GDPR and Log Data

GDPR and Log Data

The EU's General Data Protection Regulation (GDPR) brings a host of new requirements for anyone offering goods and services in the EU. It gives strict rules about what you can and can't do with the personal data you collect.

According to Article 3 (2), the GDPR applies to anyone - based anywhere in the world - who:

  • Offers goods or services to people in the EU (whether free or paid for), or
  • Monitors the behavior of people in the EU.

"Processing personal data" and "monitoring people's behavior" might not sound like something your company is involved in. However, this can include something as common and basic as using a web server to collect log data.


Personal Data

According to the GDPR, data protection is a basic human right. Recital 1 of the GDPR states that "everyone has the right to the protection of [their] personal data."

Personal data, according to Article 4 (1), means information that can be used to identify a person. There are countless examples, such as:

  • Someone's email address
  • A social security number
  • An "online identifier"

Log Data

What is Log Data?

Log data is collected by applications, websites and instant messaging platforms to record the interactions between a user and a system. Log files hold a record of activity on a web server, and can be used to identify things such as:

  • Who has visited your website or used your app
  • The visitor's location
  • The visitor's activity while on your website/app

Log files can contain any information that a website admin wants. At the very least, they will usually contain an IP address.

There had been some question in the past as to whether IP addresses - particularly dynamic IP addresses, which change each time a user connects to the internet - are considered to be personal data. This question was largely laid to rest in 2016 when the Court of Justice of the European Union ruled on the case of Brewer v Germany:

InfoCuria: Screenshot of excerpt from Brewer v Germany court judgment - IP addresses are personal data

Because they can be used to identify a person, dynamic IP addresses should be treated as personal data. This is confirmed in the GDPR, for example at Recital 30:

"persons may be associated with online identifiers provided by their devices, applications, tools and protocols, such as internet protocol addresses"

To comply with the GDPR, you need to think carefully about:

  • What information you're collecting via log data, and
  • Whether you're processing log data in a legally compliant way

You must make sure that everything you do in relation to log data complies with the six principles of data processing set out in Article 5 of the GDPR. These principles provide the foundation for all data processing activity.

We'll look at how you can apply five of these six principles to your processing of log data. The remaining principle is accuracy. Accuracy is not very relevant to this type of processing. It will suffice to say that you must always try to make sure that any personal data in your possession is accurate.

Lawfulness, Fairness and Transparency

Lawfulness, Fairness and Transparency

Compliance with this principle requires that you:

  • Have a legal basis for all your data processing activities
  • Only process people's data in a fair way, that they would reasonably expect, and
  • Always process data in a transparent way and have a Privacy Policy in place

Transparency and Your Privacy Policy

Articles 13 and 14 of the GDPR are very specific about the information that you need to provide your users. You must have a Privacy Policy which informs your users about:

  • Your company's name and contact details
  • The name and contact details of your Data Protection Officer (if you have one)
  • Why you need to process log data (and any other personal data you're processing)
  • Your legal basis for processing this data
  • If you're relying on legitimate interests as your legal basis, details of your Legitimate Interests Assessment
  • Who you'll be sharing this data with
  • How long you'll be storing the data
  • Information about your users' data rights - including their rights to withdraw consent and lodge a complaint about you

Our Privacy Policy Generator makes it easy to create a Privacy Policy for your website. Just follow these steps:

  1. Click on the "Privacy Policy Generator" button.
  2. At Step 1, select the Website option and click "Next step":
  3. TermsFeed Privacy Policy Generator: Create Privacy Policy - Step 1

  4. Answer the questions about your website and click "Next step" when finished:
  5. TermsFeed Privacy Policy Generator: Answer questions about website - Step 2

  6. Answer the questions about your business practices and click "Next step" when finished:
  7. TermsFeed Privacy Policy Generator: Answer questions about business practices  - Step 3

  8. Enter your email address where you'd like your policy sent, select translation versions and click "Generate."

    TermsFeed Privacy Policy Generator: Enter your email address - Step 4

    You'll be able to instantly access and download your new Privacy Policy.

According to Recital 58 of the GDPR:

"The principle of transparency requires that any information addressed to the public or to the data subject be concise, easily accessible and easy to understand, and that clear and plain language [...] be used."

This means that although the legal and technical details might be complicated, you must find a way to explain them to your users in terms that they'll understand.

Processing personal data can only take place on one of six lawful bases set out at Article 6 of the GDPR:

  1. Consent
  2. Contract
  3. Legal obligation
  4. Vital interests
  5. Public task
  6. Legitimate interests

You need to determine your legal basis for any use of log data containing personal data.

Legitimate Interests

Legitimate interests is the most flexible of the legal bases, but not necessarily the appropriate for each situation. You can only process personal data on the basis of your legitimate interests if you've considered how you might impact upon your users' privacy rights, and if you're treating their data in a way that they would reasonably expect.

You can rely on your legitimate interests in processing personal data if you undertake a Legitimate Interests Assessment and satisfy the three-part test:

  1. Purpose - are pursuing a legitimate interest?

    For example, you might be logging IP addresses of visitors to your website in order to maintain security.

    Recital 49 of the GDPR specifically says that the "processing of personal data to the extent strictly necessary and proportionate for the purposes of ensuring network and information security" is a legitimate interest.

  2. Necessity - is the processing necessary to fulfill your legitimate interests?

    Is there another way that you might fulfill this purpose, that has a smaller impact on your users' privacy? In the case of logging IP addresses to maintain your website's security, probably not. If your website is being repeatedly targeted by spammers, for example, you need to know something about who's doing it.

  3. Balancing - do your interests override your users' rights to privacy in this case?

    You need to balance your interests against your users' rights to data protection. If you're taking appropriate care to process their IP addresses in a way that exposes them to minimal risk, i.e. by only storing this data securely, and only for as long as is necessary to achieve your aims, then this should represent an overriding legitimate interest.

    Here's how software company SmartSVN explains its legitimate interests in collecting IP addresses in its Privacy Policy:

  4. SmartSVN Privacy Policy: Data Collection clause with GDPR data processing legitimate interest highlighted

Consent sometimes seems like the easy option. Just ask people to agree to something they may or may not have read, then go ahead and do whatever they've agreed to. This is a misconception.

Under the GDPR, consent must be:

  • Freely given
  • Clear and unambiguous, and
  • Easily withdrawn

According to Recital 42 of the GDPR:

"Consent should not be regarded as freely given if the data subject has no genuine or free choice or is unable to refuse or withdraw consent without detriment."

The implication of the rules around consent is that you shouldn't be relying on consent to collect data that you need to keep your website or app running securely. But you should usually ask for consent to process data for other purposes.

The only personal data that most log files contain is an IP address. But your log files could contain all sorts of personal data.

Some log data might be essential for your purpose of maintaining your website. Other information might just be helpful in allowing you to improve your website by testing bugs.

These are two different data processing purposes. You may need to rely on a separate legal basis for each.

For example:

A delivery form on your website asks your users for their mailing address. The form crashes your website roughly 10 percent of the times it is used. To find out why, you log the mailing address data of everyone who is using the form. You discover that the form crashes when addresses are inputted using a particular format.

You now have mailing address data in your log files. You're processing people's data in a way that they might not reasonably expect. If you have to carry out this type of data processing, you should consider seeking your users' consent.

Google Chrome asks users for consent to send crash reports when they first download its web browser app:

Google Chrome download Accept and Install page with checkbox to send usage statistics

Clicking on "Learn more" takes you to this informative page that helps users make a decision about how their personal information is used by Google:

Google Chrome Help: What reports for automatically reporting errors and crashes includes - Personal data highlighted

Here's the relevant part of Chrome's Privacy Policy that elaborates on this summary and provides more technical information for those who want to know it:

Google Chrome Privacy Notice: Server logs clause

Note that Chrome includes cookies in its log data collection. Certain cookies are also considered personal data that require consent to use.

Purpose Limitation

Limitations on Purposes of Processing

The European Data Protection Supervisor states that you must "limit processing of data through an IT system to its primarily specified purpose."

Recital 50 of the GDPR states that you can only process data for the purposes for which you collected it. If your server logs are designed to help you maintain the security and functionality of your site, you can't use the personal data they contain for any other purpose.

For example:

You tell your users that you log referral data - information about how they got to your website and which website they'd been on previously - for security purposes. This can be a legitimate way to use this type of data, as you might notice that a large number of users are being referred to your site from a particular phishing site.

Website admins can also use referral data in their logs to analyze the effectiveness of marketing campaigns. This can also be perfectly legitimate. But it's an example of "further processing" which might not be compatible with the purposes for which you originally collected this data.

Remember that not all of your log data is personal data - but some of it is. You must make sure that your users know about the purposes for which you use the personal data in your log files.

Data Minimization

Data Minimization

There was a time where everyone involved in running a website or an online business was clamoring to obtain as much personal data about website visitors as possible. Those days are over. Data collection in server logs should be turned "off" by default.

If you must collect personal data in your log files, Article 5 (1)(c) states that it must be "adequate, relevant and limited to what is necessary."

There are obvious ways to comply with this principle, including not logging any personal data you don't need. If you're logging usernames, payment card details, locations, etc. unnecessarily, it should be easy enough to stop doing this by editing your data collection forms and methods.

What's less obvious is how to minimize the collection of more typical types of log data such as IP addresses and other technical information.

The Internet Engineering Task Force's Internet Area Working Group (IntArea) has produced some draft guidance which makes a suggestion about how to minimize the data collected for your log files:

"keep only the first two octets (of an IPv4 address) or the first three octets (of an IPv6 address) with remaining octets set to zero, when logging"

For example, here are the first two octets of an IPv4 address:

Wikimedia Commons upload of an example of an IPv4 address with first two octets highlighted

IntArea also suggests that you don't:

"log unnecessary identifiers, such as source port number, time stamps, transport protocol numbers or destination port numbers."

Storage Limitation

Limitations on Data Storage

Article 5 (1)(e) of the GDPR states that personal data must be stored "for no longer than is necessary for the purposes for which the personal data are processed."

This period will vary depending on the reason you collect a particular type of log data. IntArea suggests that you shouldn't:

"store logs of incoming IP addresses from inbound traffic for longer than three days [...] a three-day logging period covers a week-end, which is convenient for professional server providers."

Many companies choose to delete log files after 7 days. You can automatically delete old log files with a service like Logrotate.

You should explain how long you will store log files in your Privacy Policy.

Here's how AdBlock does this:

AdBlock Privacy Policy: Personal information AdBlock collects clause with information about deletion of log files

Integrity and Confidentiality

Integrity and Confidentiality

It's very important that you keep your users' personal data safe. This applies as much to log files as it does other kinds of personal data. You must have systems in place for preventing a data breach and reporting any data breaches that do occur.

In Recital 108, the GDPR advocates "data protection by design and by default." This means that you should develop your website or app in such a way that builds secure data processing into its core functioning.

The GDPR suggests encrypting personal data at Article 32. You can encrypt log files using technologies such as OpenPGP. Encryption is a good precaution in case you fall victim to a cyberattack.

If you suspect that you have fallen victim to any kind of data breach, Article 33 dictates that you must report it to your supervisory authority (data protection authority) as soon as possible. Under certain conditions you must also alert your users directly.

Article 35 of the GDPR also requires you to carry out a data protection impact assessment if you're carrying out risky data processing. You might need to carry out a data protection impact assessment if, for example, you're using new technology that might make your log data vulnerable until bugs are worked out.

Summary for GDPR-Compliant Log Data

Summary for GDPR-Compliant Log Data

It might not be immediately apparent that log data is subject to the GDPR. However, because log files can contain personal data, the principles of data processing apply here the same as they apply to the processing of any other personal data.

Make sure that your processing of log data complies with the principles of:

  • Fairness, lawfulness and transparency:
    • Create a Privacy Policy which tells your users about how you process log data.
    • Ensure you have a legal basis for processing log data.
    • Where you have a legitimate interest, make sure you carry out a Legitimate Interests Assessment.
    • Where you need to obtain consent, make sure it is meaningful.
  • Purpose limitation:
    • Don't use log data for any purpose other than the one you collected it for.
  • Data minimization:
    • Only collect the log data that you actually need.
    • Consider storing only the necessary components of IP addresses.
  • Accuracy:
    • Take steps to ensure that your log data is accurate, where relevant.
  • Storage limitation:
    • Only store log data for as long as you need it.
    • Automatically erase log data on a regular cycle.
  • Integrity and confidentiality:
    • Have systems in place to keep log data secure.
    • Consider encrypting your log data.
    • Always report serious data breaches to your supervisory authority.
Robert B.

Robert B.

Legal writer.

This article is not a substitute for professional legal advice. This article does not create an attorney-client relationship, nor is it a solicitation to offer legal advice.