Pre-Engagement Readiness Guide

Before We Can Work Our Magic,
Your Data Needs to Be Ready.

The Client Data Structure Protocol is your pre-engagement checklist. Written for executives and IT administrators who want to understand exactly what it takes to unlock the full power of Agent X.

Plain LanguageNo Coding Required5 Requirements
Download the ProtocolView Requirements

Three Stages. Your Data Powers All of Them.

Agent X is the engine. Your data is the fuel. This protocol ensures the fuel is ready.

1
Ingest
Agent X connects to your existing data sources and reads the information your business generates every day.
2
Orchestrate
The orchestration layer organizes, cross-references, and processes data according to your defined business rules.
3
Deliver
Decisions, reports, alerts, and automated tasks are delivered to the right people and systems at the right time.

Supported Platforms & Formats

Agent X connects natively to these systems. Not on the list? Custom connectors are available.

CRM Systems
Salesforce, HubSpot, Zoho CRM, Microsoft Dynamics
ERP Systems
SAP, Oracle NetSuite, Microsoft Business Central
Cloud Storage
Google Drive, SharePoint / OneDrive, Dropbox Business
Databases
MySQL, PostgreSQL, SQL Server, MongoDB
Email & Communication
Microsoft 365, Google Workspace, Slack, Microsoft Teams
Project Management
Asana, Monday.com, Jira, Notion
File Formats
CSV, XLSX, PDF (text-based), DOCX, JSON, XML
Custom
REST API, GraphQL, Webhook, SFTP, Custom connectors on request

The Five Requirements

What Your Organization Needs to Prepare

No coding required. Your IT administrator can complete every item on this list independently.

1
Data Must Be Digitally Accessible
All information Agent X will work with must exist in a digital format that a computer can read. Paper records, physical filing systems, or unsupported legacy software does not qualify.
  • Audit all current data sources for digital accessibility
  • Digitize or migrate any critical offline records
  • Confirm legacy systems can export in supported formats
2
Data Must Be in Supported Systems or Formats
Agent X connects natively to a defined list of platforms and file types. Data in unsupported formats must be exported or converted before onboarding.
  • Review the supported platforms list above
  • Configure unsupported systems to export as CSV, XLSX, or JSON
  • Confirm all systems are on current software versions
3
Access Credentials Must Be Configured
Agent X needs permission to read from your data systems. This means creating a dedicated service account with the minimum permission level required for your use case.
  • Create a dedicated service account in each connected platform
  • Assign minimum required permission level (Read Only, Read/Write, or Limited Admin)
  • Document credentials securely for handoff via encrypted portal
  • Get IT security / compliance team approval
4
Data Must Be Consistently Structured
The same type of information should be stored the same way across your systems. Inconsistent structure is one of the most common reasons AI systems produce unreliable outputs.
  • Standardize date formats across systems (ISO 8601 preferred)
  • Establish canonical naming conventions, cleanse duplicates
  • Ensure mandatory fields are complete in primary tables
  • Verify currency and unit labels in financial data
5
A Designated Data Owner Must Be Assigned
Each major data source must have a named internal owner who is responsible for that data, understands what it contains, and can make decisions about how it is used.
  • Identify an Executive Sponsor for the engagement
  • Assign a Data Owner for each connected system
  • Designate an IT Administrator for technical tasks
  • Share ownership map with your onboarding manager

Pre-Onboarding Preparation

Your IT administrator should be able to complete every item on this list without writing a single line of code.

Executive Sign-Off

  • Executive Sponsor identified and briefed
  • Data access approved by IT Security / Compliance
  • Data Owners assigned for each connected system
  • Internal timeline aligned with onboarding schedule

Access & Credentials

  • Service accounts created in all systems
  • Permission levels configured per spec
  • Credentials documented for encrypted handoff
  • VPN / firewall / IP allowlisting configured

Data Quality

  • Data audit completed across primary systems
  • Date formats standardized
  • Critical duplicates resolved
  • Mandatory fields checked for completeness

System Readiness

  • Unsupported systems export to CSV/XLSX/JSON
  • Export schedules confirmed
  • All platforms on current versions
  • API access enabled where applicable

Four-Phase Onboarding

You do not manage this process. Your onboarding team leads every step.

1
Connection & Verification
Live connections established to each data source. Permissions verified. Data flow confirmed.
2
Data Quality Assessment
Automated scan produces a Data Quality Report. Remaining inconsistencies reviewed with your Data Owners.
3
Orchestration Configuration
Agent X configured to your business rules, workflows, and priorities. ELOS and ZPOS modules activated.
4
Go-Live & Handoff
Live monitoring begins. Your team receives ELOS dashboard access and operational training.

Data Security

How We Protect Your Data

Minimum Necessary Access

Agent X accesses only the specific data required for its defined functions. No broader access than what your use case requires.

No Persistent Raw Data Storage

Your raw records are not stored on our infrastructure beyond active processing tasks.

Encrypted Transit (TLS 1.3+)

All data encrypted in transit. Credentials stored in encrypted vaults, never transmitted in plain text.

Full Audit Logging

Every action Agent X takes is logged with a complete audit trail accessible to your team.

Right to Revoke

Revoke access to any system at any time by disabling the service account. No involvement from us required.

Compliance Aligned

Designed to align with SOC 2, GDPR, HIPAA (where applicable), and ISO 27001 requirements.

Get Started

Download the Full Protocol

Share this document with your IT Administrator and Executive Sponsor. Complete the readiness checklist before your kickoff call.

Request the Protocol (PDF)View Training Programs