home / skills / jeremylongshore / claude-code-plugins-plus-skills / posthog-data-handling

This skill helps enforce PostHog privacy by detecting, redacting, and managing data retention for PII and sensitive data across integrations.

npx playbooks add skill jeremylongshore/claude-code-plugins-plus-skills --skill posthog-data-handling

Review the files below or copy the command above to add this skill to your agents.

Files (1)
SKILL.md
5.5 KB
---
name: posthog-data-handling
description: |
  Implement PostHog PII handling, data retention, and GDPR/CCPA compliance patterns.
  Use when handling sensitive data, implementing data redaction, configuring retention policies,
  or ensuring compliance with privacy regulations for PostHog integrations.
  Trigger with phrases like "posthog data", "posthog PII",
  "posthog GDPR", "posthog data retention", "posthog privacy", "posthog CCPA".
allowed-tools: Read, Write, Edit
version: 1.0.0
license: MIT
author: Jeremy Longshore <[email protected]>
---

# PostHog Data Handling

## Overview
Handle sensitive data correctly when integrating with PostHog.

## Prerequisites
- Understanding of GDPR/CCPA requirements
- PostHog SDK with data export capabilities
- Database for audit logging
- Scheduled job infrastructure for cleanup

## Data Classification

| Category | Examples | Handling |
|----------|----------|----------|
| PII | Email, name, phone | Encrypt, minimize |
| Sensitive | API keys, tokens | Never log, rotate |
| Business | Usage metrics | Aggregate when possible |
| Public | Product names | Standard handling |

## PII Detection

```typescript
const PII_PATTERNS = [
  { type: 'email', regex: /[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}/g },
  { type: 'phone', regex: /\b\d{3}[-.]?\d{3}[-.]?\d{4}\b/g },
  { type: 'ssn', regex: /\b\d{3}-\d{2}-\d{4}\b/g },
  { type: 'credit_card', regex: /\b\d{4}[- ]?\d{4}[- ]?\d{4}[- ]?\d{4}\b/g },
];

function detectPII(text: string): { type: string; match: string }[] {
  const findings: { type: string; match: string }[] = [];

  for (const pattern of PII_PATTERNS) {
    const matches = text.matchAll(pattern.regex);
    for (const match of matches) {
      findings.push({ type: pattern.type, match: match[0] });
    }
  }

  return findings;
}
```

## Data Redaction

```typescript
function redactPII(data: Record<string, any>): Record<string, any> {
  const sensitiveFields = ['email', 'phone', 'ssn', 'password', 'apiKey'];
  const redacted = { ...data };

  for (const field of sensitiveFields) {
    if (redacted[field]) {
      redacted[field] = '[REDACTED]';
    }
  }

  return redacted;
}

// Use in logging
console.log('PostHog request:', redactPII(requestData));
```

## Data Retention Policy

### Retention Periods
| Data Type | Retention | Reason |
|-----------|-----------|--------|
| API logs | 30 days | Debugging |
| Error logs | 90 days | Root cause analysis |
| Audit logs | 7 years | Compliance |
| PII | Until deletion request | GDPR/CCPA |

### Automatic Cleanup

```typescript
async function cleanupPostHogData(retentionDays: number): Promise<void> {
  const cutoff = new Date();
  cutoff.setDate(cutoff.getDate() - retentionDays);

  await db.posthogLogs.deleteMany({
    createdAt: { $lt: cutoff },
    type: { $nin: ['audit', 'compliance'] },
  });
}

// Schedule daily cleanup
cron.schedule('0 3 * * *', () => cleanupPostHogData(30));
```

## GDPR/CCPA Compliance

### Data Subject Access Request (DSAR)

```typescript
async function exportUserData(userId: string): Promise<DataExport> {
  const posthogData = await posthogClient.getUserData(userId);

  return {
    source: 'PostHog',
    exportedAt: new Date().toISOString(),
    data: {
      profile: posthogData.profile,
      activities: posthogData.activities,
      // Include all user-related data
    },
  };
}
```

### Right to Deletion

```typescript
async function deleteUserData(userId: string): Promise<DeletionResult> {
  // 1. Delete from PostHog
  await posthogClient.deleteUser(userId);

  // 2. Delete local copies
  await db.posthogUserCache.deleteMany({ userId });

  // 3. Audit log (required to keep)
  await auditLog.record({
    action: 'GDPR_DELETION',
    userId,
    service: 'posthog',
    timestamp: new Date(),
  });

  return { success: true, deletedAt: new Date() };
}
```

## Data Minimization

```typescript
// Only request needed fields
const user = await posthogClient.getUser(userId, {
  fields: ['id', 'name'], // Not email, phone, address
});

// Don't store unnecessary data
const cacheData = {
  id: user.id,
  name: user.name,
  // Omit sensitive fields
};
```

## Instructions

### Step 1: Classify Data
Categorize all PostHog data by sensitivity level.

### Step 2: Implement PII Detection
Add regex patterns to detect sensitive data in logs.

### Step 3: Configure Redaction
Apply redaction to sensitive fields before logging.

### Step 4: Set Up Retention
Configure automatic cleanup with appropriate retention periods.

## Output
- Data classification documented
- PII detection implemented
- Redaction in logging active
- Retention policy enforced

## Error Handling
| Issue | Cause | Solution |
|-------|-------|----------|
| PII in logs | Missing redaction | Wrap logging with redact |
| Deletion failed | Data locked | Check dependencies |
| Export incomplete | Timeout | Increase batch size |
| Audit gap | Missing entries | Review log pipeline |

## Examples

### Quick PII Scan
```typescript
const findings = detectPII(JSON.stringify(userData));
if (findings.length > 0) {
  console.warn(`PII detected: ${findings.map(f => f.type).join(', ')}`);
}
```

### Redact Before Logging
```typescript
const safeData = redactPII(apiResponse);
logger.info('PostHog response:', safeData);
```

### GDPR Data Export
```typescript
const userExport = await exportUserData('user-123');
await sendToUser(userExport);
```

## Resources
- [GDPR Developer Guide](https://gdpr.eu/developers/)
- [CCPA Compliance Guide](https://oag.ca.gov/privacy/ccpa)
- [PostHog Privacy Guide](https://docs.posthog.com/privacy)

## Next Steps
For enterprise access control, see `posthog-enterprise-rbac`.

Overview

This skill implements PostHog data handling patterns for PII detection, redaction, retention, and GDPR/CCPA workflows. It provides practical steps and code patterns to classify data, detect sensitive items in logs, redact before storage or logging, and automate retention and deletion. Use it to ensure PostHog integrations meet privacy and audit requirements.

How this skill works

The skill inspects event payloads, log entries, and cached user records for PII using regex-based detectors and field-based classification. It replaces or masks sensitive values before logging, enforces configurable retention rules with scheduled cleanup jobs, and provides DSAR export and deletion procedures tied to PostHog and local caches. Audit logging captures compliance actions.

When to use it

  • Integrating PostHog into an application that collects user events or profiles
  • Before shipping logging or analytics pipelines to avoid PII leaks
  • Implementing GDPR/CCPA DSAR export or right-to-deletion workflows
  • Setting retention schedules for logs, errors, and audit data
  • Auditing existing PostHog datasets for sensitive data exposure

Best practices

  • Classify data up front into PII, sensitive, business, and public categories
  • Detect PII with targeted regexes and field lists, not ad-hoc string searches
  • Redact or encrypt sensitive fields before any logging or external export
  • Keep audit logs immutable and retain them per compliance requirements
  • Automate retention cleanup with scheduled jobs and safe cutoff policies
  • Design DSAR and deletion flows that remove PostHog copies and local caches and then record the action

Example use cases

  • Scan historical PostHog exports for emails, phones, SSNs and flag records for remediation
  • Wrap telemetry logging so API keys and passwords are never written in plaintext
  • Schedule daily cleanup of API logs older than 30 days while preserving audit entries
  • Respond to a user deletion request by deleting in PostHog, cleaning local caches, and recording the deletion
  • Export a consolidated DSAR package containing profile and activity data for a given user ID

FAQ

How do I detect PII reliably?

Use a mix of regex patterns for common PII types and explicit sensitive field lists. Validate detections with sampling and refine patterns to reduce false positives.

What retention periods should I use?

Base retention on purpose: short for debug logs (e.g., 30 days), longer for error analysis (e.g., 90 days), and keep audit logs per legal requirements (often several years). PII should be retained only as long as legally required or until deletion requests.