An electronic document or file that records all actions and events in a system in chronological order, as well as error messages and other incidents. It is used to analyze the operation of an object. Such object can be a computer, server, web resource, operating system, or separate application.
Unauthorized access to a log file or the logging of confidential information can cause data leakage.