The Theft Investigation Checklist is a comprehensive tool designed to guide companies through the process of investigating theft incidents. This form ensures that all necessary steps are taken, from recognizing a problem to determining actions to be taken based on findings. The checklist is a vital resource for businesses aiming to handle theft investigations systematically and legally, ensuring that they do not overlook any critical steps or procedures.
This checklist should be used whenever a business suspects theft has occurred within its operations. It is critical for ensuring that the investigation is thorough, legally compliant, and respects employee rights. This form is especially useful in cases where there are potential disputes over accusations of theft and when prior investigation guidelines need to be addressed.
Notarization is not commonly needed for this form. However, certain documents or local rules may make it necessary. Our notarization service, powered by Notarize, allows you to finalize it securely online anytime, day or night.
Our built-in tools help you complete, sign, share, and store your documents in one place.
Make edits, fill in missing information, and update formatting in US Legal Forms—just like you would in MS Word.
Download a copy, print it, send it by email, or mail it via USPS—whatever works best for your next step.
Sign and collect signatures with our SignNow integration. Send to multiple recipients, set reminders, and more. Go Premium to unlock E-Sign.
If this form requires notarization, complete it online through a secure video call—no need to meet a notary in person or wait for an appointment.
We protect your documents and personal data by following strict security and privacy standards.

Make edits, fill in missing information, and update formatting in US Legal Forms—just like you would in MS Word.

Download a copy, print it, send it by email, or mail it via USPS—whatever works best for your next step.

Sign and collect signatures with our SignNow integration. Send to multiple recipients, set reminders, and more. Go Premium to unlock E-Sign.

If this form requires notarization, complete it online through a secure video call—no need to meet a notary in person or wait for an appointment.

We protect your documents and personal data by following strict security and privacy standards.
What happened? What was the date, time and duration of the incident or behavior? How many times did this happen? Where did it happen? How did it happen? Did anyone else see it happen? Was there physical contact?
Decide whether to investigate. Take immediate action, if necessary. Choose an investigator. Plan the investigation. Conduct interviews. Gather documents and other evidence. Evaluate the evidence. Take action.
There are three types of field investigationsdescriptive, comparative, and correlative. Descriptive field investigations involve describing parts of a natural system.
Information to Identify the Case: Begin the report with case specific information that identifies the case the report is related to. Referral Source: Allegation Details: Information About the Subject: Investigation Scope/ Purpose: Case Notes: Interview Summaries: Interview Reports:
Identify Scene Dimensions. Locate the focal point of the scene. Establish Security. Tape around the perimeter. Create a Plan & Communicate. Determine the type of crime that occurred. Conduct Primary Survey. Identify potential evidence. Document and Process Scene. Conduct Secondary Survey. Record and Preserve Evidence.
Preserve and Document the Incident Scene. Collecting Information. Determine Root Causes. Implement Corrective Actions.
Follow Company Policies. Assign an Investigator. Emphasize Confidentiality. Begin the Investigation ASAP. Gather Evidence, Conduct Interviews, and Trace Assets. Notify the Police. Discipline or Terminate the Employee. Recover Losses.
Step 1: Ensure Confidentiality. Step 2: Provide Interim Protection. Step 3: Select the investigator. Step 4: Create a Plan for the Investigation. Step 5: Develop Interview Questions. Step 6: Conduct Interviews.
The investigative process is a progression of activities or steps moving from evidence gathering tasks, to information analysis, to theory development and validation, to forming reasonable ground to believe, and finally to the arrest and charge of a suspect.