the list.
Once again, limiting access to just those who need to be working on the list is one solution to the problem. This leads to the next point.
- Who has the authority to edit or change the list?
- What is the list actually used for?
- Viewing/accessing of list by third party.
Suggested Solutions and PrecautionsThere are a few steps your organisation can take to protect the integrity of the list it has – and the privacy of those on it.
Most of these precautions are relatively easy to put in place, and really should be instituted as a matter of course when you are working with direct mail lists.
- Simply lay down the rules.
- Limiting access through passwords, profiles and other security measures on your group's computers.
This can be done by putting in place password protection, and locking people out of documents and limiting accessibility by using profiles.
There are also other ways your group can use computer security measures to stop unauthorised access and editing. Speak to your IT manager, consultant or technician for more information.
- Other security.
If you have a copy of your list on a disc, again, store it securely.
- Limiting access by keeping the list on a floppy disc or CD.
It should be made clear that the disc is not to be copied or circulated under any circumstances.
- Banning any unauthorised printing or copying of the list, or even putting in place a blanket ban on any list printing or copying.
Generally speaking, treat your list like it contains the secret of KFC's herbs and spices..
Not only is it one of the most important documents your organisation has, but it should be one of the most private and respected.
Those on the list have trusted your organisation with their private details – your group needs to reciprocate that trust. If it does not, not only could it fall into legal trouble, but it could lose the trust of the public – something which may never be overcome.