Reaching Others University at Buffalo - The State University of New York
Skip to Content

IT Policies

Log Data Access and Retention

Read or Download the Policy

Retention and destruction rules for system log data on servers and networked devices that are managed by central IT.  Log data are confidential, subject to privacy requirements, and are destroyed after their business use is completed.