U-M Windows Forest
How-To Documents
Get Help

Guidelines for Release of Security Log Information


Protect the privacy of individuals whose personal information may be captured in security logs in accordance with laws, regulations and university policies while supporting the normal operation, administration and troubleshooting of systems and networks.


These guidelines apply to security logs, such as Kerberos and Windows logs, which capture security information associated with users of university information services. Users (whose private personal information is captured) may include faculty, staff, students, alumni and other individuals who access university information services. The guidelines specifically address requests from unit system administrators to access security log information associated with computers that are under their purview for troubleshooting purposes. Requests to access log information associated with a specific individual are also addressed.

General Guidelines


ITS System Administrator (Controlling the Security Log):

Unit System Administrator (Requesting Access to Security Log):

User Advocate:

Data Steward:


Responsible Use of Information Resources (SPG 601.07

Privacy and the Need to Monitor and Access Records (SPG 601.11)

Institutional Data Resource Management Policy (SPG 601.12)

Information Security Policy (SPG 601.27)