Skip to main content
Last updated: 15 November 2025

Overview

This page explains how Boomerang logs activity related to the Developer API and dashboard, how long those logs are typically retained, and where the privacy boundaries sit. It should be read together with the Boomerang Privacy Policy, which governs how personal information is handled, and with:

What Boomerang logs

Boomerang logs operational and audit events to secure and operate the Developer API. In summary:
  • API requests
    For each API request, Boomerang records metadata such as:
    • HTTP method, path, and status code
    • Response time
    • Server ID and, where applicable, associated user ID
    • Token identifier (not the raw token value)
    • Source IP address and high-level user agent details
  • Dashboard and administrative actions
    For sensitive actions in the dashboard, Boomerang records:
    • Action type (for example, token created, rotated, or revoked; settings changed)
    • Actor identity (for example, the authenticated user performing the action)
    • Timestamp and source IP address
    • Relevant identifiers (for example, which server and which token)
    Example: Boomerang logs that a particular administrator created a token for a specific server from a given IP address, but does not log the full token value or any payload content.
  • Metadata only, not content
    Boomerang focuses on , and does not log:
    • Message content
    • Full payload bodies
    • Large data structures returned by the API
This logging is used for security, operations, and abuse detection, not for advertising or profiling.

Identifiers and secrets in logs

To support investigation and auditing, logs may include:
  • User IDs
  • Server IDs
  • Token identifiers (for example, key IDs or truncated references)
  • Source IP addresses
  • X-Request-Id (if provided by the client)
  • trace_id for error responses
Safeguards:
  • Full token values are never written to logs.
  • Token storage uses one-way hash or equivalent mechanisms; raw token material is not recoverable from storage or logs.
Integrators should mirror this approach in their own systems:
  • Log identifiers and correlation IDs.
  • Avoid logging raw secrets or sensitive payload content.

Retention

Operational and audit logs are kept for limited periods.
  • Operational logs (for example, routine request/response metadata) are typically retained for up to 90 days, subject to operational and legal requirements.
  • Audit logs (for example, token creation/rotation/revocation, key configuration changes) may be retained for up to 12 months, particularly where needed for security and compliance.
Actual retention periods and any jurisdiction-specific variations are governed by, and should be interpreted in line with, the Boomerang Privacy Policy.

Access to logs

Access to logs is restricted:
  • Only authorised Boomerang staff may access logs, and only for:
    • Operating and maintaining the service
    • Security monitoring, investigation, and abuse detection
    • Supporting customers and resolving incidents
Boilerplate:
  • Logs may be processed using Boomerang’s internal tooling and selected processors; details of any such processing and international transfers are covered in the Boomerang Privacy Policy.

Privacy boundaries

Boilerplate privacy boundaries:
  • Logs are not used for advertising, behavioural profiling, or unrelated analytics.
  • Message content and large payloads are not logged; the focus is on security and operational metadata.
  • Personal information in logs is minimised to what is necessary for security, operations, and legal compliance.
For full details of how personal information is collected, used, and shared, the Boomerang Privacy Policy prevails over this page.

Expectations for integrators

Integrators are expected to maintain their own audit trail for their systems and usage of the Developer API, while respecting privacy and secrecy requirements. Minimum expectations:
  • Log for diagnosis and security
    • Record timestamps, HTTP status codes, and key identifiers (for example, server IDs).
    • Capture X-Request-Id (your correlation ID) and store trace_id values from error responses to support joint investigations.
  • Avoid logging sensitive content
    • Do not log full token values, passwords, or other secrets.
    • Avoid logging personal information unless strictly necessary, and ensure any such logging complies with laws that apply to you.
  • Align with your own compliance obligations
    • Apply appropriate retention and access controls to your logs.
    • Treat logs as potentially sensitive, particularly where they include identifiers or limited personal information.
Your logging and audit obligations are determined by your own legal, regulatory, and contractual environment; this page does not constitute legal advice.