Ensuring the "envelope" of your store is secure is the first line of defense.
Question / Field | Yes | No | NA | Comments | ||
|---|---|---|---|---|---|---|
A | B | C | D | E | ||
1 | Exterior Lighting: Are all entry points, parking lots, and loading docks illuminated after hours? | |||||
2 | Signage: Are "CCTV in Operation" and "No Cash Kept on Premises" signs clearly visible? | |||||
3 | Glass & Entry Points: Are windows fitted with security film or shutters? Are door hinges tamper-proof? | |||||
4 | Landscaping: Is greenery trimmed to prevent "blind spots" where individuals could hide? | |||||
5 | Electronic Article Surveillance (EAS): Are the pedestals at the entrance calibrated? Do you have a consistent tagging policy for high-shrink items? |
How you display products often determines how easily they disappear.
Question / Field | Yes | No | NA | Comments | ||
|---|---|---|---|---|---|---|
A | B | C | D | E | ||
1 | High-Value Zone (HVZ): Are high-theft items (electronics, designer goods, fragrance) kept in line-of-sight of the registers? | |||||
2 | Merchandise Protection: | |||||
3 |
| |||||
4 |
| |||||
5 | Shelf Organization: Is "facing" done regularly? (Zoning makes it easier to spot gaps where items have been swept). | |||||
6 | Fitting Room Protocol: | |||||
7 |
| |||||
8 |
| |||||
9 |
|
The register is a primary hotspot for both external fraud and internal theft.
Question / Field | Yes | No | NA | Comments | ||
|---|---|---|---|---|---|---|
A | B | C | D | E | ||
1 | Till Management: | |||||
2 |
| |||||
3 |
| |||||
4 | Refunds & Voids: Do all returns require a manager's override or a second signature? | |||||
5 | Large Bill Protocol: Is a counterfeit detection pen or UV scanner used for all high-denomination bills? | |||||
6 | Cash Skimming: Are regular cash pickups scheduled so that large amounts of cash never sit in the drawer? | |||||
7 | PCI Compliance: Are card readers inspected daily for "skimmers" or tampered seals? |
Hardware is only effective if it’s functional and monitored.
Question / Field | Yes | No | NA | Comments | ||
|---|---|---|---|---|---|---|
A | B | C | D | E | ||
1 | CCTV Coverage: | |||||
2 |
| |||||
3 |
| |||||
4 |
| |||||
5 | Live Monitoring: Does the manager on duty perform at least two 10-minute "virtual tours" via the monitor during their shift? | |||||
6 | Access Control: Are backroom and office codes changed whenever a key-holding employee leaves the company? |
Statistically, internal shrink can be just as damaging as external shoplifting.
Question / Field | Yes | No | NA | Comments | ||
|---|---|---|---|---|---|---|
A | B | C | D | E | ||
1 | Employee Purchases: Must all staff purchases be verified by a manager and kept in a designated area until the end of the shift? | |||||
2 | Bag Checks: Is there a consistent policy for checking employee bags/lockers upon exit? | |||||
3 | Trash Audits: Are clear trash bags used? Are boxes broken down to ensure items aren't hidden inside "empty" packaging? | |||||
4 | The "Two-Person Rule": Are two people present for store opening, closing, and high-value inventory counts? | |||||
5 | Whistleblower Hotline: Is there an anonymous way for employees to report suspicious peer behavior? |
Training is your most versatile tool.
Question / Field | Yes | No | NA | Comments | ||
|---|---|---|---|---|---|---|
A | B | C | D | E | ||
1 | Aggressive Hospitality: Are staff trained to greet every customer? (Thieves hate being noticed). | |||||
2 | Body Language Recognition: Can staff identify "booster" behavior (aimless wandering, looking at cameras, ignoring products)? | |||||
3 | Standard Operating Procedure (SOP) for Theft: | |||||
4 |
| |||||
5 |
| |||||
6 | Law Enforcement Contact: Is there a list of emergency and non-emergency numbers by every phone? |
Loss prevention is often a game of numbers and paperwork.
Question / Field | Yes | No | NA | Comments | ||
|---|---|---|---|---|---|---|
A | B | C | D | E | ||
1 | Cycle Counting: Instead of yearly audits, are "high-shrink" departments counted weekly? | |||||
2 | Shipping & Receiving: | |||||
3 |
| |||||
4 |
| |||||
5 | Key Log: Is there a master log of who has physical keys and when they were issued? |
Form Template Insights
Please remove this form template insights section before publishing.
To build a functional template, you need to understand the operational "why" behind each section. These insights focus on the mechanics of store protection and the practical application of the checklist items.
The goal of physical security is to increase the effort and time required to commit a bypass.
The register is where physical goods convert to data and cash. Discrepancies here are often the first sign of systemic loss.
Loss is not always theft; it is often administrative error.
Technology only works if it is part of a disciplined routine.
Behavioral deterrents are often more effective than hardware.
CCTV is often used only after an incident, but its primary value in a checklist is preventative maintenance.
A paper trail is the best defense against internal shrinkage.
Mandatory Questions Recommendation
Please remove this mandatory questions recommendation section before publishing.
To build an effective template, certain questions must be considered "non-negotiable." These items act as the foundation for the entire program because they address the most common points of failure in store operations.
Below are the mandatory questions for your checklist and the operational reasoning for their inclusion.
Why: Real-time tracking prevents "lag" in your data. If you only count once a week, you cannot pinpoint exactly when a loss occurred or which staff members were present. This question forces immediate accountability for the most expensive or easily stolen inventory (e.g., smartphones, designer handbags, or jewelry).
Why: A surveillance system that isn't recording is just an expensive decoration. Checking the timestamp is critical because if an incident occurs at 2:00 PM but the system shows 11:00 AM, finding the footage becomes a massive time sink. This ensures that evidence is always ready and searchable.
Why: Merchandising teams often move shelves or hang large banners without considering security. This question ensures that the store layout remains "transparent." If a staff member cannot see a customer from the main floor or the register, that area becomes a high-risk zone for concealment.
Why: A "blind count" means the staff member counts the cash without knowing what the computer says should be there. This is the most effective way to prevent "lapping" or small-scale internal theft where a person might pocket the "overage" if they knew the exact target number.
Why: Technical drift happens. A power surge or a loose wire can disable the alarm pedestals at the front door without anyone noticing. Daily testing ensures that the electronic barrier is actually active and that staff are not relying on a broken system.
Why: One of the most common ways to move large amounts of product out of a store is by hiding it inside cardboard boxes or dark trash bags destined for the dumpster. Requiring clear bags and a second pair of eyes breaks this cycle.
Why: In many theft scenarios, an accomplice holds a back fire-exit open or a thief simply runs out a side door to a waiting car. Ensuring these doors are alarmed and not blocked by incoming freight is a fundamental safety and security requirement.
Why: Access control is only as strong as the most recent update. If a former employee still has a key or a working alarm code, the building’s perimeter is effectively compromised. This question ensures the "digital and physical locks" are rotated regularly.
To configure an element, select it on the form.