Checkpoint Security System-3 WC Blog 263
Checkpoint Systems-3
Checkpoint Tags-5
Checkpoint Labels-4
Stop Shoplifting-3
Checkpoint Security Systems Are Key To Your Inventory Control: Part 1
Loss Prevention professionals like to throw around the term inventory control whenever we are discussing merchandise shrinkage and how to prevent it. While the idea of inventory control is valid, there are many facets about it that must be considered when we are making reference to it. Often, I believe we in Loss Prevention start to discuss tactics to control inventory and we can lose sight of the object of those tactics. Here is what I mean; inventory control is the ability to accurately know what is coming into your building, knowing where it is in your building, knowing all that transpires with that merchandise (ie; markdowns, buy backs, vendor credits, etc.) and knowing how it leaves the building (via point of sale, vendor returns, chargebacks, etc.). When you have all that knowledge you have control over inventory. Implementing strategies to control inventory includes such things as Direct to Store Delivery processing, receipt of vendor credits, building alarm controls, key controls, stockroom access controls and so on. Each process can make a significant impact on shortage come inventory time. What I would like to discuss are several strategies a retailer can use to exert more control over their inventory. The first strategy I want to strongly encourage is to invest in a Checkpoint Security System.
By purchasing a Checkpoint Security System you are taking measures to stop shoplifting and you can also deter internal theft and vendor theft as well. Checkpoint systems include electronic article surveillance (EAS) antennas in a variety of models, Checkpoint tags and Checkpoint labels, deactivation pads and detachment tools for checkout stands. When used together, Checkpoint Tags and Checkpoint Labels are placed on merchandise to stop shoplifting and when shoplifting is attempted, these devices cause the EAS antennas to sound their alarms and alert employees that merchandise is being removed from the store. Deactivation pads basically “turn off” Checkpoint labels after an item is purchased so the EAS antennas don’t alarm. Removal tools allow cashiers to take the hard Checkpoint tags off of items as they are purchased.
Store goods can be protected with soft Checkpoint Labels that can be applied to a variety of different products, from meat soaker pads to blister packed merchandise and even cosmetics. Hard Checkpoint Tags provide protective solutions for almost any other product carried, including but not limited to clothing, softlines accessories, peg hole protection, the list goes on. My point is, once merchandise is protected it is hard for anyone to sneak products out of a store. Not only do Checkpoint tags stop shoplifting but the employee who wants to steal has a difficult time getting past security measures. I have apprehended dishonest employees who had stolen merchandise that was protected but had to go to significant lengths to try to bypass our Checkpoint Security System. There are also vendors that will try to steal, taking merchandise out in purses, bags, between empty cartons and Checkpoint Systems detect them too making no distinctions between shoplifters, employees or vendors.
Where does inventory control begin with tagging? It begins as soon as merchandise is received. Arrangements can be made through Checkpoint for vendor source tagging of some items and other merchandise a store will be responsible for tagging. Tagging products immediately eliminates most opportunities for any type of theft and store owners/managers have exerted control over how that product will leave their building.
Inventory Control is a simple concept, controlling where your merchandise is or where it is going. Checkpoint Systems can help ensure your merchandise stays in the store until it goes out through a point of sale and drive up profits.
Need information on Checkpoint Security Systems? Give us a call at 1.770.426.0547 now.
Loss Prevention professionals like to throw around the term inventory control whenever we are discussing merchandise shrinkage and how to prevent it. While the idea of inventory control is valid, there are many facets about it that must be considered when we are making reference to it. Often, I believe we in Loss Prevention start to discuss tactics to control inventory and we can lose sight of the object of those tactics. Here is what I mean; inventory control is the ability to accurately know what is coming into your building, knowing where it is in your building, knowing all that transpires with that merchandise (ie; markdowns, buy backs, vendor credits, etc.) and knowing how it leaves the building (via point of sale, vendor returns, chargebacks, etc.). When you have all that knowledge you have control over inventory. Implementing strategies to control inventory includes such things as Direct to Store Delivery processing, receipt of vendor credits, building alarm controls, key controls, stockroom access controls and so on. Each process can make a significant impact on shortage come inventory time. What I would like to discuss are several strategies a retailer can use to exert more control over their inventory. The first strategy I want to strongly encourage is to invest in a Checkpoint Security System.
By purchasing a Checkpoint Security System you are taking measures to stop shoplifting and you can also deter internal theft and vendor theft as well. Checkpoint systems include electronic article surveillance (EAS) antennas in a variety of models, Checkpoint tags and Checkpoint labels, deactivation pads and detachment tools for checkout stands. When used together, Checkpoint Tags and Checkpoint Labels are placed on merchandise to stop shoplifting and when shoplifting is attempted, these devices cause the EAS antennas to sound their alarms and alert employees that merchandise is being removed from the store. Deactivation pads basically “turn off” Checkpoint labels after an item is purchased so the EAS antennas don’t alarm. Removal tools allow cashiers to take the hard Checkpoint tags off of items as they are purchased.
Store goods can be protected with soft Checkpoint Labels that can be applied to a variety of different products, from meat soaker pads to blister packed merchandise and even cosmetics. Hard Checkpoint Tags provide protective solutions for almost any other product carried, including but not limited to clothing, softlines accessories, peg hole protection, the list goes on. My point is, once merchandise is protected it is hard for anyone to sneak products out of a store. Not only do Checkpoint tags stop shoplifting but the employee who wants to steal has a difficult time getting past security measures. I have apprehended dishonest employees who had stolen merchandise that was protected but had to go to significant lengths to try to bypass our Checkpoint Security System. There are also vendors that will try to steal, taking merchandise out in purses, bags, between empty cartons and Checkpoint Systems detect them too making no distinctions between shoplifters, employees or vendors.
Where does inventory control begin with tagging? It begins as soon as merchandise is received. Tagging products immediately eliminates most opportunities for any type of theft and store owners/managers have exerted control over how that product will leave their building.
Inventory Control is a simple concept, controlling where your merchandise is or where it is going. Checkpoint Systems can help ensure your merchandise stays in the store until it goes out through a point of sale and drive up profits.
Need information on Checkpoint Security Systems? Give us a call at 1.770.426.0547 now.
Checkpoint tags-4 WC blog 237
Clothing alarm-3
Clothing security tags-3
Do’s And Don’ts In Responding To A Clothing Alarm Part 1
You may be considering the important decision to invest in Checkpoint tags to prevent the theft of clothes from your store. If you do decide to take this important step you will certainly make your store more profitable. But did you know that there is more to do once electronic article surveillance antennas are installed and you have placed security tags on clothes? In order to have an effective plan for clothing security you will need to train employees on how to properly respond to alarm activations. I have been involved with Retail Loss Prevention for a long time and I have witnessed positive and negative results from EAS alarms based on how employees respond to those alarms. When a store has an Electronic Article Surveillance (EAS) system installed the company will provide initial training but it is incumbent on the store to conduct ongoing training to its employees. In this article I will be addressing the DO’s and DON’Ts of EAS alarm response when security tags on clothes trigger an alarm.
Let’s begin the discussion with a review of what clothing security tags are and how they work. Checkpoint tags for clothes are designed to be pinned to clothing and only removed with a special detachment key. Any attempt to forcibly remove the tags or pry them off of a garment damages the product and undermines the reason someone would steal the merchandise in the first place. Clothing security tags are designed and built to emit a radio frequency signal that can be picked up by an EAS antenna when carried within the receiving range of the antenna. Once carried into that range or field a tag will cause the antenna to sound an alarm. It is this alarm that employees respond to in order to recover merchandise. There are times when the alarm itself is enough to cause a criminal to drop the item they were going to steal. In many instances it is how effectively an employee responds to the alarm that determines whether merchandise is recovered.
I mentioned that my point in writing this is that there are proper ways to respond to a clothing alarm and there are certainly ways NOT to respond. Employees get initial training when a system is installed and after that it is up to the store owner or supervisors to conduct ongoing training. It is important to train correctly and these are my tips.
DON’Ts to EAS alarm responses:
• Don’t approach the person with an accusatory tone or aggressive stance. Aggressive attitudes tend to elicit a similar response which can escalate a situation.
• Don’t automatically take a person’s bag, purse or backpack from them.
• Don’t accuse someone of trying to steal, even if a receipt check or bag inspection results in recovering merchandise.
• Don’t assume that if garments have Checkpoint tags on them that they have been stolen. The receipt check could reveal the cashier failed to remove clothing security tags.
• Don’t make a scene.
• Don’t stand in front of the person with whom you are interacting. If they are stealing they may stop for an alarm, however if they feel you are finding something they may assume you are going to put them in jail and they may try to run. You could be pushed out of the way, possibly getting injured in the process.
• If you make a recovery due to a clothing alarm, don’t follow the suspect into the parking lot to get a tag number from the car. I have seen people back all the way to the end of a parking lot, endangering other drivers in order to avoid their license plate number being seen.
In part 2 I will be discussing the steps an employee should DO in the event of a clothing alarm. The old saying goes that you attract more flies with honey than vinegar, and the same principle applies to recovering merchandise when Checkpoint tags sets off an EAS antenna alarm. Train employees on proper responses to alarms and see how much your clothing security can pay off.
Clothing security is important and we can help you with it. Call 1.770.426.0547 and let’s talk.
You may be considering the important decision to invest in Checkpoint tags to prevent the theft of clothes from your store. If you do decide to take this important step you will certainly make your store more profitable. But did you know that there is more to do once electronic article surveillance antennas are installed and you have placed security tags on clothes? In order to have an effective plan for clothing security you will need to train employees on how to properly respond to alarm activations. I have been involved with Retail Loss Prevention for a long time and I have witnessed positive and negative results from EAS alarms based on how employees respond to those alarms. When a store has an Electronic Article Surveillance (EAS) system installed the company will provide initial training but it is incumbent on the store to conduct ongoing training to its employees. In this article I will be addressing the DO’s and DON’Ts of EAS alarm response when security tags on clothes trigger an alarm.
Let’s begin the discussion with a review of what clothing security tags are and how they work. Checkpoint tags for clothes are designed to be pinned to clothing and only removed with a special detachment key. Any attempt to forcibly remove the tags or pry them off of a garment damages the product and undermines the reason someone would steal the merchandise in the first place. Clothing security tags are designed and built to emit a radio frequency signal that can be picked up by an EAS antenna when carried within the receiving range of the antenna. Once carried into that range or field a tag will cause the antenna to sound an alarm. It is this alarm that employees respond to in order to recover merchandise. There are times when the alarm itself is enough to cause a criminal to drop the item they were going to steal. In many instances it is how effectively an employee responds to the alarm that determines whether merchandise is recovered.
I mentioned that my point in writing this is that there are proper ways to respond to a clothing alarm and there are certainly ways NOT to respond. Employees get initial training when a system is installed and after that it is up to the store owner or supervisors to conduct ongoing training. It is important to train correctly and these are my tips.
DON’Ts to EAS alarm responses:
• Don’t approach the person with an accusatory tone or aggressive stance. Aggressive attitudes tend to elicit a similar response which can escalate a situation.
• Don’t automatically take a person’s bag, purse or backpack from them.
• Don’t accuse someone of trying to steal, even if a receipt check or bag inspection results in recovering merchandise.
• Don’t assume that if garments have Checkpoint tags on them that they have been stolen. The receipt check could reveal the cashier failed to remove clothing security tags.
• Don’t make a scene.
• Don’t stand in front of the person with whom you are interacting. If they are stealing they may stop for an alarm, however if they feel you are finding something they may assume you are going to put them in jail and they may try to run. You could be pushed out of the way, possibly getting injured in the process.
• If you make a recovery due to a clothing alarm, don’t follow the suspect into the parking lot to get a tag number from the car. I have seen people back all the way to the end of a parking lot, endangering other drivers in order to avoid their license plate number being seen.
In part 2 I will be discussing the steps an employee should DO in the event of a clothing alarm. The old saying goes that you attract more flies with honey than vinegar, and the same principle applies to recovering merchandise when Checkpoint tags sets off an EAS antenna alarm. Train employees on proper responses to alarms and see how much your clothing security can pay off.
Clothing security is important and we can help you with it. Call 1.770.426.0547 and let’s talk.
Alpha Thunder Tag-4 WC Blog 216
Checkpoint Classic N10-3
i-pad theft-4
Tablet Theft-4
Mobile Medical Devices Allow Doctors To Visit Patients Online – Those Devices Need To Be Protected With Alpha Thunder Tags Part 1
Have you ever had to go to a doctor’s office and then wait to be seen? It isn’t much fun, especially when it’s your first visit and you have to complete all of the background information, medical history, insurance information, etc. The other day I had to make such a visit to a doctor’s office/clinic for a family member. The one upside was that this was a new facility so we were the only people waiting to be seen except, the television monitor indicated one other patient was being seen “online”. Online?! It was interesting that someone not at the clinic was being seen before us. We finished our paperwork and my family member was called in to see the doctor. The wait wasn’t as long as I am used to from other experiences so I was pleasantly surprised. While I waited in the lobby I was reading some of the literature about this particular medical provider chain. I found that they have on online consultation they can provide to their patients. That would explain the online patient that was ahead of us. The picture they showed on the advertisement had a patient with a tablet and their website information. Now, since I write about mobile medical devices and protecting against i-pad theft and tablet theft using Alpha Thunder Tags, I couldn’t help but have my curiosity piqued. Does this provider use medical tablets or i-pads on their end to conduct online visits? If they do, are they taking precautions to protect those devices from theft?
Facilities that are using mobile medical devices must be careful to protect those devices or they risk compromising patient information. Medical i-pad theft or tablet theft can be prevented if a facility uses an Alpha Thunder Tag on a device and installs Checkpoint Classic N10 antennas on their entrances/exits. The Alpha Thunder Tag is attached to each mobile device with an adhesive backing. The tags are electronic article surveillance ready, and emit a radio frequency signal that can be read by the Checkpoint Classic N10 antenna. If someone tries to steal one of the devices protected with a tag, an alarm in the antenna activates an audible signal and the built in flashing LED lights are set off. Employees from the clinic or hospital can respond to the alarm and recover the stolen goods. The Thunder Tag has a tamper alarm so that if someone decides to try to be clever and remove the tag, the alarm built into the tag activates.
If space for an electronic article surveillance antenna (EAS) in your doorways is a concern, the Checkpoint Classic N10 is the perfect solution. It is designed to take up very little room, fitting comfortably in standard entry ways. Though they do not take up the area that the antennas in large retail stores do, they still provide the same high level detection capabilities. If a tablet theft or i-pad theft is taking place and the device is concealed in a briefcase, purse or in a pocket, the antenna will still detect the Thunder Tag.
So, getting back to my clinic visit, I was intrigued by the advertisement and when I got home, I looked up information on the company’s website. According to their information, a patient only needs to set up an account and they can see a doctor using their phone, tablet or computer. The information did not specify how the doctor “sees” the patient. My inkling is that with a computer, the doctor is somewhat locked into one place for consultations. With a mobile device, they could be moving within the clinic and multitasking. It is even possible that an i-pad or tablet would be the better solution so they can do the consultation and still have the ability to look up medical information using medical apps that are now available to healthcare providers. Of course, this is speculation on my part, but with the growing use of mobile medical devices and the fact this provider seems to be on the cutting edge of technology, I would be surprised if they were not using mobile devices for their service.
It is great that healthcare providers are using the power of technology to improve patient services and cutting down the length of time required to see a doctor. Mobile devices are helping to make great strides in medicine, even to the point that doctors can consult with each other in remote locations. With all these advances, it only makes sense to protect against medical i-pad theft and tablet theft with Alpha Thunder Tags and Classic N10 antennas. Why risk losing a device when security is a phone call away!
Need information on Alpha Thunder Tags? Give us a call at 1.770.426.0547 now.
Have you ever had to go to a doctor’s office and then wait to be seen? It isn’t much fun, especially when it’s your first visit and you have to complete all of the background information, medical history, insurance information, etc. The other day I had to make such a visit to a doctor’s office/clinic for a family member. The one upside was that this was a new facility so we were the only people waiting to be seen except, the television monitor indicated one other patient was being seen “online”. Online?! It was interesting that someone not at the clinic was being seen before us. We finished our paperwork and my family member was called in to see the doctor. The wait wasn’t as long as I am used to from other experiences so I was pleasantly surprised. While I waited in the lobby I was reading some of the literature about this particular medical provider chain. I found that they have on online consultation they can provide to their patients. That would explain the online patient that was ahead of us. The picture they showed on the advertisement had a patient with a tablet and their website information. Now, since I write about mobile medical devices and protecting against i-pad theft and tablet theft using Alpha Thunder Tags, I couldn’t help but have my curiosity piqued. Does this provider use medical tablets or i-pads on their end to conduct online visits? If they do, are they taking precautions to protect those devices from theft?
Facilities that are using mobile medical devices must be careful to protect those devices or they risk compromising patient information. Medical i-pad theft or tablet theft can be prevented if a facility uses an Alpha Thunder Tag on a device and installs Checkpoint Classic N10 antennas on their entrances/exits. The Alpha Thunder Tag is attached to each mobile device with an adhesive backing. The tags are electronic article surveillance ready, and emit a radio frequency signal that can be read by the Checkpoint Classic N10 antenna. If someone tries to steal one of the devices protected with a tag, an alarm in the antenna activates an audible signal and the built in flashing LED lights are set off. Employees from the clinic or hospital can respond to the alarm and recover the stolen goods. The Thunder Tag has a tamper alarm so that if someone decides to try to be clever and remove the tag, the alarm built into the tag activates.
If space for an electronic article surveillance antenna (EAS) in your doorways is a concern, the Checkpoint Classic N10 is the perfect solution. It is designed to take up very little room, fitting comfortably in standard entry ways. Though they do not take up the area that the antennas in large retail stores do, they still provide the same high level detection capabilities. If a tablet theft or i-pad theft is taking place and the device is concealed in a briefcase, purse or in a pocket, the antenna will still detect the Thunder Tag.
So, getting back to my clinic visit, I was intrigued by the advertisement and when I got home, I looked up information on the company’s website. According to their information, a patient only needs to set up an account and they can see a doctor using their phone, tablet or computer. The information did not specify how the doctor “sees” the patient. My inkling is that with a computer, the doctor is somewhat locked into one place for consultations. With a mobile device, they could be moving within the clinic and multitasking. It is even possible that an i-pad or tablet would be the better solution so they can do the consultation and still have the ability to look up medical information using medical apps that are now available to healthcare providers. Of course, this is speculation on my part, but with the growing use of mobile medical devices and the fact this provider seems to be on the cutting edge of technology, I would be surprised if they were not using mobile devices for their service.
It is great that healthcare providers are using the power of technology to improve patient services and cutting down the length of time required to see a doctor. Mobile devices are helping to make great strides in medicine, even to the point that doctors can consult with each other in remote locations. With all these advances, it only makes sense to protect against medical i-pad theft and tablet theft with Alpha Thunder Tags and Classic N10 antennas. Why risk losing a device when security is a phone call away!
Need information on Alpha Thunder Tags? Give us a call at 1.770.426.0547 now.
JM Blog 11 Alpha Hard Tags
Key words KW – Alpha Ink Tag 5
KW- Prevent Shoplifting 5
Alpha Ink Tags; Remove The Reward And Reduce The Risk
To prevent shoplifting retail operators, must see the full scope of why shoplifting occurs. This quest to understand, to know, why a problem exists is the only path to truly ending a problem. We cannot afford to invest in programs and expend energy targeting issues we cannot impact or ones that are not the real problem. We live in a system where the risks and costs of being caught stealing carries little in the way of real consequence and the potential rewards of theft far outweigh what little impact the system does have. In to this place comes the Alpha Ink Tag and with it a measure of control for the retailer to shift the risk/reward dynamic.
How can an MPS device like an Alpha Ink Tag impact an issue as broad as this? How can the Alpha Ink Tag do anything beyond a normal clothing tag to prevent shoplifting? It does it by targeting the reward side of the equation. It hits the shoplifter in the one are that the system cannot, right in the pocket.
Those who steal for financial reasons are playing the long game, betting on an unstable enterprise with the full knowledge that at some point they will lose. It’s true, everyone gets caught eventually but they don’t view this in the same way those of us on the right side of the law do. For these shoplifters being caught is a cost of doing business. A cost they don’t care about paying, so long as they have profited enough to cover the expense.
Sadly, this mindset is the same one that good business people use. If every fourth project is a potential failure but the ones before it succeeded and the next one could be a win you roll the dice. Even if you fail you have already paid for that loss with your success. Shoplifting is the same dynamic. Every win creates a cushion that makes taking a loss an acceptable outcome. To prevent shoplifting, we need to hit the thieves in the same place they hit us, the pocketbook.
The Alpha device does just that. The removal of these tags causes a release of ink that ruins the clothing they are attached to. Once the garment is ruined it is worthless to the thief. They took the risk and you ensured that they get no reward. With one single device, you not only work to prevent shoplifting but also make their business model ineffective.
With this single device, you will have targeted both the symptom and the source of the problem. If a shoplifter needs to put themselves at risk of detection by targeting merchandise which you have protected in your store they will think twice. If, after this, they proceed only to have the Alpha Ink Tag destroy their ill-gotten gains, reducing its value to zero, they will quickly find you a poor investment of their time.
Trying to prevent shoplifting will always be a task that is ever changing. Motives and methods are ever evolving. The tools we have combat the thieves, the way we use those tools and our mindset regarding the issue must also change. The Alpha Ink Tag is a single device that covers multiple aspects of the problem while remaining a practical solution. There will always be a need, always be greed and we have to accept that. What we do not have to do is idly sit by while the system allows for the rewards of theft to outweigh the risk. We can’t fix the system but we can tip the scales back in our favor. Protect your merchandise and remove the reward and reduce your risk.
Need information on Alpha Ink Tags? Give us a call at 1.770.426.0547 now
To prevent shoplifting retail operators, must see the full scope of why shoplifting occurs. This quest to understand, to know, why a problem exists is the only path to truly ending a problem. We cannot afford to invest in programs and expend energy targeting issues we cannot impact or ones that are not the real problem. We live in a system where the risks and costs of being caught stealing carries little in the way of real consequence and the potential rewards of theft far outweigh what little impact the system does have. In comes the Alpha Ink Tag and with it a measure of control for the retailer to shift the risk/reward dynamic.
How can an MPS device like an Alpha Ink Tag impact an issue as broad as this? How can the Alpha Ink Tag do anything beyond a normal clothing tag to prevent shoplifting? It does it by targeting the reward side of the equation. It hits the shoplifter in the one are that the system cannot, right in the pocket.
Those who steal for financial reasons are playing the long game, betting on an unstable enterprise with the full knowledge that at some point they will lose. It’s true, everyone gets caught eventually but they don’t view this in the same way those of us on the right side of the law do. For these shoplifters being caught is a cost of doing business. A cost they don’t care about paying, so long as they have profited enough to cover the expense.
Sadly, this mindset is the same one that good business people use. If every fourth project is a potential failure but the ones before it succeeded and the next one could be a win you roll the dice. Even if you fail you have already paid for that loss with your success. Shoplifting is the same dynamic. Every win creates a cushion that makes taking a loss an acceptable outcome. To prevent shoplifting, we need to hit the thieves in the same place they hit us, the pocketbook.
The Alpha device does just that. The removal of these tags causes a release of ink that ruins the clothing they are attached to. Once the garment is ruined it is worthless to the thief. They took the risk and you ensured that they get no reward. With one single device, you not only work to prevent shoplifting but also make their business model ineffective.
With this single device, you will have targeted both the symptom and the source of the problem. If a shoplifter needs to put themselves at risk of detection by targeting merchandise which you have protected in your store they will think twice. If, after this, they proceed only to have the Alpha Ink Tag destroy their ill-gotten gains, reducing its value to zero, they will quickly find you a poor investment of their time.
Trying to prevent shoplifting will always be a task that is ever changing. Motives and methods are ever evolving. The tools we have combat the thieves, the way we use those tools and our mindset regarding the issue must also change. The Alpha Ink Tag is a single device that covers multiple aspects of the problem while remaining a practical solution. There will always be a need, always be greed and we have to accept that. What we do not have to do is idly sit by while the system allows for the rewards of theft to outweigh the risk. We can’t fix the system but we can tip the scales back in our favor. Protect your merchandise and remove the reward and reduce your risk.
Need information on Alpha Ink Tags? Give us a call at 1.770.426.0547 now
According to the Food Marketing Institute (FMI) website, http://www.fmi.org/research-resources/supermarket-facts, Supermarket Sales By Department 2015 (% of total supermarket store sales) 2014 Supermarket Sales of alcoholic beverages amounted to $21,296.639 (millions of dollars) or 4.4% of total grocery store sales. It is interesting to note that according to the 2014-2015 Global Retail Theft Barometer Supermarkets/Grocery Retailers experienced 1.35% stock shortage results. The number one shortage category under “Food and Beverages” was wines and spirits (pg. 55). The GRTB goes on to report that approximately 50% of shortage in Supermarkets/ Grocery retailers is due to dishonest employees and 31% is due to shoplifting (pg. 54). My question to grocery store owners is this, “If 4.4% of your total sales are coming from the sale of alcoholic beverages and your number one category for shortage is from wines and spirits, what in the world are you doing to curb this threat to your business? If you haven’t given it much thought, I would like to suggest considering the use of bottle locks from Alpha Security.
Bottle Locks are locking devices that fit over the tops of wine and liquor bottles. When securely placed on the top of the cap of a bottle the lock cannot be removed safely without the use of a detachment key. This means any attempted theft and tampering with a lock could likely result in a broken bottle. An Alpha bottle lock is also sensitive to electronic article surveillance (EAS) antennas meaning that if a shoplifter tries to sneak a bottle past EAS antennas the antenna alarm will be set off. This warning gives store employees an opportunity to respond to the alarm and recover the merchandise before it is removed from the premises.
As an anti-theft tool, bottle locks impact both internal and external theft. Employees who may have been able to remove merchandise that was not protected by concealing product in bags, purses or under clothing are no longer able to do so without setting off an alarm. If proper procedures are enforced in a store, all alarm activations are treated the same and an inspection will reveal stolen merchandise. Employees and customers are equally subject to package checks and receipt reviews when they are the cause of an EAS antenna alarm. When employees know they are not exempted from scrutiny they tend to curtail dishonest activity. Shoplifters who have hit a store in the past shy away when they notice an EAS system is installed.
Aside from preventing theft an added benefit of using Alpha Security bottle locks on wines and spirits is that the devices are reusable. The locks are placed on products at the store by staff and when a bottle is purchased it goes through the point of sale where the merchandise is rung up and the bottle lock is then removed. Usually a store will have a collection box at the register and the locks are gathered for placement on new product as it is received. Stores are not required to continually purchase new anti-theft devices, making this an economical means of protecting a business. For those business owners who are concerned with environmental issues, the ability to recycle and reuse bottle locks is something to consider. Alpha Security anti-theft products are designed to be used over and over again so that a business doesn’t have to purchase new replacements.
If you sell wine or spirits in your grocery store and almost 4.5% of your sales come from this product line it is important to protect merchandise. Using a bottle lock on each of your bottles is important, especially when this is the number one stolen item in grocery stores.
Need information on bottle locks? Give us a call at 1.770.426.0547 now.