Records documenting the use of databases and other information technology and communication systems to ensure security and appropriate use. Includes, but is not limited to:
- Audit trails and logs
- Authorizations for and modifications to the configurations and settings of IT infrastructure (such as firewalls, routers, ports, network servers, etc.)
- Log-in records, security logs, and system usage files
Official Copy: Any office
Retention: 1 year after date of activity
Disposition Method: Delete