Logging Policy
Logging exists only where operationally unavoidable. Logs are treated as temporary technical artifacts, not institutional memory.
Principles
- No personally identifying information
- No behavioral analytics
- No third-party telemetry
- No indefinite retention
Retention
- Logs have defined lifetimes
- Expiration is automatic
- Retention windows are documented per system
Access
- Logs are restricted to operators
- No external access
- No secondary use
Deletion
- Deletion mechanisms are tested
- User-triggered deletion is immediate where applicable
- Backups expire automatically
- No shadow copies
If data does not exist, it cannot be compelled.