

Frank81
Inquirer
What happens to the evidence and case files after the investigation is completed? Do you store them, and for how long?
How long do you keep case-related data?
Answer from
Thank you for your question. The security and confidentiality of case-related information are among our highest priorities. Below is an overview of our data handling and retention policy:
Data Security During Investigation
All evidence and case files are stored exclusively on offline (air-gapped) devices that have never been connected to the Internet,
All storage media use state-of-the-art encryption algorithms to prevent unauthorized access,
Only the Director of DET.GROUP communicates with clients and has access to the decryption keys, ensuring the highest level of confidentiality.
Communication Protocol
We communicate only via encrypted channels:
ProtonMail for email communication, offering end-to-end encryption,
Secure messaging applications with advanced encryption standards for chat and file transfer.
This minimizes the risk of data leaks during the investigation.
Delivery of Evidence
At the conclusion of an investigation, the client receives:
An encrypted PDF report containing all findings,
Original photos, videos, audio recordings, or other evidence, also delivered in encrypted format,
Decryption details shared securely with the client.
Post-Investigation Policy
After the case is closed and the client confirms receipt of all evidence, all related data is permanently destroyed using industry-standard secure deletion methods,
We retain only essential billing and accounting records in text format, for compliance purposes,
Client names are never stored—each client is assigned a cover code name for internal reference.
Long-Term Storage Upon Request
Some clients require secure long-term storage of their evidence. In such cases:
We store the data on a dedicated, encrypted device, isolated from all networks,
The device is physically secured and accessible only to authorized personnel,
Retention is indefinite and subject to a specific confidentiality agreement.
Summary
Your privacy and data security are our absolute priorities. We use advanced encryption, strict access control, and physical isolation measures to ensure that sensitive information never falls into the wrong hands.
Contact us if you require additional details or want to discuss a long-term secure storage arrangement.
Ask a Private investigator
By submitting this form, you agree to the processing of your personal data in accordance with our Privacy Policy.
Next Questions
🔥