How Long Should Police Departments Retain Digital Evidence?
By Ali Rind on May 6, 2026, ref:

Few questions cause more confusion in records management than how long to keep digital evidence. The wrong answer in either direction is expensive. Destroy evidence too early and you risk spoliation sanctions or wrongful conviction reversals. Keep everything forever and you bury your agency in storage costs and FOIA exposure.
The short version: retention is driven by case type, evidence type, and active legal status, and rules vary by jurisdiction. Below is a practical reference, plus how modern systems automate compliance with policy-based retention.
Police departments must retain digital evidence for the longer of: (1) the statute of limitations for the offense, (2) the duration of any active investigation, prosecution, or appeal, or (3) any active legal hold. Default retention ranges from 90 days for cleared minor incidents to permanent retention for homicide and sex offenses. Federal agencies must additionally comply with the Federal Records Act and 28 CFR Part 23 where applicable.
How the statute of limitations drives retention
The single most important driver of retention is the statute of limitations for the underlying offense. Evidence must be retained at least until prosecution becomes legally impossible, and longer if the case is reopened, appealed, or subject to post-conviction review.
Statutes of limitations vary widely:
- No limitation for homicide and most capital offenses
- 6 to 25 years for felony sex crimes, with many states extending or eliminating limits when DNA evidence exists
- 3 to 10 years for non-violent felonies
- 1 to 3 years for most misdemeanors
- Federal felonies typically carry a five-year statute of limitations, with exceptions for fraud, terrorism, and offenses against the United States
Where DNA evidence is present, several states have eliminated the statute of limitations for qualifying sex offenses entirely, making digital evidence retention effectively permanent. Check your state code or the DOJ Office of Justice Programs guidance before setting policy.
Body-worn camera retention is its own category
BWC produces the largest volume of digital evidence in modern agencies, and retention rules differ from traditional case files. Most state BWC statutes distinguish between incident footage (use of force, arrest, response to a complaint) and non-incident footage (routine patrol, no enforcement action).
- Non-incident footage is typically retained 60 to 180 days, then automatically purged
- Incident footage must be retained for the duration of the case, including appeals, often years
- Officer-involved shootings and in-custody deaths require permanent retention in many jurisdictions
- FOIA or public records requests trigger a legal hold that pauses scheduled deletion
Misclassification is the most common BWC retention failure. See body-worn camera evidence challenges for the full workflow.
Federal vs state vs local retention requirements
Three layers of rules apply, and each agency must comply with the strictest of the three.
Federal agencies must follow the Federal Records Act and NARA-approved retention schedules. Criminal intelligence systems also fall under 28 CFR Part 23, which requires periodic review and purging of intelligence records that don't meet ongoing relevance criteria.
State agencies follow their state's records retention schedule, typically published by the state archives or attorney general's office. Each state sets its own schedule, and records officers should consult their state archives directly rather than relying on a federal clearinghouse.
Local agencies must meet or exceed state minimums but may set longer retention by department policy. Many do, especially for use-of-force incidents and officer-involved investigations.
When rules conflict, the longest applicable retention always wins. See digital evidence retention and legal holds for government.
Legal holds override the retention schedule
A legal hold pauses scheduled deletion regardless of how old the evidence is or what the default retention period says. Triggers include:
- Active litigation (civil or criminal)
- Reopened investigations
- Pending FOIA or public records requests
- Internal affairs investigations
- Court orders requiring preservation
- Anticipation of litigation (a known event likely to result in a claim)
Failing to honor a legal hold, even accidentally, can result in spoliation sanctions, adverse inference instructions, dismissed cases, and personal liability for records officers. Document every hold, including who placed it, when, and what it covers. See FOIA-compliant DEMS for the disclosure-side workflow.
When and how to dispose of digital evidence
Once retention requirements expire and no holds apply, evidence should be disposed of formally, not just deleted. Proper disposition includes:
- Authorization by the appropriate authority (chief, prosecutor, or court order, depending on jurisdiction)
- Final chain-of-custody entry documenting the disposal decision
- Cryptographic erasure rather than simple file deletion. Digital evidence on physical media must be sanitized to NIST SP 800-88 standards
- Certificate of destruction retained as part of the agency's audit record
- Notification to any party with a continuing interest (defense counsel, court, etc.)
Read digital evidence disposition best practices for the full workflow. Improper disposition is one of the most common chain-of-custody failures in modern litigation.
How modern DEMS automates retention compliance
Manual retention tracking using spreadsheets, calendar reminders, and sticky notes fails at scale. A purpose-built digital evidence management system enforces retention policy automatically:
- Policy-driven retention. Set rules once by case type, evidence type, and jurisdiction; the system applies them at ingest.
- Automatic flagging when records approach retention limits, with review queues for records officers.
- Single-click legal hold with full audit log of who held what, when, and why.
- Conditional disposition. The system blocks deletion if any hold is active, regardless of age.
- Immutable audit trail documenting every retention decision for court or oversight review.
- Destruction certificates auto-generated and archived for the agency's records.
The agencies that get retention right aren't the ones with the strictest policy. They're the ones whose policy is enforced by software, not memory. See evidence governance lifecycle for how the full lifecycle is managed.
Fix your retention schedule before it costs you a case
Get retention wrong and your agency faces spoliation sanctions, dismissed cases, FOIA penalties, and reputational damage. Get it right with policy-driven automation, and retention stops being a records-officer headache.
Start by auditing your current schedule against state law and the case-type table above. Identify gaps, then evaluate whether your current system can enforce the corrected schedule automatically. The DEMS selection guide walks through what to look for.
Want to see how policy-driven retention actually works? Request a demo and we'll walk through your agency's specific case mix, state requirements, and BWC volume.
People Also Ask
Non-incident footage is typically retained 60 to 180 days depending on state law. Incident footage (use of force, arrest, complaint) is retained until the case is fully closed, including appeals, often years. Officer-involved shootings often require permanent retention.
No. As long as a case is active, on appeal, or subject to a legal hold, evidence must be preserved. Destroying evidence on an open case can result in spoliation sanctions and dismissal.
Dismissal does not automatically authorize destruction. Most jurisdictions require evidence to be retained through the appeal window and any potential refiling period, typically one to three years post-dismissal.
The retention periods are usually the same, but the destruction methods differ. Digital evidence requires cryptographic erasure or NIST 800-88 sanitization rather than physical destruction.
About the Author
Ali Rind
Ali Rind is a Product Marketing Executive at VIDIZMO, where he focuses on digital evidence management, AI redaction, and enterprise video technology. He closely follows how law enforcement agencies, public safety organizations, and government bodies manage and act on video evidence, translating those insights into clear, practical content. Ali writes across Digital Evidence Management System, Redactor, and Intelligence Hub products, covering everything from compliance challenges to real-world deployment across federal, state, and commercial markets.
Jump to
You May Also Like
These Related Stories

Evidence Disposition Best Practices: When and How to Destroy Digital Evidence

Signs Your Police Evidence Management Approach Has Reached Its Limits



No Comments Yet
Let us know what you think