Prevent

A checklist teams can run every week.

Use this checklist to turn policy into consistent behavior: zone control, reconciliation, verification at handoffs, and evidence retention that supports investigations.

Perimeter

Perimeter and access

  • Gate schedule defined and exceptions logged
  • Secondary access points identified and hardened
  • Lighting overlap validated at corners and egress routes
  • Signage aligned to real access rules and reporting contacts
  • Camera views capture faces/plates at control points
Harvest

Harvest operations

  • Staging zones have clear ownership and supervision
  • Bin assignments documented; moved bins tracked
  • Shift-end reconciliation completed daily during peak
  • Overnight staging minimized or covered with lighting/cameras
  • Suspicious vehicle logging template available on-site
Transport

Transport and handoffs

  • Pickup verification: driver ID and plate capture
  • Seal logging with unique IDs and photos
  • Handoff signatures and timestamps recorded
  • Receiving seal check and count reconciliation standardized
  • Variance protocol defined (hold, document, escalate)
Visibility

Surveillance and evidence

  • Time sync enabled across cameras and recorders
  • Retention set based on discovery lag (30–90 days)
  • Remote access accounts individualized; MFA enabled when available
  • Evidence export SOP defined; exports logged
  • Camera naming maps clearly to zones and control points