Zero-Retention Verification That Still Passes Audit
How to keep toxic identity data out of your systems without losing defensibility when an offer is challenged or fraud is discovered later.

If you need to store biometrics to pass audit, your evidence model is wrong. Store proofs, delete payloads, and log deletion as a control.Back to all posts
When an offer gets challenged and everyone asks for the receipts
The worst time to discover your retention model is during an escalated hiring incident. One Slack thread turns into five: Recruiting wants speed, Security wants containment, Legal wants consent and defensibility, and Audit wants proof that controls are operating effectively. By the end of this article, you will be able to codify a zero data retention pattern that preserves auditability through immutable events, Evidence Packs, and versioned policy decisions. The key move is to stop treating biometric artifacts as your audit record. Treat them as transient processing inputs. Your audit record should be a minimal, privacy-safe evidence trail that can survive incident response, legal review, and regulator questions.
Zero retention fails when you confuse payload with proof
Recommendation: store proofs, not payloads. Proofs are time-stamped, policy-bound attestations and event logs that show what checks ran and what the result was. Payloads are the actual ID images, face frames, or voice recordings that create the highest sensitivity and retention risk. Checkr found that 31% of hiring managers reported interviewing someone later found to be using a false identity. Directionally, that supports investment in stronger identity gating before interviews. It does not prove your organization will see the same rate, nor does it validate any single vendor's detection accuracy.
Needs: control description, operating evidence, timestamps, exception approvals, access logs, and policy versioning.
Does not need: raw biometric media retained indefinitely, unless you have an explicit legal basis and retention schedule.
Ownership, automation, and systems of truth
Recommendation: define a single owner for workflow, a single owner for policy, and a single source of truth for candidate status. This prevents "shadow exceptions" and reduces reviewer fatigue. Ownership model that works in real pipelines: - Recruiting Ops owns the funnel workflow and SLAs (what happens when verification fails, retries, candidate comms). - Security owns risk policy and access control (Risk-Tiered Verification thresholds, step-up criteria, reviewer permissions). - Legal or GC owns retention, consent language, and appeal rights (what is stored, for how long, and who can dispute outcomes). Automation vs manual review: - Automated: passive signals (device, network, behavior), document authenticity checks, liveness, face match, voice match, risk scoring, decision logging, deletion receipts. - Manual: only the step-up tier, only on high-risk signals or candidate-initiated appeal, with tight RBAC and time-boxed artifact access. Sources of truth: - ATS is the system of record for candidate status and hiring decisions. - Verification service is the system of record for verification events and evidence references. - Evidence store is the system of record for minimal Evidence Packs (attestations, hashes, logs), not raw biometrics.
Key definitions you can put in policy
Use these definitions to align Security, Legal, and Audit on what you mean in contracts and control narratives.
Implementation pattern: prove controls ran without storing biometrics
Recommendation: implement three retention classes and make deletion a first-class event. Step-by-step guidance: - Payload: raw ID images, face frames, voice recordings, biometric templates. Target: zero retention after decision, unless a time-boxed appeal is triggered. - Short-Lived Review Artifacts: redacted snapshots needed for a human reviewer during a step-up tier. Target: strict TTL (hours or days), encrypted, access logged, auto-purged. - Durable Proof: event logs, signed attestations, hashes, decision IDs, policy version, reviewer approvals, and deletion receipts. Target: retain per your audit schedule because it is low toxicity. - Verification is not a one-time gate. Store a current state (verified, needs-step-up, expired, exception-granted) plus the event history that got you there. - Device fingerprint drift, impossible travel, network anomalies, and behavior patterns should trigger step-up checks before you ever request additional sensitive data. - Define: retry count, alternate document types, assisted capture, and a manual-review window. Every fallback must produce an event log and a reason code to avoid inconsistent exceptions. - Hash any transient artifact before deletion and store the hash in the Evidence Pack. This lets you prove integrity of what was processed without retaining the content.
Classify data into Payload, Short-Lived Review Artifacts, and Durable Proof.
Make "verification state" continuous.
Use passive signals as the first line of defense.
Create a fallback when the ID will not scan.
Preserve auditability with cryptographic references.
Candidate ID (internal), job requisition ID, and session ID
Timestamped results for each check (doc authenticity, liveness, match)
Risk tier selected and risk signals that drove it (reason codes)
Policy version and threshold set
Reviewer ID and approval trail for exceptions
Deletion receipts for any transient artifacts
Policy artifact: zero-retention with audit-grade Evidence Packs
This policy snippet shows how an operator team can codify retention, step-up tiers, and required logging so you can pass audit without keeping biometrics.
Anti-patterns that make fraud worse
- Retaining raw ID images and biometric media "for safety" without a defined TTL, purpose limitation, and access model, which increases breach and discovery exposure. - Letting recruiters grant ad hoc exceptions in DMs or spreadsheets, which creates audit gaps and inconsistent treatment that fraudsters learn to exploit. - Using a single hard gate with no fallback path, which forces desperate teams to bypass verification entirely to hit hiring targets.
Where IntegrityLens fits
IntegrityLens AI supports zero-retention verification with audit-ready evidence by keeping hiring workflow and verification events in one defensible pipeline. TA leaders and recruiting ops run the ATS workflow end-to-end, while CISOs and Legal get policy control, Evidence Packs, and access governance that stand up in audits and investigations. Risk-Tiered Verification applies passive signals first, then step-up checks only when needed, preserving candidate speed while reducing fraud exposure. - Full ATS workflow across Source candidates - Verify identity - Run interviews - Assess - Offer - Advanced biometric identity verification with zero-retention patterns and deletion receipts - Fraud detection signals and AI screening interviews available 24/7 - Technical assessments across 40+ programming languages - Evidence Packs for audit trails and exception governance
How to answer Audit, Legal, and IR questions in one page
Recommendation: pre-write your audit narrative and map it to logs and controls so you are not inventing process during an incident. Operator answers you should be able to produce quickly: - "What personal data do we retain?" A data-class table with TTLs, purpose, and access roles. - "How do we prove the right person was interviewed?" Evidence Pack showing identity gating result, session linkage, and continuous verification state. - "How do exceptions work?" Documented step-up path, reason codes, approvals, and appeal SLAs. - "What if verification fails due to camera/ID issues?" Fallback workflow plus logs showing consistent handling.
Sources
- Checkr, Hiring Hoax (Manager Survey, 2025): https://checkr.com/resources/articles/hiring-hoax-manager-survey-2025
Related Resources
Key takeaways
- Treat verification as a continuous state with short-lived artifacts and long-lived, minimal event evidence.
- Auditability comes from immutable logs, signed attestations, and reproducible decision policy, not raw biometric storage.
- Risk-Tiered Verification reduces friction by applying step-up checks only when passive signals warrant it.
- Design explicit fallbacks for failed scans to avoid reviewer improvisation and inconsistent exceptions.
- Pre-approve retention, access, and appeal flows so Legal and Audit are not negotiating during an incident.
Codifies retention classes, Risk-Tiered Verification, and the minimum evidence required for audit without storing biometric payloads.
Designed for CISOs and GCs to sign off because it makes deletion and access logging explicit.
policyVersion: "2026-03-16"
scope:
pipeline: "Source candidates -> Verify identity -> Run interviews -> Assess -> Offer"
appliesTo: ["pre-interview identity gating", "post-incident audit requests", "candidate appeals"]
dataClasses:
payload:
description: "Raw biometric and document media used only for real-time verification"
items: ["id_front_image", "id_back_image", "selfie_frames", "voice_sample", "biometric_template"]
retention:
default: "delete-immediately-after-decision"
appealHold:
enabled: true
ttl: "72h" # time-boxed, only if candidate initiates appeal
storageControls:
encryption: "AES-256"
access: "no-direct-human-access" # except within appealHold window
deletionReceiptRequired: true
shortLivedReviewArtifacts:
description: "Redacted artifacts visible to a trained reviewer for step-up tier"
items: ["id_snapshot_redacted", "liveness_summary", "match_explainability"]
retention:
ttl: "7d"
autoPurge: true
accessControls:
rbacRoles: ["security-reviewer", "legal-reviewer"]
mfaRequired: true
accessLogging: "immutable"
durableProof:
description: "Audit-grade evidence without raw biometrics"
items:
- "verification_event_log"
- "attestation_signature"
- "policy_version"
- "risk_tier"
- "reason_codes"
- "artifact_hashes"
- "exception_approvals"
- "deletion_receipts"
retention:
ttl: "per-audit-schedule" # defined in GRC control matrix
integrity:
immutability: true
signingKey: "kms://org/verification-attestations"
riskTieredVerification:
passiveSignalsFirst: true
tiers:
low:
criteria: ["known_device", "consistent_network", "no_behavior_anomalies"]
requiredChecks: ["document_auth", "liveness", "face_match"]
stepUpOn: ["device_drift", "vpn_or_datacenter_ip", "impossible_travel"]
high:
criteria: ["multiple_anomalies", "repeated_failures", "proxy_suspected"]
requiredChecks: ["document_auth", "liveness", "face_match", "voice_match"]
humanReview: true
humanReviewSla: "4h"
loggingRequirements:
mustLog:
- "candidate_internal_id"
- "req_id"
- "session_id"
- "timestamp"
- "check_results"
- "risk_tier"
- "reason_codes"
- "policyVersion"
- "exception_id (if any)"
- "deletion_receipt_id"
linkage:
atsStatusUpdate: true
idempotencyKeyRequired: true
fallbacks:
idScanFailure:
retries: 2
alternateDocsAllowed: ["passport", "national_id"]
assistedCaptureEnabled: true
requireReasonCode: true
cameraUnavailable:
allowReschedule: true
maxDeferrals: 1
requireRecruitingOpsApproval: true
appeals:
enabled: true
window: "72h"
evidenceAccess:
roles: ["security-reviewer", "legal-reviewer"]
timeBoundAccess: true
candidateNotification: true
Outcome proof: What changes
Before
Verification artifacts were inconsistently retained across tools, exceptions lived in email threads, and audit requests required manual reconstruction of who approved what and when.
After
The team implemented zero-retention for biometric payloads, standardized Evidence Packs with immutable event logs and deletion receipts, and routed only high-risk sessions to step-up review with RBAC and SLAs.
Implementation checklist
- Define what "zero retention" means for each data class (document images, face template, voiceprint, device signals).
- Log only: who, what, when, policy version, decision, and cryptographic references to evidence.
- Use short TTLs for any artifacts required for human review, with immutable deletion receipts.
- Implement Risk-Tiered Verification using passive signals first, then step-up checks for anomalies.
- Separate system-of-record (ATS) from evidence store and from verification processor.
- Create an appeal path with SLAs and role-based access to Evidence Packs.
Questions we hear from teams
- Can we be audit-ready if we do not retain ID images or recordings?
- Yes, if you retain durable proof: timestamped check results, policy version, reason codes, exception approvals, and deletion receipts. Audit typically needs evidence that controls operated effectively, not indefinite storage of biometric payloads.
- What do we do when a candidate cannot complete verification?
- Use predefined fallbacks: limited retries, alternate documents, assisted capture, and a step-up manual review tier with SLAs. Every fallback should produce reason-coded events so exceptions are consistent and reviewable.
- How do we preserve defensibility if a proxy interview is suspected after the fact?
- Link the interview and assessment sessions to the verification session ID, store the continuous verification state, and retain an Evidence Pack that shows which checks ran and the results under a specific policy version. If you need to investigate, your audit trail is already assembled without requiring raw biometrics.
Ready to secure your hiring pipeline?
Let IntegrityLens help you verify identity, stop proxy interviews, and standardize screening from first touch to final offer.
Watch IntegrityLens in action
See how IntegrityLens verifies identity, detects proxy interviewing, and standardizes screening with AI interviews and coding assessments.
