Navigating Church IT to Protect the Church

Balancing risks with helpful technology for congregations and staff.

Nick B. Nicholaou serves as president of MBS Inc., based in Huntington Beach, California. In his role with MBS—which stands for Ministry Business Services—Nicholaou has served churches as an IT (Information Technology) consultant and strategist for many years. Since 1987, he has helped churches through a number of IT transitions, and he wrote the Christianity Today book Church IT. I spoke with him about how churches should approach IT.

Churches tend to be open, welcoming places with a heart for saving the lost. What potential risks can this create when it comes to IT risk management?
Churches today offer Wi-Fi access for their guests as part of being a welcoming organization. They want to provide an appropriate suite of services to help meet people’s needs. But most churches do not strategically approach how to set up the WiFi for those needs.
I talk in my book, Church IT: Strategies and Solutions, about the need to segment Wi-Fi for guests versus staff, and to make sure that Wi-Fi access for guests is filtered for appropriate content. Churches need to either use a password to protect their Wi-Fi and/or turn it off when Wi-Fi doesn’t need to be available.
Why is that important?
At a church in Missouri, someone pulled into the church parking lot after hours and distributed child porn over the church’s unsecured public Wi-Fi. The FBI was called in to address this, and investigators saw that it was coming from the church’s public IP address. The FBI then confiscated all of the church’s computers, including servers, to do a forensic analysis to make sure no one on staff was involved. The forensic audit took months, so the church was without its computers for that length of time.
Churches need to protect their public Wi-Fi access, either with a password, which is recommended—but most churches don’t want to do this because they want to be open, accepting places—or they need to at least turn off their Wi-Fi when it doesn’t need to be in use.
In your book, you talk about changing paradigms such as the cloud. What is the cloud, and what risk management issues are associated with it?
The cloud refers to where data and apps reside and how they’re accessible. If they reside on servers, and those servers are accessible over the internet, that’s the cloud. It doesn’t matter if the servers are in your building or in a datacenter somewhere else. The fact that they can be accessed over the internet means they’re in the cloud.
If churches use cloud storage, they need to make sure their security is up-to-date. That means that nobody can access the data except those who are given access.
Another changing paradigm you mention is BYOD. What is BYOD and what risk management issues are associated with it?
The cloud enables BYOD, but BYOD is its own issue. BYOD stands for “Bring Your Own Device.” We see a growing trend where people want to use their own computers, or organizations that want people to use their own computers rather than computers that are bought by, engineered, managed, and controlled by the organization. BYOD makes many IT people very nervous.
There are certain policies you need to have in place to protect the organization and the user if you’re going to do BYOD. BYOD makes sense for most organizations today, but there are issues of responsibility.
For instance, what is the organization responsible for and what is the user responsible for? If someone says, “Hey, I would like to use my own computer instead of the computer you have given me,” what happens if the hard drive on their personal computer crashes? Who’s responsible to fix it?
From a risk management perspective, the organization should require that the user’s machine run the organization’s preferred antimalware solution. The user also should be willing to submit the personal computer to the organization periodically to confirm that the antimalware solution is still running and is properly configured.
Why do you think BYOD makes sense for most organizations?
A couple of reasons. One, it makes for a happier user community, and two, it can save the organization money.
If I’m a church pastor, why would I want to buy my own computer?
That’s a good question. So maybe we’re a church that only allows Windows machines. And we’ve just called you as a pastor, fresh out of seminary, and you’ve done everything in your computing life on a Mac. Should we care if you use a Windows machine or a Mac? With today’s technology it doesn’t have to matter. We should focus on how to make you optimally productive. So how do we make you as productive as possible? Probably not by requiring that you switch to a church-owned Windows computer.

Wi-Fi: The Liability Considerations

What steps can a church take to reduce its exposure to liability based on inappropriate use of an internet connection made available by its Wi-Fi hotspot? There are many precautions that should be considered, including the following:

1. Require all internet users to agree to “terms and conditions of use” as a condition to gaining access. Such terms and conditions typically include several items, including the following:

  • A warning that the connection is not secure, and that users who use the Wi-Fi hotspot do so entirely at their own risk
  • A requirement that users be of a specified age or older (i.e., 18)
  • An agreement to refrain from copyright violations or any illegal or offensive behavior, including defamation, theft, fraud, harassment, or access to and dissemination of child porn
  • A recommendation that users not disclose passwords or credit card information
  • A disclaimer of all warranties
  • A limitation on liability statement to the effect that the church, as the hotspot provider, is not liable for any wrongful acts by any user, or for any user’s damages resulting from a use of the hotspot, including but not limited to (1) loss or damage to a user’s computer files due to viruses or hacking; (2) identity theft; and (3) loss of confidential information, credit card numbers, and passwords

2. Consider contracting out the installation and maintenance of a Wi-Fi hotspot on your premises. Many companies perform these services for a fee.

3. Require users to register. This can act as a deterrent to inappropriate conduct.

4. Use filtering software to block access to inappropriate websites.

Excerpted from “Preventing Flare-Ups with Wi-Fi Hotspots,” by Richard R. Hammar.

You emphasize the need for organizations to have a disaster recovery plan for their IT. In your experience, are most handling that issue well?
Most handle it, at best, on a mediocre level. They might be doing backups daily. They might be taking one backup offsite on a weekly basis. But they’re probably not testing their backups on a regular basis. And the reason usually is not enough staff. I understand that this is a situation many find themselves in, but in a disaster the only way you’re going to be considered heroic is if you know for a fact that you’re going to be able to recover your data.
I know a church that lost its entire IT operation for a month because a storm took out all of its servers. This was a megachurch that had multiple IT staff. One person was responsible for testing the backups on a regular basis, but because the backups had always worked, he just decided—on his own—to stop testing. Then the storm came through, took out the church’s entire IT infrastructure, and guess what the church didn’t have? Backups of data!
That leads right into my next question, which is how scary should this IT arena be to churches?
Well, it needs to be appropriately assessed. God did not give us a spirit of fear, and that’s an important piece of the puzzle. But he did give us brains and gifts of administration and wisdom, so we need to apply them and say, “How should we best approach this?”
It really is a risk management issue. And, just like any risk management issue, we need to decide where we feel the appropriate setting is on the risk meter that we’re comfortable with. To ignore IT in that evaluation is unwise because today everything depends on IT.

This content is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional service. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. "From a Declaration of Principles jointly adopted by a Committee of the American Bar Association and a Committee of Publishers and Associations." Due to the nature of the U.S. legal system, laws and regulations constantly change. The editors encourage readers to carefully search the site for all content related to the topic of interest and consult qualified local counsel to verify the status of specific statutes, laws, regulations, and precedential court holdings.

ajax-loader-largecaret-downcloseHamburger Menuicon_amazonApple PodcastsBio Iconicon_cards_grid_caretChild Abuse Reporting Laws by State IconChurchSalary Iconicon_facebookGoogle Podcastsicon_instagramLegal Library IconLegal Library Iconicon_linkedinLock IconMegaphone IconOnline Learning IconPodcast IconRecent Legal Developments IconRecommended Reading IconRSS IconSubmiticon_select-arrowSpotify IconAlaska State MapAlabama State MapArkansas State MapArizona State MapCalifornia State MapColorado State MapConnecticut State MapWashington DC State MapDelaware State MapFederal MapFlorida State MapGeorgia State MapHawaii State MapIowa State MapIdaho State MapIllinois State MapIndiana State MapKansas State MapKentucky State MapLouisiana State MapMassachusetts State MapMaryland State MapMaine State MapMichigan State MapMinnesota State MapMissouri State MapMississippi State MapMontana State MapMulti State MapNorth Carolina State MapNorth Dakota State MapNebraska State MapNew Hampshire State MapNew Jersey State MapNew Mexico IconNevada State MapNew York State MapOhio State MapOklahoma State MapOregon State MapPennsylvania State MapRhode Island State MapSouth Carolina State MapSouth Dakota State MapTennessee State MapTexas State MapUtah State MapVirginia State MapVermont State MapWashington State MapWisconsin State MapWest Virginia State MapWyoming State IconShopping Cart IconTax Calendar Iconicon_twitteryoutubepauseplay
caret-downclosefacebook-squarehamburgerinstagram-squarelinkedin-squarepauseplaytwitter-square