Audit Log Requirements: What to Track, How Long to Keep
    Compliance & Documents

    Audit Log Requirements: What to Track, How Long to Keep

    Compliance audit trail: track user changes, document access, deal modifications. Meet regulatory requirements for dealer recordkeeping.

    Sarah Lin
    Mar 22, 2026
    7 min read

    "Who changed this deal price from $18,500 to $16,000?" Without audit logs, you'll never know. Was it an authorized manager discount, or an unauthorized staff member committing fraud? During regulatory audits, customer disputes, or internal investigations, audit logs are your only proof of what happened.

    An audit log (also called activity log, change log, or transaction log) is a detailed, tamper-proof record of every action taken in your dealership management system: who logged in, what data they accessed, what changes they made, and when. Audit logs are critical for: regulatory compliance (proving who accessed customer data), fraud prevention (detecting unauthorized price changes, document alterations), and legal defense (evidence in customer disputes).

    While no single law explicitly mandates "audit logs," regulations like FTC consumer protection rules, state privacy laws, and Canadian PIPEDA require dealers to demonstrate compliance - and audit logs are how you prove it. Dealerships without comprehensive audit logs face higher liability, inability to detect fraud, and failed audits.

    This guide covers what to track in audit logs, retention requirements, compliance implications, DMS configuration, and how to use logs for fraud detection and audit defense.

    Why Audit Logs Matter: Real-World Scenarios

    Scenario 1: Customer Claims Contract Fraud

    Situation: Customer claims you changed purchase price from $15,000 (verbally agreed) to $17,000 on signed contract.

    Without audit logs: Your word vs customer's word. No proof of what actually happened. High risk of lawsuit, BBB complaint, regulatory investigation.

    With audit logs: "Our logs show purchase price was entered as $17,000 on Jan 15 at 2:14 PM by Sales Rep John Smith. No changes were made after customer signed at 2:45 PM. Here's the timestamped log." Case dismissed.

    Scenario 2: Regulatory Audit (Privacy Breach Investigation)

    Situation: Customer reports receiving spam emails after purchasing from your dealership. Regulator investigates: "Who accessed this customer's email address?"

    Without audit logs: Cannot prove who accessed data. Regulator assumes worst case (data breach, unauthorized access). Fines: $10,000-$50,000 per violation.

    With audit logs: "Logs show only authorized sales rep (John Smith) and F&I manager (Jane Doe) accessed customer record on Jan 15. No exports to external systems. No unauthorized access detected." Audit passed.

    Scenario 3: Internal Fraud Detection

    Situation: Monthly financial reconciliation reveals $5,000 missing from cash deposits.

    Without audit logs: No way to identify who processed transactions, when cash was recorded, or who accessed payment records. Fraud goes undetected until losses accumulate.

    With audit logs: Review logs for cash transactions during missing period. Identify that Employee X processed 10 cash deals but only 7 were deposited. Flag for investigation. Employee terminated, losses recovered.

    What to Track in Audit Logs

    1. User Authentication Events

    Track every login, logout, and access attempt to identify unauthorized access:

    EventWhat to LogWhy It Matters
    Successful LoginUsername, timestamp, IP address, device typeProve who was logged in when suspicious activity occurred
    Failed Login AttemptUsername attempted, timestamp, IP address, failure reasonDetect brute-force attacks, unauthorized access attempts
    Password ChangeUsername, timestamp, IP address, initiated by (user vs admin)Detect account takeover (unauthorized password reset)
    Logout / Session TimeoutUsername, timestamp, logout method (manual vs timeout)Verify user was logged out when claimed (alibi defense)
    Permission ChangesUser affected, old role, new role, changed by, timestampDetect unauthorized privilege escalation

    2. Data Access Events (Privacy Compliance)

    Privacy laws (PIPEDA in Canada, state laws in US) require tracking who accessed personal information:

    EventWhat to LogCompliance Requirement
    Customer Record ViewedUser, customer name, timestamp, fields accessed (email, SSN, credit report)PIPEDA (Canada), CCPA (California)
    Credit Report PulledUser, customer name, timestamp, credit bureau (Equifax, TransUnion, Experian)FCRA (Fair Credit Reporting Act)
    Customer Data ExportedUser, customer count, export format (CSV, PDF), timestampGDPR/PIPEDA (data portability)
    Document Viewed/DownloadedUser, document type (contract, credit app), customer name, timestampPrivacy compliance (access control)
    Email/SMS Sent to CustomerUser, customer, message content (opt-out link), timestampCAN-SPAM Act (US), CASL (Canada)

    3. Data Modification Events (Fraud Prevention)

    Track every change to critical data to detect unauthorized alterations:

    EventWhat to LogWhy It Matters
    Deal Price ChangedUser, customer name, old price, new price, timestamp, reason (if provided)Detect unauthorized discounts, fraud
    Payment RecordedUser, customer, amount, payment method (cash, check, card), timestampReconcile cash deposits, detect skimming
    Vehicle Price ChangedUser, stock number, old price, new price, timestampDetect unauthorized markdowns
    Customer Info UpdatedUser, customer name, field changed (email, phone, address), old value, new value, timestampDetect unauthorized data alteration
    Document DeletedUser, document type, customer name, timestamp, deletion reasonPrevent evidence destruction, regulatory violation
    Inventory Added/RemovedUser, stock number, action (added, sold, wholesale), timestampTrack vehicle movement, prevent theft

    4. System Configuration Changes (Security)

    Track changes to system settings that affect security and compliance:

    EventWhat to LogWhy It Matters
    User Account Created/DeletedAdmin user, new username, role assigned, timestampDetect unauthorized account creation (backdoor access)
    Backup PerformedTimestamp, backup size, backup location, initiated byVerify disaster recovery compliance
    Integration ConfiguredAdmin user, integration name (QuickBooks, marketplace), API keys added, timestampDetect unauthorized third-party access
    System Settings ChangedAdmin user, setting changed (tax rate, fee amounts), old value, new value, timestampAudit financial settings changes

    Audit Log Data Fields (Required Elements)

    Every audit log entry must contain these fields to be useful for investigations and audits:

    FieldDescriptionExample Value
    TimestampExact date/time of event (ISO 8601 format)2026-01-15T14:23:47-05:00
    User ID / UsernameWho performed the actionjohn.smith@dealeroneview.com
    User RolePermission level at time of actionsales_rep, manager, admin
    IP AddressSource IP of request192.168.1.45 (internal) or 203.0.113.5 (external)
    Event TypeCategory of actionlogin, data_access, data_modify, config_change
    Action TakenSpecific action descriptiondeal_price_changed, customer_record_viewed
    Resource AffectedWhat data was accessed/changedDeal #12345, Customer ID: 789, Vehicle Stock A-123
    Old ValueValue before change (for modifications)$18,500
    New ValueValue after change (for modifications)$16,000
    Reason / NotesOptional: Why change was made"Manager discount approved - customer loyalty"
    Result / StatusSuccess, failure, errorSuccess, Failed (permission denied)

    Audit Log Retention Requirements

    Retention Periods by Jurisdiction

    JurisdictionRetention PeriodGoverning Law
    Federal (US)5 years (transaction-related logs)FTC Act, Gramm-Leach-Bliley Act
    California (CCPA)24 months (data access logs)California Consumer Privacy Act
    Canada (Federal)7 years (financial transaction logs)CRA (Canada Revenue Agency)
    Canada (PIPEDA)1 year minimum (data access logs)Personal Information Protection Act
    Ontario (OMVIC)7 years (vehicle sales transaction logs)Motor Vehicle Dealers Act

    Best Practice: Use longest applicable period (7 years) to cover all jurisdictions and provide buffer.

    Log Storage Requirements

    • Immutability: Logs cannot be edited or deleted by users (append-only storage)
    • Encryption: Encrypt logs at rest (AES-256) and in transit (TLS 1.2+)
    • Access control: Only system admins can access logs (not sales staff)
    • Backup: Daily backups to separate storage (prevent loss in hardware failure)
    • Geographic redundancy: Store backups in different location (disaster recovery)

    Using Audit Logs for Fraud Detection

    Red Flags to Monitor (Automated Alerts)

    PatternWhat It IndicatesRecommended Action
    Multiple failed login attemptsBrute-force attack or unauthorized access attemptLock account after 5 failed attempts. Alert admin.
    Login from unusual locationAccount compromise (login from different state/country)Require 2FA verification. Alert user.
    After-hours data accessUnauthorized access (login at 2 AM when dealership closed)Review log details. Verify with user.
    Mass customer data exportData theft (employee exporting 500+ customer records)Block export. Alert owner immediately.
    Price changes without manager approvalUnauthorized discounts (sales rep lowering prices)Require manager override for discounts > $500.
    Document deletionsEvidence destruction (deleting customer complaints)Prevent deletion entirely. Require admin approval.
    Excessive cash transactionsMoney laundering or skimming (employee processing many cash deals)Review cash reconciliation. Flag for audit.

    Weekly Audit Log Review Checklist

    • Failed login attempts: Review all failed logins. Investigate 5+ failures from same IP.
    • After-hours access: Review logins outside business hours (6 PM - 8 AM). Verify legitimacy with users.
    • Price changes: Review all deal price modifications > $500. Verify manager approval.
    • Payment modifications: Review all cash payment entries. Reconcile with deposits.
    • Document deletions: Review any deleted documents. Verify deletion reason.
    • Permission changes: Review any user role changes. Verify authorized by owner.

    DMS Audit Log Configuration

    Essential DMS Features for Compliance

    FeatureWhy It MattersHow to Verify
    Automatic LoggingNo manual entry = no gaps or manipulationTest: Make change, verify log entry created automatically
    Immutable Log StorageCannot edit/delete logs (tamper-proof)Ask vendor: "Can users delete audit logs?" (Answer must be NO)
    Detailed Change TrackingLogs old value + new value (not just "changed")Test: Change price, verify log shows $18,500 → $16,000
    User AttributionEvery action tied to specific user (no "system" changes)Review logs - verify username appears on every entry
    Search/Filter CapabilityQuick retrieval for audits (find all actions by user X)Test: Search logs for specific user or date range
    Export FunctionalityProvide logs to auditors (CSV, PDF reports)Test: Export last 30 days of logs to CSV
    Real-Time AlertsDetect fraud immediately (not weeks later)Configure: Alert on mass data export, after-hours login

    Audit Log Configuration Steps

    1. Enable comprehensive logging: Configure DMS to log all events (authentication, data access, modifications, deletions)
    2. Set retention period: Configure 7-year retention (longest required period)
    3. Configure alerts: Set up automated alerts for red flags (failed logins, mass exports, after-hours access)
    4. Restrict log access: Only owner/admin can view logs (not sales staff)
    5. Test logging: Perform test actions (login, change price, delete document) and verify logs capture details
    6. Schedule reviews: Calendar weekly log reviews (15-20 minutes to scan for anomalies)
    7. Train staff: Explain audit logs to team: "Everything you do is logged. Unauthorized actions will be detected."

    Audit Log Review During Regulatory Audits

    Common Regulator Requests

    Regulator QuestionWhat They're Looking ForHow to Respond
    "Who accessed this customer's credit report?"Verify permissible purpose (FCRA compliance)Export logs for customer ID. Show only authorized users accessed during loan application.
    "When was this buyer's guide created?"Verify FTC compliance (buyer's guide before sale)Export logs for deal. Show buyer's guide created on Jan 15 at 10:23 AM, customer signed at 2:45 PM (compliant).
    "Who modified this contract after signing?"Detect fraud (post-signature alterations)Export logs for deal. Show no modifications after customer signature timestamp (compliant).
    "How do you prevent unauthorized document deletion?"Verify record retention complianceShow DMS config: "Document deletion requires admin approval. All deletion attempts logged."

    Audit Preparation Checklist

    • Test log export: Before audit, test exporting logs to CSV/PDF (verify readability)
    • Review for gaps: Scan logs for missing entries (e.g., no logins on business day = logging failure)
    • Prepare log summary: Create summary report: "Total logins: 1,245. Total price changes: 87. Total document deletions: 0."
    • Document logging policy: Write policy: "All user actions logged. Logs retained 7 years. Logs immutable."
    • Designate log custodian: Assign one person to retrieve logs for auditor (avoid confusion)

    Frequently Asked Questions

    What is an audit log for car dealerships?

    An audit log (also called activity log or change log) is a detailed record of who accessed, modified, or deleted data in your dealership management system. It tracks: user actions (login, document access, price changes), timestamps, IP addresses, and before/after values for changes.

    Are dealerships legally required to maintain audit logs?

    Yes, indirectly. While no single law mandates 'audit logs,' regulations require dealers to prove compliance during audits. FTC, state DMV, and privacy laws (PIPEDA in Canada) require demonstrating who accessed customer data and when. Audit logs are your proof.

    How long do I need to keep audit logs?

    Match your document retention period: 5-7 years depending on jurisdiction. If logs relate to specific transactions (e.g., who changed deal price), keep logs for same period as deal documents (5 years federal, 7 years Canada).

    What happens if I can't produce audit logs during an investigation?

    Without audit logs, you cannot prove compliance or defend against accusations. For example: Customer claims you changed contract after signing - no audit log means no defense. Privacy breach investigation - no log of who accessed data means you're liable.

    Can audit logs be manually edited or deleted?

    No. Audit logs must be immutable (tamper-proof). Use DMS systems that prevent deletion/editing of logs, store logs in append-only format, and encrypt log files. Manual log systems (spreadsheets) are not compliant.

    What DMS features support audit log compliance?

    Look for: (1) Automatic logging (no manual entry), (2) Immutable log storage (cannot edit/delete), (3) Detailed change tracking (before/after values), (4) User attribution (who made change), (5) Search/filter capability, and (6) Export for audits (CSV, PDF reports).

    Never lose track of who did what - comprehensive audit logs built in.

    DealerOneView DMS includes tamper-proof audit logs tracking every user action: logins, data access, price changes, document deletions, and system configuration. Get automated fraud alerts, instant log exports for audits, and 7-year retention compliance.

    See Audit Log System in Action →

    Get More Insights Like This

    Subscribe to our newsletter for the latest dealership tips and industry trends.