<s>
In	O
cryptology	O
,	O
SecureLog	B-Algorithm
is	O
an	O
algorithm	O
used	O
to	O
convert	O
digital	O
data	O
into	O
trusted	O
data	O
that	O
can	O
be	O
verified	O
if	O
the	O
authenticity	O
is	O
questioned	O
.	O
</s>
<s>
SecureLog	B-Algorithm
is	O
used	O
in	O
IT	O
solutions	O
that	O
generates	O
data	O
to	O
support	O
compliance	O
regulations	O
like	O
SOX	O
.	O
</s>
<s>
SecureLog	B-Algorithm
involves	O
an	O
active	O
key	O
provider	O
,	O
a	O
managed	O
data	O
store	O
and	O
a	O
verification	O
provider	O
.	O
</s>
<s>
The	O
managed	O
data	O
store	O
uses	O
the	O
active	O
keys	O
to	O
do	O
asymmetric	B-Application
encryption	I-Application
,	O
timestamping	O
and	O
archive	B-Application
the	O
data	O
into	O
a	O
locked	O
database	O
.	O
</s>
<s>
SecureLog	B-Algorithm
is	O
used	O
to	O
secure	O
different	O
types	O
of	O
data	O
logs	O
like	O
access	O
logs	O
,	O
email	O
archives	O
or	O
transaction	O
logs	O
and	O
is	O
primarily	O
in	O
use	O
where	O
compliance	O
might	O
be	O
an	O
issue	O
.	O
</s>
<s>
SecureLog	B-Algorithm
is	O
used	O
to	O
solve	O
the	O
traditional	O
administrator	O
problem	O
.	O
</s>
<s>
It	O
has	O
been	O
proposed	O
that	O
SecureLog	B-Algorithm
can	O
be	O
used	O
by	O
a	O
free	O
institution	O
to	O
lock	O
government	O
logs	O
and	O
stop	O
them	O
from	O
potential	O
manipulation	O
.	O
</s>
