EducationMarch 2026 · 7 min read

What Is a Chain of Custody Document and Why Every Freelancer Needs One

You have probably heard the term in crime dramas. In freelancing, a Chain of Custody document is the difference between having proof a client received your invoice and having nothing but a sent email.

In criminal law, a chain of custody is a documented record of who has had possession of a piece of evidence, when they had it, and what happened to it. It exists to prove the evidence was not tampered with between collection and presentation in court.

In invoicing, the concept applies directly. A Chain of Custody document for an invoice is a complete, tamper-evident record of every interaction the invoice has had from the moment it was created to the moment it was paid with cryptographic proof that the record has not been altered.

What a Chain of Custody document contains

A properly generated Chain of Custody document for an invoice includes the following events, each with a timestamp, IP address, and cryptographic hash:

1
Invoice created
When the invoice was built in the system, by whom, with a hash of the original content.
2
Invoice sent
When the invoice was delivered to the client, to which email address, via which delivery method.
3
Email opened
When the client opened the email containing the invoice link, recorded via a tracking pixel.
4
Invoice viewed
When the client clicked the link and viewed the invoice in their browser. IP address, browser, device type, and exact timestamp all recorded.
5
E-signature captured
If required the client's drawn signature, the IP address at time of signing, and an explicit written acknowledgment.
6
Invoice paid
When the invoice was marked paid, by whom, and when.

What makes it tamper-evident

The tamper-evident property comes from cryptographic hash chaining. Each event record contains a SHA-256 hash of the previous event. This creates a chain where every entry is mathematically dependent on all the entries before it.

If anyone including the platform itself were to alter, delete, or insert an event retroactively, the hash of that entry would no longer match the hash stored in the next entry. The chain would break. The break is detectable by anyone who runs the verification.

This is what separates a Chain of Custody document from a simple activity log. A log can be edited. A hash-chained document cannot be edited without the tampering being immediately visible.

Public verification

Every Chain of Custody document generated by InvoiceProof includes a public verification URL at invoiceproof.io/verify. Anyone a client, a lawyer, a mediator, or a judge can visit that URL and independently confirm the document has not been altered.

This is the key difference between claiming your records are accurate and being able to prove it. The public verification URL removes any need to trust the platform. The cryptography does the verification independently.

How to use it in a dispute

When a client disputes receipt of an invoice, you export the Chain of Custody document with one click from your dashboard. The document shows every interaction in sequence, with timestamps and IP addresses. You share it with the client, include it in a demand letter, or present it in small claims court.

The document makes the "I never got it" defense untenable. The client's IP address accessed the invoice at 11:02 AM on March 3rd. That is in the record. That record cannot be altered without detection. The dispute ends.

Free download

Get the Invoice Dispute Toolkit

A demand letter template and step-by-step dispute checklist. Free. No account required.

No spam. Unsubscribe any time.

Disclaimer: This article is for informational purposes only and does not constitute legal advice. The legal admissibility of electronic records varies by jurisdiction. Consult a licensed attorney for advice specific to your situation.