Know Where Every Specimen Is. Prove Where It Has Been.
Physical Storage Hierarchy
OpenCryo models your actual storage infrastructure as a configurable container tree. Define your own container types (tanks, canisters, canes, goblets, vials, shippers) with capacity limits and nesting rules that enforce valid hierarchies. A cane goes inside a canister, not directly into a tank. The system prevents invalid placements.
Every level of the tree shows capacity usage and inventory rollup: specimen counts, container counts, and distinct clients. Expand and collapse the hierarchy in the UI, navigate by clicking through levels, and see your entire storage footprint at a glance.
- Configurable container types with capacity tracking
- Nesting rules that enforce valid hierarchies
- Equipment specification catalog (manufacturer data, evaporation rates)
- Tree visualization with expand/collapse navigation
- Mobile containers (shippers) where placement IS the departure event
- Capacity tracking with inventory rollup at every level
Specimen Lifecycle
Every specimen record carries client linkage, type classification, custom metadata fields (configurable per organization), and status tracking. The custody timeline shows the complete chain: stored, moved, retrieved, departed, received, destroyed. Each event is timestamped and attributed to a specific staff member.
Custom specimen fields let each organization add data points relevant to their workflows: grade, collection date, straw color, fertilization method, or anything else. These fields appear on intake forms and specimen detail views.
Order-Driven Operations
All operations in OpenCryo are driven by orders. Nothing happens to a specimen without a documented reason. Six order types (storage, return, transfer, destruction, sample use, audit) map to specific workflows. Staff work from an order queue rather than from memory.
The receiving workflow supports container-level batch intake: declare the container hierarchy being received, select storage placement, and create all specimen records at once. Destruction follows a regulated protocol with qualified performer, qualified reviewer, client authorization verification, and dual-signature audit trail.