Skip to content

Hub retention policies

Each Hub record type has a default retention window. Customers can shorten or extend per-tenant within compliance bounds. governance_event records have a fixed 7-year floor (regulatory).

Record typeDefaultMin (customer override)MaxRationale
output7 years1 year10 yearsAligned with SOC 2 + business-record retention
decision7 years1 year10 yearsSame — decisions are auditable artifacts
governance_event7 years7 years (fixed)10 yearsRegulatory floor — cannot be shortened
artifact3 years90 days10 yearsArtifacts are typically larger; lower default
employee_profileIndefinite until offboarding +30dN/AN/ADrives RBAC + archetype mapping
telemetry_event13 months6 months36 monthsOperational data; balances trend analysis vs cost
  1. Nightly purge job in the Hub data plane runs at the tenant’s chosen maintenance window (default: 02:00 customer-region time)
  2. Records older than the retention window are soft-deleted (marked is_purged=true, kept for 30 days as a recovery buffer)
  3. After 30 days they are hard-deleted (rows removed, files erased from object storage)
  4. Each purge emits a hub.record_purged governance_event (idempotent — one per batch)

In Command Center → Settings → Hub Retention, you can:

  • Adjust the per-record-type retention (within Min/Max bounds)
  • Pause purges (e.g., during a litigation hold)
  • Schedule one-off purges (e.g., end-user GDPR right-to-erasure request)
  • Restore soft-deleted records within the 30-day buffer window

When an end user requests their data be erased:

  1. IT admin opens Command Center → Compliance → Right to Erasure → New request
  2. Enter the user’s email or user_id
  3. Claresia generates an impact report showing:
    • All records the user is the actor for (created_by matches)
    • All records that mention the user in output_body, input_params, etc.
    • Records that fall under exception (e.g., governance_event legal floor)
  4. IT admin reviews and approves
  5. Claresia executes the purge:
    • Eligible records: hard-deleted within 24 hours
    • Records under legal floor: redacted in place (PII scrubbed, hash recomputed, governance_event retained)

If your legal team places a hold on a tenant or record set:

  1. IT admin opens Command Center → Compliance → Legal Hold → New hold
  2. Define scope (tenant-wide, by user, by date range, by skill)
  3. Hold is recorded as a governance_event of kind compliance.legal_hold_added
  4. Purge job skips any record matching the hold scope
  5. Hold can be released by IT admin (with Claresia CSM co-acknowledgment, recorded)

Holds override retention shortenings (you can’t legal-hold a record below the default and then shorten retention to delete it).

Backup retention is independent of Hub record retention:

ModeBackupRetention
ADaily Aurora snapshot35 days
BDaily Aurora snapshot + weekly cross-region90 days
CCustomer-controlledCustomer-defined

Restoring from a backup does not undo a hard-delete — by design (otherwise GDPR right-to-erasure could be bypassed).

To verify retention is being enforced as configured:

Terminal window
# Count records older than configured retention (should be 0)
curl 'https://api.claresia.com/hub/v1/records/retention/audit' \
-H 'Authorization: Bearer $JWT' \
-G \
--data-urlencode 'tenant_id=dainese'

Returns:

{
"tenant_id": "dainese",
"audit_ts": "2026-05-03T03:00:00Z",
"by_record_type": {
"output": { "retention_days": 2555, "records_overdue": 0, "purge_last_run_ts": "2026-05-03T02:14:00Z" },
"decision": { "retention_days": 2555, "records_overdue": 0, "purge_last_run_ts": "2026-05-03T02:14:30Z" },
"governance_event": { "retention_days": 2555, "records_overdue": 0, "purge_last_run_ts": "2026-05-03T02:15:00Z" },
...
}
}

Any non-zero records_overdue indicates a purge job failure — check status.claresia.com for the affected service.

  • SOC 2 considers it a financial-control evidence artifact; 7 years aligns with the SEC retention standard.
  • GDPR Article 30 (records of processing activities) doesn’t fix a number but 7 years is the prevailing defensible interpretation.
  • NIS2 requires 6 years for PHI access logs; 7 gives margin.
  • EU AI Act Article 12 (logging obligation for high-risk AI systems) doesn’t fix a number either; 7 years aligns with audit defensibility.

If your jurisdiction requires longer (e.g., financial sector 10-year retention), extend per-tenant in Command Center settings.