crimson logo
ProductsServicesAboutResourcesBlogLoginContactRequest a Demo


The wonders of big data go hand-in-hand with the responsibility of serious data security. We understand that the confidentiality, integrity, and availability of your data is vital to your organization’s success.

For more information about security features on the Crimson platform, please visit the Crimson Security page.

Keeping Data Safe

CMDI keeps your fundraising and donor data secure using the standards established by the PCI Security Council. When credit card numbers are received in hard copy form, they are handled in secure and monitored environments. Physical credit card numbers are blacked-out and stored safely after transactions are processed through Crimson’s integration with Anedot. Additionally, credit card numbers are never written or stored in our software or hardware, and extensive penetration tests are conducted on our systems as well.


Secure Data Centers

The Crimson application and your data are maintained at a secure, offsite data center that maintains SSAE 16 Type II compliance. This top-tier data center provides carrier-level support, including:


  • Building engineered for local seismic, storm, and flood risks
  • Dual-alarmed, dual-interlock, multi-zone, pre-action dry pipe water-based fire suppression
  • Humidity and temperature control
  • Redundant (N+1) cooling systems, CPS/UPS systems, and diesel generators with on-site diesel fuel storage
  • Redundant power distribution units (PDUs)
  • VESDA (very early smoke detection apparatus)


  • 24-hour manned security, including foot patrols and perimeter inspections
  • Biometric scanning and card readers for access
  • Dedicated concrete-walled data center rooms
  • Computing equipment in access-controlled steel cages
  • 360-degree video surveillance throughout facility and perimeter
  • Tracking of asset removal

Security at CMDI's Office

CMDI takes every effort to secure the physical premises of our office and caging facilities. These security standards include:

  • Separate biometric access control to enter caging facility and offices
  • Separate biometric access control to enter caging facility and offices
  • Dedicated mail intake room, opening and sorting room, document scanning room, and data entry room with their own biometric access and video surveillance
  • Tracking of asset removal