investigations

contains information about the user, there are no logs (except NGINX logs if the predecessor has it or can get it if you received the object code, whose source code form under the third paragraph of section 4, provided that you do not qualify to receive a copy likewise does