Defect Closure Guide

Defect Closure Guide

Step 1 – Access your recommendations:

Access your recommendations by clicking “View Recommendations” in the email you received from us, following completion of an audit.

If you did not receive this email, please contact Checkpoint Support (support.checkpoint@intertek.com) to request a new one.

If the button is unresponsive, please do the following:
      1. Right click on "View Recommendation"
      2. "Copy link address"
      3. Paste the link directly into your browser.



Step 2 – Open a recommendation:

Double click the row containing the recommendation you wish to update. This will open a new window which will allow you to provide updates.




Step 3 – Add Agreed date:

If possible, provide an estimated date that you can complete our recommendation by, as the agreed date. (Screenshot at bottom of page)


Step 4 – Add Defect note:

Add any relevant information about the defect as a defect note(Screenshot at bottom of page)

 If you have resolved the defect, please describe the changes you made to resolve it in the defect note. 

Step 5 – Provide evidence:

If possible, please provide evidence of the defect resolution in the form of photographs or official documentation.



Step 6 – Close defect:

If the defect has been fully resolved and the recommendation does not apply to you anymore, please click the "Close defect" button.










    • Related Articles

    • Guidelines for Evidence Required for Escalation Closure V4 2025

      Guidelines for Evidence Required for Escalation Closure Please ensure the property thing-code and the name and position of the person confirming resolution of the escalation issues are provided at all times. If the escalation contains multiple ...
    • Detailed guide on using Checkpoint as a Customer

      Attached is a guide on using the main features of using Checkpoint as a customer.
    • Customer Guide for resending emails from Checkpoint when Not a Buyin

      In the “Service Orders” section, find the audit you would like to chase by searching for the Target name. Open the service order by double clicking on the row: Click the icon highlighted below to view the Target details: Navigate to the email log and ...
    • User Account Roles, Made Clear

      Roles & Permissions Different roles give different levels of access, so the right people can do the right tasks without unnecessary complexity. A user can only be assigned one role. Here’s a quick guide to what each role means: Below is a summary of ...
    • Completing a Checkpoint Self Assessment

      Starting the Self Assessment You will receive an invitation to complete the self-assessment from the email address no-reply@checkpointsolutions.co.uk. The invitation will appear similar to as shown below. When you click "Complete Now," a new tab will ...