All internet traffic on the servers is logged. Each operation is associated with a security token that can be traced back to the individual user. Within the application, logging is performed for all critical operations. Each log entry includes details about who performed the action, what was done, and when it occurred. These logs are accessible to the system’s administrative users.