Complete, tamper-proof logging of all system activities. SHA-256 hash chain, GDPR compliant and exportable at any time.
Each entry is cryptographically linked to the previous one. Retroactive manipulation is mathematically impossible.
Entries cannot be edited or deleted. What has been logged stays logged – protected at the database level.
IP addresses are automatically pseudonymised. When a user is deleted, logs remain anonymised.
Logs actions from web dashboard and mobile app equally. Each entry shows the source of the action.
Export filtered logs as CSV for reports, audits or external documentation.
Actions are logged instantly – non-blocking, without delaying the actual operation.
Each audit entry is hashed with SHA-256 – together with the hash of the previous entry. This creates a chain where any retroactive change is immediately detectable.
a3f2...8b1c
a3f2...8b1c
7e91...2d4f
7e91...2d4f
c8b4...9e7a
c8b4a1...9e7a3f
Audit entries are protected against modification and deletion at the database level. At the same time, personal data is handled in compliance with GDPR.
Filter, search and export audit logs directly in the admin area. Full transparency at a glance.