All actions that modify data or access protected data should be logged using a new Audit Log system.
All actions that modify data or access protected data should be logged using a new Audit Log system.