The above data is required for the following purposes:
- Access protection and security measures
- Reporting system for traceability and availability
The storage of data is appropriate and limited to what is necessary, as it is essential to identify the authorized operators.