Request Access
Compliance

Data Retention Policy

Clear rules for how long we keep your data, what happens when you leave, and how deletion works.

Retention Schedule

Data CategoryRetention PeriodStorageDeletion Method
AI Provider Prompts0 days (zero retention)Never stored at providerN/A — never persisted
Web Search Prompts0 daysNever storedN/A — prompt text never logged
User DocumentsDuration of account + 30 days (default — configurable)S3 (per-org KMS)Cryptographic deletion
AI Responses / ReportsDuration of account + 30 days (default — configurable)Aurora (per-org partition)Cascading delete + S3 purge
Knowledge Vault OPT-INAdmin-configured (up to org policy max)S3 Glacier (per-org KMS)Admin-initiated or policy expiry
Audit Logs6 years (HIPAA ceiling)Aurora (90d hot) → S3 WORMAutomatic expiry after 6 years
Account MetadataDuration of account + 90 daysAuroraHard delete
Billing Records7 years (IRS requirement)Stripe + AuroraAutomatic expiry
Session Tokens24 hoursCognitoAutomatic expiry

Knowledge Vault — Long-Term Document Storage

By default, user documents are purged 30 days after account closure — the safest option for firms that treat data as liability. But for organizations that want their AI to get smarter over time, we offer the Knowledge Vault.

How It Works

Think of it as a climate-controlled storage unit for your firm's institutional knowledge. Documents move from hot storage to an encrypted cold archive (S3 Glacier), where they remain available for RAG indexing without sitting in active storage.

Admin-Controlled Retention

Organization admins set their own retention window: 30 days, 1 year, 5 years, or indefinite. The 30-day post-cancellation purge is the minimum floor, not a ceiling.

Smarter AI Over Time

Knowledge Packs improve with more context. A firm with 5 years of precedents in the vault has a fundamentally more valuable AI than one that started yesterday.

Same Encryption, Different Tier

Vault documents use the same per-org KMS encryption as active storage. Cryptographic deletion still works — destroy the key and all vault data becomes permanently unreadable.

Vault vs. Active Storage

FeatureActive StorageKnowledge Vault
Access SpeedInstant (milliseconds)RAG-indexed (seconds for retrieval)
EncryptionS3 + KMS (per-org)S3 Glacier + KMS (per-org)
RAG AvailabilityFull text + embeddingsEmbeddings always live; source on-demand
Default RetentionAccount + 30 daysAdmin-configured
Pricing TierIncluded in all plansProfessional ($299) and above
DeletionAutomatic on account closureAdmin-initiated or policy-based expiry

Account Deletion Process

Day 0 — Deletion Requested

Admin initiates account deletion from Settings. All active sessions are immediately terminated. A confirmation email is sent.

Day 1–7 — Grace Period

Account is suspended but data remains intact. Admin can cancel deletion during this window.

Day 7–30 — Data Purge

All user documents, AI responses, and account metadata are permanently deleted. S3 objects are cryptographically shredded (KMS key destroyed).

Day 30+ — Complete

Only audit logs remain (required by law for 6 years). All other data is irrecoverable.

Cryptographic Deletion

When we delete your data, we don't just remove database rows — we destroy the KMS encryption key that protects your organization's S3 bucket. Even if the encrypted bytes somehow persisted, they would be permanently unreadable. This exceeds NIST SP 800-88 "Purge" requirements.

Ready to See YourAI in Action?

100 free AI Requests. No credit card required. SOC 2 certified from day one.

Request Access