In most cases, it's used for auditing. If someone is suspected of abandoning their job, or stealing, or working a 2nd job, or etc... then the logs are reviewed.
Source: Been Micromanaged in the past and seen scenarios where said micromanagers used such data on others.
In most cases, it's used for auditing. If someone is suspected of abandoning their job, or stealing, or working a 2nd job, or etc... then the logs are reviewed.