Audit Trail & Audit Log
An audit trail -- also known as an audit log -- records every relevant action in LiteLog together with timestamp, user and context. This makes it possible to trace who created, changed or confirmed information at any time. The protocols are stored tamper-resistant and form the basis for legally compliant archiving. Security providers obtain a complete chain of evidence that supports internal controls and external audits.
How it works
- Every action (scan, edit, approval, deletion) is logged with user ID, timestamp and IP context.
- Entries are cryptographically chained so that retroactive changes become detectable.
- Logs are stored in append-only format. No record can be overwritten or removed.
- Authorised users can filter, search and export the trail for audits or client reports.
Why it matters
Regulators and clients increasingly demand proof that records have not been altered. A reliable audit trail turns every checkpoint scan, incident report and shift confirmation into court-ready evidence. LiteLog builds the audit trail automatically, so teams stay compliant without extra work.
Related terms
Frequently asked questions
Who can access the audit trail?
Only users with the appropriate role. LiteLog uses role-based access control so that field staff, supervisors and auditors see exactly the data they need.
How long are audit logs retained?
Retention periods are configurable. LiteLog supports archiving durations that meet GoBD and other regulatory requirements.
Does the audit trail slow down daily operations?
No. Logging runs in the background. Guards and service staff interact with the app as usual. The trail is generated automatically.