All activities and events in your application are logged. This allows you to present all proofs during inspections by authorities or during audits. In this four-minute video, learn how to search in the logs or find out against which restricted party lists you screen.
If you click the video, a request with your IP address will be transmitted to the provider. Dataprotection
Comments
Please sign in to leave a comment.