Records documenting the use of databases and other information technology and communication systems to ensure security and appropriate use. Includes, but is not limited to:

  • Audit trails and logs
  • Authorizations for and modifications to the configurations and settings of IT infrastructure (such as firewalls, routers, ports, network servers, etc.)
  • Log-in records, security logs, and system usage files

Official Copy: Any office 
Retention: 1 year after date of activity
Disposition Method: Delete