Data Destruction Policy

Acutus AI

1. Introduction

Acutus AI is committed to ensuring secure and responsible data management, including the proper disposal of sensitive data. This Data Destruction Policy outlines the guidelines for the secure destruction of data to prevent unauthorized access, data breaches, or leaks.

2. Scope

This policy applies to all employees, contractors, and third-party vendors handling data on behalf of Acutus AI. It covers all electronic and physical data stored on company-owned or employee-owned devices used for company purposes.

3. Data Classification

Before destruction, data must be classified into the following categories:

• Public Data: Non-sensitive data that can be freely shared.
• Internal Data: Information meant for internal use but not considered confidential.
• Confidential Data: Sensitive business, employee, or customer information requiring protection.
• Restricted Data: Highly sensitive data that, if disclosed, could cause significant harm to the company or its stakeholders.

4. Data Retention Period

5. Approved Data Destruction Methods

Depending on the storage medium, the following destruction methods will be used:

Digital Data Destruction:
Paper Document Destruction:

6. Data Handling & ETL Process

7. Responsibilities

8. Data Destruction Documentation

A log must be maintained for the destruction of confidential and restricted data, including:

Certificates of destruction must be obtained from vendors handling secure disposal.

9. Compliance & Auditing

10. Exceptions

Any exceptions to this policy must be approved by Acutus AI's management and documented accordingly.

By enforcing this Data Destruction Policy, Acutus AI aims to protect sensitive information, mitigate data security risks, and comply with regulatory obligations.

Data Retention

Data Type Retention Period Notes
Survey Response Data Up to 12 months Retained for data analysis and client reporting. Deleted after project closure unless otherwise agreed.
Processed & Anonymized Data Up to 24 months If used for modelling, training, or analysis, data is retained in anonymized form.
Client Project Files Up to 12 months Includes raw data, reports, and analytics. Deleted after final delivery unless extended per contract.
System Logs & Audit Trails Up to 6 months Used for security and compliance audits. Automatically purged thereafter.
Backup Files Up to 90 days Encrypted backups stored securely. Deleted post-retention period.