Data Security

last updated 12/16/2019

ACS Technologies Group, Inc., and its affiliates, their officers, directors, employees or agents (collectively referred to as "ACST") creates software to help churches, schools, and organizations manage numerous administrative duties. You may be a visitor ("Visitor") to our websites ("Websites"), a customer ("Customer" or “Licensee”, typically a church or an organization) who purchased our products and services (collectively, "Services"), or a guest ("Guest", typically a congregant) that a Customer invited to use our Services. For the sake of simplicity, we’ll specify when we’re referring to Visitors, Customers, and Guests, and we’ll refer to "you" generally.


How does ACST ensure reliable access to its Services?

For Internet connectivity, we use several enterprise providers that deliver fast and reliable access to our Services. In the event that an Internet provider experiences a system failure, ACST has redundant connections in place as a backup.

How does ACST keep its Services secure?

We monitor critical systems from multiple locations and collect historical data to ensure all systems are functioning at peak efficiency. We also analyze performance trends to help identify potential problems before they affect you.

Desktop Services

We deploy and maintain enterprise grade servers running industry standard operating systems in our data center. Using this combination of reliable services, we’ve been able to maintain uptime of over 99.99% historically.

Websites and Web-based Services

We partner with Amazon Web Services (“AWS”) to host and store our sensitive customer data. AWS commits to at least 99.99% uptime and has a solid reputation in the security industry. AWS is PCI DSS Level 1 compliant as a Service Provider, holds numerous compliance certifications, and also maintains SAS70 Type II certification.

How does ACST back up and recover Customer data?

There are distinct differences in how we can assist our Customers when they need help with data backup and recovery for our Desktop and Web-based Services. The time to recover or restore your data depends on the Services you use and the circumstances under which your data was lost.

Desktop Services

Our Support department can help Desktop customers make a backup of their data, but we cannot recover or restore lost or corrupt data that is stored locally.

Web-based Services

We're able to take elaborate measures to ensure we can recover and protect your data from many scenarios.

  • We back up data regularly and synchronize this data to our offsite disaster recovery location.
  • We back up your entire database using multiple methods to increase the security and availability of your data.
  • All the data you enter and leave in your ACST Web-based product is backed up.
  • We encrypt and store all backups in redundant locations and have access to your data backed up for a maximum of six months. This means that if you removed data 7 months ago, that data will not be available in a backup.

How does ACST protect Customer data?

We use a combination of advanced hardware and software firewalls from leading network security providers. These firewalls secure your data from multiple threats (e.g. hackers, viruses, spybots, etc). Our staff continuously monitors logs and data points to ensure the integrity of our systems.

Does ACST have SSAE Certification?

No. SSAE 18 is not a required certification in our industry. While ACST has considered becoming SSAE 18 certified, we’ve chosen not to as there isn’t a high demand to meet this standard. However, we believe the policies, practices, and procedures ACST has in place to audit our security controls, run parallel to that of SSAE certification.

Does ACST comply with PCI DSS?

Yes, ACST has met the criteria for PCI Compliance. For more information and a copy of our current Attestation of Compliance, visit this FAQ on PCI Compliance.

Does ACST engage with an independent auditor to conduct a security audit?

Yes.

What security measures are in place to protect Customer data?

Data center building access is controlled by keycard entry. All entry points into the building and into the data center are monitored by security cameras 24 hours a day. Data center room access is limited to network administrative staff only.

Does ACST have a power backup and disaster recovery plan in place?

Yes, our data center is protected by an Uninterruptible Power Supply. It is further protected by a commercial generator, that can provide redundant utility power for our data and support centers, if needed. We also have a disaster recovery plan in place that is tested, reviewed, and updated annually with improvements.

Our relationship with our Customers is built on trust. Protecting our customers' data is a responsibility we take very seriously.