Who Are The People In Your Office Space? Background Checks Can Ease Employee Concerns

 

Pre-employment Screening- 4                                                                                                  WC blog 59
Background Checks-4
Who Are The People In Your Office Space?  Background Checks Can Ease Employee Concerns
     I remember a certain children’s show when I was little that I loved.  It had puppets and people interacting and having fun.  It had educational lessons, I learned about counting from a friendly vampire and episodes were “brought to you by the letter (you fill in the blank)…” .  There was catchy music that caught my attention too, one song was about “rubber ducky” and the other was about “Who are the people in your neighborhood?”  As I have grown over the years, I still recall these memories, but I have changed the words to the “Who are the people in your neighborhood song” to fit my time as a Loss Prevention Manager.  My version goes something like, “A criminal is a person in your company, in your company, in your c-o-m-p-a-n-y, oh a criminal is a person in your company, a person that you meet each day!”  I changed the words to fit my day so sometimes it was a criminal employee and other times a shoplifter.  However I re-worded the song, it always made me laugh.  I kind of do that to myself, much to the chagrin of my wife (she does not think I am as funny as I think I am).  While this is funny to me, there is an element of truth to it.  Who ARE the people in your company?  Who is that person sharing an office space with their co-workers?  Did you conduct a pre-employment screening of your staff members before bringing them on board?  If so, how thorough was that screening or background check?  If not, you need to ask yourself what you really know about that person.
     I know what you are thinking, “I don’t need to have anyone do background checks on my employees, I called their references before I hired them”.  I have a couple of concerns I would like to point out about this strategy.  First, if the reference was a former employer most employers today can only confirm if an employee worked for them and what dates they worked there. They may tell you if the employee is rehireable or not.  In order to avoid legal issues most employers will not discuss the quality of the employees work or workplace issues they may have had while employed.  All you are left with is a very innocuous report that tells you little about your prospective new hire.  Are the references you called personal references?  OK, let’s be serious for a moment, are the personal references you have on your resume people that may not like you or have worked with you and would not have good things to say?  How are you sure you aren’t calling the prospective employee’s mom (not too many mom’s out there are going to bad-mouth their kid)?  An employee background check done professionally will uncover criminal history, verify school or education information, and validate employment history and addresses.    A pre-employment screening may also be used to get driving record information if the employee would be in the position to have to drive a company vehicle or even use their own car in the execution of their job responsibilities.  
     If you still aren’t convinced of the need for pre-employment screening, let me share one case in which an employer is involved in a lawsuit, in part, for failing to conduct a background check that resulted in one employee injuring another.  From an article in Littler.com, by Jennifer Mora, September 16, 2015, “State Appellate Court Considers Employer’s Duty to Conduct Criminal Background Checks”, the writer reports on a case in which a temporary staffing agency placed a plaintiff in a supervisory position at a rice mill and he was assaulted one night by another worker who had been hired by the staffing agency who had become insubordinate and assaulted the plaintiff.  The plaintiff suffered damage to his teeth and shoulder.  The article goes on to say that the allegation against the staffing agency is that they failed to conduct a background check on the assaulting employee.  The assaulting employee stated in pre-employment paperwork he had never been convicted of a felony, but his criminal record reflected prior misdemeanor convictions which included assault.
     By conducting employee background checks you don’t have to wonder, “Who is the person in your neighborhood?”  Sing another tune like, “Happy days are here again”.  Keep your workplace safe and avoid possible legal problems.  Look into the benefits of background checks.
For more information on background checks, contact us or call 1.770.426.0547   

I remember a certain children’s show when I was little that I loved. It had puppets and people interacting and having fun.  It had educational lessons, I learned about counting from a friendly vampire and episodes were “brought to you by the letter (you fill in the blank)…” . There was catchy music that caught my attention too, one song was about “rubber ducky” and the other was about “Who are the people in your neighborhood?” As I have grown over the years, I still recall these memories, but I have changed the words to the “Who are the people in your neighborhood song” to fit my time as a Loss Prevention Manager. My version goes something like, “A criminal is a person in your company, in your company, in your c-o-m-p-a-n-y, oh a criminal is a person in your company, a person that you meet each day!”  I changed the words to fit my day so sometimes it was a criminal employee and other times a shoplifter. However I re-worded the song, it always made me laugh. I kind of do that to myself, much to the chagrin of my wife (she does not think I am as funny as I think I am).  While this is funny to me, there is an element of truth to it. Who ARE the people in your company? Who is that person sharing an office space with their co-workers?  Did you conduct a pre-employment screening of your staff members before bringing them on board? If so, how thorough was that screening or background check? If not, you need to ask yourself what you really know about that person.

I know what you are thinking, “I don’t need to have anyone do background checks on my employees, I called their references before I hired them”. I have a couple of concerns I would like to point out about this strategy. First, if the reference was a former employer most employers today can only confirm if an employee worked for them and what dates they worked there.They may tell you if the employee is rehireable or not. In order to avoid legal issues most employers will not discuss the quality of the employees work or workplace issues they may have had while employed. All you are left with is a very innocuous report that tells you little about your prospective new hire. Are the references you called personal references? OK, let’s be serious for a moment, are the personal references you have on your resume people that may not like you or have worked with you and would not have good things to say? How are you sure you aren’t calling the prospective employee’s mom (not too many mom’s out there are going to bad-mouth their kid)? An employee background check done professionally will uncover criminal history, verify school or education information, and validate employment history and addresses. A pre-employment screening may also be used to get driving record information if the employee would be in the position to have to drive a company vehicle or even use their own car in the execution of their job responsibilities.  

 

If you still aren’t convinced of the need for pre-employment screening, let me share one case in which an employer is involved in a lawsuit, in part, for failing to conduct a background check that resulted in one employee injuring another. From an article in Littler.com, by Jennifer Mora, September 16, 2015, “State Appellate Court Considers Employer’s Duty to Conduct Criminal Background Checks”, the writer reports on a case in which a temporary staffing agency placed a plaintiff in a supervisory position at a rice mill and he was assaulted one night by another worker who had been hired by the staffing agency who had become insubordinate and assaulted the plaintiff. The plaintiff suffered damage to his teeth and shoulder. The article goes on to say that the allegation against the staffing agency is that they failed to conduct a background check on the assaulting employee. The assaulting employee stated in pre-employment paperwork he had never been convicted of a felony, but his criminal record reflected prior misdemeanor convictions which included assault.

 

By conducting employee background checks you don’t have to wonder, “Who is the person in your neighborhood?” Sing another tune like, “Happy days are here again”. Keep your workplace safe and avoid possible legal problems. Look into the benefits of background checks.

 

For more information on background checks, contact us or call 1.770.426.0547   

 

 

Alpha Thunder Tags Minimize Opportunity For Medical Mobile Device Theft

 

Alpha Thunder Tags-5                                                                                                                    WC blog 58
i-pad theft-4
Tablet theft-4
Alpha Thunder Tags Minimize Opportunity For Medical Mobile Device Theft
2012 – 6 laptops and tablet devices stolen from Northwestern Memorial Hospital’s Home Hospice offices. (Reported in Healthcare- Informatics.com, July 27, 2012 article by Gabriel Perna) 
2013 – Four computers stolen in a July 15 burglary of an administrative building of Advocate Medical Group (Chicago Tribune, August 24, 2013, Peter Frost and Julie Wernau) 
2014 – Nearly 20 tablet computers reported stolen from Medical Transporter of Georgia (wmcactionnews5.com Dec 02, 2014)
2014 – Laptop reported missing from Riverside County Regional Medical Center contained information on 563 patients (scmagazine.com, June 25, 2014, Adam Greenberg, Senior Reporter)
2015 – “Laptop stolen from a member of the faculty of LSU Health New Orleans School of Medicine has potentially exposed the protected health information of approximately 5,000 minor patients…” (The Clarion-Ledger, September 15, 2015) 
Tablet theft, i-pad theft and even laptop theft is a real issue for medical providers.  You may operate a medical transport company, doctor’s office or dental clinic it doesn’t matter, if you use mobile devices you have a risk of theft. Some of the cases I have listed were due to break-ins, but others were incidents of theft.  This article is about how the use of Alpha Thunder Tags and common sense steps on a daily basis can prevent your devices from leaving the building and creating a security risk.
     Many businesses and offices associated with medicine and patient information are becoming more reliant on mobile devices for conducting business. Doctors and nurses are accessing patient information, looking up prescription information even consulting with other medical providers on treatments and procedures.  The concern that needs to be addressed is what happens to the device during a consultation or patient interaction.  How do you prevent in i-pad theft or laptop theft from taking place when someone has put down a device for a consultation or client interaction? If the office devices are secured with Alpha Thunder Tags a thief who picks one up and attempts to leave the building will trigger an alarm.  The tag works with acoustic magnetic (AM) or radio frequency (RF) technology that will activate electronic article surveillance (EAS) antennas placed in doorways or entrance/exits to buildings.  This assumes that a facility has EAS antennas installed in the building.  If EAS antennas are not set up, a company, such as Checkpoint, offers a number of different antenna solutions that can be installed in office areas to provide a secure environment.  If someone were to try to exit with a device and a Thunder Tag is on it, the tag has a built in annunciator that will sound and the antenna will also sound.  The antennas also have built in LED lights that flash and alert staff of an unauthorized breach.  To further protect against tablet theft, the Alpha Thunder Tag also has a tamper alarm that will sound if someone were to try to remove the tag from the mobile device.
     If you are wondering whether the investment in an EAS system is worth the expense simply to install Alpha Thunder Tags to prevent i-pad theft or tablet theft, I would like to pose this question to you, what will the cost be to your business or practice if one of your devices is stolen?  Not only will your business be liable to all the potential clients who had their information compromised, you will also be subject to enormous fines from the Department of Health and Human Services.  Depending on the findings and number of patient records stolen, I have seen fines range from hundreds of thousands of dollars into the millions of dollars.
     I mentioned at the beginning of this article I would share a few other ideas that can be implemented to help prevent i-pad theft or tablet theft.  Devices that are not being used should be stored in a room that is inaccessible to the public.  Devices need to charge, so this is the place where the charging station should be located.  If the business has an after- hours cleaning service, a locking cabinet should be used for storing devices.  Engrave all devices with a serial number or identification number.  Labels with serial numbers can be removed, engraved markings are much more difficult and leave visible signs indicating information was covered over or erased.  Require a user to sign in with a name or employee number and individual password so you know who last had a device.
     Mobile technology offers so many advantages over the old paper files and even over the desktop computer.  Faster access to information, accuracy and even improved patient care are some of the improvements mobile devices offer.  They also have risks.  Minimize those risks with Alpha Thunder Tags.
For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547
          

2012 – 6 laptops and tablet devices stolen from Northwestern Memorial Hospital’s Home Hospice offices. (Reported in Healthcare- Informatics.com, July 27, 2012 article by Gabriel Perna) 

2013 – Four computers stolen in a July 15 burglary of an administrative building of Advocate Medical Group (Chicago Tribune, August 24, 2013, Peter Frost and Julie Wernau) 

2014 – Nearly 20 tablet computers reported stolen from Medical Transporter of Georgia (wmcactionnews5.com Dec 02, 2014)

2014 – Laptop reported missing from Riverside County Regional Medical Center contained information on 563 patients (scmagazine.com, June 25, 2014, Adam Greenberg, Senior Reporter)

2015 – “Laptop stolen from a member of the faculty of LSU Health New Orleans School of Medicine has potentially exposed the protected health information of approximately 5,000 minor patients…” (The Clarion-Ledger, September 15, 2015) 

 

Tablet theft, i-pad theft and even laptop theft is a real issue for medical providers. You may operate a medical transport company, doctor’s office or dental clinic it doesn’t matter, if you use mobile devices you have a risk of theft. Some of the cases I have listed were due to break-ins, but others were incidents of theft. This article is about how the use of Alpha Thunder Tags and common sense steps on a daily basis can prevent your devices from leaving the building and creating a security risk.

Many businesses and offices associated with medicine and patient information are becoming more reliant on mobile devices for conducting business. Doctors and nurses are accessing patient information, looking up prescription information even consulting with other medical providers on treatments and procedures. The concern that needs to be addressed is what happens to the device during a consultation or patient interaction. How do you prevent i-pad theft or laptop theft from taking place when someone has put down a device for a consultation or client interaction? If the office devices are secured with Alpha Thunder Tags a thief who picks one up and attempts to leave the building will trigger an alarm. The tag works with acoustic magnetic (AM) or radio frequency (RF) technology that will activate electronic article surveillance (EAS) antennas placed in doorways or entrance/exits to buildings.  This assumes that a facility has EAS antennas installed in the building.  If EAS antennas are not set up, a company, such as Checkpoint, offers a number of different antenna solutions that can be installed in office areas to provide a secure environment. If someone were to try to exit with a device and a Thunder Tag is on it, the tag has a built in annunciator that will sound and the antenna will also sound. The antennas also have built in LED lights that flash and alert staff of an unauthorized breach. To further protect against tablet theft, the Alpha Thunder Tag also has a tamper alarm that will sound if someone were to try to remove the tag from the mobile device.

If you are wondering whether the investment in an EAS system is worth the expense simply to install Alpha Thunder Tags to prevent i-pad theft or tablet theft, I would like to pose this question to you, what will the cost be to your business or practice if one of your devices is stolen? Not only will your business be liable to all the potential clients who had their information compromised, you will also be subject to enormous fines from the Department of Health and Human Services. Depending on the findings and number of patient records stolen, I have seen fines range from hundreds of thousands of dollars into the millions of dollars.

I mentioned at the beginning of this article I would share a few other ideas that can be implemented to help prevent i-pad theft or tablet theft. Devices that are not being used should be stored in a room that is inaccessible to the public. Devices need to charge, so this is the place where the charging station should be located. If the business has an after- hours cleaning service, a locking cabinet should be used for storing devices. Engrave all devices with a serial number or identification number. Labels with serial numbers can be removed, engraved markings are much more difficult and leave visible signs indicating information was covered over or erased. Require a user to sign in with a name or employee number and individual password so you know who last had a device.

Mobile technology offers so many advantages over the old paper files and even over the desktop computer. Faster access to information, accuracy and even improved patient care are some of the improvements mobile devices offer. They also have risks. Minimize those risks with Alpha Thunder Tags.

 

For more information on Alpha Thunder Tags, contact us or call 1.770.426.0547

          

 

Checkpoint Labels Do More Than Deter Theft

 

(Checkpoint labels-4)
Checkpoint Labels Do More Than Deter Theft
Walking the line between shrinkage control and customer satisfaction is one of the most difficult tasks as a retailer, luckily Checkpoint labels offer the perfect solution to keeping your loss under control, while also not inconveniencing customers and remaining easy to use. In the world of retail loss prevention, reducing shrinkage is far and away the primary focus. I’ve seen it numerous times; loss prevention teams risking liability by not following company policy-and even worse; store management and loss prevention teams disregarding customer satisfaction to deter theft. The fact is, your company lives off of your honest customers and your employees. Thieves must be dealt with while maintaining your return customers and efficiently utilizing your staff. 
It is well known that Electronic Article Surveillance (EAS) alarms put a dent in shoplifting for retailers both large and small, however, when operating or managing a smaller retail store without a full-time, trained loss prevention staff, losses can be harder to manage. For example: it’s not hard for a smaller retailer to identify what merchandise they are losing, but it can be difficult to identify how the merchandise is exiting the store unpaid and how to stop it. Coming up with the time, training, hiring and payroll to investigate shrinkage in-depth is simply not doable for all companies. Checkpoint labels can alleviate the stress that comes with the shrink in a number of ways. The labels can easily be applied by store associates or managers to virtually any type of item, and once applied, will bring the loss of those items down dramatically- regardless of how they are leaving the store. It’s never a nice subject to think about for store management teams, but trusted associates do steal. Period. I have caught, interviewed and charged many veteran sales associates with theft and the rationalizations for why they do it are endless. I have heard every excuse ranging from low blood-sugar to simply trying to see if they could get away with it. The fact is, employees you trust are capable of acting in a way that you wouldn’t expect, and labeling your high-loss merchandise will not only prevent and deter the theft, but may also shine light on how your losses are occurring. 
Keeping your customers coming back through your doors, past your EAS alarm, is just as valuable as locating and terminating your sources of merchandise loss. Labeling merchandise keeps you ahead of the curve in this regard. Non-disruptive, inconspicuous labels do not cover important data on merchandise and are easily deactivated at the point of sale, which is very important, because when trying to keep your honest customers returning to your store, it is best not to humiliate them. Genuine Checkpoint labels will not reactivate after your customer has left the store, or worse, left the register and is headed for the door. Many of us have been in situations where the EAS alarm will go off as we exit a store, and it is often due to the oversight of an employee that did not remove a tag from an article. These situations are bound to happen and are typically very forgivable, but if an honest customer is consistently setting off the EAS alarm, they may not be a customer for much longer. This is a reason to steer-clear of cheap off-brand labels, they are huge culprits of reactivation, even moments after being de-activated. 
You don’t have to sacrifice time, money, customers and profits to keep your merchandise in your store. 
For more information Checkpoint labels, contact us or call 1.770.426.0547

Walking the line between shrinkage control and customer satisfaction is one of the most difficult tasks as a retailer, luckily Checkpoint labels offer the perfect solution to keeping your loss under control, while also not inconveniencing customers and remaining easy to use. In the world of retail loss prevention, reducing shrinkage is far and away the primary focus. I’ve seen it numerous times; loss prevention teams risking liability by not following company policy-and even worse; store management and loss prevention teams disregarding customer satisfaction to deter theft. The fact is, your company lives off of your honest customers and your employees. Thieves must be dealt with while maintaining your return customers and efficiently utilizing your staff. 

 

It is well known that Electronic Article Surveillance (EAS) alarms put a dent in shoplifting for retailers both large and small, however, when operating or managing a smaller retail store without a full-time, trained loss prevention staff, losses can be harder to manage. For example: it’s not hard for a smaller retailer to identify what merchandise they are losing, but it can be difficult to identify how the merchandise is exiting the store unpaid and how to stop it. Coming up with the time, training, hiring and payroll to investigate shrinkage in-depth is simply not doable for all companies. Checkpoint labels can alleviate the stress that comes with the shrink in a number of ways. The labels can easily be applied by store associates or managers to virtually any type of item, and once applied, will bring the loss of those items down dramatically- regardless of how they are leaving the store. It’s never a nice subject to think about for store management teams, but trusted associates do steal. Period. I have caught, interviewed and charged many veteran sales associates with theft and the rationalizations for why they do it are endless. I have heard every excuse ranging from low blood-sugar to simply trying to see if they could get away with it. The fact is, employees you trust are capable of acting in a way that you wouldn’t expect, and labeling your high-loss merchandise will not only prevent and deter the theft, but may also shine light on how your losses are occurring. 

 

Keeping your customers coming back through your doors, past your EAS alarm, is just as valuable as locating and terminating your sources of merchandise loss. Labeling merchandise keeps you ahead of the curve in this regard. Non-disruptive, inconspicuous labels do not cover important data on merchandise and are easily deactivated at the point of sale, which is very important, because when trying to keep your honest customers returning to your store, it is best not to humiliate them. Genuine Checkpoint labels will not reactivate after your customer has left the store, or worse, left the register and is headed for the door. Many of us have been in situations where the EAS alarm will go off as we exit a store, and it is often due to the oversight of an employee that did not remove a tag from an article. These situations are bound to happen and are typically very forgivable, but if an honest customer is consistently setting off the EAS alarm, they may not be a customer for much longer. This is a reason to steer-clear of cheap off-brand labels, they are huge culprits of reactivation, even moments after being de-activated. 
You don’t have to sacrifice time, money, customers and profits to keep your merchandise in your store. 

 

For more information Checkpoint labels, contact us or call 1.770.426.0547

 

 

Alpha Shark Tags: Stopping Policy-Abusing Customers In Their Tracks

 

JH Blog 05
(Alpha Shark Tag-5, Wardrobing-3)
Alpha Shark Tags: Stopping Policy-Abusing Customers In Their Tracks
If you work in retail, whether it be as a sales associate, manager, or member of Loss Prevention, you have dealt with bad customers. Personally, I have dealt with countless customers who attempt to abuse the lenience of our store’s return policy. The most common type of policy-abusing customer is the one who buys one or more expensive items, wears it as much as they feel they can get away with, and then returns it for a full refund, essentially turning the business you work hard to operate into a free-of-charge clothing rental store. This practice is well known throughout retail and is called “wardrobing”. Fortunately, there is a simple, cheap, and effective solution to this problem: Alpha Shark Tags.
Every store has a different way of dealing with wardrobing customers. Some store policies are able to easily deny a customer return with minimal evidence of wear or usage. This seems like a simple solution to the problem, but the consequences of frequently denying customer returns can quickly drive away honest customers who are not actually trying to abuse your policies. More commonly, stores will gladly accept merchandise for return as long as it is not heavily soiled or obviously damaged or worn. I am a Loss Prevention Manager at a high-end retail department store and our store’s return policy is about as lenient as you can possibly get, and stopping customers from abusing our lenient policy requires numerous documented infractions. Just recently we collected enough documentation to place return restrictions on a prolific wardrobing customer. After looking through all of the bad returns this customer had performed over the past few years, we determined our loss from taking returns of non-re-sellable merchandise was over $4,000.00. Had we implemented the use of the Alpha Shark Tag, we could have spared ourselves the losses.
The Alpha Shark Tag is an incredibly effective security device, especially when considering how easy it is to use. The tag is inexpensive and easily secures to merchandise. Once attached to your most popular bad-return items, the tag provides a reliable way to stop taking losses on returns. The tag remains on the item even after the customer leaves the point of sale. Once the customer gets home, they can then choose to easily remove the tag with a pair of scissors. There really is no excuse for a customer to bring back an item without the tag still attached once they have been informed that your return policy dictates the tag must still be on the item. Simply stating that the store’s sale tickets and paper tags must remain on the merchandise in order to return it is not good enough. I frequently get items returned that have had the tags obviously re-attached, and others that are very skillfully reattached that are harder for a sales associate to spot. The Alpha Shark Tag is impossible for the professional policy abuser to reattach.
Another benefit of the tag that may be overlooked is the fantastic theft deterrence that it offers. The bright red color and sleek design will quickly turn away any casual shoplifter while not bothering your honest customers. In my experience, thieves are looking for the fast and easy grab, and even if they are just scoping out your store, seeing tagged merchandise will make them reconsider. Applying the tags will also quickly send your return-policy abusing customers out the door looking for a store that is not protected from their bad habits.
Put an end to your losses from your bad customers and keep the honest ones coming in. You aren’t operating a free clothing rental.
For more information on Alpha Shark Tags, contact us or call 1.770.426.0547.

If you work in retail, whether it be as a sales associate, manager, or member of Loss Prevention, you have dealt with bad customers. Personally, I have dealt with countless customers who attempt to abuse the lenience of our store’s return policy. The most common type of policy-abusing customer is the one who buys one or more expensive items, wears it as much as they feel they can get away with, and then returns it for a full refund, essentially turning the business you work hard to operate into a free-of-charge clothing rental store. This practice is well known throughout retail and is called “wardrobing”. Fortunately, there is a simple, cheap, and effective solution to this problem: Alpha Shark Tags.

 

Every store has a different way of dealing with wardrobing customers. Some store policies are able to easily deny a customer return with minimal evidence of wear or usage. This seems like a simple solution to the problem, but the consequences of frequently denying customer returns can quickly drive away honest customers who are not actually trying to abuse your policies. More commonly, stores will gladly accept merchandise for return as long as it is not heavily soiled or obviously damaged or worn. I am a Loss Prevention Manager at a high-end retail department store and our store’s return policy is about as lenient as you can possibly get, and stopping customers from abusing our lenient policy requires numerous documented infractions. Just recently we collected enough documentation to place return restrictions on a prolific wardrobing customer. After looking through all of the bad returns this customer had performed over the past few years, we determined our loss from taking returns of non-re-sellable merchandise was over $4,000.00. Had we implemented the use of the Alpha Shark Tag, we could have spared ourselves the losses.

 

The Alpha Shark Tag is an incredibly effective security device, especially when considering how easy it is to use. The tag is inexpensive and easily secures to merchandise. Once attached to your most popular bad-return items, the tag provides a reliable way to stop taking losses on returns. The tag remains on the item even after the customer leaves the point of sale. Once the customer gets home, they can then choose to easily remove the tag with a pair of scissors. There really is no excuse for a customer to bring back an item without the tag still attached once they have been informed that your return policy dictates the tag must still be on the item. Simply stating that the store’s sale tickets and paper tags must remain on the merchandise in order to return it is not good enough. I frequently get items returned that have had the tags obviously re-attached, and others that are very skillfully reattached that are harder for a sales associate to spot. The Alpha Shark Tag is impossible for the professional policy abuser to reattach.

 

Another benefit of the tag that may be overlooked is the fantastic theft deterrence that it offers. The bright red color and sleek design will quickly turn away any casual shoplifter while not bothering your honest customers. In my experience, thieves are looking for the fast and easy grab, and even if they are just scoping out your store, seeing tagged merchandise will make them reconsider. Applying the tags will also quickly send your return-policy abusing customers out the door looking for a store that is not protected from their bad habits.

 

Put an end to your losses from your bad customers and keep the honest ones coming in. You aren’t operating a free clothing rental.

 

For more information on Alpha Shark Tags, contact us or call 1.770.426.0547.

 

 

Time To Put A Lid On Grocery Store Shortage With Bottle Locks

 

Bottle Security-4                                                                                                                       WC blog 47
Bottle Locks-5
Alpha Security-3
Time To Put A Lid On Grocery Store Shortage With Bottle Locks
     I have been spending quite a bit of time reading through the 2014-2015 Global Retail Theft Barometer (GRTB).  One of the findings that I found interesting was that, “… within respective categories, items such as footwear, mobile device accessories, wines and spirits, and fragrances were some of the most stolen items.”   Within the “Food and Beverages” division wines and spirits ranked as the top most stolen items.  (2014-2015 GRTB pg. 55).  If you are a business owner with stores selling wines and/or spirits, you can take steps to protect your merchandise by using bottle security devices.  In this article, I would like to review some of the causes for wine and spirit theft and how shrinkage in this category can be dramatically reduced.
     Generally there are four causes for retail shortage, employee theft, shoplifting, vendor shortage and administrative and non-crime loss.  According to the GRTB, supermarkets and grocery retailers in North America reported that 20% of their shortage was due to vendor/supplier fraud and administrative and non-crime losses.  This left 50% of shrinkage being due to employee theft and 31% is reported as shoplifting (pg. 54).  If 80-81% of a grocery retailer’s losses are due to theft and the top category is wine and spirits, then it is reasonable to assume that protection of this line of products will add profit to your bottom line.  Bottle security is as easy as securing wines and spirits with bottle locks.  These devices come in a number of different styles, from locks that fit around the collar of a bottle, to those that secure over the entire cap.  Alpha security bottle locks are available with radio frequency (rf) or acoustic magnetic (am) alarms to work with electronic article surveillance antennas.  
     The bottle locks work because they fit over the cap or around the collar of the bottle and prevent someone from tampering with the cap and opening the bottle.  If someone were to steal the bottle and successfully exit the store with it, once they were to attempt to open it, there is a strong probability they will break the bottle.  Bottle security is enhanced because the bottle locks provide a visual deterrent to theft.  Shoplifters will tend to shy away from merchandise that is clearly protected against theft.  For the most part, shoplifters are after items that will not pose a great risk to steal.  At this point you may be asking how much of your merchandise would you have to protect to reduce shrink caused by shoplifting.  That is entirely up to you.  The more merchandise you protect, the more you are likely adding to your profit margin.  A key point to remember is that most Alpha Security devices are reusable.  The devices are removed at the point of sale and ready to be placed on new product as you fill your shelves.
     Employee theft is the second part of the equation in reducing wine and spirit shrink.  As mentioned in the first part of this article, employee theft accounts for 50% of shrink in grocery stores/supermarkets.  Access to merchandise and more places in a store to hide dishonest activity makes this threat more difficult to impact.  Using bottle locks on all of your wine and alcohol products, including the merchandise in your stockroom will reduce the chances an employee will bother trying to conceal a bottle and leave the store.  It is imperative that there are tight controls on your detacher keys to ensure a dishonest employee cannot unlock bottles outside of store guidelines and bypass your security measures.  
     Grocery stores may be hampered by high shrinkage as a result of employee theft and shoplifting, but the use of Alpha Security products can help cut those losses.  Since wine and spirits are the top shortage area of grocery stores, implementing bottle security measures will help improve store profitability. 
For more information on bottle locks contact us or call 1.770.426.0547   
     
       

I have been spending quite a bit of time reading through the 2014-2015 Global Retail Theft Barometer (GRTB). One of the findings that I found interesting was that, “… within respective categories, items such as footwear, mobile device accessories, wines and spirits, and fragrances were some of the most stolen items.”  Within the “Food and Beverages” division wines and spirits ranked as the top most stolen items. (2014-2015 GRTB pg. 55). If you are a business owner with stores selling wines and/or spirits, you can take steps to protect your merchandise by using bottle security devices. In this article, I would like to review some of the causes for wine and spirit theft and how shrinkage in this category can be dramatically reduced.

 

Generally there are four causes for retail shortage, employee theft, shoplifting, vendor shortage and administrative and non-crime loss. According to the GRTB, supermarkets and grocery retailers in North America reported that 20% of their shortage was due to vendor/supplier fraud and administrative and non-crime losses. This left 50% of shrinkage being due to employee theft and 31% is reported as shoplifting (pg. 54). If 80-81% of a grocery retailer’s losses are due to theft and the top category is wine and spirits, then it is reasonable to assume that protection of this line of products will add profit to your bottom line. Bottle security is as easy as securing wines and spirits with bottle locks. These devices come in a number of different styles, from locks that fit around the collar of a bottle, to those that secure over the entire cap. Alpha security bottle locks are available with radio frequency (rf) or acoustic magnetic (am) alarms to work with electronic article surveillance antennas.  

 

The bottle locks work because they fit over the cap or around the collar of the bottle and prevent someone from tampering with the cap and opening the bottle. If someone were to steal the bottle and successfully exit the store with it, once they were to attempt to open it, there is a strong probability they will break the bottle. Bottle security is enhanced because the bottle locks provide a visual deterrent to theft. Shoplifters will tend to shy away from merchandise that is clearly protected against theft. For the most part, shoplifters are after items that will not pose a great risk to steal. At this point you may be asking how much of your merchandise would you have to protect to reduce shrink caused by shoplifting. That is entirely up to you. The more merchandise you protect, the more you are likely adding to your profit margin. A key point to remember is that most Alpha Security devices are reusable.  The devices are removed at the point of sale and ready to be placed on new product as you fill your shelves.

 

Employee theft is the second part of the equation in reducing wine and spirit shrink. As mentioned in the first part of this article, employee theft accounts for 50% of shrink in grocery stores/supermarkets. Access to merchandise and more places in a store to hide dishonest activity makes this threat more difficult to impact. Using bottle locks on all of your wine and alcohol products, including the merchandise in your stockroom will reduce the chances an employee will bother trying to conceal a bottle and leave the store. It is imperative that there are tight controls on your detacher keys to ensure a dishonest employee cannot unlock bottles outside of store guidelines and bypass your security measures.  

 

Grocery stores may be hampered by high shrinkage as a result of employee theft and shoplifting, but the use of Alpha Security products can help cut those losses. Since wine and spirits are the top shortage area of grocery stores, implementing bottle security measures will help improve store profitability. 

 

For more information on bottle locks, contact us or call 1.770.426.0547