Compliance

Quality at the Core: ISO 9001

The ISO 9001:2015 certification is the foundation of our Quality Management System.

It certifies that ACCA software’s business processes are designed, implemented, and monitored to ensure the effectiveness, efficiency, and continuous improvement of our solutions, with a focus on achieving complete customer satisfaction.

It represents our operational transparency and our commitment to delivering consistently excellent service.


Download the certification

Information Security and Cloud: ISO 27001, 27017, 27018

The ISO/IEC 27001:2022 certification ensures that ACCA software has implemented an effective Information Security Management System (ISMS), safeguarding the confidentiality, integrity, and availability of both business and customer data.
 
The ISO/IEC 27017:2015 and ISO/IEC 27018:2019 extensions further strengthen this guarantee by defining specific controls for cloud service security and, in particular, the protection of Personally Identifiable Information (PII) processed in the cloud environment. These certifications embody our commitment to fairness and respect for the rights of customers and employees, ensuring that data is managed with the utmost care and full regulatory compliance.

 


Download the certification

BSI C5:2020

ACCA software S.p.A. is compliant with the C5 standard (Cloud Computing Compliance Criteria Catalogue), the catalogue of security requirements developed by the BSI, the German Federal Office for Information Security, and internationally recognised as one of the most rigorous benchmarks for cloud services.

The standard provides comprehensive coverage of all the domains that contribute to the security of a cloud service: governance and policies, human resources, physical security, IT operations, identity and access management, cryptography, communications security, secure development, supplier management, incident management, business continuity, compliance, and transparency toward the customer.

Achieving C5 compliance confirms our commitment to a systematic and measurable approach to information security, safeguarding the confidentiality, integrity, and availability of our customers' data.