Skip to content

Synthetic Users Information Governance & Records Management Standard

Document ID: CRA-34.1.1-IGRMS-001

Version: 1.0

Effective Date: March 25, 2026

Last Updated: March 25, 2026

Owner: CTO — Artur Ventura

Approved By: CEO — Kwame Ferreira

Classification: Internal – Confidential

CRA Control: CRA 34.1.1


1. Purpose

This Standard defines how Synthetic Users identifies, classifies, stores, retains, and disposes of records throughout their lifecycle. It ensures that information assets are managed in a manner consistent with legal, regulatory, and contractual obligations — including obligations arising from the JPMC client engagement — and that records are available for audit and compliance purposes.

This Standard supplements (and is distinct from) the Records & Document Management Policy, which covers the operational management of policy documents and internal working documents.


2. Scope

This Standard applies to:

  • All records created, received, or maintained by Synthetic Users in the course of business operations
  • All employees, contractors, and third parties who create, store, or process Synthetic Users records
  • All systems used to store Synthetic Users records, including cloud storage, databases, communication platforms, and AI/GenAI system logs

3. Information Classification

All records and information assets are classified into one of four levels:

ClassificationDescriptionExamplesAccess
Highly ConfidentialRecords containing customer PII, JPMC data, security findings, credentials, or legal holdsJPMC study data, penetration test reports, encryption keys, legal hold records, breach notificationsNamed individuals only; strict need-to-know
ConfidentialInternal business records not for external disclosureFinancial statements, contracts, HR records, internal audit reports, vendor DPAsInternal staff with business need
InternalGeneral operational records shared within the organizationMeeting notes, project plans, operational procedures, internal communicationsAll employees and approved contractors
PublicRecords approved for external publicationPrivacy policy, terms of service, public security documentationNo restriction

Classification is assigned at creation and reviewed when records are transferred or retained beyond their initial period.


4. Records Lifecycle

4.1 Creation

  • Records are created in the appropriate system based on their classification and type
  • Each record must have a clear title, creation date, and owner
  • AI/GenAI-generated content is labelled as such at creation (see Section 8)

4.2 Storage & Access

  • Highly Confidential and Confidential records are stored in access-controlled systems with encryption at rest (AES-256)
  • Access is granted on a least-privilege, need-to-know basis
  • Shared access to Confidential records requires documented justification
  • JPMC-specific records are stored in designated, isolated storage locations

4.3 Use & Transmission

  • Records are transmitted externally only over encrypted channels (TLS 1.2+)
  • Highly Confidential records may not be transmitted via personal email, personal cloud storage, or unencrypted channels
  • Records shared with JPMC are provided through approved channels only

4.4 Retention

Retention periods are defined in Section 6. Records are retained in accordance with their classification and type, taking into account the longer of: the business need, the legal requirement, and any applicable contractual obligation.

4.5 Disposal

Records are disposed of in accordance with the disposal methods defined in Section 7. Disposal is documented and approved per the requirements of each classification level.


5. Retention Schedule

Record CategoryRecord TypesRetention PeriodLegal BasisPrimary Storage System
Customer DataStudy configurations, interview transcripts, synthetic outputs, personasDuration of customer relationship + 30 days (unless legally required to retain)Contract; GDPR Art. 5Customer database partition (PostgreSQL / AWS RDS)
JPMC Client DataJPMC study data, outputs, correspondenceDuration of engagement + 3 yearsJPMC contractual requirementsIsolated JPMC storage; legal folder
Financial RecordsInvoices, receipts, bank records, payroll, tax filings7 yearsTax and corporate lawAccounting system; CFO secure folder
Contracts & LegalVendor contracts, NDAs, DPAs, employment agreements, client agreementsDuration of contract + 7 yearsContract law; applicable statute of limitationsLegal documentation repository (Git-backed)
Security & Compliance RecordsSOC 2 reports, penetration test reports, vulnerability scans, SAST reports, risk assessments3 yearsSOC 2; contractual (JPMC)Compliance folder; legal documentation repository
AI/GenAI RecordsModel validation checklists, AI risk assessments, adversarial test reports, provider DPAs3 yearsJPMC SCA CRA 13.1.1; contractualInternal compliance folder; legal folder
HR & Employment RecordsOffer letters, performance reviews, training records, termination documentsDuration of employment + 7 yearsEmployment lawHR system; CEO secure folder
Operational RecordsMeeting notes, project plans, internal communications2 years (unless escalated to Confidential status)Business needNotion; email systems
Incident RecordsIncident reports, post-mortems, breach notifications, remediation evidence5 yearsGDPR Art. 33; contractualIncident management system; legal folder
Audit Logs & Access LogsSystem access logs, API logs, change management logs, authentication events1 year rolling (extended to 3 years if security incident occurs)SOC 2; contractualAWS CloudWatch; logging service

When Synthetic Users receives a legal hold notice or anticipates litigation, regulatory inquiry, or JPMC-related investigation:

  1. The CEO and Legal advisor are notified immediately
  2. A legal hold is placed on all potentially relevant records — standard disposition schedules are suspended for affected records
  3. Affected records are identified, preserved, and labelled with the legal hold reference
  4. Records under legal hold are stored in a designated, access-controlled location
  5. The legal hold is reviewed quarterly and lifted only with CEO + Legal advisor approval
  6. When lifted, normal retention and disposal schedules resume for the affected records

7. Disposal Methods

Disposal MethodWhen UsedEvidence Required
Cryptographic erasureCloud-stored data (S3, RDS) where re-keying or key deletion renders data inaccessibleDeletion confirmation from cloud provider or key management log
Secure deletion (software)Application-level data deletion from databases and file storesDeletion log entry; developer confirmation
Database record purgeStructured data subject to retention expiry (e.g., customer data post-contract)Automated purge job log
Certified destruction (third-party)Any physical media (not currently applicable — Synthetic Users operates cloud-only)Certificate of destruction
Provider data deletion confirmationAI/GenAI provider data upon decommissioningWritten confirmation from provider per DPA
Archive and tombstoneRecords that must be retained for legal hold but removed from active systemsArchive log; tombstone record in source system
Document shreddingAny physical documents (rare; applies to printed contracts or physical mail)Destruction log
Degaussing / physical destructionPhysical storage media (if any)Certificate of destruction

Disposal of Highly Confidential records requires CTO approval and written documentation.


8. AI/GenAI Records

AI/GenAI systems at Synthetic Users generate records that require specific governance:

Record TypeLabellingRetentionNotes
AI-generated interview responsestype: ai_generated in database; labelled in UIPer customer data retentionNot presented as human responses
AI-generated research reportsProminently labelled "AI-Generated Synthesis" in UIPer customer data retentionAttribution chain preserved
Prompt template versionsTagged in Git repository3 yearsVersion history preserved in Git
Inference logs (application-level)Tagged with session ID; no PII in logs1 year rollingScoped to tenant
Model validation recordsStored in compliance folder3 yearsRequired by JPMC CRA 13.1.1
AI/GenAI risk assessment recordsStored in compliance folder3 yearsRequired by JPMC CRA 13.1.1

9. Roles and Responsibilities

RoleResponsibility
CTO — Artur VenturaStandard owner; approves disposal of Highly Confidential records; oversees AI/GenAI records governance
CFO — Zumbi FerreiraOwns financial records retention; approves disposal of financial records
CEO — Kwame FerreiraApproves legal holds; approves policy exceptions; receives disposal confirmation for JPMC records
All EmployeesResponsible for classifying records they create; adhering to retention schedules; reporting disposal of records not yet past their retention period
Engineering TeamImplements technical controls for retention and disposal in platform systems; maintains audit logs

10. Change Management

VersionDateAuthorSummary
1.0March 25, 2026Artur Ventura, CTOInitial release. Establishes classification scheme, full retention schedule, disposal methods, AI/GenAI records section, and legal hold procedure in response to JPMC CRA 34.1.1.

11. Review

This Standard is reviewed annually or whenever a material change occurs to applicable law, contractual obligations, or system architecture. Updates require CTO approval.



Synthetic Users, Inc. — 3201 Coolidge Ave, Los Angeles, CA 90066, USA

Released under the MIT License.