What would be the BEST justification from a privacy standpoint for including log generation in a system's design?