last updated 12/16/2019
ACS Technologies Group, Inc., and its affiliates, their officers, directors, employees or agents (collectively referred to as "ACST") creates software to help churches, schools, and organizations manage numerous administrative duties. You may be a visitor ("Visitor") to our websites ("Websites"), a customer ("Customer" or “Licensee”, typically a church or an organization) who purchased our products and services (collectively, "Services"), or a guest ("Guest", typically a congregant) that a Customer invited to use our Services. For the sake of simplicity, we’ll specify when we’re referring to Visitors, Customers, and Guests, and we’ll refer to "you" generally.
For Internet connectivity, we use several enterprise providers that deliver fast and reliable access to our Services. In the event that an Internet provider experiences a system failure, ACST has redundant connections in place as a backup.
We monitor critical systems from multiple locations and collect historical data to ensure all systems are functioning at peak efficiency. We also analyze performance trends to help identify potential problems before they affect you.
We deploy and maintain enterprise grade servers running industry standard operating systems in our data center. Using this combination of reliable services, we’ve been able to maintain uptime of over 99.99% historically.
We partner with Amazon Web Services (“AWS”) to host and store our sensitive customer data. AWS commits to at least 99.99% uptime and has a solid reputation in the security industry. AWS is PCI DSS Level 1 compliant as a Service Provider, holds numerous compliance certifications, and also maintains SAS70 Type II certification.
There are distinct differences in how we can assist our Customers when they need help with data backup and recovery for our Desktop and Web-based Services. The time to recover or restore your data depends on the Services you use and the circumstances under which your data was lost.
Our Support department can help Desktop customers make a backup of their data, but we cannot recover or restore lost or corrupt data that is stored locally.
We're able to take elaborate measures to ensure we can recover and protect your data from many scenarios.
We use a combination of advanced hardware and software firewalls from leading network security providers. These firewalls secure your data from multiple threats (e.g. hackers, viruses, spybots, etc). Our staff continuously monitors logs and data points to ensure the integrity of our systems.
No. SSAE 18 is not a required certification in our industry. While ACST has considered becoming SSAE 18 certified, we’ve chosen not to as there isn’t a high demand to meet this standard. However, we believe the policies, practices, and procedures ACST has in place to audit our security controls, run parallel to that of SSAE certification.
Yes, ACST has met the criteria for PCI Compliance. For more information and a copy of our current Attestation of Compliance, visit this FAQ on PCI Compliance.
Data center building access is controlled by keycard entry. All entry points into the building and into the data center are monitored by security cameras 24 hours a day. Data center room access is limited to network administrative staff only.
Yes, our data center is protected by an Uninterruptible Power Supply. It is further protected by a commercial generator, that can provide redundant utility power for our data and support centers, if needed. We also have a disaster recovery plan in place that is tested, reviewed, and updated annually with improvements.
Our relationship with our Customers is built on trust. Protecting our customers' data is a responsibility we take very seriously.