{"id":180,"date":"2022-07-16T17:07:30","date_gmt":"2022-07-16T17:07:30","guid":{"rendered":"https:\/\/connectionpoint.com\/help\/?post_type=docs&#038;p=180"},"modified":"2023-01-18T12:55:30","modified_gmt":"2023-01-18T20:55:30","password":"","slug":"connectionpoint-security-description","status":"publish","type":"docs","link":"https:\/\/connectionpoint.com\/help\/docs\/connectionpoint-security-description\/","title":{"rendered":"ConnectionPoint Security Description"},"content":{"rendered":"\n<p class=\"has-text-align-center has-pale-cyan-blue-background-color has-background has-medium-font-size\"><strong>This document describes the data security environment for ConnectionPoint systems. <\/strong><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>This environment applies to our crowdfunding applications including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/fundrazr.com\" target=\"_blank\" rel=\"noreferrer noopener\">FundRazr<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/cocopay.co\" target=\"_blank\" rel=\"noreferrer noopener\">CoCoPay<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/crowdfundr.com\" target=\"_blank\" rel=\"noreferrer noopener\">Crowdfundr<\/a><\/li>\n<\/ul>\n\n\n\n<p>It also applies to the underlying crowdfunding-as-a-service infrastructure used under contract by<br>ConnectionPoint whitelabel partners.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Overview<\/strong><br>ConnectionPoint takes the security, preservation, and privacy of our customer\u2019s data very seriously. It is<br>our intention not only to adhere to applicable data privacy laws in Canada and America but to go<br>beyond that with best practices from other regions such as the European Union including the GDPR<br>regulations. We publish and communicate our data privacy policy to our customers in links from our<br>website pages and, on request, in a written and dated document.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To achieve these goals, we manage these aspects of our systems:<br>\u2022 Computing infrastructure<br>\u2022 Data storage locations<br>\u2022 Data encryption<br>\u2022 Data access controls<br>\u2022 Employee access<br>\u2022 Customer access<br>\u2022 Credit card data protection<br>\u2022 Payment transaction data flow<br><\/p>\n\n\n\n<p>Each of these aspects will be discussed in more detail below.<br><\/p>\n\n\n\n<p><strong>Computing infrastructure<\/strong><br>We host our compute servers with Amazon Web Services (AWS) at locations in Quebec in Canada and<br>North Virginia in America. By leveraging the investments AWS has made in physical security and data<br>availability, we can provide very high levels of data protection at low cost.<\/p>\n\n\n\n<p><strong>These benefits include things like<\/strong><br>\u2022 Generator-backup of all electrical systems intended to cover extended periods of electrical<br>outages from natural disasters like hurricanes, tornados or floods.<br>\u2022 Armed physical building security at the data server locations to prevent malicious attacks from<br>disgruntled persons or even terrorists.<br>\u2022 Network intrusion detection and denial-of-service attack counter-measures.<br>We follow AWS best practices in building our applications that use their data services and enjoy the<br>many benefits they provide.<br>AWS is widely admired for their commitment to data security and privacy. They provide extensive<br>documentation on their security practices. This information is available on their web site here.<br><\/p>\n\n\n\n<p><strong>Data Storage Locations<\/strong><br>We store application and customer data in two AWS data centers. Data for customers who prefer<br>storage within Canada is stored in the facility in Quebec. Data for other customers is stored in North<br>Virginia.<br><\/p>\n\n\n\n<p><strong>Data Encryption<\/strong><br>Data stored within the databases are encrypted. Even if the database itself was copied and moved from<br>our facilities it cannot be read without our secret access keys. Access to these keys is restricted to key<br>employees of ConnectionPoint who commit to their protection via signed employee data confidentially<br>agreements.<br><\/p>\n\n\n\n<p><strong>Data Access Controls<\/strong><br>Internet access to our database servers is very tightly controlled. Only machines communicating from a<br>short whitelist of known locations (as defined by their IP addresses) are permitted access to the data.<br>These known locations correspond to the ConnectionPoint offices and specific machines in possession of<br>our CEO and CTO. All communication with our computing and database servers is over secure IP<br>protocols such as SSL and HTTPS.<br>All other access to the data is managed through our application compute servers. Our applications<br>enforce rules to control access i.e. who can view data and what data each individual is allowed to load.<br><strong>Employee Access<\/strong><br>ConnectionPoint employees are required to sign data confidentially and protection agreements.<br>Employees are restricted in what data they are allowed to access and are granted access only to data<br>they need to perform their jobs.<br>Employee login access to our control systems such as managing the AWS environment or accessing our<br>application master accounts at Facebook, LinkedIn, Google, PayPal, WePay, Stripe, etc. is protected by<br>two-factor authentication. This means that accessing one of our systems using an employee\u2019s account requires not only an identifier and password but access to a code generator on an employee\u2019s mobile<br>phone which creates a unique identification number for each access attempt or via a text-back service<br>that sends a unique, time-limited identifier to the employee\u2019s phone.<br><strong>Customer Access<\/strong><br>ConnectionPoint customers, after logging in, can access their donor and contribution information<br>through secure web pages on our sites. Customers can grant their employees and volunteers various<br>levels of access. This provides very granular levels of control over who can see and access donor<br>information. The chart below is copied from within our application and shows these levels.<\/p>\n\n\n\n<p>Customers in the Owner or Manager role can download all donor and contribution information into CSV<br>or XLS files. These files are transmitted over encrypted channels to the user\u2019s device to prevent<br>interception while transiting over the network.<br>An important point from the chart above is that Promoters (either staff members or volunteers) can<br>securely upload their own contact lists to the system. The Promoter can then send an email to the<br>members of this list prompting them to support the campaign. Only those contacts that proactively<br>\u201dopt-in\u201d to receiving information from the organization are copied into the organization\u2019s records. This is in compliance not only with anti-spam legislation such as CASL but also with best practices for<br>preserving personal privacy such as the European Union\u2019s GDPR and California\u2019s CCPA.<br>Credit Card Data Protection<br>ConnectionPoint does not store credit card data. This is done very intentionally to eliminate the<br>potential for a security breach either through internal employee malfeasance or by internet hacker<br>attacks. We work with payment processing partners who offer mechanisms for us to process payment<br>transactions without requiring us to manage the card data. With this approach we can rely on the<br>payment processors highest levels of Payment Card Industry (PCI) data security compliance without<br>having to implement these costly procedures ourselves. Despite this approach, we still follow PCI<br>compliance standards ourselves as best practices for maintaining customer data security.<br><strong>Payment Transaction Data Flow<\/strong><br>The payment processing industry is complex and intentionally obscure. This next section will explain<br>how data security is maintained as payments are processed by ConnectionPoint in cooperation with our<br>partners PayPal, Stripe and WePay.<br><strong>There are three main flavors of payment transactions:<\/strong><br>1) Payments via credit cards<br>2) Payments via bank transfers<br>3) Payments via a PayPal account<br>ConnectionPoint processes all three types of transactions via one or more of our three payment<br>processing partners depending on the preferences of our customer. In addition, we also can process<br>transactions using a PayPal account. These will be discussed separately.<br>Credit cards via Stripe or WePay<br>Processing credit cards requires a donor to enter their name, billing address, credit card number, expiry<br>date and CVV number into an online form. When paying with Stripe or WePay, this form is hosted on the<br>ConnectionPoint product page. The contents of the form are encrypted and delivered to the donor\u2019s<br>browser using Secure Sockets Layer (SSL) technology. This encryption is done in case hackers are<br>monitoring traffic on the wireless network and trying to intercept this important data.<br>The data entered into this form is encrypted and \u201ctokenized\u201d to make it harder to intercept and then<br>sent from ConnectionPoint\u2019s servers to the payment processor\u2019s Application Programming Interface<br>(API) over SSL. The payment processor creates a transaction requesting payment that is securely<br>transferred to the credit card Interchange Network \u2013 the massive global system run by the banks and<br>credit card processing companies. The bank or credit card company that issued the credit card checks<br>the availability of credit on the card and, if after appropriate anti-fraud security checks are done and the<br>transaction is approved, debits the card for the value of the transaction. The completed transaction<br>confirmation message is returned via the Interchange Network and the payment processing account of<br>ConnectionPoint\u2019s customer is credited with the value of the transaction less any agreed upon processing fees. It is important to note that at no time in this process did ConnectionPoint hold or have access to the value of the transaction.<br>Bank payments via Stripe or WePay<br>When using Stripe or WePay it is possible for customers in the US to enable their account such that a<br>donor can elect to pay via a bank card. When this is turned on an additional option of Pay by bank is<br>provided at checkout. Clicking on this link opens a new window containing a secure webpage on the<br>WePay or Stripe systems. There, the donor is prompted to search for their bank, securely log in to the<br>bank\u2019s payment system, select the account to fund the payment and confirm the transaction. On the<br>successful completion of the transaction the donor is returned to the campaign page and prompted for<br>any additional tax receipt information that has been requested by the campaign. At no time in this<br>process are the details of the bank account shared with ConnectionPoint or made visible outside of the<br>bank\u2019s secure website.<br><\/p>\n\n\n\n<p><strong>Paying with PayPal<\/strong><br>When paying via PayPal as the payment processor the process is slightly different. When the donor<br>clicks to confirm they want to make a contribution, they are transferred to a secure PayPal webpage.<br>There, they are prompted to log into their PayPal account with their email and PayPal password to<br>complete the transaction. They can select any of the funding sources attached to the PayPal account<br>including previously registered credit cards, connected bank accounts or even a PayPal account balance.<br>If they do not have a PayPal account, they click on a Pay as a guest option which prompts them for their<br>credit card information as described above. On successful completion of the transaction, they are<br>returned to the campaign page and prompted for any additional tax receipt information requested by<br>the campaign. At no time are the internal details of the funding payment account (such as the bank<br>account number, credit card number or even credit card type) shared with ConnectionPoint.<br>Recurring Payment Transaction Data Flow<br>As mentioned above ConnectionPoint does not store credit card data. This complicates the process for<br>securely managing recurring payments and pledge payments i.e. payments made conditionally on the<br>achievement of certain future objectives. By working in collaboration with our payment processors we<br>have a good solution to this problem.<br>To enable the processing of these types of payments, contributors are prompted during the payment<br>processor portions of the payment workflows to pre-authorize future payments. If the contributor<br>grants the authorization, ConnectionPoint is provided with a secure \u201ctoken\u201d which we store in our<br>database. At the appropriate times in the future when we want to process a recurring payment or<br>pledge payment, we submit the token to the payment processor instead of the contributor\u2019s payment<br>card data. This token presentation authorizes the payment processors to create a transaction according<br>to the parameters the contributor agreed to (i.e. the value and frequency of the contribution) and the<br>transaction is executed using the Interchange Network.<br>This process is very secure because even if the preauthorized tokens are stolen from our database, they<br>cannot be processed by anyone other than ConnectionPoint and to any other beneficiary besides the<br>organization originally identified as the recipient of funds in the authorization transaction.<br>Summary<br>ConnectionPoint cares deeply about the security of our customers\u2019 information and the integrity of our<br>payment processing activities. We have implemented industry best practices to help us achieve a very<br>high level of security. However, we are always interested in further improvements to our system and<br>welcome feedback on perceived vulnerabilities and suggested enhancements.<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-0dfbf163 wp-block-group-is-layout-flex\">\n<figure class=\"wp-block-image is-resized\"><a href=\"https:\/\/fundrazr.com\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"365\" height=\"106\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"FundRazr logo, click to go to platform\" class=\"wp-image-3757 lazyload\" style=\"aspect-ratio:3.443396226415094;width:189px;height:auto\" sizes=\"auto, (max-width: 365px) 100vw, 365px\" data-src=\"https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/FR-logo-for-footer.png\" data-srcset=\"https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/FR-logo-for-footer.png 365w, https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/FR-logo-for-footer-300x87.png 300w, https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/FR-logo-for-footer-360x105.png 360w\"><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><a href=\"petfundr.com\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"307\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"PetFundr logo, click to go to platform\" class=\"wp-image-3778 lazyload\" style=\"aspect-ratio:3.3355048859934855;width:173px;height:auto\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" data-src=\"https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/05\/petfundr_logo60-1024x307.png\" data-srcset=\"https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/05\/petfundr_logo60-1024x307.png 1024w, https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/05\/petfundr_logo60-300x90.png 300w, https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/05\/petfundr_logo60-768x230.png 768w, https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/05\/petfundr_logo60-360x108.png 360w, https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/05\/petfundr_logo60.png 1128w\"><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><a href=\"https:\/\/crowdfundr.com\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"365\" height=\"106\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"Crowdfundr logo, click to go to platform\" class=\"wp-image-3758 lazyload\" style=\"aspect-ratio:3.443396226415094;width:189px;height:auto\" sizes=\"auto, (max-width: 365px) 100vw, 365px\" data-src=\"https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/CF-logo-for-footer.png\" data-srcset=\"https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/CF-logo-for-footer.png 365w, https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/CF-logo-for-footer-300x87.png 300w, https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/CF-logo-for-footer-360x105.png 360w\"><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image is-resized\"><a href=\"https:\/\/cocopay.co\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"365\" height=\"106\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" alt=\"Cocopay logo, click to go to platform\" class=\"wp-image-3759 lazyload\" style=\"aspect-ratio:3.443396226415094;width:220px;height:auto\" sizes=\"auto, (max-width: 365px) 100vw, 365px\" data-src=\"https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/CCP-logo-for-footer.png\" data-srcset=\"https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/CCP-logo-for-footer.png 365w, https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/CCP-logo-for-footer-300x87.png 300w, https:\/\/connectionpoint.com\/help\/wp-content\/uploads\/2023\/04\/CCP-logo-for-footer-360x105.png 360w\"><\/a><\/figure>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This document describes the data security environment for ConnectionPoint systems. This environment applies to our crowdfunding applications including: It also applies to the underlying crowdfunding-as-a-service infrastructure used under contract byConnectionPoint&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"doc_category":[25],"doc_tag":[],"class_list":{"0":"post-180","1":"docs","2":"type-docs","3":"status-publish","5":"doc_category-about-connectionpoint"},"year_month":"2026-04","word_count":1768,"total_views":"1724","reactions":{"happy":"0","normal":"0","sad":"0"},"author_info":{"name":"Shannon Belliveau","author_nicename":"shannon","author_url":"https:\/\/connectionpoint.com\/help\/author\/shannon\/"},"doc_category_info":[{"term_name":"About ConnectionPoint","term_url":"https:\/\/connectionpoint.com\/help\/help-category\/about-connectionpoint\/"}],"doc_tag_info":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ConnectionPoint Security Description -<\/title>\n<meta name=\"description\" content=\"This document describes the data security environment for ConnectionPoint systems. (FundRazr, Crowdfundr, CoCoPay)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/connectionpoint.com\/help\/docs\/connectionpoint-security-description\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ConnectionPoint Security Description -\" \/>\n<meta property=\"og:description\" content=\"This document describes the data security environment for ConnectionPoint systems. (FundRazr, Crowdfundr, CoCoPay)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/connectionpoint.com\/help\/docs\/connectionpoint-security-description\/\" \/>\n<meta property=\"og:site_name\" content=\"ConnectionPoint Help Center\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-18T20:55:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/connectionpoint.com\\\/help\\\/docs\\\/connectionpoint-security-description\\\/\",\"url\":\"https:\\\/\\\/connectionpoint.com\\\/help\\\/docs\\\/connectionpoint-security-description\\\/\",\"name\":\"ConnectionPoint Security Description -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/connectionpoint.com\\\/help\\\/#website\"},\"datePublished\":\"2022-07-16T17:07:30+00:00\",\"dateModified\":\"2023-01-18T20:55:30+00:00\",\"description\":\"This document describes the data security environment for ConnectionPoint systems. (FundRazr, Crowdfundr, CoCoPay)\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/connectionpoint.com\\\/help\\\/docs\\\/connectionpoint-security-description\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/connectionpoint.com\\\/help\\\/docs\\\/connectionpoint-security-description\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/connectionpoint.com\\\/help\\\/docs\\\/connectionpoint-security-description\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/connectionpoint.com\\\/help\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Help Centre\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ConnectionPoint Security Description\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/connectionpoint.com\\\/help\\\/#website\",\"url\":\"https:\\\/\\\/connectionpoint.com\\\/help\\\/\",\"name\":\"ConnectionPoint Help Center\",\"description\":\"Help for FundRazr, Crowdfundr, CoCoPay, and PetFundr\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/connectionpoint.com\\\/help\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ConnectionPoint Security Description -","description":"This document describes the data security environment for ConnectionPoint systems. (FundRazr, Crowdfundr, CoCoPay)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/connectionpoint.com\/help\/docs\/connectionpoint-security-description\/","og_locale":"en_US","og_type":"article","og_title":"ConnectionPoint Security Description -","og_description":"This document describes the data security environment for ConnectionPoint systems. (FundRazr, Crowdfundr, CoCoPay)","og_url":"https:\/\/connectionpoint.com\/help\/docs\/connectionpoint-security-description\/","og_site_name":"ConnectionPoint Help Center","article_modified_time":"2023-01-18T20:55:30+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/connectionpoint.com\/help\/docs\/connectionpoint-security-description\/","url":"https:\/\/connectionpoint.com\/help\/docs\/connectionpoint-security-description\/","name":"ConnectionPoint Security Description -","isPartOf":{"@id":"https:\/\/connectionpoint.com\/help\/#website"},"datePublished":"2022-07-16T17:07:30+00:00","dateModified":"2023-01-18T20:55:30+00:00","description":"This document describes the data security environment for ConnectionPoint systems. (FundRazr, Crowdfundr, CoCoPay)","breadcrumb":{"@id":"https:\/\/connectionpoint.com\/help\/docs\/connectionpoint-security-description\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/connectionpoint.com\/help\/docs\/connectionpoint-security-description\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/connectionpoint.com\/help\/docs\/connectionpoint-security-description\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/connectionpoint.com\/help\/"},{"@type":"ListItem","position":2,"name":"Help Centre"},{"@type":"ListItem","position":3,"name":"ConnectionPoint Security Description"}]},{"@type":"WebSite","@id":"https:\/\/connectionpoint.com\/help\/#website","url":"https:\/\/connectionpoint.com\/help\/","name":"ConnectionPoint Help Center","description":"Help for FundRazr, Crowdfundr, CoCoPay, and PetFundr","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/connectionpoint.com\/help\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"knowledge_base_info":[],"knowledge_base_slug":[],"_links":{"self":[{"href":"https:\/\/connectionpoint.com\/help\/wp-json\/wp\/v2\/docs\/180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/connectionpoint.com\/help\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/connectionpoint.com\/help\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/connectionpoint.com\/help\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/connectionpoint.com\/help\/wp-json\/wp\/v2\/comments?post=180"}],"version-history":[{"count":0,"href":"https:\/\/connectionpoint.com\/help\/wp-json\/wp\/v2\/docs\/180\/revisions"}],"wp:attachment":[{"href":"https:\/\/connectionpoint.com\/help\/wp-json\/wp\/v2\/media?parent=180"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/connectionpoint.com\/help\/wp-json\/wp\/v2\/doc_category?post=180"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/connectionpoint.com\/help\/wp-json\/wp\/v2\/doc_tag?post=180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}