A suspected security violation will result in the documents, logs and other communication exchanged between parties (including e-mails, Private Messages or recorded phone calls), used as evidence to support criminal prosecution and/or civil action(s).