Most church boards treat data security as an IT problem. It is not. It is a stewardship problem — the same kind of stewardship the church already exercises over money, facilities, and pastoral confidentiality. Members hand the church information they would not hand a stranger. The question is whether the church is being a faithful custodian of it.
What data your church actually holds
Take an honest inventory. The typical local church database contains:
- Names, addresses, phone numbers, and emails of every member and regular attender — including children.
- Birthdays, anniversaries, marriage status.
- Detailed family relationships, including blended-family structures and custody notes.
- Pastoral notes — sometimes including counseling history, marital struggles, addiction, mental-health concerns.
- Confidential prayer requests — often the most sensitive data in the entire database.
- Giving history, by donor, by date, by fund — in detail.
- Background-check status for volunteers, including any flags.
- Children’s ministry check-in records, including allergies and pickup authorizations.
That is not a customer database. That is a portrait of a community in its most private form. The risk profile is closer to a small medical clinic than a small business.
The threats that actually matter
Forget the Hollywood threat model. The realistic risks for a local church are:
- Account takeover. A staff member reuses a password from a compromised site, and an attacker walks in.
- Phishing. The bookkeeper gets an email “from the pastor” asking for a giving export. They send it.
- Lost devices. A volunteer’s laptop disappears with the directory cached locally.
- Inappropriate insider access. A volunteer with too-broad permissions browses giving records or pastoral notes they have no business seeing.
- Vendor breach. The ChMS vendor or one of their providers gets compromised.
- Departing-staff data export. A former employee takes member data with them.
Any meaningful security posture must address all six. Most do not.
Role-based access — in detail
The single most underused control in church software is role-based access. The defaults are usually too generous. A children’s ministry coordinator does not need to see giving amounts. A volunteer scheduler does not need to see pastoral notes. The senior pastor probably does not need a bulk export of every counseling record on the platform.
A serious ChMS lets you define roles down to the field level — not just “admin / staff / volunteer.” And it logs every read of a sensitive record so that, if a question comes up, you can answer it.
Encryption — in motion and at rest
This sounds technical but the principle is simple. “In motion” means data is encrypted as it travels between the user and the server (TLS 1.2 or better, no exceptions). “At rest” means data is encrypted in the database itself, so a stolen backup file cannot be read.
Both are table stakes in 2026. If a vendor cannot answer “yes, both, here is how,” that tells you what you need to know.
How AI changes the security conversation
AI features in a ChMS introduce a new question: what data is being sent to the AI provider, and under what terms? Honest vendor answers look like this:
- Only the prompt context required for the task is sent — not your entire database.
- Pastoral notes and confidential prayer requests are excluded from generic prompts by default.
- Individual donor amounts are excluded from comms drafting unless explicitly required.
- Your data is not used to train any third-party model.
- Every AI call is logged for audit, with user, time, and scope.
- You can use your own AI provider key per tenant, keeping the legal relationship in your control.
- AI features can be fully disabled per-tenant if your elder board prefers.
If you cannot get specific answers to those, assume the worst.
The questions every elder board should ask
Whether you are evaluating a new platform or auditing an existing one, run through this list at a board meeting:
- Where is our data physically hosted, and under whose jurisdiction?
- Is the database encrypted at rest? Is all traffic encrypted in motion?
- Who at the vendor can read our data, and under what circumstances?
- What is the breach notification timeline written into our contract?
- Can we export everything if we leave, in a usable format?
- How granular is role-based access, and is it audited?
- Are pastoral notes and prayer requests treated differently from general member data?
- What happens to data when a staff member leaves?
- Are background checks stored or only verified?
- What AI providers are involved, and what is sent to them?
- Has the vendor had a third-party security review or SOC 2?
- What is the disaster-recovery plan if the vendor disappears?
What you can do in-house this month
Vendor due-diligence is half the job. The other half is local discipline:
- Turn on multi-factor authentication for every staff and volunteer account that touches the database. Not optional.
- Audit your roles. Most churches have at least one volunteer with admin-level access from a project that ended years ago.
- Establish a clear off-boarding checklist for staff and volunteers who leave.
- Decide who can see giving amounts and write it down.
- Decide who can see pastoral notes and prayer requests and write it down.
- Run a quarterly access review with the executive pastor or administrator.
The pastoral framing
Security in a church is not about paranoia. It is about being trustworthy. A member who hesitates to share a prayer request — because they are not sure where it ends up — is a member the church has not loved well. Good security is invisible to the people who benefit from it; it is the floor of trust that makes pastoral confidence possible at all.
For more on how SanctuaryIQ approaches data handling specifically, see our Security & Stewardship page.