If you are a business affected by COVID-19, we are here to provide you with pro bono consulting services!

C2CB Volunteer Policies

Thank you for being part of our C2CB community. To ensure the best possible experience, we have established guidelines for C2CB volunteers.

By joining C2CB as a volunteer, you agree that you have read and will follow the rules and guidelines set forth below. Questions about C2CB should be directed to c2cb.info@gmail.com. Specific questions about an ongoing project should be sent to the Project Lead.

Please take a moment to read through these important guidelines. In order to preserve a climate that encourages both civil and fruitful dialogue, C2CB reserves the right to suspend or terminate membership for those who violate these rules.

Electronic acknowledgement and acceptance of these policies will be considered equivalent to acceptance by physical signature.


C2CB volunteers should be professional, honest, and impartial; communicate effectively and clearly; maintain confidentiality; and never accept any forms of payment or remuneration (other than travel expenses, room and board, and hospitality) except those which are agreed to be covered by the client on a case-by-case basis.

We ask that C2CB volunteers follow these guidelines:

Be professional

  • Be respectful of the clients and of other C2CB volunteers who you work with on projects, both in action and communication, and be comfortable working on collaborations or in groups with other C2CB volunteers.
  • Ensure that C2CB projects that you participate in are completed in a timely manner. If there are issues with timely project completion, make sure to communicate with the client and any other C2CB volunteers who are involved in the project, or contact the C2CB Volunteer Manager or  Project Manager if necessary.
  • Use consulting or analytical methods and approaches that are suitable for the projects at hand. Return well-written and clear results to the clients. Send only those analyses to the clients that would be acceptable to be peer reviewed, clear, and well-written.
  • Do not volunteer for a project if you have a moral objection to it, or if you are certain that you do not possess the knowledge necessary to fulfill the request.
  • Do disclose any potential conflicts of interest before starting on a project. Do not participate in a project if there is an identified conflict of interest.

    Be respectful

    • The clients have worked on their projects before involvement with C2CB. Please respect the amount of work that they have put into their projects. Do not insult the clients or become involved with any project that you are opposed to, have reservations about or cannot fully commit to.

    Ensure good and timely communication

    • Clearly state all options for analyses and work with the clients to select analytic approaches that ensure a well-researched and analyzed result. If there are multiple C2CB volunteers involved in a project, clearly present each member’s role in the project to the clients so that there are no misunderstandings about which members will be working on various sections of a project. Communicate openly with the team and give credit where credit is due always.
    • Ensure that all communication with the clients and any other C2CB volunteers who are involved in the project are dealt with in a timely manner. When working on a project or committee, volunteers should do their best to respond or acknowledge receipt of communication within 24 hours.

      Report honestly and maintain impartiality/neutrality

      • Report honestly on the quality of the data and results to the clients.
      • Be transparent about the strength of the data collected and the evidence, fully disclose any negative results, and do not cherry-pick from the supplied data to bolster the wants of the clients. Be objective and honest in data analysis.
      • Make sure to maintain an impartial and neutral approach to a project at all times. Do not volunteer to work on a project if you hold a fixed opinion on what the results should show. Please note that this is not the same as being well acquainted with the subject area under analysis.


      • All C2CB volunteers should maintain professional confidentiality standards when working on a project.
      • Do not discuss the project details to an inappropriate level or share data without the express permission of the clients.
      • For purposes of our work, a standard three year Non-Disclosure Agreement is assumed to be in force and binding on all parties. See below ("C2CB CONFIDENTIALITY AND DATA SECURITY POLICY") for more detail.

      Reproducibility and sharing

      • Supply a full explanation of the analyses performed for a project, with sufficient detail that another professional could determine what was done and reproduce it if needed.

      • Make sure to include necessary and relevant citations in any written reports supplied to the clients.

      • Recognize that analyses will be used in further papers or written articles and most likely shared beyond C2CB.


      • C2CB volunteers should comply with all laws in their jurisdictions about data gathering and sharing.


      • C2CB does not accept remuneration or payment of any kind other than for previously established expense reimbursements per the project engagement agreement. C2CB volunteers must refuse any offers of recompense for their work on a project. If there is any uncertainty about remuneration, please contact the C2CB Business Consultant.

      • Any analyses that C2CB volunteers perform should be done without profit as a motive.


      • C2CB volunteers and clients should communicate clearly about the possibility of publication involving the results of a C2CB project. Specifically, C2CB volunteers must have written permission from the client to publish analysis results. Similarly, clients must obtain written approval of each C2CB volunteer prior to publishing their names in a publication.


      C2CB volunteers must agree to uphold the following ethical standards, in providing services to clients, in working with colleagues, and in other professional activities.

      1. I will serve my clients with integrity, competence, independence, objectivity, and professionalism.
      2. I will mutually establish with my clients realistic expectations of the benefits and results of my services.
      3. I will only accept assignments for which I possess the requisite experience and competence to perform and will only assign staff or engage colleagues with the knowledge and expertise needed to serve my clients effectively.
      4. Before accepting any engagement, I will ensure that I have worked with my clients to establish a mutual understanding of the objectives, scope, work plan, and fee arrangements.
      5. I will treat appropriately all confidential client information that is not public knowledge, take reasonable steps to prevent it from access by unauthorized people, and will not take advantage of proprietary or privileged information, either for use by myself, the client's firm, or another client, without the client's permission.
      6. I will avoid conflicts of interest or the appearance of such and will immediately disclose to the client circumstances or interests that I believe may influence my judgment or objectivity.
      7. I will offer to withdraw from a consulting assignment when I believe my objectivity or integrity may be impaired.
      8. I will refrain from inviting an employee of an active or inactive client to consider alternative employment without prior discussion with the client.
      9. If within the scope of my engagement, I will report to appropriate authorities within or external to the client organization any occurrences of malfeasance, dangerous behavior, or illegal activities.
      10. I will respect the rights of consulting colleagues and consulting firms and will not use their proprietary information or methodologies without permission.
      11. I will represent the profession with integrity and professionalism in my relations with my clients, colleagues, and the general public.
      12. I will not advertise my services in a deceptive manner nor misrepresent or denigrate individual consulting practitioners, consulting firms, or the consulting profession.
      13. I will promote adherence to these ethical standards by other member consultants working with me or on my behalf.


      This policy outlines behaviors expected of all C2CB volunteers who handle data and will provide guidelines for proper storage and transfer of data.


      The primary objectives of this data security policy are to:

      • Protect the privacy of individuals
      • Protect the integrity and confidentiality of the data
      • Prevent inappropriate disclosure of the data

      Data confidentiality, privacy and security are priorities for C2CB to ensure the protection of its customers. The protection of data is a critical business requirement, yet flexibility to access data and work effectively is also critical.

      It is not to be expected that this policy can effectively deal with the malicious theft scenario or that it will reliably protect all data. Its primary objective is user awareness and to avoid accidental loss or disclosure scenarios.

      Data Definition and Use

      The data received by C2CB will be used solely for the purpose of fulfilling the requirements of the intended project and will not be used for other purposes, without prior permission from the client organization.

      Data, for the purpose of this policy, includes all information that is communicated between the client and C2CB project participants. This includes documents, written, verbal  or electronic communications and other types of information that are shared or created during the course of the project.

      Data received by C2CB in any form as part of client communication or during the project will be used solely for the purpose of fulfilling the requirements of the intended project and will not be used for other purposes, without prior permission from the client organization.

      While this policy covers all types of data, of particular concern for the purpose of confidentiality, security and privacy are sensitive information pertaining to both physical persons and organizations, which includes existing or proposed products and services or the processes and capabilities required to implement them, description(s), technical and business information relating to proprietary ideas and inventions, ideas, patentable ideas, trade secrets, drawings and/or illustrations, patent searches, research and development, production, costs, profit and margin information, finances and financial projections, customers, clients, marketing, competitor analysis, and current or future business plans and models, regardless of whether such information is designated as sensitive at the time of its disclosure.

      Data Classification

      All information covered by this policy is to be classified among one of three categories, according to the level of security required. In descending order of sensitivity, these categories are "Confidential", "Internal Use Only,” and “Public.”

      ConfidentialThis includes sensitive personal information (SPI) or personally identifiable information (PII) and must be given the highest level of protection against unauthorized access, modification or destruction. SPI/PII is information that can be used to identify or locate a specific individual. Examples of confidential information include, but are not limited to, information protected under privacy laws, names, date or place of birth, address, national ID, medical/health information, account number of any type, IDs, handles, and URLs, among others as well as any content that can be used to determine the identity of the individuals through triangulation and deduction.Also includes sensitive and proprietary commercial and business information, the loss of which would compromise the client’s ability to execute or implement the business or project proposed or could reduce sales, profits or margins, increase costs and expenses and otherwise reduce or impair any competitive advantages that the holder of that information might have had.

      Internal Use Only: is less sensitive than confidential information, but if exposed to unauthorized parties could contribute to identify theft, financial fraud and/or violate State and/or Federal laws,  or is restricted by the client. This also includes internal information which, although dissemination of which may not be as harmful as confidential information as described above, could facilitate the entry into the market of competitors or provide them with potentially useful information. General, but not detailed, information as to vendors, suppliers, clients and product lines would fall into this classification.

      Public: is generally available to the public, or if it were to become available to the public, would have no material adverse effect on individual members of C2CB, the client organization and/or any related parties.

      It is the responsibility of the C2CB Business Consultant and the client to identify which data that will be used during the project belong to which of these categories, and to agree on protocols to protect the confidential and internal use categories.

      Data Access

      It is the responsibility of C2CB volunteers working with client data to ensure that data identified as “confidential” or “internal use only” be restricted to use by the project team. Access to the confidential and internal use only data, whether raw or in a format specific to an application or software tool (i.e., application-native), will normally be limited to the C2CB volunteers processing and/or analyzing the data.

      Storage and Retention

      Copies/duplication of data will be kept to the minimum necessary to complete the project.

      All confidential data or data for internal use only will be removed from equipment/environment within 120 days of sign-off for project completion or sooner if requested by the client. All data not publicly available will be encrypted according to industry best practices and destroyed at the end of the maximum retention period.

      Data Transfer

      Any transfer of data (email attachments, email body, FTP, removable media, etc.) with confidential or for internal use only information will be encrypted, transmitted using secure file transfer protocols, and/or transferred via a secure file sharing service.

      Encrypted data file and password/key for decrypting it will not be transmitted via the same channel.


      • Minimum encryption level for data with sensitive information is PGP, AES-128, or equivalent or stronger. The encrypted data file may be keyed or self-extracting (password).
      • All back-ups and other copies due to current operational process must adhere to the same standards above.
      • Any unauthorized use or disclosure of sensitive data will be reported to the organization within 72 hours of discovery by C2CB.


      ‚ÄčLast Updated on 28 March 2020

      This statement discloses policies and procedures concerning information gathering and dissemination practices for C2CB. Each time you use our site, the current version of the Privacy Statement will apply. This Privacy Statement is applicable to all site visitors, registered users, and all other users of our site.

      "Personal Data" is any information that enables us to identify you, directly or indirectly, by reference to an identifier such as your name, identification number, location data, online identifier or one or more factors specific to your physical, physiological, genetic, mental, economic, cultural or social identity.

      By visiting https://c2cb.wildapricot.org, you acknowledge that you have read and understood the processes and policies referred to in this Privacy Statement.

      If you have any questions or concerns about this Privacy Statement, please contact us using the Contact Us section on our site. Alternatively, you can contact us by sending an email to c2cb.info@gmail.com

      User Information

      Users of this website may differ in their access or needs. We recommend you read this policy in its entirety to understand your and our responsibilities. We use your IP address to help diagnose problems with our server and administer our website.

      The information in this statement applies to the C2CB website (https://c2cb.wildapricot.org). The website uses cookies to keep track of users as they navigate from one screen to another, such as when you log in to Wild Apricot using a password. See below for more information about cookies.

      Member Information

      We collect members’ contact information (e.g., name and email address) and background information (e.g., areas of expertise and interest). Contact information is only used to send information   about our organization and calls for volunteers. This contact information is also used to get in touch with members when necessary. Members’ contact information is never shared with other organizations or individuals without members' permission.

      Limited information from your member profile, specifically name, state, years of experience, areas/industry sectors of expertise, and LinkedIn Profile/CV, will be visible to the public via the C2CB website, primarily for the purpose of allowing prospective clients to search and understand the available consultant base.

      In addition, we may share your Personal Data for the purposes described in this Privacy Statement with:

      • C2CB Executive Committee and other project team members
      • Client organization for projects
      • Analytics and search engine providers that assist us in the improvement and optimization of our site

        Our site is not directed to minors. If you are a minor under the laws of our country, do not use our site. Please have your parents contact us on your behalf.  We do not knowingly collect Personal Data from minors. If we learn that Personal Data of minors has been collected through our site, we will take the appropriate steps to delete this information.


        Members can change their address and related information at the C2CB membership site (https://c2cb.wildapricot.org).


        The C2CB website has security measures in place to protect against the loss, misuse, and alteration of the information under our control. Members’ personal information is behind a firewall, modifiable by each member only by password access through secure forms pages. Member Directory information is not accessible by search engines that target HTML pages.

        Cookie Information

        What is a cookie?

        A cookie is a simple text file stored on your computer or mobile device when you visit a website. Most websites use cookies to improve your experience by allowing the website to "remember" you, either for the duration of your visit (using a "session cookie") or for repeat visits (using a "persistent cookie"). Cookies may be set by the website you are visiting ("first-party cookies") or they may be set by other websites that run content on the page you are viewing ("third-party cookies").

        What do cookies do?

        Cookies perform different functions, like letting you navigate between pages efficiently, storing your preferences, and improving your experience of a website. Cookies make the interaction between you and the website faster and easier. If a website doesn’t use cookies, it will think you are a new visitor every time you move to a new page on the site. For example, even after you log in, the site won’t recognize you or be able to keep you logged in if you move to another page.

        How does C2CB use cookies?

        C2CB uses different types of cookies to enhance and improve your experience. By continuing to browse our site, you are agreeing to our use of cookies. We use the following types of cookies:

        • Strictly necessary cookies: These cookies are required for the operation of our website, including cookies that enable you to log in to secure areas or update membership information.
        • Analytical/performance cookies: These cookies allow us to recognize and count the number of visitors and to see how visitors move around our website when they are using it. This helps us improve the way our website works, for example, by ensuring you are finding what you are looking for easily.
        • Functionality cookies: These cookies are used to recognize you when you return to our website. This enables us to personalize our content for you, greet you by name, and remember your preferences (e.g., your mailing and notification preferences).

          Note that third parties (e.g., providers of external services like web traffic analysis services) may also use cookies, over which we have no control. These cookies are likely to be analytical/performance cookies or targeting cookies.

          Most internet browsers are initially set up to automatically accept cookies. You can change the settings to block cookies or to alert you when cookies are being sent to your device. There are many ways to manage cookies. Help in turning off cookies can be found in your browser or mobile phone help files or at this website. If you disable the cookies we use, you may not be able to access all or parts of our site.

          Cookies used by C2CB on the website (https://c2cb.wildapricot.org):

          Cookie Prefix



          Stores the last opened page in admin view. Used when switching between public and admin view.


          Additional session key


          Also used to display notifications in place of the Wild Apricot logo


          Used to display notifications in place of the Wild Apricot logo


          Used for CSRF (Cross-site request forgery) attack protection


          Stores the return URL after an unsuccessful attempt to authorize a transaction with Wild Apricot Payments (AffiniPay).


          Used to determine if the user is viewing the site in https mode


          Stores the last opened page in public view. Used when switching between admin and public view.


          Stores the return URL after successfully authorizing a transaction with Wild Apricot Payments (AffiniPay).


          Stores role of user (contact/member/admin)


          Stores the association ID. Used when authorizing a transaction with Wild Apricot Payments (AffiniPay).


          Used to display information about incomplete applications and event registrations, open invoices etc.


          Test cookie used to determine if cookies are enabled in client browser


          Main authorization cookie


          Used for wizards (member application, event registration, etc)


          Also used for wizards (member application, event registration, etc)

          Possible Future Privacy Policies

          The policies above are in development, pending use of this website for other activities that might affect privacy.

          Already a registered volunteer? Log in through the icon below:

          Log in
          Powered by Wild Apricot. Try our all-in-one platform for easy membership management