There are Lots of Ways to Donate
Nevada Humane Society has a four star rating with Charity Navigator, the world’s largest and most-utilized independent nonprofit evaluator. Charity Navigator empowers donors of all sizes with free access to data, tools, and resources to guide philanthropic decision making. Through Charity Navigator’s ratings, non-profits are equipped with the nonprofit sector’s premier trust indicator and a powerful platform to raise awareness and funds.
We are very proud of this excellent Charity Navigator rating and highly encourage you to visit the Charity Navigator website to learn more about how our organization achieved this four star rating through our life-saving work helping Norther Nevada’s homeless pets find Forever Homes.
Nevada Humane Society (NHS) places a high priority on protecting your privacy and will never share personal information with third parties. NHS does not collect personal information about visitors to its website except when visitors specifically provide such information on a voluntary basis. Personal information will not be used by or distributed to third parties but will be used by NHS and the payment processor to securely process any donations.
NHS will never sell or rent donors’ names and personal information to anyone outside the organization. Furthermore, it is our practice to abide by all donors’ requests to opt out of receiving emails and/or be excluded from receiving fundraising appeals and/or any other type of mailing or phone call which will cease all communications from us. In addition to unsubscribing, you may also email firstname.lastname@example.org to review personal information collected and request corrections, or to inform NHS you don’t want your information used for NHS marketing purposes. NHS uses a layered approach to security to protect donor information including: proactive maintenance for all the systems which includes security patches, firewalls, intrusion protection, business continuity, disaster recovery solution, and application control that uses zero trust protocols to lock everything and whitelist items in real time.