The most important step is to make sure that access to your data is securely controlled – only you should have access to your log information. Additionally, consider the types of data being logged (e.g., location information) and if necessary opt out of logging such data altogether or delete existing logs regularly.