Sourcegraph Cody · Sourcegraph Privacy Policy · View original document ↗

Log Data and Access Audit Logs Collection

Low severity High confidence Explicitdocumentlanguage Unique · 0 of 325 platforms
Share 𝕏 Share in Share 🔒 PDF
Monitor governance changes for Sourcegraph Cody Create a free account to receive the weekly governance digest and monitor one platform for governance changes.
Create free account No credit card required.
Document Record

What it is

Sourcegraph automatically records your IP address, browser details, repository names you access, and other technical data in server logs, and retains access audit logs including what data you accessed for security incident investigation.

This analysis describes what Sourcegraph Cody's agreement states, permits, or reserves. It does not constitute a legal determination about enforceability. Regulatory applicability and practical outcomes may vary by jurisdiction, enforcement context, and individual circumstances. Read our methodology

ConductAtlas Analysis

Why it matters (compliance & governance perspective)

This provision authorizes collection of repository names and data accessed as part of audit logging, meaning records of which code repositories you interact with may be retained and shared with customers in the event of a security incident.

Consumer impact (what this means for users)

Sourcegraph's log data collection includes repository names, user IDs, IP addresses, and records of data accessed. The policy states access audit log information is retained only for security purposes and shared only with relevant customers in the event of a security incident.

Cross-platform context

See how other platforms handle Log Data and Access Audit Logs Collection and similar clauses.

Compare across platforms →

Monitoring

Sourcegraph Cody has changed this document before.

Receive same-day alerts, structured change summaries, and monitoring for up to 10 platforms.

Start Watcher free trial Or create a free account →
▸ View Original Clause Language DOCUMENT RECORD
"
As with most websites and technology services delivered over the internet, when you access or use our Services, our servers automatically collect data and record it in log files. This log data may include your web request, IP address, browser type and settings, date and time of use, information about browser configuration, error data, repository name, user ID, and cookie data. When you visit or use our Services, we may collect information related to accessing systems and data, including IP addresses, usernames, and data accessed. This information is only retained for the purposes of identifying, analyzing, and resolving potential security incidents.

— Excerpt from Sourcegraph Cody's Sourcegraph Privacy Policy

ConductAtlas Analysis

Institutional analysis (Compliance & governance intelligence)

1) REGULATORY LANDSCAPE: Collection of IP addresses and persistent identifiers engages GDPR personal data definitions and CCPA categories of personal information. The retention of access audit logs for security purposes may align with GDPR Article 6(1)(f) legitimate interests, but retention periods should be documented and proportionate. 2) GOVERNANCE EXPOSURE: Low to medium. The policy limits access audit log retention to security incident purposes and restricts access to those who need it for those purposes. The disclosure that this information is shared with relevant customers in the event of a security incident is operationally relevant for enterprise deployments. 3) JURISDICTION FLAGS: EU/EEA deployments should confirm that log data retention periods and purposes satisfy GDPR storage limitation principles. Enterprise customers in regulated industries (financial services, healthcare) should confirm that log data sharing in security incidents is covered by their customer agreements. 4) CONTRACT AND VENDOR IMPLICATIONS: Enterprise customers should confirm that their customer agreements address notification and data sharing protocols in the event of a security incident involving access audit logs, including timeliness of notification. 5) COMPLIANCE CONSIDERATIONS: Legal teams should confirm that log data retention schedules are documented and defensible under applicable privacy laws, and that deletion workflows for log data are in place upon account termination.

Full compliance analysis

Regulatory citations, enforcement risk, and due diligence action items.

Track 1 platform — free Try Watcher free for 14 days

Free: track 1 platform + weekly digest. Watcher: 10 platforms + same-day alerts. No credit card required.

Applicable agencies

  • FTC
    The FTC has jurisdiction over consumer data collection and retention practices, including the scope and purpose of log data collection by technology service providers.
    File a complaint →

Provision details

Document information
Document
Sourcegraph Privacy Policy
Entity
Sourcegraph Cody
Document last updated
May 12, 2026
Tracking information
First tracked
May 12, 2026
Last verified
May 12, 2026
Record ID
CA-P-011846
Document ID
CA-D-00799
Evidence Provenance
Source URL
Wayback Machine
Content hash (SHA-256)
df2d4196ecea360b04ad9684b8e596ac2cfeb41cb2be50ace2b878d7c3dd599f
Analysis generated
May 12, 2026 15:34 UTC
Methodology
Evidence
✓ Snapshot stored   ✓ Hash verified
Citation Record
Entity: Sourcegraph Cody
Document: Sourcegraph Privacy Policy
Record ID: CA-P-011846
Captured: 2026-05-12 15:34:28 UTC
SHA-256: df2d4196ecea360b…
URL: https://conductatlas.com/platform/sourcegraph-cody/sourcegraph-privacy-policy/log-data-and-access-audit-logs-collection/
Accessed: May 13, 2026
Permanent archival reference. Stable identifier suitable for legal filings, compliance documentation, and research citation.
Classification
Severity
Low
Categories

Other risks in this policy

Professional Governance Intelligence

Need to monitor specific governance provisions?

Professional includes provision-level monitoring, governance timelines, regulatory mapping, and audit-ready analysis.

Arbitration clauses AI governance Data rights Indemnification Retention policies
Start Professional free trial

Or start with Watcher →

Built from archived source documents, structured governance mappings, and historical version tracking.

Frequently Asked Questions

What does Sourcegraph Cody's Log Data and Access Audit Logs Collection clause do?

This provision authorizes collection of repository names and data accessed as part of audit logging, meaning records of which code repositories you interact with may be retained and shared with customers in the event of a security incident.

How does this clause affect you?

Sourcegraph's log data collection includes repository names, user IDs, IP addresses, and records of data accessed. The policy states access audit log information is retained only for security purposes and shared only with relevant customers in the event of a security incident.

Is ConductAtlas affiliated with Sourcegraph Cody?

No. ConductAtlas is an independent monitoring service. We are not affiliated with, endorsed by, or sponsored by Sourcegraph Cody.