An audit log is maintained for all actions. User e-mail address, IP address, action, time stamp and descriptions are logged for each event.