~3-page information security policy template on audit trails, security logs and so on.
Audit trails, security logs and other records of key transactions and activities are an important element of the information risk management framework, for both automated IT systems and manual processes (e.g. visitor logs, keyholder records). The security and other requirements must be determined and satisfied in order for them to be valuable controls.
Supplied as an MS Word document, readily customised for your organisation's specific situation.