Retention and destruction rules for system logs on servers and networked devices that are managed by central IT. Log files are confidential, subject to privacy requirements, and are destroyed after their business use is completed.