KBVS & ASU-UCMS
- Every time you visit a web page, you send information to the web server. Web servers routinely maintain access logs with a portion of this information, which can be used to get an overall picture of what pages are popular, what other sites link to this one, and what web browsers people are using.
- These logs are used to produce site statistics; the raw log data is not made public.
- Log data may be examined by developers and administrators in the course of solving technical problems and in tracking down badly-behaved web spiders that overwhelm the site. IP addresses of Users derived either from those logs or from records in the database are frequently used to correlate usernames and network addresses in investigating abuse of the jbcollege.curioversity.com site, including spamming, vandalism, harassment of other users, or other disruptions of the site.