Logging of User Actions
Systems operated by ITS automatically log information related to user actions. This information is required for proper operations, effective troubleshooting, and information security operations. The type of information logged varies with each system, but typically includes network addresses of local devices, destination addresses, and network ports being used. Log files often associate login times and locations with NetIDs. Log retention time varies by system and the amount of data collected by the system. Access to log files is restricted to authorized staff with the appropriate credentials.