How does Renewal Fix access our data?
Renewal Fix connects to your systems using read-only access. We only read the data required to detect renewal risk signals.
We do not write data, trigger actions, or modify records in any connected system.
What systems does Renewal Fix connect to?
Renewal Fix connects to tools commonly used by Customer Success and Revenue teams, such as:
- Salesforce
- Zendesk
- Jira
- Slack
- Conversation intelligence tools
Access is scoped to the minimum required for risk detection.
Does Renewal Fix modify our workflows or customer data?
No. Renewal Fix does not:
- Update records
- Create or close tickets
- Send messages on your behalf
- Change workflows or automations
Your existing processes remain unchanged.
Where does Renewal Fix run?
Renewal Fix can run in a managed environment or, if required, be deployed to run in your own infrastructure.
This allows teams with stricter security or compliance requirements to maintain full control over execution and data boundaries.
Is the system auditable?
Yes. Renewal Fix is designed to be fully auditable.
- Every workflow step is visible
- Signal sources are explainable
- Alert logic can be reviewed and vetted
There are no black-box decisions.
How is data used?
Data is used solely to:
- Detect renewal risk signals
- Correlate patterns across tools
- Generate alerts and executive summaries
Data is not resold, shared, or used for training unrelated models.
Does Renewal Fix store customer data?
Only the minimum data required to generate alerts and summaries is retained.
Retention policies are designed to support risk analysis while minimizing long-term data storage.
How does Renewal Fix support security reviews?
Renewal Fix is intentionally lightweight:
- No new platform to maintain
- No broad permissions
- No invasive agents or scripts
This makes security, legal, and procurement reviews faster and simpler.
Who should we contact with security questions?
If you have specific security or compliance questions, contact us at hello@renewalfix.com. We’re happy to walk through access models, deployment options, and audit requirements.
Comments
0 comments
Please sign in to leave a comment.