
Written by Policy Pros, UK Policy Writing Specialists at Policy Pros
Last reviewed:
Data Storage Policy Writers
How an organisation stores its data is fundamental to its compliance with UK data protection law, its resilience against cyber threats and its ability to respond to regulatory requests. A data storage policy sets out the rules and procedures for storing electronic and physical data throughout its lifecycle, from creation to secure disposal. Without a clear policy, organisations risk data breaches, regulatory fines, loss of business-critical information and failure to respond to data subject access requests (DSARs) within the statutory timeframe.
At Policy Pros, we write bespoke data storage policies that are aligned with the UK General Data Protection Regulation (UK GDPR), the Data Protection Act 2018, ICO guidance on data retention and the NCSC's cloud security principles. Our policies are practical, sector-appropriate and designed to integrate with your wider information governance framework.
Data Storage Principles Under UK GDPR
The UK GDPR establishes several principles that directly govern how organisations store personal data. Two of the most relevant to data storage are the storage limitation principle and the integrity and confidentiality principle.
Storage limitation (Article 5(1)(e)): Personal data must be kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the data is processed. In practical terms, this means organisations must define clear retention periods for each category of personal data they hold, and must have procedures in place to review, archive or delete data when the retention period expires. The ICO has emphasised that keeping personal data indefinitely "just in case" is not compliant with this principle.
Integrity and confidentiality (Article 5(1)(f)): Personal data must be processed in a manner that ensures appropriate security, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage. This requires organisations to implement technical and organisational measures such as encryption, access controls, backup procedures and physical security for servers and archives.
Article 25 of the UK GDPR further requires data protection by design and by default. This means that when organisations design or procure data storage systems, they must build in data protection safeguards from the outset, rather than adding them as an afterthought. For example, a new cloud storage system should be configured with role-based access controls, encryption at rest and automated retention schedules before it goes live.
Retention Schedules by Data Type
One of the most important components of a data storage policy is the retention schedule, which specifies how long different categories of data should be kept. While the UK GDPR does not prescribe specific retention periods, various statutes, regulations and professional guidelines provide a framework. Below are common retention periods for key data types:
HR and personnel records:
- Personnel files and training records: six years after employment ends (reflecting the limitation period for contractual and statutory claims)
- Payroll and tax records: six years plus the current year (required by HMRC)
- Recruitment records for unsuccessful candidates: six to twelve months (to cover potential discrimination claims)
- Health and safety records: at least three years, or forty years for records relating to asbestos exposure or other hazardous substances (under the Control of Substances Hazardous to Health Regulations 2002)
Financial records:
- Accounting records: six years for private companies (Companies Act 2006, Section 388)
- VAT records: six years (HMRC requirement)
- Insurance policies: permanently, or at least for the period during which claims could arise
Medical and health data:
- Occupational health records: six years after employment ends, or forty years for records relating to exposure to hazardous substances
- NHS patient records: retention periods vary by record type, as set out in the NHS Records Management Code of Practice
The data storage policy should include a retention schedule tailored to the organisation's specific data processing activities, and should be reviewed regularly to ensure it remains accurate and compliant.
Cloud Storage and UK GDPR Implications
Most modern organisations use cloud storage services to some extent, whether through dedicated platforms such as Microsoft 365, Google Workspace or Amazon Web Services, or through specialist sector applications. Cloud storage offers significant benefits in terms of scalability, accessibility and disaster recovery, but it also raises specific UK GDPR compliance considerations.
When personal data is stored in the cloud, the organisation (as data controller) must ensure that the cloud provider (as data processor) offers sufficient guarantees regarding security, availability and data protection. A data processing agreement compliant with Article 28 of the UK GDPR must be in place, and the organisation should carry out due diligence on the provider's security certifications, data centre locations and incident response procedures.
A critical consideration is the location of the data. If the cloud provider stores data outside the UK, the organisation must ensure that there is an adequate legal basis for the international transfer. Following the UK's departure from the EU, the UK has its own adequacy framework. The UK Government has issued adequacy regulations for the EEA, and data transfers to countries with an adequacy decision (such as EU member states) can proceed without additional safeguards. For transfers to countries without adequacy, such as the United States (unless the provider is covered by the UK Extension to the EU-US Data Privacy Framework), the organisation must implement appropriate safeguards such as standard contractual clauses (SCCs) or binding corporate rules.
The NCSC publishes cloud security guidance that is particularly relevant for UK organisations evaluating cloud storage providers. The guidance sets out fourteen cloud security principles covering areas such as data in transit protection, asset protection and resilience, separation between customers, governance and operational security. Organisations should use this framework when assessing cloud providers and should document their assessment in the data storage policy or a supporting risk assessment.
Encryption at Rest and in Transit
Encryption is one of the most effective technical measures for protecting stored data. The UK GDPR does not mandate encryption as such, but Article 32 requires organisations to implement appropriate technical measures, and the ICO has consistently identified encryption as a key safeguard.
Encryption at rest protects data that is stored on servers, hard drives, USB devices or backup media. If an encrypted device is lost or stolen, the data remains inaccessible without the decryption key, significantly reducing the risk and impact of a data breach. Full-disk encryption should be enabled on all laptops and portable devices, and server-side encryption should be enabled for cloud storage and databases.
Encryption in transit protects data as it moves between systems, for example when files are uploaded to cloud storage or when data is transmitted between offices. Transport Layer Security (TLS) is the standard protocol for encrypting data in transit, and the policy should specify that all data transfers must use TLS 1.2 or higher.
The data storage policy should set out the organisation's encryption standards, specify the minimum acceptable encryption algorithms and key lengths, and define responsibilities for key management, including the secure storage and rotation of encryption keys.
Backup and Recovery Requirements
Data backups are essential for business continuity and resilience. A data storage policy should define the organisation's backup strategy, including:
- Backup frequency: How often data is backed up (for example, daily incremental backups and weekly full backups)
- Backup locations: Where backups are stored, including off-site or geographically separated locations to protect against site-level disasters
- Backup encryption: All backup media should be encrypted to the same standard as live data
- Recovery testing: Backups should be tested regularly (at least quarterly) to confirm that data can be restored successfully
- Recovery time objectives (RTO) and recovery point objectives (RPO): The policy should define how quickly data must be restored and how much data loss is acceptable
The Data Protection Act 2018, in conjunction with the UK GDPR, requires that organisations be able to restore the availability and access to personal data in a timely manner following a physical or technical incident (Article 32(1)(c)). Organisations that cannot recover data after a ransomware attack or hardware failure may face enforcement action from the ICO, particularly if the loss affects individuals' rights and freedoms.
Secure Deletion and Data Disposal
When data reaches the end of its retention period, or when storage media is decommissioned, the organisation must ensure that data is securely deleted so that it cannot be recovered. Simply deleting files or formatting a hard drive is not sufficient, as data can often be recovered using commercially available tools.
Secure deletion methods include:
- Overwriting data using approved software that writes random data across the entire storage medium multiple times
- Degaussing magnetic media to disrupt the magnetic field and render data unrecoverable
- Physical destruction of storage media (shredding, incineration or crushing) through a certified destruction provider, with a certificate of destruction retained for audit purposes
- Cryptographic erasure, where the encryption keys for encrypted data are securely destroyed, rendering the data permanently inaccessible
The ICO expects organisations to have documented procedures for secure data disposal and to maintain records of what was destroyed, when and by whom. Failure to dispose of data securely has resulted in enforcement action and significant fines.
How Data Storage Policy Links to DSAR Processes
Under Article 15 of the UK GDPR, individuals have the right to request a copy of the personal data an organisation holds about them. Organisations must respond to a data subject access request (DSAR) within one calendar month. To meet this deadline, the organisation must know where personal data is stored, in what format, and how to retrieve it.
A well-drafted data storage policy, supported by an information asset register (IAR), enables organisations to locate and retrieve personal data efficiently. The IAR maps each category of personal data to its storage location, the legal basis for processing, the retention period and the responsible data owner. Without this mapping, DSAR responses are likely to be incomplete or delayed, which could result in a complaint to the ICO.
The data storage policy should cross-reference the organisation's DSAR procedures and the IAR, ensuring that staff understand how storage locations relate to their obligations under the UK GDPR.
How Policy Pros Can Help
Policy Pros writes data storage policies that are comprehensive, legally compliant and tailored to your organisation's infrastructure and data processing activities. We ensure alignment with UK GDPR Articles 5(1)(e) and 25, the Data Protection Act 2018, ICO retention guidance and NCSC cloud security principles.
We also write complementary policies including data protection and confidentiality policies, information asset registers, data retention schedules, backup and recovery procedures and secure disposal policies. Whether you need a standalone data storage policy or a complete information governance framework, our team is here to support you.
For more information and a quote, please get in touch.