My I T Security department is trying to to better understand the login architecture and audit capabilities of Audacity.
Because our PC’s are encrypted, I T needs to know the following.
Does Audacity require an unique user ID to log onto the application?
Does Audacity have an audit trail?
Can anyone offer me any direction concerning the above questions?