TL;DR: Churches collect some of the most sensitive personal data of any organization: religious affiliation, financial giving, children’s details, health conditions, and confidential prayer requests. Yet most churches have little to no data security in place. In 2024, a single misconfigured database at a Brazilian church app company exposed 932,000 members’ data. This guide covers the laws you need to know, the mistakes to avoid, and a practical checklist to protect your congregation.


Why Church Data Security Should Be on Every Pastor’s Radar

If you think your church is too small to worry about data security, think again.

Every church, regardless of size, collects personal information. Names, addresses, phone numbers, email addresses, dates of birth. That alone makes you a custodian of sensitive data.

But churches go far beyond basic contact details. You hold data that most businesses never touch:

  • Religious affiliation. The simple fact that someone attends your church reveals their faith. Under laws like the GDPR, this is classified as “special category” data, the highest level of sensitivity.
  • Financial giving records. Tithe and donation histories show income patterns and financial behaviour.
  • Children’s information. Sunday school, youth groups, and child check-in systems store data about minors.
  • Health and prayer requests. When someone asks the prayer team to pray for their cancer diagnosis or marriage struggles, that information is deeply personal.
  • Pastoral counselling notes. Some churches keep records of counselling sessions, which may include mental health disclosures.

If this data were leaked, the consequences would be devastating. Members could face discrimination based on their faith. Financial details could be exploited. Children’s information could be misused. And your congregation’s trust would be shattered.


The Wake-Up Call: 932,000 Church Members Exposed in Brazil

In 2024, cybersecurity researchers at Cybernews discovered a massive data leak from inChurch, a Brazilian company providing church management apps to over 5,000 churches in Brazil and 45,000 worldwide.

An improperly configured Google Cloud Storage bucket left 9.2 million files publicly accessible on the internet. Among those files were Excel spreadsheets containing the personal data of 932,000 church members.

The leaked data included names, email addresses, phone numbers, home addresses, and other personal details. The cause was not a sophisticated cyberattack. It was a simple misconfiguration. Nobody set proper authentication on a cloud storage bucket.

The most alarming part? The data sat exposed for an unknown period before it was discovered. inChurch’s CTO stated that no evidence of malicious exfiltration was found, but the reality is clear: the data was accessible to anyone who knew where to look.

This is not an isolated incident. In December 2024, the BlackLock ransomware group struck First Baptist Church in High Springs, and RansomHub claimed a ransomware attack on Greater Mt Calvary Holy Church in Washington, D.C. Cybercriminals have identified churches as soft targets.

If a company serving 45,000 churches can make this mistake, any church can.


What Data Does Your Church Actually Hold?

Most pastors underestimate the volume and sensitivity of the data their church processes. Here is a breakdown.

Data TypeExamplesWhy It’s Sensitive
Member profilesName, address, phone, email, date of birth, marital status, family relationshipsPersonally identifiable information (PII)
Religious affiliationChurch membership, baptism records, small group participationSpecial category data under GDPR/POPIA
Financial recordsTithe amounts, giving history, bank details, payment methodsReveals income and financial behaviour
Children’s dataNames, ages, parent details, allergies, medical notes, photosSubject to strict child protection laws
Health informationPrayer requests mentioning illness, pastoral care notes, disability accommodationsMedical data is heavily regulated
Communication logsWhatsApp messages, emails, SMS, counselling notesMay contain private disclosures
Volunteer recordsBackground check results, safeguarding documentationCriminal record data is highly sensitive
Attendance recordsWho attended which service, event, or groupReveals patterns of religious practice

The key insight: Simply knowing that someone is a member of your church reveals their religious beliefs. In many jurisdictions, that alone triggers the highest level of data protection requirements.


7 Common Security Mistakes Churches Make

Most church data breaches are not caused by hackers. They are caused by everyday practices that nobody thought to question.

1. Shared Passwords

The church office has one login for everything. The admin, the pastor, the worship leader, and two volunteers all use the same email password. When one person leaves, nobody changes it.

2. Member Data in Spreadsheets

Your membership list lives in a Google Sheet or Excel file on someone’s personal laptop. There is no encryption, no access control, and no audit trail of who viewed or edited it.

3. Unencrypted Backups

If your church management software backs up data, where does that backup go? If it is an unencrypted file sitting in a Dropbox folder or on a USB drive, you have a serious vulnerability.

4. No Access Controls

Every volunteer who helps in the church office can see every member’s giving history, every prayer request, and every child’s record. There is no concept of “need to know” access.

5. Personal Devices Without Security

Staff and volunteers access church systems from personal phones and laptops with no security policies, no screen locks, no remote wipe capability.

6. WhatsApp Groups with Sensitive Data

Church leaders share prayer requests, member concerns, and even financial information in WhatsApp groups. If anyone in that group loses their phone or gets hacked, all of that data is exposed.

7. No Incident Response Plan

If your data were breached tomorrow, who would you call? What would you tell your congregation? Most churches have no plan at all.


Data Protection Laws Your Church Needs to Know

Data protection is not just a corporate concern. Churches are explicitly covered by data protection laws worldwide. Here is what applies to you depending on where your church operates.

GDPR (UK and EU)

The General Data Protection Regulation is one of the most comprehensive data protection frameworks in the world. It applies to every church in the UK and EU.

Key points for churches:

  • Religious beliefs are classified as “special category data” under Article 9, requiring extra safeguards
  • Churches have a limited exemption under Article 91 if they had pre-existing data protection rules, but most churches do not qualify
  • You need a lawful basis to process member data. Consent or “legitimate interest” are the most common
  • Members have the right to access, correct, and delete their data
  • Data breaches must be reported to the ICO (UK) or relevant authority within 72 hours
  • Fines can reach up to 4% of annual turnover or 20 million euros

For churches in the UK specifically, the ICO provides detailed guidance on handling special category data. If you serve a diaspora community in the UK, check our guide to UK church management software and our diaspora church management guide for more context.

POPIA (South Africa)

South Africa’s Protection of Personal Information Act has been fully enforceable since July 2021. It applies to every church operating in the country.

Key points for churches:

  • Religious beliefs are classified as “special personal information” under Section 28
  • Churches can process members’ religious data under a specific exemption for spiritual or religious organizations, but only for data relating to their own members
  • You must appoint an Information Officer responsible for POPIA compliance
  • Data breaches must be reported to the Information Regulator
  • Penalties include fines of up to R10 million and up to 10 years imprisonment

For South African churches exploring software options, our South Africa church management guide covers tools that are POPIA-aware.

NDPA (Nigeria)

Nigeria’s Data Protection Act, signed into law in June 2023, replaced the earlier NDPR regulation and established the Nigeria Data Protection Commission (NDPC) as the enforcement body.

Key points for churches:

  • All organizations processing personal data in Nigeria must comply, including churches
  • You must obtain informed, specific, and freely given consent before processing member data
  • Data breaches must be reported to the NDPC within 72 hours
  • Sensitive personal data (including religious beliefs) requires additional safeguards
  • Organizations must implement technical and organizational measures to protect data, including encryption and access controls

Nigerian churches managing members digitally should see our Nigeria church management software guide for tools that understand the local landscape.

Other Regions

RegionKey LawReligious Data Status
BrazilLGPD (2020)Religious beliefs are “sensitive data”
KenyaDPA (2019)Religious beliefs are “sensitive personal data”
GhanaDPA (2012)Covers “data relating to religious beliefs”
IndiaDPDPA (2023)Broad personal data protections apply
AustraliaPrivacy ActReligious affiliation is “sensitive information”

The pattern is clear: Around the world, data about religious beliefs is treated as some of the most sensitive information a person can share. Your church has a legal and moral obligation to protect it.


Church Data Security Checklist

Here is a practical, actionable checklist your church can implement regardless of size or budget. You do not need a dedicated IT team to get started.

Access and Authentication

  • Use unique accounts for every person. No more shared passwords. Each staff member and volunteer gets their own login.
  • Enable two-factor authentication (2FA) on every system: email, church management software, cloud storage, social media accounts.
  • Implement role-based access. The worship leader does not need to see giving records. The children’s ministry volunteer does not need access to pastoral counselling notes.
  • Review access quarterly. When someone leaves a role, revoke their access immediately.

Data Storage and Encryption

  • Stop using spreadsheets for member data. Move to a proper church management system with built-in encryption and access controls.
  • Encrypt all backups. Whether cloud or local, backups must be encrypted.
  • Know where your data lives. Can you list every system, spreadsheet, and device that holds member information?
  • Delete data you no longer need. Old member records from people who left years ago should be archived or deleted per your retention policy.

Communication and Devices

  • Create a policy for WhatsApp and messaging groups. No sharing of sensitive member data in group chats. Use your church management system’s secure messaging instead.
  • Require screen locks on all devices that access church data.
  • Use a password manager. Services like Bitwarden (free for small teams) eliminate the temptation to reuse passwords.

Policies and Training

  • Write a data protection policy. It does not need to be complicated. A two-page document covering what data you collect, why, and how you protect it.
  • Train your team. Annual training for staff and volunteers on data handling. Focus on phishing awareness, password hygiene, and reporting suspicious activity.
  • Create an incident response plan. Know who to contact, what to tell your congregation, and which regulator to notify if a breach occurs.

Children’s Data

  • Minimize collection. Only collect what is necessary (name, age, parent contact, medical needs for safety).
  • Obtain parental consent before collecting children’s data.
  • Restrict access to children’s records to authorized children’s ministry leaders only.

What to Look for in Church Management Software

Your church management software is the primary system holding your member data. Choosing a platform with strong security is not optional. Here is what to evaluate.

Security FeatureWhat to AskWhy It Matters
Encryption at restIs stored data encrypted (AES-256 or equivalent)?Protects data even if servers are compromised
Encryption in transitDoes the platform use TLS/HTTPS for all connections?Prevents interception during data transfer
Role-based access controlsCan you set different permission levels for different roles?Ensures people only see what they need to
Audit logsCan you see who accessed what data and when?Critical for breach investigation and compliance
Two-factor authenticationDoes the platform support or enforce 2FA?Prevents unauthorized access from stolen passwords
Data backup and recoveryAre backups automated, encrypted, and tested?Ensures you can recover from ransomware or data loss
Data export and deletionCan you export or delete a member’s data on request?Required for GDPR, POPIA, and NDPA compliance
Compliance certificationsSOC 2, ISO 27001, or equivalent?Third-party verification of security practices
Data residencyWhere are servers located? Can you choose your region?Important for GDPR and POPIA compliance
Vendor security practicesDoes the vendor have a security page or bug bounty program?Shows they take security seriously

Not every platform will tick every box. But if a church management tool cannot answer basic questions about encryption and access controls, that is a red flag.

For a full comparison of platforms, see our complete guide to church management software in 2026.


The Global Angle: Why Churches in Africa and Latin America Face Greater Risk

The conversation about church data security has been dominated by North American and European voices. But the reality is that churches in Africa and Latin America face the same risks with far less awareness and fewer resources.

Consider the following:

  • The fastest-growing churches in the world are in Sub-Saharan Africa and Latin America. Many are digitizing membership records, giving, and communication for the first time.
  • Data protection laws are newer. Nigeria’s NDPA only took effect in 2023. Kenya’s DPA enforcement is still maturing. Many church leaders are unaware these laws apply to them.
  • Technology infrastructure varies widely. Churches may rely on personal phones, free cloud tools, and WhatsApp for everything. These tools are convenient but lack the security controls that purpose-built software provides.
  • The inChurch breach was a Brazilian company. The biggest church data breach on record did not happen in the US or Europe. It happened in Brazil, affecting churches across Latin America.

This is not about blame. It is about awareness. If your church is in Lagos, Nairobi, Johannesburg, or Sao Paulo, you are processing the same types of sensitive data as a church in London or New York. Your members deserve the same level of protection.

The good news is that modern cloud-based church management tools are increasingly being built with global churches in mind. Fair pricing for local markets, multilingual support, and security standards that meet international requirements. The era of one-size-fits-all American church software is ending.


Our Recommendation

Church data security is not a “nice to have.” It is a responsibility.

Your congregation trusts you with some of the most intimate details of their lives. Their faith, their finances, their children, their struggles. That trust comes with an obligation to protect their information.

Here is what we recommend:

  1. Start with the checklist above. You do not need to do everything at once. Begin with unique accounts, 2FA, and moving off spreadsheets.
  2. Know your legal obligations. Whether it is GDPR, POPIA, NDPA, or another framework, understand what applies to your church and comply.
  3. Choose software that takes security seriously. Look for encryption, access controls, audit logs, and compliance certifications. Our 2026 church management software guide breaks down which platforms deliver on security.
  4. Train your team. The biggest vulnerability in any organization is human error. Regular training on phishing, passwords, and data handling makes a measurable difference.
  5. Have a plan for when things go wrong. Because eventually, something will happen. A lost phone, a phishing email, a misconfigured setting. The difference between a minor incident and a major breach is how quickly and effectively you respond.

Your members chose to trust your church with their personal data. Honour that trust by protecting it.


Frequently Asked Questions

Does my church really need to comply with data protection laws?

Yes. Churches are not exempt from data protection legislation in any major jurisdiction. The GDPR, POPIA, and NDPA all apply to churches that process personal data. The penalties for non-compliance are significant, and more importantly, your congregation expects you to handle their information responsibly.

What is “special category data” and why does it matter for churches?

Under the GDPR, special category data includes information about religious beliefs, health, racial or ethnic origin, and other sensitive attributes. Because church membership inherently reveals someone’s religious beliefs, churches handle special category data by default. This triggers additional requirements for how you collect, store, and process that information.

Is using Google Sheets or Excel for member data a security risk?

It is one of the biggest risks churches face. Spreadsheets have no access controls, no audit logs, no encryption at rest (unless you configure it manually), and they are easily copied or shared. If a volunteer downloads the membership spreadsheet to their personal laptop and that laptop is stolen, you have a data breach. Use a proper church management system instead.

We are a small church with 50 members. Do we still need to worry about this?

Size does not determine risk. A breach affecting 50 members is still a breach. Those 50 people trusted you with their personal data. Small churches are also more likely to use informal systems (spreadsheets, personal email, shared drives) that have weaker security. Start with the basics: unique accounts, 2FA, and a proper church management platform.

How do we handle prayer requests securely?

Prayer requests often contain sensitive health and personal information. Best practices include: limit access to prayer request data to authorized prayer team members, do not share specific requests in public WhatsApp groups, use your church management software’s built-in communication tools rather than personal messaging apps, and establish a retention policy so old prayer requests are deleted after a defined period.

What should we do if we think our church data has been breached?

Act immediately. First, contain the breach by securing the affected system (change passwords, revoke access). Second, assess the scope of the breach: what data was affected and how many people. Third, notify your data protection authority within the required timeframe (72 hours under GDPR and NDPA). Fourth, notify affected members honestly and transparently. Finally, document everything and review what went wrong to prevent it from happening again.

Can we use free tools like Google Workspace for church data?

Google Workspace (even the free tier for nonprofits) offers reasonable security features, including 2FA, access controls, and encryption. The risk is not in the tool itself but in how you use it. If you configure permissions properly, enforce 2FA, and avoid sharing sensitive data in uncontrolled spreadsheets, it can work as a baseline. However, purpose-built church management software provides features that general-purpose tools do not, like role-based member access, giving management, and compliance-ready data handling.


Protecting your church’s data starts with awareness. Share this guide with your church leadership team, your IT volunteers, and anyone who handles member information. The cost of prevention is always lower than the cost of a breach.