Inclusion/Exclusion Criteria

How Can 2-1-1 Long Island help me? | How does the 2-1-1 call center work? | What are the benefits of the 2-1-1 online database? | What's Included? | Inclusion Criteria

2-1-1 Database Inclusion Criteria:

a)    Not-for-profit organizations registered as federally exempt 501(c)(3), or community organizations of equivalent status, including, but not limited to, faith based institutions, self-help groups, elected officials, civic and professional organizations and public agencies.

b)    Nationally-based not-for-profit organizations outside of our geographic parameters which provide a service not available locally.

c)    For-profit organizations may be included if they meet a community need where insufficient not-for-profit or government services exist to meet the need and if they are licensed or certified by respective licensing entities.

d)    Organizations shall have been in existence for six months or are affiliated with another organization that has been in existence for at least one year.  Exceptions may be made.

e)    Organizations must have a demonstrated ability to provide the service as stated on the resource profile form, as indicated by information from consumers or professionals.

2-1-1 Database Exclusion Criteria:

a)    Any agency that consistently claims it performs certain functions or is open certain hours and is not, will be reviewed and possibly deleted.

b)    Any agency that provides a service that is characterized as illegal in nature.

c)    Individual practitioners. 

Note:  Exclusion appeals may be directed in writing to the 2-1-1 Long Island regional collaborative.


a)    All information will be validated annually.

b)    The name and title of person verifying information from each agency will be noted.

c)    Inclusion/exclusion policy will be reviewed, at a minimum, every three years.

d)    Returned and approved agency profiles will be kept or stored for a minimum of three years.

e)    The 2-1-1 Long Island regional participants will safeguard the resource database through duplication or computerized back-up.  The back-up database will be kept in a secure location where it is protected from destruction or theft.