last updated 11/20/2020
ACS Technologies Group, Inc., and its affiliates, their officers, directors, employees or agents (collectively referred to as "ACST") creates software to help churches, schools, and organizations manage numerous administrative duties. You may be a visitor ("Visitor") to our websites ("Websites"), a customer ("Customer" or “Licensee”, typically a church or an organization) who purchased our products and services (collectively, "Services"), or a guest ("Guest", typically a congregant) that a Customer invited to use our Services. For the sake of simplicity, we’ll specify when we’re referring to Visitors, Customers, and Guests, and we’ll refer to "you" generally.
For Internet connectivity, we use several enterprise providers that deliver fast and reliable access to our Services. In the event that an Internet provider experiences a system failure, ACST has redundant connections in place as a backup.
We monitor critical systems from multiple locations and collect historical data to ensure all systems are functioning at peak efficiency. We also analyze performance trends to help identify potential problems before they affect you.
We deploy and maintain enterprise grade servers running industry standard operating systems in our data center. Using this combination of reliable services, we’ve been able to maintain uptime of over 99.99% historically.
We partner with Amazon Web Services (“AWS”) to host and store our sensitive customer data. AWS commits to at least 99.99% uptime and has a solid reputation in the security industry. AWS is PCI DSS Level 1 compliant as a Service Provider, holds numerous compliance certifications, and also maintains SAS70 Type II certification.
There are distinct differences in how we can assist our Customers when they need help with data backup and recovery for our Desktop and Web-based Services. The time to recover or restore your data depends on the Services you use and the circumstances under which your data was lost.
Our Support department can help Desktop customers make a backup of their data, but we cannot recover or restore lost or corrupt data that is stored locally.
We're able to take elaborate measures to ensure we can recover and protect your data from many scenarios.
We use a combination of advanced hardware and software firewalls from leading network security providers. These firewalls secure your data from multiple threats (e.g. hackers, viruses, spybots, etc). Our staff continuously monitors logs and data points to ensure the integrity of our systems.
ACST has chosen not to obtain SSAE SOC reports as our industry doesn’t require us to meet those auditing obligations. On an annual basis, ACST conducts an internal corporate risk assessment to assess the maturity of our security controls, using the Center for Internet Security ("CIS") 20 guidelines. The CIS 20 also maps the CIS controls to NIST SP800-53 and PCI DSS and offers anonymous comparison analysis against industry peer groups. We feel that the CIS 20 guidelines meet or exceed industry practices and provide an excellent benchmark.
Yes, ACST is a PCI DSS Level 1 compliant service provider. For more information, visit our FAQ on PCI Compliance.
Data center building access is controlled by keycard entry. All entry points into the building and into the data center are monitored by security cameras 24 hours a day. Data center room access is limited to network administrative staff only.
Yes, our data center is protected by an Uninterruptible Power Supply. It is further protected by a commercial generator that can provide redundant utility power for our data and support centers, if needed. We also have a disaster recovery plan in place that is tested, reviewed, and updated annually with improvements.
Our relationship with our Customers is built on trust. Protecting our customers' data is a responsibility we take very seriously.