Constellation Research and Analytics
  • Home
  • About Us
  • Services
  • Past Projects
  • Research Tips / Blog
  • Signup For Our Newsletter
  • Giving Back

Contact Us Today! JasonRoss@ConstellationResearchAnalytics.ca or 604-780-7643

Constellation Research and Analytics
  • Home
  • About Us
  • Services
  • Past Projects
  • Research Tips / Blog
  • Signup For Our Newsletter
  • Giving Back

LEGACY IDENTIFIER SERVICE (PLANNED GIFT GOLD MINING)

Secure More Planned Gifts So You Can Secure Your Healthcare Charities Future

Demographics in Canadian society are shifting and the donor pool is skewing ever more towards older donors. Are you prepared for the demographic wave in the next decade when Boomers pass on their wealth to heirs and charities? 



How The Legacy Identifier Service Pocess Works


Rather than use the same outdated models that have been around for decades for determining who would make a good planned giving donor (giving trends change right??), our Legacy Identifier Service uses data analytics to analyze who typically leaves a planned gift to your organization and scans the database to determine who fits this “ideal planned gift prospect” profile. 


With this list, your fundraisers can fill their portfolios with qualified PG prospects that are ready to connect with them and they can secure more planned gifts for your healthcare organization.  Secure your charity's future by ensuring there will be funding available to it in that future!



How We Protect Our Clients' Data


We take our responsibility for protecting our clients' data very seriously. Along with the usual cyber-security measures (antivirus protection, VPN deployment, IT security procedures, data encryption) we also employ a Privacy By Design framework. PbD was created by Deloitte Canada to enable data manipulation and analysis while simulataneously protecting clients' data security. Here's how it works:


  

  • Data Minimization (Reduce the data collected) – This involves having no personally identifiable information being collected unless a specific and compelling purpose is defined – effectively eliminating privacy risk at the earliest stage.


  • De-identification (Make individuals less identifiable) – This involves datasets being stripped of all information that could identify an individual, either directly or though linkages to other datasets.


  • User access controls (Restrict access) This is a set of processes that grant or deny specific requests to obtain information, and is generally combined with other security policies to safeguard personal information.

Past Projects:

- Coming soon!


Reviews From Our Happy Planned Giving Clients

- Coming soon!

Book Your "Dig New Goldmines" phone call now!
  • Home
  • About Us
  • Services
  • Past Projects
  • Giving Back

Constellation Research and Analytics

Phone: 604-780-7643

Email: jasonross@constellationresearchanalytics.ca

Copyright © 2025 Constellation Research and Analytics - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept