Description

A person can see a chronological record of data access or use. These records can contain an action taken, time and date or the IP address of the device accessing the data.

Advantages

  • Gives visibility of when data has been accessed, by whom and the reason why
  • It gives the user the ability to see whether their permissions are being followed

Limitations

  • Can be challenging to present the log in a way that makes it useful or actionable, depending on the granularity and frequency of recorded events

Examples