Incident Report Documentation Audit Checklist [FREE PDF]

Accurate and complete incident report documentation is a cornerstone of effective security management, legal defensibility, and regulatory compliance. ASIS Physical Security Standard PSC.1-2012 and ASIS Workplace Violence Prevention WVPI.1-2011 establish clear requirements for the timely creation, review, and retention of security incident records. This audit checklist enables Security Directors and supervisors to systematically evaluate whether incident reports meet organizational policy, ASIS

  • Industry: Corporate Security
  • Frequency: Monthly
  • Estimated Time: 30-45 minutes
  • Role: Security Director
  • Total Items: 36
  • Compliance: ASIS Physical Security Standard PSC.1-2012, ASIS Workplace Violence Prevention WVPI.1-2011, NFPA 730 Guide for Premises Security 2020 Edition, DHS Chemical Facility Anti-Terrorism Standards (CFATS) 6 CFR Part 27, UL 2050 Standard for National Industrial Security Systems

Report Completeness & Basic Information

Verify that each audited incident report contains all mandatory basic identifying information.

  • Does each incident report include a unique report number and the date and time of the incident?
  • Does each report clearly identify the exact location where the incident occurred?
  • Is the name, badge number, and signature of the reporting officer included on every report?
  • Is the incident category or type (e.g., theft, trespass, workplace violence, medical) correctly classified on each report?
  • Are all mandatory fields on the incident report form completed with no blank or incomplete entries?

Narrative Quality & Factual Accuracy

Assess whether the written narrative sections of each report are factual, objective, and sufficiently detailed.

  • Is the incident narrative written in objective, factual language free of personal opinions or assumptions?
  • Does the narrative include a chronological account of events from initial discovery to resolution?
  • Are all persons involved (subjects, victims, witnesses) identified with full names and contact information where obtainable?
  • Are any property losses, damages, or injuries described with sufficient specificity (item descriptions, values, injury nature)?
  • Is the narrative free of grammatical errors, illegible handwriting, or undefined abbreviations that could impair understanding?

Timeliness & Submission Compliance

Evaluate whether incident reports were submitted within required timeframes and routed to appropriate stakeholders.

  • Were all audited reports submitted within the organizationally mandated timeframe (e.g., within 24 hours of incident)?
  • Were high-priority incidents (e.g., violence, major theft, CFATS-reportable events) escalated to management within the required notification window?
  • Were copies of applicable reports distributed to HR, legal, facilities, or law enforcement as required by policy?
  • Is there evidence of supervisor review and sign-off on each report within the required review period?
  • Were any late submissions documented with an explanation and approved by the Security Director?

Evidence & Supporting Documentation

Confirm that all supporting evidence, attachments, and witness statements are properly referenced and secured.

  • Are photographs, video evidence references, or physical evidence inventory sheets attached where applicable?
  • Do reports involving CCTV footage include the specific camera IDs, timestamps, and confirmation of footage preservation?
  • Are witness statements (if taken) signed, dated, and attached as supplemental documents to the incident report?
  • Is a documented chain of custody established for any physical evidence collected during the incident response?
  • Are all evidence reference numbers cross-linked between the incident report and the evidence log?

Follow-Up & Corrective Actions

Review whether incidents triggered appropriate follow-up investigations and corrective action documentation.

  • Does each applicable report include a documented follow-up action plan or case disposition status?
  • Were corrective actions (e.g., additional patrols, access control changes, lighting upgrades) implemented and documented in response to incidents?
  • Have law enforcement referrals been documented with case numbers where applicable?
  • For workplace violence incidents, was an immediate threat assessment conducted and documented per ASIS WVPI.1-2011?
  • Are recurring incident types flagged for trend analysis and escalation to senior management review?

Records Retention & Data Security

Confirm that incident records are stored, protected, and retained in accordance with regulatory and legal requirements.

  • Are all incident reports stored in a secure, access-controlled location (physical or digital) accessible only to authorized personnel?
  • Are digital incident records backed up regularly and protected with appropriate encryption and access controls?
  • Are records being retained for the minimum required period per organizational policy and applicable regulations (e.g., 3–7 years)?
  • Is there an auditable access log tracking who has viewed or modified incident records in the reporting period?
  • Are records involving personally identifiable information (PII) handled in compliance with applicable privacy laws and data protection policies?

Audit Findings, Deficiencies & Recommendations

Summarize overall audit findings, identify systemic gaps, and document recommendations for improvement.

  • What percentage of audited reports were found to be fully compliant with all documentation standards?
  • Were recurring deficiency types identified across multiple reports (e.g., missing signatures, late submissions, incomplete narratives)?
  • Please describe all significant deficiencies identified during this audit and their frequency.
  • Please document specific corrective action recommendations and the responsible party for each identified gap.
  • Has this audit report been reviewed and signed off by the Security Director or senior security leadership?
  • Has a follow-up audit date been scheduled to verify that corrective actions have been implemented?

Related Security Checklists

Related Guard Operations Checklists

Why Use This Incident Report Documentation Audit Checklist [FREE PDF]?

This incident report documentation audit checklist [free pdf] helps corporate security teams maintain compliance and operational excellence. Designed for security director professionals, this checklist covers 36 critical inspection points across 7 sections. Recommended frequency: monthly.

Ensures compliance with ASIS Physical Security Standard PSC.1-2012, ASIS Workplace Violence Prevention WVPI.1-2011, NFPA 730 Guide for Premises Security 2020 Edition, DHS Chemical Facility Anti-Terrorism Standards (CFATS) 6 CFR Part 27, UL 2050 Standard for National Industrial Security Systems. Regulatory-aligned for audit readiness and inspection documentation.

Frequently Asked Questions

What does the Incident Report Documentation Audit Checklist [FREE PDF] cover?

This checklist covers 36 inspection items across 7 sections: Report Completeness & Basic Information, Narrative Quality & Factual Accuracy, Timeliness & Submission Compliance, Evidence & Supporting Documentation, Follow-Up & Corrective Actions, Records Retention & Data Security, Audit Findings, Deficiencies & Recommendations. It is designed for corporate security operations and compliance.

How often should this checklist be completed?

This checklist should be completed monthly. Each completion takes approximately 30-45 minutes.

Who should use this Incident Report Documentation Audit Checklist [FREE PDF]?

This checklist is designed for Security Director professionals in the corporate security industry. It can be used for self-assessments, team audits, and regulatory compliance documentation.

Can I download this checklist as a PDF?

Yes, this checklist is available as a free PDF download. You can also use it digitally in the POPProbe mobile app for real-time data capture, photo documentation, and automatic reporting.

Browse More Checklists