SOC 2 Compliance
Renewly implements SOC 2 Type II engineering controls to protect your contract data. This page explains the security measures in place.
Field-Level Encryption
Sensitive contract fields are encrypted at rest using AES-256-GCM. This includes contact emails, phone numbers, payment details, and tax identifiers extracted from your contracts.
- Vendor contact email and phone
- Internal contact email
- Payment details and bank accounts
- Tax IDs and government identifiers
Data Retention Policies
Organisation admins can set retention periods for different types of data. When data exceeds its retention period, it can be automatically deleted or flagged for review.
Audit logs have a minimum 90-day retention period to meet SOC 2 requirements. This cannot be reduced.
Security Event Monitoring
All security-relevant actions are logged with severity levels. Events include login attempts, password changes, API key operations, data access, and permission changes.
Compliance Controls
Managing Compliance Settings
Organisation admins can configure all compliance settings from the Settings page:
- Settings > Data Retention - Configure retention periods
- Settings > Security Events - View security event log
- Settings > SSO - Configure single sign-on
- Settings > Activity - Full audit trail