Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

How to manage data lifecycle: Data retention for compliance

By Lauren LeRoy
compliance-security-freepik1170x658.jpg

Image via Freepik

November 3, 2022

Solving data retention is a complex problem. Companies retain all kinds of data for different purposes, each requiring different retention rules for distinct types of information. Adding another layer of complexity, data retention laws and regulations vary not only by the type of data but also by geography. Country-specific laws dictate how long an organization needs to retain some data and when to eliminate other data. In addition, specific data may need to be retained for a legal hold that would supersede a country or data-type retention regulation.


What is Data Lifecycle Management

The terms Data Records Management, Data Lifecycle Management, and Data Retention Management are often used interchangeably, but they all refer to the fact that data has an expiration date. There are laws and regulations about how long data can be saved, when it must be deleted, and regulations that say specific information must be saved for a minimum period of time. 


Information Regulations by Industry and Type of Data

Across all industries, organizations need to maintain compliance with different retention regulations that vary by industry, country, or even by state for information such as:

●    Tax records

●    Medical records

●    Human resources records

●    Customer information

●    Accounting data

●    Environmental data

●    Personal data


An example: Data Retention in Healthcare

In the United States, regulations vary depending on the state. States may require that health practitioners save medical records for a minimum of 5-10 years. For adults, 7 years is standard. Some retention laws may say that a minor’s medical records must be kept for 10 years, but if they are under 20 years old, the records must be retained until they turn 20. In addition, there may be different laws by hospitals and/or doctors’ offices. 



Where to Start with Data Retention

Organizations need to know what kind of data they have, what regulations apply, and how to establish and execute policies for compliance. For organizations operating multi-nationally, adhering to various country regulations is even more complex. 

At any given time, retention laws may be added or altered, so Chief Data Officers (CDOs) need to stay current with retention laws to adjust and execute new policies for their company.


Who owns Data Retention?

Is data retention an IT initiative, a business problem, or a governance problem? Should data retention be dictated by the business leaders, legal, privacy, or security teams? 


Data retention applies to all parts of the business for different initiatives and priorities. A complete data lifecycle management program will consider the business processes and business needs of stakeholders. 


CDOs are more frequently tasked with owning data lifecycle management with data governance priorities. A challenge that a CDO faces in establishing a data retention program is that in addition to complying with various regulations, they will realize that some of their stakeholders may have conflicting motivations. 

●    An IT team wants to move or delete data to save costs, reduce risk, and streamline data environments. 

●    A security team wants to delete unnecessary and expired data to reduce the risk of a data breach. 

●    Business owners, analysts, and data scientists want to hold data for as long as possible to have more data for modeling and analysis.

●    Data & analytics managers want to delete expired data so that it is not used for analysis and does not clutter their workspace. 

●    A privacy team wants to remove personal data for compliance.

●    A legal team wants to preserve specific data for a legal case. 


Because organizations are working with roles that may have conflicting priorities about data lifecycle management, it is important to have consistent, documented policies about when data will be retained and when data must be deleted.


Applying Technology to Automate Data Retention

Technology solutions are available to automate the complex task of applying data retention policies. Organizations first need to discover and classify information to know the data and relevant policies to apply data retention. Advanced artificial intelligence (AI) solutions help automate discovery and classification to identify and match the data to the relevant policy.


As organizations have vast amounts of data, applying technology solutions to assist with lifecycle management is a recommended best practice to maintain a data retention program with the scale and speed needed for compliance. There are solutions specifically dedicated to documenting current retention laws in a way that organizations can apply them.


These security solutions help companies maintain retention compliance without needing a full legal staff to keep up with changing regulations. Automating data discovery and applying policy tracking is more efficient and accurate than tackling the problem with manual effort. 


Executing a Data Retention Initiative

Organizations need a way to:

●    Identify the data in their environment — and know what it is and where it is.

●    Know which retention laws apply to the data under their control.

●    Execute retention policies to ensure that data is retained or removed for compliance.

●    Stay current on the laws and regulations that apply to the data they manage.

●    Update retention policies as regulations change

●    Audit to confirm that compliance is achieved.

●    Maintain compliance for new data in the environment, new geographies, and legal retention.


Benefits of Data Lifecycle Management

Organizations gain benefits from business-centric data retention programs, including:

●    Connecting business, legal, and IT priorities.

●    Gaining customers’ trust that their data will be treated responsibly.

●    Maintaining compliance across different kinds of data with geography laws.

●    Applying consistent retention policies across the data ecosystem.

●    Reducing the risk of exposure from saving data longer than needed.

●    Saving storage costs by following retention policies to eliminate expired data.

●    Avoiding fines for non-compliance with regulations.

●    Establishing rules to save data needed for legal holds.

KEYWORDS: compliance cyber security data protection data regulation security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Lauren LeRoy is the Director of Product Marketing at BigID.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Two people studying documents

    The future of data privacy and compliance (and how to stop it)

    See More
  • SEC0219-data-Feat-slide1_900px

    How to protect ERP data when access to corporate networks is both ubiquitous and for sale on the dark web

    See More
  • person paying on laptop

    35% of online shoppers trust AI tools to manage their data

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!