An audit log can be used, e.g., to provide accountability for the accuracy of data in a database and to detect attempts at unauthorized access to a computer system; this is primarily because an audit record typically includes the identity of the user and program attempting each auditable event along with other information, such as the time and date on which the event occurred.