Audit & Reporting¶
View audit logs, generate reports, and maintain compliance records.
Audit Logs¶
Purpose¶
Audit logs provide a complete record of all actions in GxPSign, essential for:
- Compliance - Meet 21 CFR Part 11 requirements
- Security - Detect unauthorized access
- Troubleshooting - Investigate issues
- Accountability - Track who did what
Accessing Audit Logs¶
- Go to Settings > Audit Log
- View the chronological list of events
Screenshot Coming Soon
Screenshot of audit log interface will be added here.
Audit Log Contents¶
Event Information¶
Each audit log entry contains:
| Field | Description |
|---|---|
| Timestamp | When the event occurred (UTC) |
| User | Who performed the action |
| Action | What was done |
| Object | What was affected |
| IP Address | User's IP address |
| User Agent | Browser/device information |
| Details | Additional context |
Event Types¶
Authentication Events¶
| Event | Description |
|---|---|
user.login | User signed in |
user.logout | User signed out |
user.login_failed | Failed login attempt |
user.password_changed | Password was changed |
user.password_reset | Password reset requested |
Document Events¶
| Event | Description |
|---|---|
document.created | Document uploaded |
document.viewed | Document opened |
document.downloaded | Document downloaded |
document.deleted | Document deleted |
Signature Events¶
| Event | Description |
|---|---|
request.created | Signature request created |
request.sent | Request sent to signers |
signature.applied | Signature was applied |
signature.declined | Signer declined |
request.completed | All signatures collected |
request.cancelled | Request was cancelled |
User Management Events¶
| Event | Description |
|---|---|
user.invited | User invitation sent |
user.created | User account created |
user.updated | User details changed |
user.deactivated | User account deactivated |
user.deleted | User account deleted |
user.role_changed | User role was changed |
Organization Events¶
| Event | Description |
|---|---|
org.settings_changed | Settings modified |
org.gxp_enabled | GxP mode enabled |
org.gxp_disabled | GxP mode disabled |
Filtering Audit Logs¶
Date Range¶
- Click Date Filter
- Select start and end dates
- Click Apply
By User¶
- Click User Filter
- Select specific user(s)
- Click Apply
By Action Type¶
- Click Action Filter
- Select event types
- Click Apply
By Object¶
Search for events related to specific:
- Documents (by title or ID)
- Users (by name or email)
- Signature requests (by ID)
Exporting Audit Logs¶
Export Formats¶
| Format | Best For |
|---|---|
| CSV | Data analysis, spreadsheets |
| Official records, compliance | |
| JSON | System integration |
Export Process¶
- Apply desired filters
- Click Export
- Select format
- Click Download
Export Limits¶
| Plan | Export Limit |
|---|---|
| Starter | Last 30 days |
| Professional | Last 1 year |
| Enterprise | Full history |
Reports¶
Built-in Reports¶
Signature Summary¶
Overview of signature activity:
- Total signatures by period
- Signatures by user
- Average completion time
- Pending vs completed requests
User Activity¶
User engagement metrics:
- Active users by period
- Login frequency
- Documents accessed
- Signatures applied
Document Report¶
Document statistics:
- Documents by type
- Documents by status
- Storage usage
- Retention status
Generating Reports¶
- Go to Reports
- Select report type
- Set parameters (date range, users, etc.)
- Click Generate
- View or export results
Scheduling Reports¶
For recurring reports:
- Create the report
- Click Schedule
- Set frequency (daily, weekly, monthly)
- Enter email recipients
- Click Save Schedule
Compliance Reporting¶
21 CFR Part 11 Reports¶
Generate compliance-specific reports:
| Report | Contents |
|---|---|
| Audit Trail Report | Complete event history |
| Signature Report | All signatures with meanings |
| User Access Report | User permissions and activity |
| Training Report | Training status for all users |
Generating Compliance Reports¶
- Go to Reports > Compliance
- Select report type
- Set date range
- Click Generate
- Download signed PDF
Report Signatures
Compliance reports can include a digital signature certifying the data accuracy.
Data Retention¶
Retention Periods¶
| Data Type | Default Retention |
|---|---|
| Audit logs | 7 years |
| Signed documents | 7 years |
| User accounts | While active + 7 years |
| Signature requests | 7 years |
Retention Configuration¶
- Go to Settings > Data Retention
- Set retention periods by data type
- Click Save
Compliance Requirements
Ensure retention periods meet your regulatory requirements. Some industries require longer retention.
Data Purging¶
When retention expires:
- Data is flagged for review
- Administrator receives notification
- Administrator can extend or approve deletion
- Approved deletions are logged and executed
Dashboard Metrics¶
Key Performance Indicators¶
The admin dashboard shows:
| Metric | Description |
|---|---|
| Pending Signatures | Awaiting completion |
| Completed This Month | Signatures this period |
| Average Completion Time | Time from request to completion |
| Active Users | Users active this month |
Real-time Updates¶
Dashboard metrics update:
- Signature counts: Real-time
- User activity: Every 5 minutes
- Storage usage: Daily
Troubleshooting¶
Finding Specific Events¶
To locate a specific action:
- Note the approximate time
- Filter by user if known
- Filter by action type
- Search within results
Investigating Issues¶
For security investigations:
- Identify the timeframe
- Filter by affected user or object
- Export relevant logs
- Review IP addresses and patterns
- Cross-reference with user reports
Common Queries¶
Who viewed this document? Filter: Document ID + document.viewed action
When was this signature applied? Filter: Request ID + signature.applied action
Has this user logged in recently? Filter: User + user.login action
Best Practices¶
- Regular reviews - Check audit logs weekly
- Export regularly - Keep offline copies of important logs
- Set alerts - Configure notifications for suspicious activity
- Document retention - Establish and follow retention policies
- Access controls - Limit who can view audit logs
- Training - Ensure admins know how to use audit features