FFY25 Nonprofit Security Grant Program - Questions & Answers
Questions and Answers regarding the Nonprofit Security Grant Program
Q: I am not able to open the Investment Justification Form.
A: To access the Investment Justification (IJ) Form, you must first save the document to your computer before you open it. The following instructions are provided next to the IJ link: "Users who have difficulty opening this document can right-click on the hyperlink and save the document to your computer; you will then be able to open the document from your files."
Or follow the steps below to access the IJ form:
Click on the link to open it
Click the Download icon on your computer screen to download the form. The form is then downloaded to the Downloads folder of your desktop
Open the desktop Downloads folder where you will see the form, then click on the PDF IJ form to open it
Q: We are looking at this opportunity but also still have a grant pending with the Commonwealth Nonprofit Security Grant Program (CNSGP) or Commonwealth Nonprofit Security Personnel Grant Program (CNSPGP). Are we still allowed to apply for the FEMA funding?
A: Due to the volume of applications received under the state-funded Commonwealth Nonprofit Security Grant Program and Commonwealth Nonprofit Security Personnel Grant Program, the application review process remains ongoing for these programs. Once funding decisions are finalized, all applicants will be notified via email. Organizations that have applications pending for either state-funded programs are invited to apply for the federally funded Nonprofit Security Grant Program.
Q: Are we required to have a UEI SAM.gov number to apply?
A: As a 501c (3) organization, you are eligible to apply to the Nonprofit Security Grant Program. You are not required to have a UEI at the time of application, but you must have one to receive funds. Here is the website to use to request your UEI#: SAM.gov | Home
Q: Requesting a Copy or a link to Vulnerability Assessment Templates.
A: OGR does not provide a vulnerability assessment template. Organizations can utilize different methods to conduct their vulnerabilities assessment. An example of an assessment is to have a security firm/contractor conduct a vulnerability assessment, working with your local police department or using a self-assessment tool such as the one offered by CISA.
Q: What type of projects are allowable under the NSGP?
A: A listing of allowable projects is specified in the AGF.
Q: How many applications can an organization submit?
A: One organization can submit up to three (3) site-specific applications.
Help Us Improve Mass.gov with your feedback
Thank you for your website feedback! We will use this information to improve this page.
If you would like to continue helping us improve Mass.gov, join our user panel to test new features for the site.