A clear retention timeline tells your IRB how long you will keep recordings, transcripts, consent forms, and analysis files—and exactly when and how you will delete or destroy them. An IRB-friendly plan separates identifiable data from de-identified data, ties each item to a purpose, and includes a simple audit trail so your team can prove what happened later.
This guide gives you practical retention rationales, legal-hold considerations, and a fill-in template with separate timelines for audio, identifiable transcripts, de-identified transcripts, consent forms, and analysis files.
Primary keyword: retention timeline for recordings and transcripts
Key takeaways
- Use separate retention clocks for: audio, identifiable transcripts, de-identified transcripts, consent forms, and analysis files.
- Start the clock from a clear event (for example: “after transcription verified” or “after study closeout”).
- Keep identifiable materials for the shortest time that still supports your study workflow and obligations.
- Build in a “legal hold” stop-switch so nothing gets deleted during audits, complaints, or investigations.
- Document destruction with a simple audit trail: what, when, who, method, and approval.
What makes a retention plan “IRB-friendly”
An IRB-friendly retention plan is specific, consistent, and easy to follow. It shows the minimum time you need to keep each data type and explains how you will protect participants while the data exists.
Most issues happen when teams write one vague sentence like “data will be kept securely” and never define which data, how long, or what deletion means across cloud drives, laptops, and vendor systems.
What to include (minimum checklist)
- Data inventory: audio/video, identifiable transcripts, de-identified transcripts, consent forms, analysis files, codebooks, notes, exports.
- Retention trigger: a start date event for each item (for example, “after accuracy check completed”).
- Retention period: the time you will keep the item (days/months/years).
- Storage location(s): where it lives during retention (encrypted drive, approved cloud, locked cabinet).
- Access controls: who can access, and how you remove access at the end.
- Destruction method: how you delete, shred, or otherwise destroy the item.
- Audit trail: how you record that destruction happened.
- Legal hold: when you pause destruction and who can lift the hold.
Use plain definitions for “identifiable” and “de-identified”
Define terms in your protocol so readers do not guess. For example, an “identifiable transcript” might include names, locations, employer, or any combination of details that can reasonably point to a person.
A “de-identified transcript” usually removes direct identifiers and masks indirect identifiers (for example, replacing “St. Mary’s Clinic” with “[clinic]”) to reduce re-identification risk.
Retention timelines by file type (with common rationales)
IRBs often see the same categories of research files, but each category has different risks and different reasons to keep it. Use the sections below to pick a retention rationale that matches your workflow.
1) Audio/video recordings
Recordings are high-risk because voices and faces can identify a person. Keep them only as long as you need them for transcription verification, dispute resolution, or approved secondary checks.
- Common rationale: Keep until transcription is complete and quality-checked, then delete to reduce risk.
- Another rationale: Keep until publication/defense in case you must confirm quotes, then delete.
- Typical trigger: “After transcript verified and de-identified.”
2) Identifiable transcripts
Identifiable transcripts still carry privacy risk, but they can be easier to search than audio. Many teams keep identifiable transcripts briefly while they clean data and generate a de-identified version.
- Common rationale: Keep only until de-identification is completed and validated.
- Another rationale: Keep until member checking is finished (if approved), then delete.
- Typical trigger: “After de-identified transcript is finalized.”
3) De-identified transcripts
De-identified transcripts often have the most long-term research value with the lowest risk. You may keep them longer for analysis transparency, thesis requirements, or future approved research uses.
- Common rationale: Keep through analysis and write-up, then retain for an additional period for academic or sponsor expectations.
- Another rationale: Keep for replication and audit readiness (without identifiers).
- Typical trigger: “After study closeout” or “After final publication.”
4) Consent forms (and consent documentation)
Consent documents can be sensitive because they connect a real identity to participation. Many institutions require retention for a set period, so coordinate with your IRB office and records policy.
- Common rationale: Keep for the institution’s required retention period for human-subjects research documentation.
- Another rationale: Keep through the end of the study plus an additional period for questions, withdrawals, or audits.
- Typical trigger: “After study closure with IRB.”
5) Analysis files (coded datasets, codebooks, memos, exports)
Analysis files can become identifiable if they contain quotes, rare attributes, or linked IDs. Treat them as a separate category and decide whether they store direct identifiers, indirect identifiers, or only study IDs.
- Common rationale: Keep until results are finalized, then retain a de-identified analysis set for verification.
- Another rationale: Keep codebooks and analytic decisions longer than raw data because they support research integrity.
- Typical trigger: “After final analysis locked” or “After publication.”
Fill-in template: retention timeline plan (copy/paste)
Copy this template into your protocol, data management plan, or IRB application. Fill in each bracketed field and delete rows you do not need.
Study retention overview (one paragraph)
Template: We will collect [audio/video] and produce [identifiable transcripts] for transcription and verification. We will create [de-identified transcripts] for analysis and reporting. We will store consent documentation separately from research data. We will retain each file type for the minimum period needed for [analysis, publication, sponsor requirements, academic requirements], then we will destroy the files using the methods described below. We will pause destruction if a legal hold applies.
Retention timeline table
- Audio/video recordings
- Contains: [voice/face/name stated in recording]
- Stored in: [approved encrypted drive / approved cloud folder] (access: [roles])
- Retention starts: [date of recording / after upload / after transcript delivered]
- Keep for: [e.g., 30/60/90 days] or until [event]
- Purpose for retaining: [transcription verification / dispute resolution / member checking]
- Destruction method: [secure deletion method / vendor deletion request / device wipe standard]
- Destruction verified by: [name/role] and recorded in [log location]
- Identifiable transcripts
- Contains: [names/locations/employer/other identifiers]
- Stored in: [restricted folder] (access: [roles])
- Retention starts: [after transcript received / after QC]
- Keep for: [e.g., 14/30 days] or until [de-identification completed and validated]
- Purpose for retaining: [de-identification workflow / participant verification]
- Destruction method: [secure deletion / shred paper copies]
- Destruction verified by: [name/role] and recorded in [log location]
- De-identified transcripts
- Contains: [pseudonyms, masked identifiers, study ID only]
- Stored in: [project drive / analysis platform] (access: [roles])
- Retention starts: [after de-identification finalized]
- Keep for: [e.g., 3/5/7 years] or until [event]
- Purpose for retaining: [analysis, audit readiness, dissertation records]
- Destruction method: [secure deletion / archive then delete]
- Destruction verified by: [name/role] and recorded in [log location]
- Consent forms / consent documentation
- Contains: [names, signatures, contact details]
- Stored in: [separate consent folder / locked cabinet] (access: [roles])
- Retention starts: [date of signature / IRB study closure]
- Keep for: [institution-required period] or [X years after study closure]
- Purpose for retaining: [regulatory documentation, withdrawal tracking, audit]
- Destruction method: [shred paper / secure delete scans]
- Destruction verified by: [name/role] and recorded in [log location]
- Analysis files (coded datasets, NVivo/Atlas.ti projects, spreadsheets, memos)
- Contains: [codes, excerpts, study IDs, links to key file? yes/no]
- Stored in: [analysis workspace] (access: [roles])
- Retention starts: [analysis lock date / study closeout]
- Keep for: [e.g., 3–7 years] or until [event]
- Purpose for retaining: [research integrity, publications, dissertation files]
- Destruction method: [secure deletion, export-only then delete project]
- Destruction verified by: [name/role] and recorded in [log location]
Key file relationships (recommended)
Add a short mapping so reviewers see how items connect without guessing. This also helps your team execute deletion in the right order.
- Linking key (if used): The only file linking identities to study IDs is [file name], stored in [location], accessible to [roles], retained for [time], and destroyed [when].
- Order of destruction: We will destroy [audio] and [identifiable transcripts] first after [de-identified transcript verification], then destroy [linking key] after [final follow-up], then destroy [de-identified analysis exports] after [retention period].
Legal hold: when you must pause destruction
A retention timeline should never force deletion during an active issue. A “legal hold” is a documented pause on deletion when you reasonably expect an audit, allegation, complaint, records request, or investigation.
Even if your IRB plan says “delete after 30 days,” you should keep data on hold until an authorized person lifts the hold.
Common legal-hold triggers to name in your plan
- An IRB noncompliance review or audit notice.
- A participant complaint or privacy concern that requires fact-finding.
- An institutional investigation (research integrity, HR, or similar).
- A subpoena or formal records request routed through your institution.
- A sponsor audit or data verification request.
Simple legal-hold language (template)
Template: If we receive notice of an audit, complaint, investigation, or records request related to this study, we will place relevant study files under legal hold. While on hold, we will suspend routine destruction for affected files until [authorized role/office] confirms in writing that the hold is lifted.
How to document destruction with an audit trail
“We deleted the files” is hard to prove later unless you keep a simple log. Your audit trail does not need to be complex, but it should be consistent and protected from edits.
What to log (minimum fields)
- Item destroyed: file name(s) or batch identifier (avoid listing content).
- Category: audio, identifiable transcript, de-identified transcript, consent, analysis.
- Location: system/folder/device where it lived.
- Destruction method: secure delete, shred, wipe, vendor deletion request.
- Date/time: include time zone if multiple sites work together.
- Performed by: name/role.
- Approved by: PI or data steward (if required).
- Reason: end of retention period, participant withdrawal (if applicable), or other.
Destruction log template (copy/paste)
- Destruction log ID: [YYYY-StudyName-###]
- Date/time: [ ]
- Study: [ ]
- Data type: [audio / identifiable transcript / de-identified transcript / consent / analysis]
- Asset(s): [file list or batch label]
- Location: [system + folder path / cabinet ID]
- Retention trigger met: [event + date]
- Method: [secure delete / shred / wipe / deletion request]
- Performed by: [name/role]
- Approved by (if used): [name/role]
- Notes: [legal hold checked? yes/no; exceptions; errors]
Destruction steps that teams often miss
- Backups: Know whether your system keeps snapshots or backups and how long they persist.
- Local copies: Clean up downloads, email attachments, and auto-saved versions.
- Shared tools: Remove access in collaboration tools and delete from trash/recycle bins.
- Vendor copies: If a vendor handled transcription, document how and when vendor-side copies are deleted.
Pitfalls and decision criteria (so your plan survives real life)
Most retention plans fail because they ignore everyday workflow. Use these criteria to choose timelines your team can actually follow.
Decision criteria for picking retention periods
- Minimum necessary: keep identifiable items only as long as they support a defined task.
- Study needs: allow enough time for transcription review, corrections, and de-identification.
- Institution rules: align consent retention with your institution and IRB office expectations.
- Risk level: higher identifiability should mean shorter retention and tighter access.
- Re-use plans: if you plan future use, state whether it is de-identified only and whether consent covers it.
Common pitfalls (and quick fixes)
- Pitfall: One retention period for everything.
Fix: Split by data type and identifiability. - Pitfall: No clear trigger date.
Fix: Use events like “transcript verified” or “IRB study closed.” - Pitfall: “Delete” without a method.
Fix: Name secure deletion/shredding and who does it. - Pitfall: No plan for participant withdrawal.
Fix: State what you can and cannot remove (for example, data already de-identified or included in analysis). - Pitfall: Ignoring AI tools and uploads.
Fix: List all systems where files may be uploaded and how you control retention there.
Common questions
- Should I delete audio after transcription?
Often yes, if you no longer need it for verification and your protocol does not require retention. If you keep it, explain why and for how long. - Can I keep de-identified transcripts longer than identifiable transcripts?
Yes, that is common because de-identified transcripts reduce privacy risk and still support analysis and reporting. - Do consent forms need a different retention timeline?
Yes, because they link identity to participation and may have institution-specific retention requirements. Store them separately and define who can access them. - What is the difference between a retention schedule and a legal hold?
A retention schedule is your normal plan. A legal hold is a temporary pause on deletion when an issue arises. - How do I document destruction without exposing participant info?
Use batch IDs, file names, or internal identifiers and avoid writing sensitive content in the log. Keep the log in a restricted location. - Do I need to worry about cloud backups after deletion?
Yes, many systems keep backups or version history. Your plan should state how long those backups persist and who can request purge actions if needed.
If you need clean, consistent transcripts or captions as part of your retention and de-identification workflow, GoTranscript offers options that fit different research setups, including automated transcription and transcription proofreading services. When you’re ready to standardize your process end-to-end, you can also use GoTranscript’s professional transcription services to support your study documentation and data handling plan.