Data Retention & Deletion Policy
Transparent information about how long we keep your data and our deletion procedures
This policy outlines our data retention practices in compliance with GDPR Article 5(1)(e) (storage limitation principle), UK GDPR, and CCPA requirements. We retain personal data only as long as necessary for the purposes for which it was collected.
Automated Deletion
Most data categories are automatically deleted when retention periods expire
Secure Deletion
Multi-stage deletion process ensures data is completely unrecoverable
Regular Reviews
Retention periods are reviewed annually and updated as needed
Data Retention by Category
Data Examples
Legal Basis
Contract performance, Legitimate interests
Data Examples
Legal Basis
Legal obligation (tax law)
Data Examples
Legal Basis
Legitimate interests
Data Examples
Legal Basis
Legal obligation (GDPR compliance)
Data Examples
Legal Basis
Legitimate interests
Data Examples
Legal Basis
Consent
Data Examples
Legal Basis
Legitimate interests (security)
Deletion Process
Soft Deletion
Data is marked as deleted but remains recoverable
Access: No user access, admin recoverable
Hard Deletion
Data is permanently removed from primary systems
Access: Not recoverable from primary systems
Backup Purging
Data is removed from all backup systems
Access: Completely unrecoverable
Anonymization
Any remaining references are anonymized
Access: No longer considered personal data
Your Rights Regarding Data Retention
You can request deletion of your personal data at any time, subject to legal requirements.
- Account data can be deleted immediately
- Billing data must be retained for 7 years (legal requirement)
- Consent records must be retained for 3 years (GDPR compliance)
- Some data may be anonymized instead of deleted
In some cases, we may need to extend retention periods:
- Active legal proceedings
- Ongoing regulatory investigations
- Suspected fraud or security incidents
- User requests for account recovery
Automated Systems
- Daily automated deletion jobs
- Retention period monitoring
- Deletion confirmation logging
- Compliance reporting dashboard
Security Measures
- Cryptographic deletion for encrypted data
- Multi-pass overwriting for sensitive data
- Deletion verification and auditing
- Regular compliance assessments