We store various access logs and infrastructure operation logs indefinitely in preparation for security incidents. However, as a rule, we do not disclose or provide these to users.
Log data is stored in an isolated log storage environment and is protected against tampering.
We may submit logs only to the extent deemed necessary by our company on social and ethical grounds, upon request from relevant authorities such as for criminal investigations.