To provide accurate and comprehensive audit logs in order to detect and react to inappropriate access to, or use of, information systems or data.
This policy applies to all Information Systems that store, process or transmit LEADx Data.
- Access to Information Systems and data, as well as significant system events, must be logged by the Information System.
- Information System audit logs must be protected from unauthorized access or modification.
- Information System audit logs must be retained for an appropriate period of time, based on the Document Retention Schedule and business requirements. Audit logs that have exceeded this retention period should be destroyed according to UF document destruction policy.
- Information System Administrators (ISAs) are responsible for developing and implementing procedures for the reporting and handling of inappropriate or unusual activity.
- Information System Managers (ISMs) are responsible for monitoring and reviewing audit logs to identify and respond to inappropriate or unusual activity.
Date Last Revised: 5/1/2020
Date Established: 5/1/2020