Data Retention Policy Template: Schedules, Legal Hold Triggers, and Defensible Disposal
Table of Contents
TL;DR
- The SEC has fined more than 100 firms over $2.2 billion for off-channel communication recordkeeping failures since December 2021 — including a $63 million settlement with 12 firms on January 13, 2025.
- The FTC’s Avast and X-Mode consent orders in 2024 made indefinite data retention itself the violation, not just the failure to delete on request. “We kept it forever” is now an enforcement theory.
- A defensible retention policy has four parts: a schedule (record category → retention period → legal basis), a legal hold workflow, a disposal-with-proof process, and explicit coverage of backups, replicas, and shadow copies.
- The cheapest mistake is keeping data too long. The most expensive mistake is destroying it after a hold should have been issued. Both happen because nobody owns the schedule.
If you’ve worked in risk or compliance for more than a year, you’ve seen this exact scene: someone leaves the firm, their laptop sits in a closet for four years, and on day one of an investigation it shows up in an e-discovery request with thirty months of unreviewed Slack messages on it. Your retention policy said “two years for instant messages.” Your reality said “indefinite, on a shelf, in a closet.”
Data retention is the discipline of closing that gap. And it’s the single area where regulators have moved fastest in the past 24 months — because retention failures are easy to prove, easy to fine, and impossible to hide once an examiner asks for the schedule.
This is the practitioner’s version. Not a generic template — the specific structure of a retention policy that survives a regulator’s records request and a plaintiff’s subpoena, with the schedule, the legal hold workflow, and the disposal proof that examiners actually look for.
Why Retention Got Hard in 2025–2026
Retention used to be a sleepy corner of records management. Then three things happened.
The SEC weaponized recordkeeping. Since December 2021, the SEC has charged more than 100 firms and collected over $2.2 billion in penalties for off-channel communications failures. The January 13, 2025 settlement — 12 firms paying $63 million combined — confirmed this isn’t a one-time sweep. The violation isn’t using WhatsApp; it’s failing to preserve and produce communications that happened on WhatsApp under SEC Rule 17a-4 and FINRA Rule 4511. If your retention schedule says “preserve electronic communications” but doesn’t enumerate Signal, iMessage, LinkedIn DMs, and personal email, you’re one inspection away from being firm number 113.
The FTC made over-retention itself a violation. Avast paid $16.5 million in February 2024 — not because they failed to delete on request, but because they retained browsing data indefinitely without a legitimate purpose and sold it. X-Mode’s April 2024 consent order required deletion of all previously collected sensitive location data unless consumers re-consented. The FTC’s updated COPPA Rule finalized January 16, 2025 caps retention at “as long as reasonably necessary.” The pattern is clear: keeping data is a risk, not a default.
State privacy laws codified storage limitation. CCPA/CPRA, Colorado, Connecticut, Virginia, and 15 other states now require disclosed retention periods for each category of personal information collected. “We retain data as long as the business needs it” is not a disclosed period. It’s a disclosure violation.
GDPR Article 5(1)(e) has required this for years — and CNIL, the Irish DPC, and other EU regulators have issued over €6.2 billion in fines since 2018, with more than 60% imposed since January 2023. The US is roughly five years behind the EU on retention enforcement. We’re catching up fast.
What a Defensible Data Retention Policy Actually Contains
Most retention “policies” in the wild are 1.5 pages of principles and zero pages of operational detail. That’s not a policy — it’s a values statement. A real policy has six components.
| Component | What It Does | Common Failure Mode |
|---|---|---|
| Scope statement | Names every system, repository, and communication channel covered | Excludes “informal” channels (Slack, WhatsApp, personal email) |
| Records inventory | Lists every category of record the firm creates or receives | Stale, last updated 2019, missing GenAI tools |
| Retention schedule | Maps each record to a retention period and legal basis | Periods set by gut, not by regulation |
| Legal hold procedure | Defines triggers, authority, custodian process, IT actions | No clear authority; holds issued via email and forgotten |
| Disposal procedure | Defines method, evidence, and approval for destruction | ”Run when there’s time”; no proof of destruction |
| Roles and ownership | Names accountable owners — not “the team” | Diffuse ownership; nobody updates the schedule |
Get those six right and you’ll pass any retention audit. Skip any one and you have a paper policy.
The Records Inventory: Your Foundation
You can’t write a retention schedule for records you can’t name. Build the inventory first.
For each record category, capture:
- Category name and description — “Customer onboarding documents,” “Employee performance reviews,” “AML transaction monitoring alerts”
- System(s) of record — the primary repository plus any backups, replicas, or analytics copies
- Owner — the named role responsible for the data, not a team
- Personal data flag — whether it contains PII subject to GDPR/CCPA/state law
- Sensitive data flag — financial, health, biometric, or other regulated subcategories
- Source — created internally, received from customer, received from vendor
- Format — structured database, document, email, voice recording, chat log
This is also where shadow systems get exposed. The marketing team’s HubSpot instance that nobody told IT about. The compliance officer’s shared drive folder of board materials. The third-party survey vendor with two years of customer responses. If the inventory doesn’t catch them, the retention schedule won’t either.
The Retention Schedule: Where Most Programs Break
The schedule is a table. One row per record category. The columns:
| Field | Example |
|---|---|
| Record category | Broker-dealer customer trade communications |
| Retention period | 6 years (3 readily accessible) |
| Legal basis | SEC Rule 17a-4(b)(4); FINRA Rule 4511 |
| Trigger date | Date of communication |
| Disposal method | Automated purge in primary system; vendor certificate for archive |
| System owner | Head of Compliance Operations |
| Last reviewed | YYYY-MM-DD |
A few rules that separate a working schedule from a decorative one.
The retention period is the longest applicable requirement, not the average. If SEC Rule 17a-4 says six years, FINRA says six years, your state tax law says seven years for related records, and your insurance carrier requires ten — keep it ten. You can always destroy on schedule; you can never un-destroy.
The trigger date matters as much as the period. “Three years” is meaningless without “three years from what.” Some common triggers: date of creation, date of last customer activity, date of contract termination, date of incident closure. Pick one per category and document it.
Personal data gets a separate row, even when it overlaps with business records. A loan file may have a 7-year retention for tax purposes. The customer’s marketing profile derived from it should not be retained for 7 years — it’s a separate processing purpose with its own legal basis under GDPR/CCPA. Split the rows so the personal data field has its own shorter schedule.
Schedules have to be reviewed at least annually. Regulations change. Systems change. New data types appear (every GenAI tool you adopt creates new categories). Set a calendar reminder; don’t trust yourself to remember.
Common Federal Retention Periods (US Financial Services)
For practitioner reference — not a substitute for a legal review of your specific obligations.
| Record Type | Retention | Authority |
|---|---|---|
| Broker-dealer customer accounts and communications | 6 years (3 readily accessible) | SEC Rule 17a-4 |
| Investment adviser books and records | 5 years (2 readily accessible) | SEC Rule 204-2 |
| BSA/AML CIP records | 5 years after account closure | 31 CFR 1020.220 |
| BSA/AML SAR supporting documentation | 5 years from filing | 31 CFR 1020.320 |
| GLBA Safeguards Rule risk assessments | Until superseded; minimum 6 years recommended | FTC GLBA Safeguards |
| Reg E error resolution | 2 years | 12 CFR 1005.13 |
| TILA/Reg Z disclosures | 2 years | 12 CFR 1026.25 |
| HMDA loan/application registers | 3 years (5 for closed-end) | 12 CFR 1003 |
| ECOA loan applications | 25 months (12 for business credit) | 12 CFR 1002.12 |
| OFAC blocked/rejected transactions | 5 years | 31 CFR 501.601 |
| Federal tax records | 7 years (3 minimum, 7 for fraud cases) | 26 USC 6501 |
What’s missing from most schedules built before 2024: the explicit treatment of off-channel communications. The SEC has made clear that messaging apps, personal devices, and ephemeral platforms fall under the same recordkeeping rules. Your schedule must list them by name and assign a preservation method — phone-based archival tools, MDM-enforced policies on personal devices, or a documented prohibition with monitoring.
The Legal Hold Workflow: The Part That Saves Your Firm
A retention schedule says “delete after 6 years.” A legal hold says “stop. Do not delete this data, no matter what the schedule says.” The hold overrides the schedule until released. Get this wrong and you’ve spoliated evidence — sanctions territory.
A working legal hold workflow has these elements:
1. Trigger definition. What events trigger a hold? Subpoena receipt. Litigation filed or threatened in writing. Government investigation notice. Internal whistleblower complaint with potential litigation exposure. Regulatory exam letter that names specific records. Document the list.
2. Authority. Only specified roles can issue or release a hold. Default: General Counsel, Chief Compliance Officer, or a designated legal hold administrator. Anyone else who suspects a hold may be needed escalates to that authority — they don’t issue holds themselves.
3. Hold notice. Goes to named custodians (the people who hold the data) and named system owners (IT, vendor admins). Specifies what data is on hold, the matter name, the preservation requirement, and the acknowledgment deadline. Custodians acknowledge in writing.
4. System actions. IT or system owners take concrete steps: suspend auto-deletion for the affected accounts, lock relevant mailboxes from purge, freeze backup rotation for the affected period, document each action.
5. Custodian reminders. Holds can run for years. Quarterly reminders to all custodians keep the hold visible. Departing employees get a transition workflow — their data is held by the firm, not deleted with their offboarding.
6. Release. When the matter closes, GC or a designated party issues a written release. Custodians and system owners are notified. Standard retention resumes from the release date forward.
The Sedona Conference’s Principle 5 on preservation — “reasonable, good-faith preservation” — is the standard most courts apply. You don’t have to preserve everything forever. You have to act reasonably and document your reasoning. Workflow is your evidence of reasonableness.
Defensible Disposal: Proving It Actually Happened
If destruction isn’t documented, it didn’t happen — at least not in front of an auditor. Defensible disposal has three parts:
The schedule says it should be destroyed. Pull the schedule entry, confirm the trigger date, confirm no hold is active.
The destruction happened. System logs, certificate of destruction from a shredding vendor, automated purge job output, or signed attestation from a system owner. Date, time, scope, method.
No hold was active. Cross-reference against the active hold list at the time of destruction. If a hold was in place, the destruction is presumptively spoliation — even if the destruction was per-schedule.
For automated systems, set up purge jobs to log every record destroyed: ID, category, retention rule applied, hold check result, timestamp. Store the logs themselves under retention (they’re audit evidence). For physical destruction, vendor certificates with serial numbers, weight, and method (shred, pulp, incinerate) are standard.
The single biggest gap in real-world programs: backups, replicas, and analytics copies. Your CRM may have purged the customer record. Your data warehouse pulled a snapshot six months ago. Your DR site replicates nightly to a second region. Your analytics team copied the table to a Snowflake share. Each of those copies is separately discoverable, separately subject to your retention obligations, and separately your problem.
A complete disposal procedure asks each system owner: “When the source record is destroyed, what happens to your copy?” If the answer is “we don’t know,” you have shadow data and your retention schedule is fiction.
The 30/60/90-Day Implementation Plan
Most retention programs fail because someone tries to boil the ocean. Don’t. Sequence the work.
Days 1–30: Inventory and gap analysis.
- Build the records inventory across every system you can identify
- Interview department heads to surface shadow systems (marketing tools, vendor portals, individual cloud drives)
- Pull your current retention policy (if any) and compare to the inventory — list every category not currently scheduled
- Identify the highest-risk gaps: regulated communications, customer PII, AI training data, vendor-held data
Days 31–60: Schedule and policy drafting.
- Build the retention schedule for the 20 highest-risk categories first (regulated records, customer PII, employee data)
- Pull the legal authorities for each — cite the specific rule, statute, or regulation
- Draft the policy document around the schedule, not vice versa
- Define the legal hold workflow with named authority and concrete trigger events
- Get GC and CCO sign-off on the schedule and policy before circulating widely
Days 61–90: Operationalization.
- Configure automated purge jobs for the categories where the schedule allows automation
- Implement the legal hold tooling — even a structured spreadsheet with custodian acknowledgments beats ad-hoc emails
- Map each system owner to their disposal evidence requirement
- Run a tabletop: “We received a subpoena yesterday for X. Walk me through the hold.” If anyone says “I’d email everyone,” you have more work to do
- Schedule the annual review — calendar invite, named owner, defined inputs
After 90 days you have a working program for your top categories. The remaining categories get added in subsequent quarters. The schedule is a living document, not a one-time deliverable.
Where This Connects to the Rest of Your Program
Retention isn’t a standalone policy. It depends on — and feeds into — several other functions.
Data classification. You can’t apply different retention to different data tiers if you haven’t classified the data. If your firm doesn’t yet have a data classification policy, start there — retention is the operational consequence of classification.
Privacy compliance. GDPR Article 5(1)(e), CCPA/CPRA, and the 19 enacted state privacy laws all require disclosed retention periods. Your privacy notice has to match your schedule. Mismatch = disclosure violation.
Incident response. When a breach happens, the first questions from regulators are: “What data was exposed? When was it collected? Should it have still been there?” Over-retention turns a breach into a bigger breach. Your IR plan should pull retention status into the impact assessment.
Vendor management. Your vendor inventory should track each vendor’s data retention practices and contractual deletion obligations. SOC 2 Type 2 reports often disclose retention; if a vendor’s retention is longer than yours, you’ve effectively extended your retention through them.
So What?
Three things to take away.
First, retention has moved from records-management housekeeping to a top-tier compliance risk. The SEC, FTC, EU regulators, and state AGs are all enforcing retention failures with multi-million-dollar consequences. The probability that your current program meets the bar is, candidly, not high.
Second, the policy is the easy part. The schedule, the legal hold workflow, and the disposal proof are the hard parts — and they’re what regulators actually examine. Spend your time there.
Third, this is one of those areas where modest, consistent investment beats heroic one-time projects. A schedule reviewed annually, holds documented when they happen, disposal logged automatically — that’s a defensible program. A 50-page policy nobody reads is not.
If you want a starting point, our Data Privacy Compliance Kit includes a retention schedule template alongside the data inventory, DSAR workflow, and 19-state privacy applicability matrix. It’s the operational scaffolding so you can spend your time on the firm-specific decisions, not on rebuilding the structure.
The retention scheduler that finally gets built isn’t the one that’s perfect. It’s the one that gets reviewed every year and lives long enough to mature.
Related Template
Data Privacy Compliance Kit
Multi-state privacy compliance templates covering 19 state laws plus GLBA and CCPA.
Frequently Asked Questions
What's the difference between a data retention policy and a records retention schedule?
How long do we have to keep electronic communications under SEC rules?
What triggers a legal hold and who has authority to issue one?
Do retention schedules need to differ for personal data versus other business records?
How do you prove defensible disposal to an auditor?
Where does cloud backup retention fit into all this?
Rebecca Leung
Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.
Related Framework
Data Privacy Compliance Kit
Multi-state privacy compliance templates covering 19 state laws plus GLBA and CCPA.
Keep Reading
Data Classification Policy Template: How to Tier Data Without 200 Categories
Build a defensible data classification policy that maps to GLBA, CCPA, HIPAA, and PCI DSS. Includes the four-tier model, regulatory crosswalk, handling rules, and legal hold triggers.
May 4, 2026
Data PrivacyGDPR Enforcement in 2025: €1 Billion in Fines, TikTok's €530M Penalty, and What US Companies Keep Getting Wrong
GDPR fines exceeded €1 billion in 2025 alone — eight of the ten biggest penalties hit US companies. TikTok's €530M fine, LinkedIn's €310M, and Google's third escalating penalty reveal a predictable enforcement pattern. Here's what practitioners need to fix before an inquiry lands.
May 2, 2026
Data PrivacyCCPA and CPRA Enforcement in 2025: What the California Privacy Protection Agency Is Actually Going After
The CPPA issued over $2.3 million in fines across multiple enforcement actions in 2025. Here's exactly what they found, what the common violation patterns are, and what compliance teams need to fix before they're next.
Apr 10, 2026
Immaterial Findings ✉️
Weekly newsletter
Sharp risk & compliance insights practitioners actually read. Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.
Join practitioners from banks, fintechs, and asset managers. Delivered weekly.