Frequently Asked Questions
For budgeting purposes, plan on $0.00 down, and $1.00/member/year. Every Grand Jurisdiction is a little different and there may be extra costs or savings depending on your specific requirements. Please contact us to get specific pricing for your requirements.
Grand View is a subscription based software that is billed in regular intervals. Typically the services are paid for monthly but arrangements can be made for annual or quarterly billing.
When we think of web based programs we often think about social media platforms where the software is free to use. The misperception is that the software is actually free. When you agree to the terms and services of a site you are agreeing to let that program use your personal information any way they want. There are advertisements scattered throughout the application that add clutter ultimately confusing the end user. Without using advertisements, there must be a way of paying for the continual development and hosting costs.
Our system has been built from the ground up to operate on all connected devices using web browsers that are freely available on the internet. . The software and data are stored in our secure data centers and accessed through the internet. All connections to the software are encrypted and all practical security standards are observed. End users will just need a connection to the internet and a up-to-date web browser.
With Grand View you will not have the hassle and headache of costly servers and client software. This offers a dramatic reduction in the total cost of ownership when compared to non-hosted systems.
Security is a tricky subject… The truth of the matter is that nothing can be guaranteed secure even governmental computer systems. We adhere to a strict set of security practices such as requiring encryption on all connections to our systems. We implement firewalls and VPNs to control how hosts connect to the server and database. We do not store sensitive information such as credit card numbers and Social Security Numbers. All monetary transactions are handled through a financial institution and the information is transmitted directly to their systems. In the event that one of our systems were ever accessed, the perpetrator would only gain access to generally public information that wouldn’t result in monetary gain.