Updated Marriage Options Screen
We have updated the layout of the Marriage screen for a more streamlined experience updating this information. The Marriage Options screen now includes the personal information name elements and aliases; […]
New Attribute & Involvements Search Tool
We’ve heard your requests and our customizations team has built a new way of viewing aggregate Attribute and Educational Involvements data in GAIL! Now you can review all the constituents who […]
“Anticipated FY to Close” Column Added to Data List
A column for “Anticipated Fiscal Year to Close” has been added to the Prospects & Plans data list on constituent records. We encourage you to continue adding this data to […]
New Region Codes
New region codes have been added to GAIL for all US Metropolitan Statistical Areas and Combined Statistical Areas as well as all Micropolitan Statistical Areas in the state of Georgia. […]
Building Deliverable Emails
Of course it’s important to create nice looking emails to send to your constituents, but did you know that some of your email elements could actually be keeping them out […]
Mentor Program Interactions
As the UGA Mentor Program continues to grow, you should expect to see more references to it in GAIL. Currently two types of interactions are being added to the records […]
Name Update – Parent Giving
As you may already know, the DAR team formerly known as Parents & Families changed their name to Parent Giving a few years ago. They should be referred as such […]
New Add a Spouse Button
We’ve created a new way to add a spouse to a constituent in GAIL! Rather than looking for the option on the main task bar, now there is an Add […]
Screen Casting in One Press Place
Welcome to One Press Place! You may have noticed there aren’t HDMI cords in the conference and breakout rooms to share your laptop to the big screen, but don’t fret! […]
Automating Process for Deactivating Expired & Inactive GAIL User Accounts
As you are all aware, DAR IT takes the security of our donor information very seriously. One of the fundamental ways to protect information is to limit access to it, […]