• What’s new
  • Pricing
Sign upLog in

People & Communication

  • people

    Free membership database
  • groups

    Community engagement & chat

Events

  • calendar

    Scheduling, facilities, & resources
  • registrations

    Signups, tickets, & payments
  • check-ins

    Attendance & volunteer tools

Worship & Teams

  • services

    Worship planning & scheduling
  • music stand

    Digital sheet music & chord charts

Mobile App & Website

  • church center

    Custom mobile app for your church
  • publishing

    Custom pages, video, & audio library

Donations

  • giving

    Tithes, offerings, & reporting

system tools

    home

    Dashboard & task management

More

  • Integrations

    Products that work with ours
  • Get Giving free for 12 months

    Apply for 12 months free

Learn & get help

  • Support

    Helpful responses in ~1 hour
  • Training

    Learn how to use the system
    • Planning Center University videos
    • How-to articles
  • Community

    Connect with customers on Facebook or Slack

Switch to Planning Center

  • Compare systems

    How we can replace your current solution
  • Calculate savings

    See how much you’ll save on giving fees
  • Getting started

    A roadmap to migration
  • Children’s ministry

    Care for families & volunteers
  • Church management system

    Equip your team, support your church
  • Church planters

    Apply for 6 months free
  • Multi-campus

    Multicampus churches

    Reach and resource every campus
  • Worship planning

    Service planning and volunteer scheduling
What’s newPricing
Sign upLog in

Security

Artboard 8
Terms of ServicePrivacy PolicyCongregant PrivacyGDPRSecurity
  • Overview
  • SOC 2 Type 2 Certified
  • PCI Compliance
  • Technical Security and Encryption
  • Secure Coding Practices
  • Data Durability and Recovery
  • Security Bug Bounty
  • Physical Security
  • Local Equipment Security
  • Personnel Security
  • Security Culture
  • Questions

Security, Compliance, Practices, and Procedures at Planning Center

The security of your data and the personal information of your congregation matters deeply to us, and we’re committed to protecting it. Here we outline the physical and technical procedures we use to ensure your data is kept safe, and the external certifications and audits we comply with to verify our practices.

SOC 2 Type 2 Certified

Planning Center is SOC 2 Type 2 certified. The American Institute of Certified Public Accountants (AICPA) created the Service Organization Control (SOC 2) framework to test organizations’ ability to protect data from potential threats.

To pass SOC 2, we worked with an AICPA-approved auditor, Johanson Group, to critique our company based on five areas: security, availability, processing integrity, confidentiality, and privacy. This audit included a review of our policies, backup and disaster recovery, incident response, firewall configurations, and other critical areas of our business. After completing the audit, we received an Auditor’s Report, proving Planning Center meets and exceeds the SOC 2 criteria. We can provide the full report upon request.

PCI Compliance

The Payment Card Industry Data Security Standards (PCI DSS, or more commonly, PCI) are a set of standards set forth by the four major card associations to protect cardholder data. All merchants and processors need to have physical, electronic, and procedural controls in place to ensure that cardholder data is stored and handled securely at all times.

Planning Center is a PCI Level One compliant merchant.

Our payment processor, Stripe, is one of the largest, most advanced payment processors in the world. They handle payment processing for services like Kickstarter, Lyft, Shopify, Pinterest, Twitter, Heroku, SurveyMonkey, and many other companies. Stripe is also a certified "PCI Service Provider Level 1" payment processor.

Technical Security and Encryption

Whenever your data is in transit between you and us, everything is sent encrypted over HTTPS, and our databases utilize encryption at rest. We limit brute force attacks with rate limiting, and all passwords are filtered from all our logs and are one-way encrypted using industry standard bcrypt.

Secure Coding Practices

We hire the best developers we can find. Since so many security exploits take advantage of coding errors, part of security is having well-tested, well-reviewed code. At Planning Center, code changes are reviewed by teammates, ran against an automated testing framework, and in most cases, manually QA’d. By the time new code is running on our production environments it has had lots of eyeballs on it. Developing this way means that it takes more time to get things done, but it also means that fewer mistakes get by.

Data Durability and Recovery

We employ a multilayered backup strategy that is designed to be resilient to hardware failure, regional disasters, and malicious acts. Both point in time backups and daily snapshots are available for use in recovery.

Security Bug Bounty

We run an ongoing bounty program through HackerOne to provide penetration testing across all of our products. These security researchers are some of the best in the world at finding vulnerabilities and responsibly disclosing them.

Our bounty program is open to anyone who finds a security vulnerability. To report a vulnerability, please start by requesting an invite to our program by email at hackerone@planningcenter.com. Our average response time is less than one day.

Physical Security

All of your data is stored in AWS data centers, which use industry leading practices in physical security, redundancy, and availability. You can learn more about Amazon's data centers here.

Local Equipment Security

At the most basic level, our main physical space is locked and alarmed during off hours. In the event of a break-in, we may lose some expensive monitors, but since our servers don't reside in our buildings, they aren't vulnerable to smash-and-grab robberies. Local computers are password protected and encrypted. In the course of conducting customer support, employees access customer data using an encrypted connection and must invoke a time-based one-time password upon connection.

Personnel Security

Planning Center is a small company, so thankfully we are able to hire some brilliant people who care about its success. Our employee turnover is extremely low (especially for the tech industry). To protect company data, including customer data, all employees sign a non-disclosure agreement when hired.

Security Culture

Lastly, a word about the culture here in general. Most of us who work at Planning Center are also users of our software. Our personal data is in the same database as our customers. We've checked-in our children using Planning Center Check-Ins at our own churches. We've donated to our churches using Planning Center Giving. We protect your data like it’s our data because it is our data.

Questions

If you have any questions that weren't addressed on this page, please don't hesitate to ask by emailing us at support@planningcenter.com.

Get updates delivered to your inbox!

  • Products

    • Calendar
    • Check-ins
    • Giving
    • Groups
    • People
    • Publishing
    • Registrations
    • Services
    • Music Stand
    • Church Center
  • Resources

    • Support
    • Training
    • Planning Center University
    • Getting Started
    • Community
  • Use cases

    • Children’s Ministry
    • Church Management System
    • Church Planters
    • Multicampus Churches
    • Worship Planning
  • How we compare

    • See Processing Fee Savings
    • Compare Pushpay
    • Compare Tithe.ly
    • Compare Breeze
    • Compare ChurchTrac
  • Company

    • About us
    • Careers
    • Developers
    • Logos
    • Terms of Service
    • Privacy Policy
  • Pricing

  • Changelog

  • What's new

  • Security

  • Status

  • Downloads

  • Apply for a free
    Giving subscription
AICPA SOC
Terms of ServicePrivacy Policy