A formal check-out and check-in log for managing the chain of custody for sensitive files, including spaces for client ID, user signatures, and audit tracking.

Similar Materials