Meritto Data & Logs Retention Policy

Meritto Data & Logs Retention Policy


Overview

Meritto Data & Logs Retention Policy establishes guidelines for managing data retention, storage, and disposal.

  • Compliance Assurance: Ensures adherence to legal and regulatory requirements.

  • Data Protection: Safeguards sensitive information from unauthorized access.

  • Efficient Management: Supports structured data handling and disposal practices.

This policy promotes secure, organized, and compliant data management within the system.

Scope

This policy applies to all data generated or managed within Meritto, including:

  • Business Data – Leads, Applications, Opportunities, IVR calling data, Communication records, and Payment histories.

  • Logs – System logs, access logs, audit trails, and other logs generated by Meritto’s applications and systems.

Definitions

  • Data – Any electronically or physically stored information used for operational, regulatory, or compliance purposes.

  • Retention Period – The duration for which data must be retained before it is archived or deleted.

  • Disposal – The process of securely removing data that is no longer required.

Retention Guidelines

Data retention is determined based on legal requirements, business needs, and industry standards. The following table outlines the retention periods for different data types in Meritto.

Business Data

All your work data like Leads, Applications, Opportunities, IVR calling data, Communication records and payment histories are stored in the system for perpetuity and are only removed from the system when you delete this data or put in a request for this data to be deleted.

Logs 

Data Type

Archival Period

Audit Logs

90 days

Exam Request/Response Logs

10 days

Payment Transaction Logs

180 days

Webhook Request/Response Logs

10 days

Automation Logs

90 days

API Logs

10 days

Upload Logs

30 days

Purge Data Logs

365 days

IVR Logs

60 days

Shortened URLs

180 days

Notifications

15 days

Google Meet & Zoom Logs

90 days

Policy Review

Meritto reviews this policy annually to ensure compliance with applicable laws, regulations, and industry standards.

Contact Information

For any questions regarding data retention or this policy, please contact the Data Protection Officer at infosec@meritto.com.

Conclusion

Meritto’s Data & Logs Retention Policy ensures secure, compliant, and efficient data management by defining clear retention periods and disposal practices. By adhering to this policy, organizations can safeguard sensitive information, meet regulatory requirements, and maintain structured data handling within the system. This structured approach enhances data security, minimizes risks, and ensures seamless operations.


    • Related Articles

    • Checking Audit Logs (User Activity)

      Overview Audit Logs Tracking in Meritto allows administrators to monitor engagement, actions, and interactions within the system. Activity Monitoring: Track user interactions and task completion. Identify Inefficiencies: Analyze workflows to improve ...
    • Data Security

      Overview At Meritto, data security is deeply embedded across our infrastructure, application, and operational layers. Hosted on AWS, we leverage tools like WAF, GuardDuty, ELK Stack, and CodeCommit to ensure robust protection, continuous monitoring, ...
    • Show Data Permission

      Overview Managing visibility of leads and applications is essential for ensuring data is accessed only by relevant users. Within the User Manager, the "Show Data" dropdown under the Client-Specific Information section allows administrators to control ...
    • Data Backup Checklist

      Introduction To close the admission cycle and start up a new one, we need to purge the existing forms and the associated records. This purged data will be stored for benchmarking and more future comprehensive analysis. Following are the data modules ...
    • Introducing Archival: Your New Data Management Solution

      Overview Data Archival helps streamline CRM data management by allowing users to archive outdated or less relevant records efficiently. Permission-Based Archiving: Control who can archive data to maintain security. Decluttered Environment: Keeps the ...