{"id":675,"date":"2025-07-16T21:22:55","date_gmt":"2025-07-16T19:22:55","guid":{"rendered":"https:\/\/africacybersecure.org\/?page_id=675"},"modified":"2025-07-17T17:29:42","modified_gmt":"2025-07-17T15:29:42","slug":"pay","status":"publish","type":"page","link":"https:\/\/africacybersecure.org\/?page_id=675","title":{"rendered":"Pay"},"content":{"rendered":"<p><!DOCTYPE html><br \/>\n<html><br \/>\n<head><br \/>\n<title>Pay for the ACC service<\/title><br \/>\n<script src=\"https:\/\/ajax.googleapis.com\/ajax\/libs\/jquery\/3.6.4\/jquery.min.js\"><\/script><br \/>\n<script src=\"https:\/\/ap-gateway.mastercard.com\/checkout\/version\/62\/checkout.js\" data-error=\"errorCallback\" data-cancel=\"cancelCallback\" data-complete=\"completeCallback\"><\/script><br \/>\n<script id=\"hpayPlugin\" data-env=\"prod\" data-country=\"rw\" data-phone=\"0788870836\" data-service=\"Pay\" data-account=\"\" data-callback=\"https:\/\/yourwebsite.com\/callback\" src=\"https:\/\/heptapay.com\/static\/js\/plugin.paypal.hp.js?v=4.0\"><\/script><br \/>\n<\/head><br \/>\n<body><\/p>\n<p>To pay for the services offered by Africa Cybersecurity Consortium (ACC), <strong>you must enter the amount of money for the services to be delivered in the USD currency field, its equivalence of money in RWF will appear in the RWF currency field above the USD currency field<\/strong>. After clicking on &#8220;Pay with Heptapay&#8221; button, you will have to wait for the processing of the request between 1 and 10 seconds depending on your Internet and web browser for the new payment pop-up window to load so that you can be able to enter your debit or visa card information. Before you proceed with the payment, ACC advises you to first read through the <a href=\"https:\/\/heptapay.com\/privacy-policy\">HeptaPay Privacy Privacy Policy<\/a><\/p>\n<div class='heptapaycontainer'>\n  <input type=\"number\" id=\"receivedAmount\" class=\"txtAmount\" step=\"1\" autoComplete=\"off\" placeholder=\"RWF\" value=\"30000\" \/><br \/>\n  <input type=\"number\" id=\"sendAmount\" class=\"txtAmount\" step=\".01\" min=\"1\" max=\"500\" autoComplete=\"off\" placeholder=\"USD\" \/><br \/>\n  <input type=\"hidden\" id=\"note\" value=\"TrxId\" \/><br \/>\n  <input type=\"hidden\" id=\"payerEmail\" value=\"\" \/><br \/>\n  <span class=\"hpayres\"><\/span><br \/>\n  <input id=\"heptapaybtn\" type=\"button\" class='btnPay' value=\"Pay with HeptaPay\" onclick=\"pay()\" \/>\n<\/div>\n<p><\/body><br \/>\n<\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pay for the ACC service To pay for the services offered by Africa Cybersecurity Consortium (ACC), you must enter the amount of money for the services to be delivered in the USD currency field, its equivalence of money in RWF will appear in the RWF currency field above the USD currency field. After clicking on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-675","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pay - Africa Cybersecurity Consortium<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/africacybersecure.org\/?page_id=675\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pay - Africa Cybersecurity Consortium\" \/>\n<meta property=\"og:description\" content=\"Pay for the ACC service To pay for the services offered by Africa Cybersecurity Consortium (ACC), you must enter the amount of money for the services to be delivered in the USD currency field, its equivalence of money in RWF will appear in the RWF currency field above the USD currency field. After clicking on [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/africacybersecure.org\/?page_id=675\" \/>\n<meta property=\"og:site_name\" content=\"Africa Cybersecurity Consortium\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-17T15:29:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/africacybersecure.org\/?page_id=675\",\"url\":\"https:\/\/africacybersecure.org\/?page_id=675\",\"name\":\"Pay - Africa Cybersecurity Consortium\",\"isPartOf\":{\"@id\":\"https:\/\/africacybersecure.org\/#website\"},\"datePublished\":\"2025-07-16T19:22:55+00:00\",\"dateModified\":\"2025-07-17T15:29:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/africacybersecure.org\/?page_id=675#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/africacybersecure.org\/?page_id=675\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/africacybersecure.org\/?page_id=675#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/africacybersecure.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pay\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/africacybersecure.org\/#website\",\"url\":\"https:\/\/africacybersecure.org\/\",\"name\":\"Africa Cybersecurity Consortium\",\"description\":\"It is about secure cyber\",\"publisher\":{\"@id\":\"https:\/\/africacybersecure.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/africacybersecure.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/africacybersecure.org\/#organization\",\"name\":\"Africa Cybersecurity Consortium\",\"url\":\"https:\/\/africacybersecure.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png\",\"contentUrl\":\"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png\",\"width\":250,\"height\":62,\"caption\":\"Africa Cybersecurity Consortium\"},\"image\":{\"@id\":\"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pay - Africa Cybersecurity Consortium","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/africacybersecure.org\/?page_id=675","og_locale":"en_US","og_type":"article","og_title":"Pay - Africa Cybersecurity Consortium","og_description":"Pay for the ACC service To pay for the services offered by Africa Cybersecurity Consortium (ACC), you must enter the amount of money for the services to be delivered in the USD currency field, its equivalence of money in RWF will appear in the RWF currency field above the USD currency field. After clicking on [&hellip;]","og_url":"https:\/\/africacybersecure.org\/?page_id=675","og_site_name":"Africa Cybersecurity Consortium","article_modified_time":"2025-07-17T15:29:42+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/africacybersecure.org\/?page_id=675","url":"https:\/\/africacybersecure.org\/?page_id=675","name":"Pay - Africa Cybersecurity Consortium","isPartOf":{"@id":"https:\/\/africacybersecure.org\/#website"},"datePublished":"2025-07-16T19:22:55+00:00","dateModified":"2025-07-17T15:29:42+00:00","breadcrumb":{"@id":"https:\/\/africacybersecure.org\/?page_id=675#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/africacybersecure.org\/?page_id=675"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/africacybersecure.org\/?page_id=675#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/africacybersecure.org\/"},{"@type":"ListItem","position":2,"name":"Pay"}]},{"@type":"WebSite","@id":"https:\/\/africacybersecure.org\/#website","url":"https:\/\/africacybersecure.org\/","name":"Africa Cybersecurity Consortium","description":"It is about secure cyber","publisher":{"@id":"https:\/\/africacybersecure.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/africacybersecure.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/africacybersecure.org\/#organization","name":"Africa Cybersecurity Consortium","url":"https:\/\/africacybersecure.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/","url":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png","contentUrl":"https:\/\/africacybersecure.org\/wp-content\/uploads\/2021\/04\/cropped-ACC_Banner_PadWithSkyWhiteBlackColor_TransparentBG.png","width":250,"height":62,"caption":"Africa Cybersecurity Consortium"},"image":{"@id":"https:\/\/africacybersecure.org\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages\/675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=675"}],"version-history":[{"count":14,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages\/675\/revisions"}],"predecessor-version":[{"id":690,"href":"https:\/\/africacybersecure.org\/index.php?rest_route=\/wp\/v2\/pages\/675\/revisions\/690"}],"wp:attachment":[{"href":"https:\/\/africacybersecure.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}