Verifa provides granular controls over which personally identifiable information (PII) is accessible through the API and for how long.
Each organization can configure which PII fields are returned in API responses
via the api_pii_fields setting. Only whitelisted fields appear in
extracted_data — all other fields are omitted.
If api_pii_fields is not configured, all fields are returned by default.
Document images (ID front, ID back, selfie) are served through HMAC-signed URLs with a configurable expiration time.
When you call GET /api/v1/sessions/\{session_id\}/documents, each document
includes:
The expires_in value (in seconds) is controlled by the organization’s
image_url_expiry_seconds setting (default: 300 seconds / 5 minutes).
Signed URLs are single-use from a security perspective — the signature is tied to the specific session, document type, and expiration timestamp.
Organizations can set a sensitive_data_retention_days value that limits how
long PII and documents are accessible after a session completes.
Once the window elapses:
GET /api/v1/sessions/\{session_id\}/result returns an empty extracted_data
object and sets sensitive_data_expired: true.GET /api/v1/sessions/\{session_id\}/documents returns an empty list.status, face_match_passed, age_check_passed) remain
accessible.The window is measured from when the session enters a terminal status
(completed, approved, rejected, or declined). Pending or in-progress
sessions are not affected.
To satisfy GDPR Article 15 access requests, Verifa provides full export endpoints that return every piece of decrypted PII associated with a session or identity in a single JSON document.
Both endpoints:
api_pii_fields whitelist.api.session.export and
api.identity.export for compliance proof.The output of either endpoint is sufficient on its own to fulfill an Article 15 access request.