• The only secure provable way we have been able to provide auditable information is to include the audit function as part of the development cycle. This has been driven by federal and state legal requirements of types of data and processes we must perform. We log, keep audit trails, and have write/update triggers that cut before and after images of parts of many transactions. This is the only provable way we are able to prove the transactions.

    Windows logs and server logs help but in the end if the law requires you to keep the minutia then the minutia is what you collect.

    M...

    Not all gray hairs are Dinosaurs!