Security: Change Log

Each module can take in hidden information about the activity preformed. In this case, the admin will want to see what changes are made to the lead log. By accessing the change log table, in the database, the user consequently adds the desired information surrounding these changes.

Lead Information

Tyler Arlt

Pear inc.

tyler@tylerarlt.com