It takes 30 minutes in average. Depending on the performance and environment of your computer, it may spend hours to finish the task.
Question about the self-assessment report
• What should I do if I lost my password for report decryption?
We are unable to retrieve your password and send it back to you. Therefore, you must re-register with or without new password and obtain the upload link again to re-upload your files.
• How long will I receive the report after I submit the scanned result?
Normally, reports can be received within several minutes, but depending on the quantity of requests, it generally does not exceed three days.
• Is my computer safe if no any weakness was identified by the toolkit?
We don't guarantee that. The toolkit just scan a part of basic and critical weakness in your computer. No weakness was identified by our toolkit doesn't mean that there is no any other weakness in your computer.
• What should I do if weaknesses are found?
The report provides either step-by-step mitigation or a general guideline for each weakness. You may search for solutions from the appendix section of report or seek helps from the cyber security vendors.
• Why is there nothing about Windows updates in the report?
There are some mistakes while the toolkit was running. For example, when your computer needs to reboot due to a Windows update issue, the toolkit may not obtain any results.
Question about the overall procedure of self-assessment
• How many times can I execute the toolkit and upload the scanned result (either on a computer or on different computers)?
You can perform scanning task as many time you want. However, you can only upload the scanned output file once per upload url we sent to you.
• Does it count a new upload attempt if I upload the same scanned result twice?
• What should I do if I encounter any problems?
We have listed frequently asked questions (FAQ) that may address the issue you are experiencing. Please refer to the FAQ section to see if your issue is covered. Otherwise, please contact .
• Is this toolkit free?
It is completely free during the demonstration period, which is from July 31, 2023 to January 31, 2024.
• Will any information from report and scanned result be revealed/read/gathered by third party?
No, it won't. The report is sent to the registered email only and we offer an option for “Protect report with password” during registration (we strongly recommend users to check this option). The scanned result is temporarily used for analyzing the weaknesses. All data will be deleted and won't be distributed or copied.
• What data will ACSI keep?
ACSI do not record any personally identifiable information from registered members except for email addresses, which are solely used for providing scan reports. We will utilize the registered data for statistical analysis to enhance cybersecurity measures, and once the analysis is completed, we will promptly delete all data.
• Can I apply for the free trial if my organization is not belong to APEC economic members?
Yes, you can still apply for it.
• What should I do if I want to unregister?
We assure you that we do not record any personally identifiable information from registered members except for email addresses, which are solely used for providing scan reports. Our intention is to enhance cybersecurity measures through statistical analysis using the registered data. Once the analysis is completed, we will promptly delete all data. If you still want to unregister, please contact for removing all your data.
An email has been sent to verify your email address. Please check your email and complete the verification. Once it is done, you will receive another email with the relevant information of the toolkit. Thank you.
Acer Cyber Security Inc. (“ACSI”, “our” or “we”), acting as data controller, respect the privacy of our customers. This Privacy Notice is to inform you of our practices concerning the collection, storage, processing, transfer and use of personal information, and the choices available regarding the collection and use of your personal information when you use the ACSI Cyber Security Self-Assessment Toolkit (the “Toolkit”). By registering for accessing the Toolkit, downloading, installing, executing, and/or otherwise using the Toolkit, you consent to the collection, transfer, processing, storage, disclosure, and other uses described in this Privacy Notice.
Collection and Use of Information and Legal Ground
We collect, process, and use the data you submit through the sign up page for the Toolkit (the “Toolkit Website”), the data about your activities on/ use of the Toolkit Website/ the Toolkit, and any other data that you voluntarily provide to ACSI whether or not through the Toolkit Website . ACSI’s purpose in collecting and processing this data is to provide you with access to the Toolkit, to download and have the Toolkit operated on your side so to generate a scan result file, to provide you with a self-assessment report based on the aforesaid output file, and to make cybersecurity service recommendations to you that are directed specifically to your need, if any.
The specific information we collect and process includes the following to the extent applicable: your name, e-mail address, other contact information, residency, experience in cybersecurity practice, industry and organization you belong to, job type, the information about the cybersecurity department within your organization, IP address, the uploaded scan result file by your use of the Toolkit, and the activity history regarding your interaction with the Toolkit Website/ the Toolkit, including but not limited to the record of your registration, downloading the toolkit, scanning, uploading the scan result file, downloading the self-assessment reports; as well as the times of your repeating of the above activities. This information could be considered personal data if we can potentially (indirectly) link this information, alone or in combination with other information, to you. The legal ground for the activities of collecting and processing your personal data is consent.
Please note that ACSI may also use this data for its internal statistical analysis, and, at its sole discretion, further provide such statistical information in a de-identified manner to third parties for their reference and non-commercial use only.
Security & Privacy
ACSI is committed to protecting your privacy and the security of the collected information by a variety of methods, including the use of security technologies and organizational procedures. We protect your personal data against destruction, loss, alteration, unauthorized disclosure of or access to personal data transmitted, stored or otherwise processed.
Processing of Personal Data
Personal data will be processed in the region in which ACSI’s registered principal office is located. Please note that we adhere to the EU General Data Protection Regulation to ensure your personal data are protected.
Personal Data Retention
The data will be stored for no longer than it is necessary to pursue the purposes of the data processing described above. Only when we are legally obliged to, or when it’s necessary to defend our interests in judicial proceedings, which are relevant with the data collected from you, will we store the personal data for longer periods. For more information about the specific retention periods that apply to your personal data, please contact us by using the contact details below.
You can at any time exercise your rights according to applicable laws, including the right to (under certain circumstances) receive additional information regarding the processing of your personal data, obtain confirmation as to whether or not personal data about you exists in ACSI’s possession, to know their content and source, to verify their accuracy, or ask for modifications, cancellation, restriction or deletion of (part of) the processing of your personal data. You also have the right to receive your personal data in a structured, commonly used and machine-readable format and to (have) transmit(ted) your personal data to another organization.
All such requests should be made in writing and send to the email address mentioned below.
Finally, you have the right to lodge a complaint with the relevant data protection authority in your economies relating to the processing of your personal data by us.
If I choose to join, can I opt out later?
Yes. You have the right to withdraw your consent at any time by sending to the email address mentioned below. We will remove your personal data from our database(s) as soon as reasonably possible. Please note however that opting-out does not affect the lawfulness of processing based on consent before its withdrawal. Please also note that your withdrawal may affect your right to receive our services completely.
Changes to the Privacy Notice
ACSI reserves the right to change this Privacy Notice at any time. This may be necessary, for example, if the law changes or if we change our business in a way that affects the way we process personal data. We therefore encourage you to check this link https://sat.acercsi.com/#privacy from time to time for updates.
For any questions or comments regarding this Privacy Notice, please contact us at: In order to allow us to provide you with faster service, please submit inquiries in English if possible and advise us of the economies you are contacting us from.
Grant of License
Subject to these Terms, ACSI grants you a non-exclusive, non-transferable, non-sublicensable, non-commercial, terminable, and limited license to use the Toolkit internally for the only purpose of your self-detection and assessment of possible cybersecurity weakness or threats of/ to the system and network of your business or organization. All rights not expressly granted herein are reserved.
Scanning Function of the Toolkit
You acknowledge and agree that when the Toolkit is executed in your computer systems/ networks, it accesses and scans the following items to collect the data required for cybersecurity analysis and production of the assessment report: system files, installed applications, security updates, system configuration, local account settings, and network connections and settings WITHOUT accessing any data of proprietary files, emails, web browsing history, system/ account passwords and data packets. Any of your personal data and personal identifiable information collected through your use of the Toolkit and its website will be protected in accordance with the Privacy Notice.
Scan Result File and Self-Assessment Report
The scan result file generated from the Toolkit and the self-assessment report provided by ACSI can be only for the use of the Toolkit and your internal reference. While they can be reference indicators, you must evaluate and determine the cybersecurity healthiness of your business or organization on your own. ACSI represents no warranty on the accuracy of the scan result file and the self-assessment report, nor the non-existence of any undetected malware, weakness, or any other security risks. ACSI further represents no warranty that the Toolkit may help you or your business or organization to prevent or avoid the possibilities of hacker intrusion.
You cannot present the scan result file, the self-assessment report, and any content of the self-assessment report, including the results, findings, recommendation, etc. to any third parties or make them public as a certification, advertisement, or solicitation, indicating that certain cybersecurity qualification, standard or practice is met.
In order to protect your system or network security and to prevent any malicious intrusion, it is suggested you should keep the scan result file, the self-assessment report, and any content of the self-assessment report, including the results, findings, recommendation, etc. confidential and only make them revealed to the members within your business or organization on a strict need-to-know basis and to the minimum extent.
Ownership and Intellectual Property Right
Titles, ownership rights and intellectual property rights in and to the Toolkit/ self-assessment report and all copies thereof, shall remain with ACSI or ACSI’s licensors or suppliers (as applicable). You do not have or shall not gain any proprietary interest in the Toolkit/ self-assessment report or any related intellectual property rights. Your possession, access, or use of the Toolkit/ self-assessment report does not transfer any ownership of the Toolkit/ self-assessment report or any intellectual property rights to you.
You must NOT conduct the following actions: (1) Use or reproduce the Toolkit except as provided in these Terms; (2) Rent or lease the Toolkit to any third parties; (3) Modify, adapt, or translate the Toolkit in whole or in part; (4) Reverse engineer, decompile, or disassemble the Toolkit or create derivative works based upon the Toolkit; (5) Merge the Toolkit with any other program; (6) Sublicense or otherwise make the Toolkit available to third parties; (7) Transfer your rights under these Terms to any third parties; (8) Export the Toolkit in contravention of applicable export laws and regulations, or sell, export, re-export, transfer, divert, disclose technical data, or dispose of, any Toolkit to any prohibited person, entity, or destination; (9) Use the Toolkit for advertising, commercial purposes, or solicitation; (10) Use the Toolkit for any unlawful purpose; or (11) Any other use of the Toolkit that ACSI deems inappropriate.
Modification and Termination
ACSI reserves the right to modify and update the whole or part of the Toolkit, as well as to terminate provision of the Toolkit, when it deems necessary, without obtaining your prior consent nor providing prior notification to you.
Without prejudice to any other rights, ACSI may immediately terminate your use of the Toolkit and these Terms with you without prior notification to you if you fail to comply with any terms and conditions hereof.
In the event of aforesaid termination, you must: (1) Cease all use of the Toolkit; (2) Destroy the original and all copies of the Toolkit; and (3) Uninstall and delete the Toolkit from all computers on which it was resident.
All disclaimers of warranties and limitation of liability set forth in these Terms shall survive termination.
Disclaimer of Warranty
THE TOOLKIT IS PROVIDED "AS-IS" WITHOUT WARRANTY OF ANY KIND. ACSI DISCLAIMS ALL WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY IN RELATION WITH THE TOOLKIT, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT OF ANY THIRD PARTY'S INTELLECTUAL PROPERTY RIGHTS, THE EFFECTIVENESS, FITNESS, STABILITY, RELIABILITY, ACCURACY, COMPLETENESS, VALIDITY, FOR A SPECIFIC PURPOSE, NONEXISTENCE OF ANY SECURITY-RELATED DEFECTS, ERRORS OR BUGS, ETC.
Limitation of Liability
IN NO EVENT SHALL ACSI, ITS AFFILICATES OR ITS SUPPLIER BE LIABLE FOR ANY DIRECT, SPECIAL, INDIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER, INCLUDING LOSS OF PROFITS OR DATA, IN CONNECTION WITH THE TOOLKIT, WHETHER IN AN ACTION IN CONTRACT OR TORT, EVEN IF ACSI HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
These Terms represent the complete terms and conditions between you and ACSI regarding the use of the Toolkit and licenses, and supersede all prior agreements, communications, proposals, and representations. If any provision of these Terms is held by a court of competent jurisdiction to be contrary to law that provision will be enforced to the maximum extent permissible, and the remaining provisions of these Terms will remain in full force and effect.
Governing Law and Jurisdiction
These Terms are governed by and construed in accordance with the laws of where ACSI’s registered principal office is located, except the laws concerning conflicts of law. The United Nations Convention on Contracts for the International Sale of Goods and the Uniform Computer Information Transactions Act do not apply to these Terms. You and ACSI agree to submit to the exclusive jurisdiction of the court for the location of ACSI’s registered principal office in any dispute arising out of or relating to these Terms and the Toolkit.