Could you share the verbiage you used to refuse the request? Or offer any general guidance for other guard operators in case they receive a similar request? I can imagine there may be certain jurisdictions where refusing such a request might be problematic.
Also, are there any guidelines for reducing the log footprint of a relay? Are the OS defaults generally sufficient, or do operators need to take additional steps to preserve user privacy?