Check sheet

Counting & accumulating data

Why use it?

To allow a team to systematically record and compile data from historical sources, or observations as they happen, so that patterns and trends can be clearly detected and shown.

What does it do?

How do I do it?

  1. Agree on the definition of the events or conditions being observed.
  1. Decide who will collect the data, over what period, and from what sources.
It must be safe to record and report “bad news”; otherwise, the data will be filtered.
  1. Design a Check Sheet form that is clear, complete, and easy to use.
  1. Collect the data consistently and accurately.
Managers and/or team members can do their part to help the data collector(s) do their job well by simply showing an interest in the project. Ask the collector(s) how the project is working out. Show your support—tell the data collector(s) you think it is important to collect the information. Above all—act on the data as quickly as possible!

Variations

Defect Location

Shows the concentration of defects by marking a drawing of the product each time a defect is found.

Task Checklist

Tasks in producing a product or delivering a service are checked off as they are done. In complex processes this is a form of “mistake proofing.”

Check Sheet
Keyboard Errors in Class Assignment
Information provided courtesy of Millcreek Township School District, Millcreek Township, Pennsylvania
Check Sheet
Event Registrations
Information provided courtesy of PC Precision Engineering

NOTE: This report needs to be accompanied with information of corrective actions taken as a result of numbers deviating from the norm.

At the production level, similar sheets are used to register the actual events as they happen. As soon as these numbers reach a threshold value, an action is initiated to investigate and correct the issue.

Check Sheet
Workstation Security Study
Information provided courtesy of Cook Children’s Health Plan

NOTE: As part of our ongoing efforts to monitor HIPPA and confidentiality requirements, a study was conducted to assess compliance with user workstations (computers) being locked when unattended in the office.


Next:
7. Control Charts