Retail Security & Loss Prevention Checklist

1. Physical Site Security & Deterrence

Ensuring the "envelope" of your store is secure is the first line of defense.

Question / Field

Yes

No

NA

Comments

Exterior Lighting: Are all entry points, parking lots, and loading docks illuminated after hours?

 

Signage: Are "CCTV in Operation" and "No Cash Kept on Premises" signs clearly visible?

 

Glass & Entry Points: Are windows fitted with security film or shutters? Are door hinges tamper-proof?

 

Landscaping: Is greenery trimmed to prevent "blind spots" where individuals could hide?

 

Electronic Article Surveillance (EAS): Are the pedestals at the entrance calibrated? Do you have a consistent tagging policy for high-shrink items?

 

2. Inventory & Merchandising Strategy

How you display products often determines how easily they disappear.

Question / Field

Yes

No

NA

Comments

High-Value Zone (HVZ): Are high-theft items (electronics, designer goods, fragrance) kept in line-of-sight of the registers?

 

Merchandise Protection:

 
 
 
 
  • Are "spider wraps" or hard tags applied correctly?
 
  • Are "keeper cases" used for small, expensive items?
 

Shelf Organization: Is "facing" done regularly? (Zoning makes it easier to spot gaps where items have been swept).

 

Fitting Room Protocol:

 
 
 
 
  • Is there a limit on the number of items allowed?
 
  • Are rooms checked immediately after a customer exits?
 
  • Are hangers and tags collected promptly?
 

3. Point of Sale (POS) & Cash Handling

The register is a primary hotspot for both external fraud and internal theft.

Question / Field

Yes

No

NA

Comments

Till Management:

 
 
 
 
  • Are "blind counts" performed (staff shouldn't know the expected total before counting)?
 
  • Are "no sale" till openings tracked and reviewed?
 

Refunds & Voids: Do all returns require a manager's override or a second signature?

 

Large Bill Protocol: Is a counterfeit detection pen or UV scanner used for all high-denomination bills?

 

Cash Skimming: Are regular cash pickups scheduled so that large amounts of cash never sit in the drawer?

 

PCI Compliance: Are card readers inspected daily for "skimmers" or tampered seals?

 

4. Surveillance & Technology

Hardware is only effective if it’s functional and monitored.

Question / Field

Yes

No

NA

Comments

CCTV Coverage:

 
 
 
 
  • Is there a clear "face shot" camera at the entrance?
 
  • Are there cameras covering the loading dock and trash compactors?
 
  • Is the DVR/NVR date and time synced correctly?
 

Live Monitoring: Does the manager on duty perform at least two 10-minute "virtual tours" via the monitor during their shift?

 

Access Control: Are backroom and office codes changed whenever a key-holding employee leaves the company?

 

5. Internal Controls & Employee Integrity

Statistically, internal shrink can be just as damaging as external shoplifting.

Question / Field

Yes

No

NA

Comments

Employee Purchases: Must all staff purchases be verified by a manager and kept in a designated area until the end of the shift?

 

Bag Checks: Is there a consistent policy for checking employee bags/lockers upon exit?

 

Trash Audits: Are clear trash bags used? Are boxes broken down to ensure items aren't hidden inside "empty" packaging?

 

The "Two-Person Rule": Are two people present for store opening, closing, and high-value inventory counts?

 

Whistleblower Hotline: Is there an anonymous way for employees to report suspicious peer behavior?

 

6. Shoplifting Prevention & De-escalation

Training is your most versatile tool.

Question / Field

Yes

No

NA

Comments

Aggressive Hospitality: Are staff trained to greet every customer? (Thieves hate being noticed).

 

Body Language Recognition: Can staff identify "booster" behavior (aimless wandering, looking at cameras, ignoring products)?

 

Standard Operating Procedure (SOP) for Theft:

 
 
 
 
  • Do employees know exactly what they can and cannot do when they suspect a theft?
 
  • Is the "Hands-Off" policy clearly defined to prevent liability and injury?
 

Law Enforcement Contact: Is there a list of emergency and non-emergency numbers by every phone?

 

7. Administrative & Data Audit

Loss prevention is often a game of numbers and paperwork.

Question / Field

Yes

No

NA

Comments

Cycle Counting: Instead of yearly audits, are "high-shrink" departments counted weekly?

 

Shipping & Receiving:

 
 
 
 
  • Are deliveries cross-checked against the manifest immediately?
 
  • Is "short-shipping" reported within 24 hours?
 

Key Log: Is there a master log of who has physical keys and when they were issued?

 

Form Template Insights

Please remove this form template insights section before publishing.

Overall Form Strengths & Summary

To build a functional template, you need to understand the operational "why" behind each section. These insights focus on the mechanics of store protection and the practical application of the checklist items.


I. Physical Barrier Mechanics

The goal of physical security is to increase the effort and time required to commit a bypass.

  • Sightlines and "Dead Zones": When designing your form, include a section for "Blind Spot Audits." This involves standing in corners to see if the view to the register is obstructed. If a staff member cannot see a customer, that customer feels unmonitored.
  • The Perimeter Envelope: Security film on glass doesn't just stop break-ins; it prevents "smash and grabs" during business hours where a thief shatters a display case and flees before staff can react.

II. The "Point of Sale" (POS) Ecosystem

The register is where physical goods convert to data and cash. Discrepancies here are often the first sign of systemic loss.

  • Transactional Integrity: Auditing "Voids" and "Line Corrects" is vital. High frequencies of these actions often indicate "sweethearting"—where a staff member pretends to scan an item for a friend but cancels the entry.
  • The "Double-Count" Principle: For cash handling, the template should enforce a hand-off. One person counts the drawer, a second person verifies the deposit bag, and both initial the log. This creates a chain of custody.

III. Inventory Accuracy & Movement

Loss is not always theft; it is often administrative error.

  • Cycle Counting vs. Full Audits: Instead of one massive annual count, the checklist should prompt for "High-Risk Counts" every 48 hours. Focus on small, high-value items like perfumes, jewelry, or small electronics.
  • Receiving Dock Discipline: Loss frequently occurs before an item even reaches the shelf. If the manifest says 10 units but only 9 arrive, and the staff signs for 10, the store has "lost" that item immediately.

IV. Electronic Article Surveillance (EAS) Maintenance

Technology only works if it is part of a disciplined routine.

  • Tagging Standards: Your template should specify where tags are placed. If tags are placed over important product information or in easily reachable spots, they are less effective.
  • Pedestal Testing: Systems can drift out of alignment. A daily "test tag" walk-through ensures the alarm actually triggers when it should.

V. Operational Habits & Staff Awareness

Behavioral deterrents are often more effective than hardware.

  • The "Zone Defense": In larger stores, staff should be assigned specific floor zones. The checklist should track if these zones are occupied during peak hours.
  • Entrance Engagement: The simple act of a verbal greeting serves as a "notice of presence." It informs a potential shoplifter that the staff is alert and the environment is controlled.
  • Trash Control: Requiring clear bags for trash prevents the "stash and dash," where expensive items are hidden in the bin to be retrieved from the dumpster later.

VI. Surveillance Data Management

CCTV is often used only after an incident, but its primary value in a checklist is preventative maintenance.

  • Storage Retention: Ensure the template asks if the system is actually recording and how many days of footage are stored. Discovering a hard drive failure after a theft is a common operational failure.
  • Field of View (FOV) Checks: Over time, cameras can be bumped or move. Monthly checks ensure they are still pointing at the cash drawer and the exits, not at the top of a shelf.

VII. Administrative Documentation

A paper trail is the best defense against internal shrinkage.

  • Key and Code Logs: Access should be treated as a physical asset. When a code is shared or a key is duplicated without a log entry, the security of the entire building is compromised.
  • Vendor Log-In: All outside contractors (cleaners, technicians) should sign in and out with a timestamp. This narrows the window of investigation if a loss is discovered in a restricted area.

Mandatory Questions Recommendation

Please remove this mandatory questions recommendation section before publishing.

Mandatory Field Rationale

To build an effective template, certain questions must be considered "non-negotiable." These items act as the foundation for the entire program because they address the most common points of failure in store operations.

Below are the mandatory questions for your checklist and the operational reasoning for their inclusion.


1. "Are all 'High-Shrink' items counted and verified at the start and end of every shift?"

Why: Real-time tracking prevents "lag" in your data. If you only count once a week, you cannot pinpoint exactly when a loss occurred or which staff members were present. This question forces immediate accountability for the most expensive or easily stolen inventory (e.g., smartphones, designer handbags, or jewelry).

2. "Is the CCTV system currently recording, and is the timestamp accurate?"

Why: A surveillance system that isn't recording is just an expensive decoration. Checking the timestamp is critical because if an incident occurs at 2:00 PM but the system shows 11:00 AM, finding the footage becomes a massive time sink. This ensures that evidence is always ready and searchable.

3. "Are there any 'Blind Spots' created by new displays or seasonal signage?"

Why: Merchandising teams often move shelves or hang large banners without considering security. This question ensures that the store layout remains "transparent." If a staff member cannot see a customer from the main floor or the register, that area becomes a high-risk zone for concealment.

4. "Did the 'Blind Count' of the cash drawer match the POS system report?"

Why: A "blind count" means the staff member counts the cash without knowing what the computer says should be there. This is the most effective way to prevent "lapping" or small-scale internal theft where a person might pocket the "overage" if they knew the exact target number.

5. "Are all EAS (Electronic Article Surveillance) pedestals tested and functional today?"

Why: Technical drift happens. A power surge or a loose wire can disable the alarm pedestals at the front door without anyone noticing. Daily testing ensures that the electronic barrier is actually active and that staff are not relying on a broken system.

6. "Was the 'Trash Out' performed using clear bags and inspected by a supervisor?"

Why: One of the most common ways to move large amounts of product out of a store is by hiding it inside cardboard boxes or dark trash bags destined for the dumpster. Requiring clear bags and a second pair of eyes breaks this cycle.

7. "Are all exterior 'Exit Only' doors alarmed and remains unobstructed?"

Why: In many theft scenarios, an accomplice holds a back fire-exit open or a thief simply runs out a side door to a waiting car. Ensuring these doors are alarmed and not blocked by incoming freight is a fundamental safety and security requirement.

8. "Have all temporary access codes or physical keys been recovered from departed staff?"

Why: Access control is only as strong as the most recent update. If a former employee still has a key or a working alarm code, the building’s perimeter is effectively compromised. This question ensures the "digital and physical locks" are rotated regularly.


Step right up! The Greatest Form Edit Show on Earth is about to begin—prizes include MAXIMUM AWESOMENESS! 🎟️🎪 Edit this Retail Security & Loss Prevention Checklist
Need a form that automatically calculates totals or other values? Zapof allows you to create tables with built-in calculations, just like a spreadsheet.
This form is protected by Google reCAPTCHA. Privacy - Terms.
 
Built using Zapof