"Then, every connection made by that user is logged together with other information including the IP address, the anonymized identifier, the time, the destination IP address, and the protocol being used." . . . .