What would be the BEST justification from a privacy standpoint for including log generation in a system's design?
-
A
Investigate fraud after it has occurred
-
B
Facilitate the recovery of information in case of system damage.
-
C
Facilitate early detection of abuse or misuse of the data that a system processes.
-
D
Allow to save the evidence of all operations carried out with the system.