GDPR Data Retention Periods: Article 5(1)(e) Guide
Steven | TrustYourWebsite · 14 May 2026 · Last updated: May 2026
The storage limitation principle in Article 5(1)(e) GDPR requires that personal data be kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the data are processed. Two consequences follow from this: every processing activity needs a defined retention period, and the controller has to actually delete or anonymise the data when that period expires.
This guide covers the principle, the three-layer constraint structure (operational need, legal obligation, data subject rights), retention periods by common data category for EU SMEs, the three options for ending retention (deletion, pseudonymisation, anonymisation), and the recurring failure modes that supervisory authorities encounter during inspections.
The storage limitation principle
Article 5(1)(e) GDPR reads:
Personal data shall be ... kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed; personal data may be stored for longer periods insofar as the personal data will be processed solely for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes in accordance with Article 89(1) subject to implementation of the appropriate technical and organisational measures.
Two operational principles follow:
- No identifiable data without a current purpose. Data with no current processing purpose must be deleted or anonymised, even if it might be useful later.
- Long-term storage is permitted only for archiving, research and statistics, and only with the safeguards in Article 89(1).
Article 5(2) GDPR adds the accountability principle: the controller is responsible for, and must be able to demonstrate, compliance with the storage limitation. In practice, this means documented retention periods per activity, a deletion schedule that is actually executed, and evidence that the schedule runs.
The three constraints stacked on top of each other
Real-world retention periods are not a single number. Three constraints stack:
| Layer | Source | What it does |
|---|---|---|
| Operational need | Business reality | Defines the minimum useful retention for the purpose |
| Legal obligation | National law (tax, employment, sector) | Requires retention for a specific period under Art. 6(1)(c) |
| Data subject rights | Art. 17 GDPR | Limits the maximum where no operational need or legal duty applies |
The final retention period for an activity is the maximum of layer 1 and layer 2, until layer 3 forces deletion when both 1 and 2 expire.
Worked example for a customer invoice:
- Operational need: keep until customer might raise a warranty claim (e.g. two years for consumer goods under EU Directive 1999/44/EC as transposed; many member states extend to longer warranty periods)
- Legal obligation: national tax and accounting law typically requires invoices to be retained from 5 to 10 years (member-state dependent)
- Data subject rights: after the longer of the two periods expires, the data must be deleted unless a new purpose has arisen (e.g. ongoing customer relationship)
The retention period for invoices is therefore "the longest applicable national tax/accounting period", commonly 7 years in Spain, Belgium, France, Germany and the Netherlands, with variation.
Retention periods by data category
These are typical ranges for SMEs operating under EU law. National variations apply; verify the specific period for the relevant member state.
Customer and order data
| Category | Typical retention | Reason |
|---|---|---|
| Active customer account data | Duration of the relationship + inactivity period (commonly 2-3 years) | Operational, contract |
| Order and invoice data | 5-10 years from invoice date | National tax/accounting law |
| Customer support tickets | 12 months from closure | Operational, evidence of service |
| Returns and complaints | 5-10 years | Often aligned with sales records |
| Customer reviews | While linked to the product, longer if anonymised | Operational |
Employee data
| Category | Typical retention | Reason |
|---|---|---|
| Active employment records | Duration of employment | Contract |
| Payroll | 5-10 years after end of employment | National tax/employment law |
| Pension and social-security records | 10+ years; sometimes lifetime | National law |
| CVs of rejected applicants | 6-12 months after the recruitment process closes | Defence against discrimination claims |
| Disciplinary records | Limited periods set by national employment law | Often 2-5 years |
| Sick leave records | Limited periods; often shorter than other HR | Sensitive health data, Art. 9 |
Marketing data
| Category | Typical retention | Reason |
|---|---|---|
| Newsletter subscribers (consent-based) | Until unsubscribe | Active consent |
| Inactive subscribers | Re-permission required after 24 months (no opens or clicks) | Risk that consent is stale |
| Marketing leads with no activity | 12-24 months after last touch | Operational; refresh consent thereafter |
| Customer purchase history for soft opt-in | Limited by national interpretation; typically while customer is active + reasonable cool-down | ePrivacy Article 13(2) soft opt-in |
Website and analytics data
| Category | Typical retention | Reason |
|---|---|---|
| Server logs (security) | 30-90 days | Security operations; longer can be challenged |
| Server logs (debugging) | 14-30 days | Operational; minimum needed |
| Cookie identifiers | Lifespan declared in cookie policy | Consent and operational |
| Analytics data (with persistent ID) | 14 months default in GA4; configurable to 2 months | Defined per analytics tool |
| CCTV footage | 7-30 days; longer requires DPIA | National guidance varies, EDPB Guidelines 3/2019 |
Application data
| Category | Typical retention | Reason |
|---|---|---|
| Account creation records | Duration of account + inactivity period | Operational |
| Login/audit logs | 12 months for SOC2/ISO 27001 contexts | Security operations |
| User-uploaded content | Duration of account | Operational |
| Account-recovery tokens | Minutes to hours | Security |
| Failed login attempts | 30 days for blocking decisions; aggregate longer | Security operations |
How to end retention: delete, pseudonymise, anonymise
GDPR offers three ways to take data out of scope at the end of its retention period.
Delete
The cleanest option. The data is physically removed from production systems, from backups according to backup expiry schedule, and from any other location it lives in. The supervisory authority looks for evidence that deletion actually happens, not just that it is scheduled.
A complication: deletion from backups is not instant. EDPB guidance allows controllers to wait for the backup rotation cycle to complete, provided the data is not restored to production from those backups in the meantime. Document the rotation cycle.
Pseudonymise
Replace direct identifiers with pseudonyms while retaining the data's analytical value. The pseudonymisation must be robust: the key that maps the pseudonym back to the identifier must be stored separately with strict access control, and the residual re-identification risk must be low enough that the data cannot be linked back to a specific individual by ordinary means.
Pseudonymisation does not take the data out of GDPR scope. The data is still personal data; it benefits from reduced obligations and is suitable for some long-term retention scenarios, but the storage limitation still applies eventually.
Anonymise
Make re-identification not reasonably possible by anyone, considering all means likely to be used. Recital 26 is the test. Once data is anonymous, it is outside GDPR and can be retained indefinitely.
Anonymisation is harder than it looks. A "name and email removed" dataset is often still pseudonymous if combinations of remaining fields (postcode + birth date + gender, or behavioural patterns) can re-identify individuals. The EDPB's Opinion 05/2014 on Anonymisation Techniques sets out the test. For most SMEs, true anonymisation of user-level data is not technically feasible; delete the data instead.
How to set up the deletion mechanism
A retention policy that exists on paper but is not actually executed is the most common storage-limitation finding in inspections.
Schedule deletion at the data layer
For structured data in a database, a scheduled job that walks each table and applies the retention rule for that table is the right level. Examples:
customerstable: rows withlast_activity < NOW() - INTERVAL '3 years'andaccount_status = 'inactive'get deleted weeklyorderstable: rows whereinvoice_date < NOW() - INTERVAL '7 years'get deleted monthlyweb_sessionstable: rows wherecreated_at < NOW() - INTERVAL '90 days'get deleted daily
For unstructured data (uploaded files, document storage), a lifecycle policy at the storage layer that expires objects after the retention period is the right level.
Audit the deletion mechanism
Log each deletion run with summary metrics: how many records expired, how many were deleted, any failures. The log is the evidence for accountability. A clean log every month for two years is much more persuasive in inspection than a policy document with no execution trail.
Connect retention to the record of processing
Each row in the Article 30 record of processing names a retention period. The retention period in the register must match the retention period executed in the data layer. Drift between the register and the actual schedule is itself a finding.
Update the privacy notice
Article 13(2)(a) requires the privacy notice to state the retention period or criteria. Match the notice to the register, and the register to the data layer. All three should tell the same story.
For broader compliance context, the GDPR compliance checklist covers the other controls that surround the retention regime.
Common mistakes
"As long as necessary" without a number. Article 13(2)(a) requires either the period or the criteria. "As long as necessary" by itself is neither.
Single retention period applied to everything. A retention regime that says "we keep all customer data for five years" misses the fact that different categories of customer data have different applicable periods. Disaggregate.
Tax retention extended to all data. National tax law requires invoices and accounting records to be retained for a specific period. It does not authorise retaining the customer's IP address, browsing history or marketing preferences for the same period. Each category has its own analysis.
Backups retained beyond the active data. A backup is a copy of personal data. If the active data is deleted but the backup is retained for ten years, the personal data has not been deleted. Backup rotation must align with the retention schedule.
Inactive accounts kept indefinitely. An account that has been inactive for years has no current processing purpose. Either re-engage the user to confirm continued purpose, or delete.
Aggregated reporting based on raw personal data kept indefinitely. If aggregated reports do not actually need row-level personal data, anonymise after aggregating, then keep only the aggregate.
Soft delete that retains identifiers. "Soft delete" via a flag on the row preserves the personal data. For storage limitation, the underlying personal data must be removed, not just hidden.
Final checklist
- Each processing activity in your register has a defined retention period
- Retention periods reflect the maximum of operational need and legal obligation
- The privacy notice states the period or the criteria for each activity
- Deletion is implemented as a scheduled job, not a manual task
- The deletion job logs its runs with summary metrics
- Backups have a rotation policy that aligns with the retention schedule
- Inactive accounts have an inactivity period and a deletion trigger
- Pseudonymisation, where used, has separate key storage with restricted access
- Anonymisation, where claimed, would pass the Recital 26 test against motivated re-identification
- Quarterly review of the register, the privacy notice and the deletion mechanism in sync
This is technical analysis, not legal advice. For complex retention questions involving litigation hold, regulated sectors, or cross-border legal-obligation conflicts, consult a lawyer who specialises in data protection.
Check your website now
Scan your website for GDPR & Privacy issues and 30+ other checks.
Start free checkWebsite Guides
Belgian GBA Cookie Enforcement: What They Check on Your Website
The Belgian Gegevensbeschermingsautoriteit (GBA) enforces cookie rules under the Wet van 13 juni 2005. Here is what they check and how to fix your cookie setup.
Cookie Banner Requirements for Belgium: What English-Speaking Businesses Need to Know
What your cookie banner must do in Belgium. GBA enforcement, equal reject button, no dark patterns and a checklist included.
Data Breach Reporting Under GDPR: 72-Hour Notification
Report a personal data breach under GDPR Article 33: the 72-hour clock, when notification is required, what to file and when to tell affected individuals.