1
We use this information for our internal security audit log, trend analysis and system administration, and to gather broad demographic information about our user base for aggregate use.