AGS uses a variety of methods to ensure that your organizational data that is entered into our platform is safe, secure, and available only to registered users in your organization. This page covers information about AGS data protection and security measures.


Table of Contents

  1. AGS Policies and Procedures
  2. AGS Application Security
  3. AGS Application Architecture
  4. Does AGS Integrate with Other Systems Like SAP or Oracle?
  5. AGS Data Backups
  6. AGS Data Retention Policy
  7. Customer Data Privacy and Security
  8. Unique Credentials Protocols
  9. Secured Environment and Firewall
  10. Customer Data Backups
  11. International Standards
  12. Data Collection and Transmission Protocols
  13. AGS Security (Encryption)
  14. AGS’ Legal Obligations to Our Customers
  15. AGS Legal
  16. AGS Privacy Policy
  17. AGS Non-Disclosure Agreement (NDA)   
  18. AGS PCI Compliance
  19. AGS’ Commitment to the GDPR
  20. AGS Terms of Use

AGS Application Architecture  

Click to review


Does AGS Integrate with Other Systems Like SAP or Oracle?

AGS is in the process of developing APIs that can be integrated to other applications, including SAP, Oracle Cloud, Microsoft, and more.

For now, customers can use our Cloud-based solution as it is now. When the APIs is ready, we will work with your IT department to insert your SAP, Oracle, or software data with our Cloud application, and ensure automatic, secured, and safe fetching of your data onto our solution.


AGS Policies and Procedures

Our operational policies ensure that we provide all our AGS team members with the necessary practices to build upon the strong foundations of their security onboarding. We utilize these policies daily and review them regularly.

AGS has implemented the following internal policies:

  • Information Security Policy
  • Access Control Policy
  • Backup Policy
  • Change Management
  • Data Classification Policy
  • Data Protection Impact Assessment (DPIA) Policy
  • Data Protection Policy
  • Data Retention Policy
  • Disaster Recovery 
  • Security Risk Management & Governance
  • Third-Party Risk Assessment Process

AGS Application Security

Security is at the forefront of AGS’ development mindset. We’ve built both internal and external security checkpoints into the AGS application development pipeline.

Our Engineering team embraces the culture of peer-review, ensuring that our coding guidelines are followed and maintained. We validate our deployments with regular ongoing security assessments, conducted with industry-leading external vendors.

We strive to have a long-term architectural vision for our application security that is continuously evolving. As we build new features for our product, we identify reasonable opportunities to further this vision in iterations, while maintaining a conscious security mindset.


AGS Data Backups

At AGS we use Database replication to keep your data safe in the case of system failure. Full database backups are taken every day, stored on safe locations, and kept for seven days as an electronic copy. In case two or more database nodes would fail concurrently we would have to revert to a backup.

Data backup does not apply to visitor visitations to our sites. We only back up consumer data (templates & dashboards).


AGS Data Retention Policy

Upon cancelling your account, AGS will maintain the account data for 60 days after which the account data will be deleted. Where applicable or required by law we will keep the records longer. 

For Group Accounts, we will save your project data for 60 days after you have closed out a project. During this 60-day timeframe you can always reactivate the project, and continue working on it.


Customer Data Privacy and Security

AGS utilizes some of the most advanced technology for Internet security available today.

When you access our site using a supported web browser, Secure Socket Layer (SSL) technology protects your information using both server authentication and data encryption. When you log in and access any page on your account, you will see a small lock icon at the top left section – to the left of the page’s URL – indicating that a secure connection has been established to our server.


Unique Credentials Protocols

AGS provides each user in your organization with a unique username and password that must be entered each time a user logs in. AGS issues a session “cookie” only to record encrypted authentication information for the duration of a specific session.

The session “cookie” does not include either the username or password of the user.

AGS does not use “cookies” to store other confidential user and session information, but instead implements more advanced security methods based on dynamic data and encoded session IDs.


Secured Environment and Firewall

In addition, AGS is hosted in a secure server environment that uses a firewall and other advanced technology to prevent interference or access from outside intruders. Customer Data is stored on a primary database server with multiple active clusters for higher availability.

Customer Data is stored on highly redundant carrier-class disk storage and multiple data paths to ensure reliability and performance. Backups are verified for integrity and stored in the same data centers as their instance.


Customer Data Backups

Using your AGS account you can export or generate backup files of your data on a daily, weekly or monthly basis depending on your edition. You can export all your organization’s data into a set of comma-separated values (CSV) Excel files, as well as restoring your data as needed from a previous backup.

For further details, please refer to the following:

  1. Ability to Export Your Template Data
  2. Ability to Export Your Analytics Dashboards
  3. How to Restore Your Data from Backups
  4. Where to Access Your Download History   
  5. Ability to Clear Your Data, and Use Your Template for a New Project

International Standards

AGS takes the safety of its clients’ data very seriously.

We comply with a number of international standards, including PCI DSS, FISMA, ISO/IEC 27001:2005, SAS 70 Type II, SysTrust, and Eu-US and Swiss-US Safe Harbor.


Data Collection and Transmission Protocols

Firewalls are in place exposing only the necessary ports through the internet and between different servers. Intrusion protection system (IPS) software is in place as a second layer of security, which will block access as soon as any suspicious login activity is detected.

AGS transmits data from the visitor’s browser to our system using HTTPS. 


AGS Security (Encryption)

Data in transit is encrypted using the following protocols and ciphers:

  • SSL Protocols
  • SSL Ciphers
  • Cross-functional data touchpoint protocols

AGS’ Legal Obligations to Our Customers

AGS is committed to keeping your data private and secure. To this end, we have expressly stated how we will handle your private data.

For a greater understanding of the legal obligations AGS adheres to regarding data privacy, please refer to our Legal Statements, Privacy Statement, as well as our Terms of Use agreement:

  1. AGS Legal
  2. AGS Privacy Policy
  3. AGS Non-Disclosure Agreement (NDA)
  4. AGS PCI Compliance
  5. AGS’ Commitment to the GDPR
  6. AGS Terms of Use

As outlined in the Privacy Statement, AGS does not review, share, distribute, print, or reference your data except as provided in the AGS Terms of Use, or as may be required by law.

For exact information, please refer to the Privacy Statement, as well as the Terms of Use agreement. These items can be viewed by clicking the relevant links above.

Email us if you have any questions: Contact AGS.