Log data as required by GPRA / IT-Security in a format form.
Our IT-Security / data protection department request an logging for relevant activities. See the attached file.
All applications has the to log the data in a defined formatted form.
The log file is transferred to a centralized system to analyse the data.
|Component||End User UI|
|Priority||Urgent - Blocker|