Acquire
Acquire security

Building Customer Trust by
ensuring Data Security

Compliance

Acquire SOC2 certified
SOC 2  Type II
Acquire privacy shield certified
Privacy Shield
Acquire GDPR
GDPR
Hippa compliant
HIPAA
Cloud security alliance
Cloud Security Alliance

Key Features

Acquire security model
Acquire Security Model
Web application security
Web Application Security
Acquire additional security features
Additional Security Features

Our Security Commitment

Acquire works tirelessly to ensure the protection of Customers’ data within its custody and is committed to continuous improvements to its information security management practices. Acquire aims to ensure the appropriate confidentiality, privacy, integrity, and availability practices are maintained in accordance with the requirements of data security standards as outlined by the SOC2 Trust Service Principles.

We ensure that its security commitments are well documented and illustrated to user entities through our website, contract agreement, or in a service level agreement.

Organizational Security & Compliance

Acquire is committed to ensuring that personal data obtained and processed is done in accordance with associated regulations and/or code of conducts laid out by SOC2 Trust Service Principles(Type I & II), HIPAA, GDPR and its principles, and Privacy Shield Principles. Formal IT policies and procedures exist that describe physical security, logical access, operations, change control, and data communication standards.

Personnel Security & Training

Acquire workforce includes partners, regular employees, and independent contractors who have direct access to Acquire’s internal information systems. Acquire’s personnel policies and practices relate to employee hiring, orientation, training, evaluation, counseling, promotion, and disciplinary activities. Security and Privacy trainings are performed upon hire and on semi-annual basis which includes but not limited to device security, acceptable use, malware prevention, data privacy, and incident reporting and data breach procedures. All employees are required to acknowledge to the confidentiality terms that they’ve read and will follow Acquire’s information security policies at least annually. Issues related to security and privacy are required to be reported immediately to Compliance team. Upon termination of work at Acquire, all access to Acquire systems is removed immediately.

Physical Security

Acquire is exclusively hosted on Microsoft Azure who provides robust, physical data center security and environmental controls. Acquire’s corporate offices all require badge access for entry, maintain video surveillance, and require all visitors sign in and be accompanied when present. Our Data Centers, provided by Microsoft Azure are located in US, France and India. They are behind a number of security clearances. Their commitment enables Acquire to deliver 24-hour service, 365 days a year to our customers. These datacenters comply with industry standards (such as ISO 27001) for physical security and availability. They are managed, monitored, and administered by Microsoft operations personnel.

Security by Design

Acquire understands the security risk associated with software changes introduced during Secure Development Lifecycle. Our security team adheres to OWASP Top 10 to categorize risks as High, Medium or Low risk. All updates or changes to the production system be they code or system configuration changes, require review prior to deployment to the production environment. Acquire applies change control requirements to systems that store data at higher levels of sensitivity, including Personally Identifiable Information.

Infrastructure Security

Acquire network, infrastructure and architecture have multiple protection layers that ensure the highest levels of security and control, which includes:

Access Control

Access to our production networks is controlled through multi-factor authentication over HTTPS encrypted protocol.

Strict Firewall rules restrict access to vulnerable ports to ensure secure and limited access to production environment.

We also utilize intrusion detection systems in our corporate network to identify potential security threats.

Login Security

Each user can log in with their unique username and password with specific authorization and permission level as controlled by account administrator.

Password complexity is conformed to defined password standards and configuration.

Logical Access

Access to data, system utilities, and program source code libraries are controlled and restricted to those authorized users who have legitimate business need.

Responsibilities and duties are well segregated to avoid repudiation and in-compatibility of responsibilities.

Datacenter

Acquires services are hosted in advanced data center operated by a recognized industry leader MICROSOFT AZURE. Our vendor adheres to the highest industry standards of quality, security and reliability. Azure meets a broad set of international as well as regional and industry-specific compliance standards, such as ISO 27001/27002:2013, FedRAMP, SOC 1 and SOC 2, CSA, FIPS 140-2, HIPAA,ISO/IEC 27018, PCI-DSS, UK G-Cloud.

Application Security

The main service that Acquire protects is live chat. All visitors ‘tagged’ with Acquire tracking code and the chat sessions between chat agent and visitors are monitored. Acquire employs both internal and external testing of our product.

Vulnerability Assessment and Penetration Testing

Vulnerability scans are performed at least quarterly on the environment to identify control gaps and vulnerabilities. Vulnerabilities found are resolved within timeframe by our security team.

A third party performs a penetration testing annually to identify and exploit vulnerabilities identified within environment.

Incident Response and Data Breach

Acquire has documented incident response and escalation procedures for reporting security incidents are adopted to guide users in identifying, reporting and mitigating failures, incidents, concerns, and other complaints.

When security events are detected they are escalated to the respective response team, Response time to address the event is 2 hours. We make sure to notify the supervisory authority of Personal Data Breach within 72 hours of becoming aware of the breach.

Data Encryption in Transit and at Rest

All data sent to or from Acquire is encrypted in transit using AES256 bit encryption. Our API and application endpoints are TLS/SSL only and core an “A+” rating on Qualys SSL Labs’ tests.

Acquire uses end-to-end encryption for Data in-transit which ensures that only communicating users can read what is sent, and nobody in between, even Acquire.

Acquire uses a Security Hash Algorithm (SHA2) for all password entries. Acquire stores the customers’ sensitive data such as Name, Email, Phone Numbers, Remarks, and chat transcripts in MySQL Database.

Data is encrypted automatically, in real time, prior to writing to storage. As a result, hackers and malicious users are unable to read sensitive data from tablespace files, database backups or disks.

Backup and Disaster Recovery

Acquire ensures that the customers can balance the need to store backups at multiple locations in case of a disaster with the need to keep their data out of certain geographies. Microsoft Azure provides clear data maps and geographic boundary information for all datacenters.

Disaster recovery plan is tested on annual basis.

Data Collection & Disposal

As an Application Service Provider, Acquire collects Personal information such as Name and contact details, chat, messaging transcripts and information related to browsing on behalf of the brand and use of our app.

Customer data will be deleted from Acquire systems upon termination of account or data retention expiration deadlines. Acquire hard deletes all information from currently running production systems. Backups are destroyed within 15 days. Acquire follows industry standards and advanced techniques for data destruction.

Bug Bounty Program

Our number one priority is customer’s security, we’re working with security researchers from worldwide to make our customers more secure. Acquire is pleased to recognize the security researchers who have helped make Acquire safer by finding and reporting security vulnerabilities.

The Acquire Bug Bounty Program is to encourage researchers to report about vulnerabilities they’ve discovered to our security and developing team, we reward researchers for submitting their findings. If you’re security researcher and have found a vulnerability in our service please report it to

security@acquire.io

A multi-layered approach is implemented by Acquire to support its People, Process, and Technological security requirements. If you want more advice and help, get in touch with our Compliance team at ashka@acquire.io

Ready to make your
sales and support team more productive?

Signup today or request a demo

Get Started Now Book a Demo
[if lte IE 8]
[if lte IE 8]