A person can see a chronological record of data access or use. These records can contain an action taken, time and date or the IP address of the device accessing the data.
- Gives visibility of when data has been accessed, by whom and the reason why
- It gives the user the ability to see whether their permissions are being followed
- Can be challenging to present the log in a way that makes it useful or actionable, depending on the granularity and frequency of recorded events
Was this pattern useful?