How long do you keep case related data
User photo

Frank81

Inquirer

What happens to the evidence and case files after the investigation is completed? Do you store them, and for how long?

Answer from 

Peter Hoffman, B.Sc.

Surveillance Specialist

Thank you for your question. The security and confidentiality of case-related information are among our highest priorities. Below is an overview of our data handling and retention policy:

Data Security During Investigation

  • All evidence and case files are stored exclusively on offline (air-gapped) devices that have never been connected to the Internet,

  • All storage media use state-of-the-art encryption algorithms to prevent unauthorized access,

  • Only the Director of DET.GROUP communicates with clients and has access to the decryption keys, ensuring the highest level of confidentiality.

Communication Protocol

  • We communicate only via encrypted channels:

    • ProtonMail for email communication, offering end-to-end encryption,

    • Secure messaging applications with advanced encryption standards for chat and file transfer.

  • This minimizes the risk of data leaks during the investigation.

Delivery of Evidence

At the conclusion of an investigation, the client receives:

  • An encrypted PDF report containing all findings,

  • Original photos, videos, audio recordings, or other evidence, also delivered in encrypted format,

  • Decryption details shared securely with the client.

Post-Investigation Policy

  • After the case is closed and the client confirms receipt of all evidence, all related data is permanently destroyed using industry-standard secure deletion methods,

  • We retain only essential billing and accounting records in text format, for compliance purposes,

  • Client names are never stored—each client is assigned a cover code name for internal reference.

Long-Term Storage Upon Request

Some clients require secure long-term storage of their evidence. In such cases:

  • We store the data on a dedicated, encrypted device, isolated from all networks,

  • The device is physically secured and accessible only to authorized personnel,

  • Retention is indefinite and subject to a specific confidentiality agreement.

Summary

Your privacy and data security are our absolute priorities. We use advanced encryption, strict access control, and physical isolation measures to ensure that sensitive information never falls into the wrong hands.

Contact us if you require additional details or want to discuss a long-term secure storage arrangement.

Is this answer helpful ?

Ask a Private investigator

By submitting this form, you agree to the processing of your personal data in accordance with our Privacy Policy.

We are accepting new cases

Trust our Private Investigators to Uncover the Truth

Custom Footer
DET.GROUP (also known as DETGROUP)

© 2025 DET.GROUP® (also known as DETGROUP) – Europe’s modern Private investigation agency