Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Exit Interviews: How to Prevent Loss and Track Your Assets

By Scott Downs
July 28, 2015

There are many methods, programs and systems to track your assets and prevent loss, however one of the most important and overlooked practices is a well-structured exit interview. When an employee is retiring, resigning or being dismissed, the exit interview should be as important as the hiring process when tracking and preventing asset loss.

The hiring process is an essential start to any robust loss prevention program, and allows the company to track their assets. During the hiring phase, the company may provide employees with uniforms, access cards, keys, passwords, vehicles, parking passes, gas cards, cellphones or any other company property that is necessary for the employee to perform their job description.

The initial employment process is very proactive with regard to assigning company property to a new employee. It is necessary, at this point, to record all pertinent information about the property assigned to that employee in multiple logs or databases. A complete and thorough document detailing the responsibility and receipt of the items issued should be signed by the employee as well.

The new employee should also sign a document indicating that he or she understands the company policy with regard to the loss of, or damage to company property issued to his/her care, custody and control. Further, the employee should understand and sign to acknowledge that the property must be returned when retiring, resigning or upon dismissal from the company. A best practice to follow is to have the original signed documents placed in the employee’s personnel folder. This practice will assist in tracking and recovering these assets at a later time and will provide the employee with the knowledge that any damage to or loss of issued property will call for immediate reimbursement to the company.

Collecting and maintaining accurate records of confidential information, trade secrets, non-compete and non-disclosure contracts or agreements, in addition to any tangible assets are time consuming and expensive, but not as costly in the long run to a company’s profit and loss statement. When tracking and preventing loss, what better way to ensure that your assets are protected and returned in the same condition and proper working order than by conducting a comprehensive exit interview by verifying the assets and cross referencing them with the acknowledgement and possession memorandum?

The importance of conducting a complete exit interview is not only to track and protect the company’s fixed assets; it allows management to learn of or about any issues, problems or grievances that could affect future loss. The exit interview will create a forum for an open dialogue that will permit the employee to speak freely to management and identify or explain any problems or complaints they may have. Learning from the interview and investigating any possible problems or concerns and correcting or addressing them will benefit the company by reducing liability from future asset loss and exposure to possible legal liability issues.

During the conversation as an active empathic listener, management will create an opportunity to help reduce loss of company assets, by going back to the employee personnel folder and using a property return form and check list to ensure that all company property is accounted for.

Tracking tangible assets following the practices above will help reduce loss of company assets however, the exit interview’s vital function is to remind the employee of his or her legal obligations with regards to non-compete or non-disclosure agreements. The goal of conducting a comprehensive exit interview is to maximize your asset control efficiency and minimize your potential for loss. The reminder of the employee’s legal responsibility should be in writing and more importantly signed by the employer and employee and placed back in the employee’s personnel folder so that the document is readily available in the event of future litigation.

The exit interview should not end there, a strong management team should record all exit interview responses and track any trends and implement corrective actions immediately. A comprehensive exit interview that is structured and conducted consistently by an active listener is one of the best ways to prevent loss and track assets if the information is used in a proactive corrective manner. 

KEYWORDS: asset management employee security exit interviews loss prevention workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Scott Downs is the Director of Operations for a national security company and a fourth generation law enforcement officer. He is an Adjunct Criminal Justice Professor at Briarcliffe College and a member of ILEETA-International Law Enforcement Educators and Trainers Association. Scott has two decades of experience as a police officer and instructor. He serves in the public and private safety and security sector as a trainer and consultant. Scott is a summa cum laude graduate of Saint Joseph’s College and holds a Master’s Degree from the Homeland Security Management Institute. Reach Scott at scottdowns@optimum.net

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • AI public safety freepik

    How to safeguard and optimize your assets through IoT and AI

    See More
  • How to Safeguard Your Information Assets

    See More
  • cybersecurity

    How to select a cybersecurity framework to protect your greatest assets: People, property and data

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing