Technical Standards for
Audit Readiness
In an Australian WHS audit, the credibility of your documentation depends on its integrity. This guide outlines the technical controls PsychProof uses to ensure records are defensible.
Cryptographic Integrity
Every record in your history is cryptographically linked to the one before it using **SHA-256 hash chaining**. This creates an immutable "chain of custody" where any attempt to modify a past record would break the entire history.
"For an inspector, this provides mathematical proof that the record has not been backdated or modified after a critical incident."
Integrity Chain Visualization
4f2a...9b1e...2c7d...Server-Side Timestamping
Timestamps are generated by our central servers, not the user's device, preventing accidental or intentional backdating.
Append-Only Logs
Records are "sealed" once entered. Any subsequent updates create a new version, preserving the full history of management action.
System-Witnessed
Verification
Unlike paper diaries or spreadsheets, PsychProof acts as an independent witness. We use technical controls to prove *when* a manager first observed a risk and *when* they acted on it.
The Transparency
Standard
Independent Verification
Our hashing is based on standard open-source cryptography. Inspectors can verify record validity using third-party tools, removing the need for "blind trust."
Verification Links
Every PDF export includes a secure verification link and QR code, allowing regulators to validate the integrity of the printed record against the digital chain.
Important Notice
This information is general in nature and provided for awareness and documentation support only. It does not constitute legal, clinical, or professional advice. Regulatory obligations vary by jurisdiction and circumstances. Organisations should refer to relevant regulators or qualified professionals for advice specific to their situation.
