Skip to main content

Audit Logs

Coming Soon

This feature is currently under development. Documentation will be updated as the feature becomes available.

Overview

Audit Logs provide a comprehensive record of user activity, system changes, and data access across the DutyCall platform for security, compliance, and troubleshooting purposes.

Planned Capabilities

User Activity Tracking

  • Authentication Events: Login, logout, failed attempts
  • Data Access: Who viewed or exported what data
  • Configuration Changes: Settings modifications with before/after values
  • Permission Changes: Role and access control updates

System Event Logging

  • API Calls: Track all programmatic access
  • Data Exports: Record all bulk data downloads
  • Integrations: Third-party system access
  • Security Events: Anomalies, suspicious activity, policy violations

Log Retention & Export

  • Searchable Interface: Filter by user, action, date, resource
  • Long-Term Storage: Retain audit logs per compliance requirements
  • Export Capabilities: Download logs for external analysis
  • Real-Time Alerts: Notifications for critical events

Audit Log Fields

Each audit log entry will include:

  • Timestamp: When the event occurred
  • User: Who performed the action (username, role, IP address)
  • Action: What was done (created, updated, deleted, exported, etc.)
  • Resource: What was affected (call record, user account, setting, etc.)
  • Details: Specific changes or parameters
  • Result: Success or failure
  • Session ID: Link to authentication session

Use Cases

Security & Compliance

  • SOC 2 / ISO 27001: Demonstrate access controls and monitoring
  • HIPAA: Track access to protected health information
  • Incident Response: Investigate security events
  • Forensic Analysis: Reconstruct timeline of events

Operational Transparency

  • Change Tracking: "Who changed this setting and when?"
  • Access Verification: "Did this user access this data?"
  • Troubleshooting: "What happened before the system behaved unexpectedly?"
  • Evidence Preservation: Support litigation or investigations
  • Compliance Audits: Demonstrate proper controls to auditors
  • Data Subject Requests: Prove compliance with privacy laws

Audit Log Examples

User Login

{
"timestamp": "2025-10-11T14:23:15Z",
"user": "jane.doe@company.com",
"action": "authentication.login.success",
"ip_address": "203.0.113.42",
"session_id": "sess_abc123",
"details": {
"method": "sso",
"provider": "okta"
}
}

Data Export

{
"timestamp": "2025-10-11T14:30:00Z",
"user": "admin@company.com",
"action": "data.export.completed",
"resource": "voice_call_records",
"ip_address": "203.0.113.42",
"session_id": "sess_xyz789",
"details": {
"date_range": "2025-09-01 to 2025-09-30",
"format": "csv",
"record_count": 1523,
"file_size_mb": 12.4
}
}

Configuration Change

{
"timestamp": "2025-10-11T15:45:30Z",
"user": "admin@company.com",
"action": "settings.retention_policy.updated",
"resource": "voice_recordings",
"ip_address": "203.0.113.42",
"session_id": "sess_xyz789",
"details": {
"before": "90 days",
"after": "180 days",
"reason": "compliance requirement update"
}
}

Want to discuss audit logging requirements? Contact your account representative.