S 2.110 Data protection guidelines for logging procedures

Initiation responsibility: Head of IT

Implementation responsibility: Administrator

In terms of data security, logging as part of IT-systems operation constitutes the manual or automatic generation of records which make it possible to answer the following questions: "Who accessed or performed what, when, using which resources?" These records should also indicate system states: "Who had which access rights for which period of time?"

The nature and scope of logging depends on general data privacy laws as well as field-specific guidelines.

The logging of administrative activities is equivalent to system monitoring, while the logging of user activities serves essentially as process monitoring. Accordingly, requirements concerning the nature and scope of system-oriented logging originate primarily from general data privacy laws, while process-oriented logging is defined mainly by field-specific guidelines. Examples of process-oriented logging guidelines are, among others, registration laws, police laws and constitutional laws.

Minimum requirements for logging

The following activities must be logged fully during the administration of IT systems:

During the processing of personal data, the following user activities must be logged selectively or fully in accordance with the sensitivity of the processes and information involved:

Limited use of log data

In accordance with the almost fully identical data privacy regulations applicable on the federal and state levels, the use of log data is strictly limited. Such data must only be used for the purposes for which they were originally saved. These purposes usually consist of general monitoring tasks specified in a security concept, checks for the proper usage of programs for processing person related data stipulated by most data security laws and monitoring by internal or external data security officers. Only in exceptional cases do field-specific regulations allow the use of such data for other purposes such as criminal prosecution.

Storage period

Unless specified otherwise by field-specific regulations, the storage period for logs is defined by the deletion guidelines forming part of generally applicable data privacy laws. Log data must be deleted immediately once they are no longer required to fulfil the purpose. If no compelling reasons exist for the further retention of log data, these must be deleted by law.

The following factors serve as orientation here:

Experience has shown that a retention period of one year should not be exceeded.

Shorter storage periods should be considered for logs which are prepared for the purpose of selective checks. Storage up to the point of actual checking is usually adequate. Here, too, field-specific regulations must be observed.

Basic technical and organisational requirements

The effectiveness of logging and its evaluation as part of monitoring depends decisively on technical and organisational conditions. In this context, the following aspects should be considered:

Review questions: