How Long Should Police Departments Retain Digital Evidence?

By Ali Rind on May 6, 2026

Female police records manager reviews a monitor in a secure records room while an officer checks

Digital Evidence Retention Periods for Police Departments
7:29

Few questions cause more confusion in records management than how long to keep digital evidence. The wrong answer in either direction is expensive. Destroy evidence too early and you risk spoliation sanctions or wrongful conviction reversals. Keep everything forever and you bury your agency in storage costs and FOIA exposure.

The short version: retention is driven by case type, evidence type, and active legal status, and rules vary by jurisdiction. Below is a practical reference, plus how modern systems automate compliance with policy-based retention.

Police departments must retain digital evidence for the longer of: (1) the statute of limitations for the offense, (2) the duration of any active investigation, prosecution, or appeal, or (3) any active legal hold. Default retention ranges from 90 days for cleared minor incidents to permanent retention for homicide and sex offenses. Federal agencies must additionally comply with the Federal Records Act and 28 CFR Part 23 where applicable.

How the statute of limitations drives retention

The single most important driver of retention is the statute of limitations for the underlying offense. Evidence must be retained at least until prosecution becomes legally impossible, and longer if the case is reopened, appealed, or subject to post-conviction review.

Statutes of limitations vary widely:

  • No limitation for homicide and most capital offenses
  • 6 to 25 years for felony sex crimes, with many states extending or eliminating limits when DNA evidence exists
  • 3 to 10 years for non-violent felonies
  • 1 to 3 years for most misdemeanors
  • Federal felonies typically carry a five-year statute of limitations, with exceptions for fraud, terrorism, and offenses against the United States

Where DNA evidence is present, several states have eliminated the statute of limitations for qualifying sex offenses entirely, making digital evidence retention effectively permanent. Check your state code or the DOJ Office of Justice Programs guidance before setting policy.

Body-worn camera retention is its own category

BWC produces the largest volume of digital evidence in modern agencies, and retention rules differ from traditional case files. Most state BWC statutes distinguish between incident footage (use of force, arrest, response to a complaint) and non-incident footage (routine patrol, no enforcement action).

  • Non-incident footage is typically retained 60 to 180 days, then automatically purged
  • Incident footage must be retained for the duration of the case, including appeals, often years
  • Officer-involved shootings and in-custody deaths require permanent retention in many jurisdictions
  • FOIA or public records requests trigger a legal hold that pauses scheduled deletion

Misclassification is the most common BWC retention failure. See body-worn camera evidence challenges for the full workflow.

Federal vs state vs local retention requirements

Three layers of rules apply, and each agency must comply with the strictest of the three.

Federal agencies must follow the Federal Records Act and NARA-approved retention schedules. Criminal intelligence systems also fall under 28 CFR Part 23, which requires periodic review and purging of intelligence records that don't meet ongoing relevance criteria.

State agencies follow their state's records retention schedule, typically published by the state archives or attorney general's office. Each state sets its own schedule, and records officers should consult their state archives directly rather than relying on a federal clearinghouse.

Local agencies must meet or exceed state minimums but may set longer retention by department policy. Many do, especially for use-of-force incidents and officer-involved investigations.

When rules conflict, the longest applicable retention always wins. See digital evidence retention and legal holds for government.

Legal holds override the retention schedule

A legal hold pauses scheduled deletion regardless of how old the evidence is or what the default retention period says. Triggers include:

  • Active litigation (civil or criminal)
  • Reopened investigations
  • Pending FOIA or public records requests
  • Internal affairs investigations
  • Court orders requiring preservation
  • Anticipation of litigation (a known event likely to result in a claim)

Failing to honor a legal hold, even accidentally, can result in spoliation sanctions, adverse inference instructions, dismissed cases, and personal liability for records officers. Document every hold, including who placed it, when, and what it covers. See FOIA-compliant DEMS for the disclosure-side workflow.

When and how to dispose of digital evidence

Once retention requirements expire and no holds apply, evidence should be disposed of formally, not just deleted. Proper disposition includes:

  • Authorization by the appropriate authority (chief, prosecutor, or court order, depending on jurisdiction)
  • Final chain-of-custody entry documenting the disposal decision
  • Cryptographic erasure rather than simple file deletion. Digital evidence on physical media must be sanitized to NIST SP 800-88 standards
  • Certificate of destruction retained as part of the agency's audit record
  • Notification to any party with a continuing interest (defense counsel, court, etc.)

Read digital evidence disposition best practices for the full workflow. Improper disposition is one of the most common chain-of-custody failures in modern litigation.

How modern DEMS automates retention compliance

Manual retention tracking using spreadsheets, calendar reminders, and sticky notes fails at scale. A purpose-built digital evidence management system enforces retention policy automatically:

  • Policy-driven retention. Set rules once by case type, evidence type, and jurisdiction; the system applies them at ingest.
  • Automatic flagging when records approach retention limits, with review queues for records officers.
  • Single-click legal hold with full audit log of who held what, when, and why.
  • Conditional disposition. The system blocks deletion if any hold is active, regardless of age.
  • Immutable audit trail documenting every retention decision for court or oversight review.
  • Destruction certificates auto-generated and archived for the agency's records.

The agencies that get retention right aren't the ones with the strictest policy. They're the ones whose policy is enforced by software, not memory. See evidence governance lifecycle for how the full lifecycle is managed.

Fix your retention schedule before it costs you a case

Get retention wrong and your agency faces spoliation sanctions, dismissed cases, FOIA penalties, and reputational damage. Get it right with policy-driven automation, and retention stops being a records-officer headache.

Start by auditing your current schedule against state law and the case-type table above. Identify gaps, then evaluate whether your current system can enforce the corrected schedule automatically. The DEMS selection guide walks through what to look for.

Want to see how policy-driven retention actually works? Request a demo and we'll walk through your agency's specific case mix, state requirements, and BWC volume.

Contact us now

People Also Ask

How long do police keep body camera footage?

Non-incident footage is typically retained 60 to 180 days depending on state law. Incident footage (use of force, arrest, complaint) is retained until the case is fully closed, including appeals, often years. Officer-involved shootings often require permanent retention.

Can police evidence be destroyed before a case is closed?

No. As long as a case is active, on appeal, or subject to a legal hold, evidence must be preserved. Destroying evidence on an open case can result in spoliation sanctions and dismissal.

What happens to evidence after a case is dismissed?

Dismissal does not automatically authorize destruction. Most jurisdictions require evidence to be retained through the appeal window and any potential refiling period, typically one to three years post-dismissal.

Is digital evidence retention different from physical evidence?

The retention periods are usually the same, but the destruction methods differ. Digital evidence requires cryptographic erasure or NIST 800-88 sanitization rather than physical destruction.

 

About the Author

Ali Rind

Ali Rind is a Product Marketing Executive at VIDIZMO, where he focuses on digital evidence management, AI redaction, and enterprise video technology. He closely follows how law enforcement agencies, public safety organizations, and government bodies manage and act on video evidence, translating those insights into clear, practical content. Ali writes across Digital Evidence Management System, Redactor, and Intelligence Hub products, covering everything from compliance challenges to real-world deployment across federal, state, and commercial markets.

Jump to

    No Comments Yet

    Let us know what you think

    back to top