Meritto Data & Logs Retention Policy establishes guidelines for managing data retention, storage, and disposal.
Compliance Assurance: Ensures adherence to legal and regulatory requirements.
Data Protection: Safeguards sensitive information from unauthorized access.
Efficient Management: Supports structured data handling and disposal practices.
This policy promotes secure, organized, and compliant data management within the system.
This policy applies to all data generated or managed within Meritto, including:
Business Data – Leads, Applications, Opportunities, IVR calling data, Communication records, and Payment histories.
Logs – System logs, access logs, audit trails, and other logs generated by Meritto’s applications and systems.
Data – Any electronically or physically stored information used for operational, regulatory, or compliance purposes.
Retention Period – The duration for which data must be retained before it is archived or deleted.
Disposal – The process of securely removing data that is no longer required.
Data retention is determined based on legal requirements, business needs, and industry standards. The following table outlines the retention periods for different data types in Meritto.
All your work data like Leads, Applications, Opportunities, IVR calling data, Communication records and payment histories are stored in the system for perpetuity and are only removed from the system when you delete this data or put in a request for this data to be deleted.
Meritto reviews this policy annually to ensure compliance with applicable laws, regulations, and industry standards.
For any questions regarding data retention or this policy, please contact the Data Protection Officer at infosec@meritto.com.
Meritto’s Data & Logs Retention Policy ensures secure, compliant, and efficient data management by defining clear retention periods and disposal practices. By adhering to this policy, organizations can safeguard sensitive information, meet regulatory requirements, and maintain structured data handling within the system. This structured approach enhances data security, minimizes risks, and ensures seamless operations.