Updated: September 2025
Sensitive item inventories have to be completed by two people for a zero trust paradigm.
You can only create one sublist per person for sensitive items.
Import your Sensitive Items List
Navigate to the Log-E Equipment tab through the menu icon in the top left corner.
Click on the three vertical dots next to the Hand Receipts name.
Tap on Import updated PDF or comm memo. Import the sensitive items list from the same time period.
Once imported, you will see a confirmation under the Import Progress that says "Checklist created". Then tap Done.
Create a Sublist
Navigate to the Checklist tab through the navigation menu in the top left corner.
Click on the three vertical dots next to the name of the sensitive items checklist you just created.
Tap Assign Sublists.
Assign Items
For sensitive items, you can only have one sublist (versus a cyclic memo).
Enter a name for the sublist (e.g., "SL for Bella").
Select all items from the sensitive items list to be added to the sublist.
Assign the sublist (user Y) and Save.
After creating the sublist, Y will now have a list of items to inventory on X's behalf.
Inventory Process for User Y
View the Sublist
Navigate to the Checklists tab using the navigation menu in the top left corner.
Click on the three dots next to the checklist assigned to you and tap Open.
Mark Items as Found:
Go through the list and check off items as you find them.
Handling Missing Items:
If an item is missing, uncheck it.
Click on the three dots next to an item's name to leave a remark, if needed.
Finalizing the Inventory
Once all items are checked or remarked upon, click Finalize and then Confirm to lock the inventory. This ensures no one can alter the information once it's been recorded.
Sign the Inventory Report
After finalizing the inventory, you will be prompted to sign the document.
Select "Sign", check the relevant boxes, and digitially sign, then Save.
View Your Form
Once Y has signed the inventory, X will need to sign the form as well.
Navigate to the Form tab through the navigation menu in the top left corner.
Select your form type: Sensitive items inventory.
Click Sign and sign the form to complete the inventory process.
Review and Confirm
After both signatures are added, confirm the completion of the inventory process.
The form will now show both Y and X's signatures, indicating that the inventory has been finalized.
Download and Store the Inventory Report
After both signatures are collected, you can access and download the finalized sensitive items form.
This form will include all item remarks and both signatures.
The report can now be stored or printed as needed.
Immutable Inventory Record
Once the inventory is finalized, the record becomes immutable (unable to modify). This ensures that no one can make changes to the inventory once it's been signed off.
This immutable status is a key part of the zero-trust security model, ensuring the integrity of the sensitive items inventory process.
Common Issues and Troubleshooting
Missing Sublist Option: Ensure you are creating a sublist for the correct item type (Sensitive Items). Sublists are only available for sensitive items and cannot be split into multiple sublists.
Cannot Edit After Finalizing: Once the inventory is marked as finalized, you cannot make changes. Double check all items before finalizing the process.
Signature Issues: Make sure both parties sign the inventory form. If any party's signature is missing, the form cannot be completed.
By following these steps, you can effectively create, manage, and finalize a sensitive items inventory list using the sublisting method, ensuring accuracy and security. The two-person workflow with immutable records guarantees the integrity of the sensitive items being inventoried.