Digital places need to be protected. A login system prevents an attacker or an unauthorized person from accessing data, the file system, the database, the repository. To ensure security, it is not only necessary to identify the user accessing the system but it is also necessary to track the operations that the user performs. The tracking is carried out by the log files. The log file records the actions performed by that particular user. Each user is responsible for the actions he performs within the system. The logs allow you to monitor a series of activities: for example, accesses to the system carried out in a given period of time, failed transactions, both software and hardware anomalies, and possible malware threats. The logs are important assets to effectively meet data protection needs. All international cybersecurity regulations require the creation of precise logging policies because the logs satisfy the need to guarantee corporate security and compliance. In recent years the IT world has been protagonist of a real revolution: mobile technology, cloud and the Internet of Things have increased the amount of data traffic on networks. IT operations in companies have become more complex. In this increasingly chaotic environment, the need to guarantee security, data protection and continuity of service has grown. Log files involve tracking and monitoring of operations. This means that the log files must be subject to the requirements of GDPR and must be protected by suitable security measures to mitigate the risks to the rights and freedoms of the data subjects.