Usage that can be monitored on the network (every action performed with the tool must be traceable and remotely supervised by network administrators)