I would guess that they already log all interactions with the UI / database of that software in those kind of scenarios anyway.I can actually see some business uses for the feature - especially in situations where security (so as to detect and document misuse) or accountability are important.