Employee Background Checks: 5
Pre-Employment Screening: 4
Background Checks; Are They Important To Your Business?
I have been a member of the law enforcement community for over 15 years. My career started as a police officer for the USAF. I served 8 years as a police officer, or Security Police as they call it, and held a myriad of duties throughout my enlistment. One of those jobs was in personnel security, which involved the management of security clearances, the military’s version of employee background checks. In the military we utilize security clearances as a means to evaluate a person’s background, in order to determine if they can be in a position of trust. This may involve access to classified or sensitive information, or may just involve the need to evaluate their character and trustworthiness, based on the position in which they are assigned. My job was to manage this process by ensuring all personnel were receiving 5 or 10 year periodic reviews as required. It also involved the review of the background questionnaires to ensure accuracy and completeness prior to being submitted. This required that I sit down with each individual and go over their information and required documentation. On one occasion during the review process I came across the section that documented marriages and/or divorces and began reviewing the information. There was an entry showing a marriage, in which the spouses name was documented as: FUK MUK Smith. It showed the marriage only lasted about 3 weeks and occurred in Las Vegas, NV. I found this unusual and asked the applicant if that was their former spouse’s full name, at which time she indicated that it meant “First Name Unknown, Middle Name Unknown.” I have to admit this was a first for me and took a lot of will power not to laugh at the situation. It reminds me of the Carrie Underwood song, “Last Name”, where she describes a drunken Las Vegas wedding, in which she wakes up not knowing her last name. Although this wasn’t a normal occurrence it did help break up the monotony of completing hundreds of background investigations each year.
As a current Manager of Loss Prevention, in the civilian sector, I am tasked with managing our employee background checks and pre-employment screening for our company as well. I take this job very seriously, as I feel that it is very important to screen our employees and mitigate our liability, by rejecting unfavorable candidates. By completing pre-employment screening we are able to identify information that may warrant an unfavorable employment action in advance so we can avoid future problems. Not completing employee background checks opens the company up to future employment issues that can’t be rectified quickly or without large amounts of HR involvement. This can result in possible delays in productivity and negatively impact work performance for an entire division, shift or company as a whole. Tracking and documenting behavior is time consuming, and typically results in additional behavioral issues, that can go on for an extended period of time. Pre-Employment screening also helps to identify individuals who may have violent tendencies. Workplace violence is a serious issue that affects all types of businesses; big or small. Our employees are our biggest asset and require the highest level of protection when it comes to assessing our risk. That is why employee background checks are so important. They allow us to properly evaluate our new hires, and reduce our risk for workplace violence, and other HR related issues.
If you aren’t currently conducting pre-employment screening, I seriously recommend you start. Regardless of whether we are dealing with classified information, or simply doing data entry or working as a cashier at the local supermarket, knowledge is power. Avoid the future personnel issues by pre-screening your employees and ensuring you hire those that best represent your company, and the values you want portrayed to your customers.
Employee Background Checks are important and we can help you with it. Call 1.770.214.0547 and let’s talk.
I have been a member of the law enforcement community for over 15 years. My career started as a police officer for the USAF. I served 8 years as a police officer, or Security Police as they call it, and held a myriad of duties throughout my enlistment. One of those jobs was in personnel security, which involved the management of security clearances, the military’s version of employee background checks. In the military we utilize security clearances as a means to evaluate a person’s background, in order to determine if they can be in a position of trust. This may involve access to classified or sensitive information, or may just involve the need to evaluate their character and trustworthiness, based on the position in which they are assigned. My job was to manage this process by ensuring all personnel were receiving 5 or 10 year periodic reviews as required. It also involved the review of the background questionnaires to ensure accuracy and completeness prior to being submitted. This required that I sit down with each individual and go over their information and required documentation. On one occasion during the review process I came across the section that documented marriages and/or divorces and began reviewing the information. There was an entry showing a marriage, in which the spouses name was documented as: FUK MUK Smith. It showed the marriage only lasted about 3 weeks and occurred in Las Vegas, NV. I found this unusual and asked the applicant if that was their former spouse’s full name, at which time she indicated that it meant “First Name Unknown, Middle Name Unknown.” I have to admit this was a first for me and took a lot of will power not to laugh at the situation. It reminds me of the Carrie Underwood song, “Last Name”, where she describes a drunken Las Vegas wedding, in which she wakes up not knowing her last name. Although this wasn’t a normal occurrence it did help break up the monotony of completing hundreds of background investigations each year.
As a current Manager of Loss Prevention, in the civilian sector, I am tasked with managing our employee background checks and pre-employment screening for our company as well. I take this job very seriously, as I feel that it is very important to screen our employees and mitigate our liability, by rejecting unfavorable candidates. By completing pre-employment screening we are able to identify information that may warrant an unfavorable employment action in advance so we can avoid future problems. Not completing employee background checks opens the company up to future employment issues that can’t be rectified quickly or without large amounts of HR involvement. This can result in possible delays in productivity and negatively impact work performance for an entire division, shift or company as a whole. Tracking and documenting behavior is time consuming, and typically results in additional behavioral issues, that can go on for an extended period of time. Pre-Employment screening also helps to identify individuals who may have violent tendencies. Workplace violence is a serious issue that affects all types of businesses; big or small. Our employees are our biggest asset and require the highest level of protection when it comes to assessing our risk. That is why employee background checks are so important. They allow us to properly evaluate our new hires, and reduce our risk for workplace violence, and other HR related issues.
If you aren’t currently conducting pre-employment screening, I seriously recommend you start. Regardless of whether we are dealing with classified information, or simply doing data entry or working as a cashier at the local supermarket, knowledge is power. Avoid the future personnel issues by pre-screening your employees and ensuring you hire those that best represent your company, and the values you want portrayed to your customers.
Employee Background Checks are important and we can help you with it. Call 1.770.214.0547 and let’s talk.
Can Loss Prevention be free? – 3 WC blog 253
Loss Prevention ROI calculator-4
Free Loss Prevention Calculator-3
The Free Loss Prevention ROI Calculator Shows The Upside Of Investing In Loss Prevention To Bring Down Shortage
I have worked in the retail business for a long time and I have seen the challenges that store managers and owners face in trying to make a profit. Some have tried reducing payroll to save money, stretching the employees as much as possible and pushing for more productivity. Large retailers use different measuring tools to try to assess this measurement. Cashier scorecards, backroom employee diagnostic measures, salesfloor call button response times and customer satisfaction surveys just to name a few. When I worked as a Loss Prevention Officer for one department store, we joked that a competitor store anchoring the other end of the mall was having a poor sales quarter when the Loss Prevention staff was cut. I am aware of one company that has reduced the number of replenishment trucks it sends each week to its stores, but the pallets of freight have been increased for each load sent. My point to all of this is that each time a decision is made or a new strategy is implemented there is an expected Return On Investment. Small businesses have even more difficult decisions to make because they don’t have the financial resources to invest like the big box stores. What if investing in a strategy would pay for itself in the long run and cost nothing, would that entice you to buy in to it? Can Loss Prevention be free? The Loss Prevention ROI Calculator can answer that question and the results may be pleasantly surprising to you.
The Loss Prevention ROI calculator allows a user to enter their annual sales dollars and a dollar amount for the investment they are willing to make in Checkpoint equipment. Based on an estimated shortage rate of 1.2% which is about average for most stores, and an estimated reduction in shrinkage to .65% the calculator shows the estimated number of months it would take for a Checkpoint system to pay for itself. Can Loss Prevention be free? Over time it can be free by the amount of money a store will save in shortage reduction. I also know that any business person worth their salt is also going to want to know what it is going to cost to use the Loss Prevention ROI calculator. Did I mention it is a Free Loss Prevention Calculator? No, I suppose I did fail to mention it. There is absolutely no cost to use the Free Loss Prevention Calculator. Users are welcome to go to the website, enter as many variations and estimates as they want and spend zero dollars to do so. Are you required to enter an email address first, register, sign in, leave a phone contact? There is no risk or follow up, no signing in or signing up, simply go to the site and use the Loss Prevention ROI calculator, no catch. When you see it is worth the investment, there is contact information YOU may use to get additional information.
You may be wondering if investing in Loss Prevention does make a difference. Can it really save you money? Let me give you an example to show it does make a difference. According to the 2014-2015 Global Retail Theft Barometer, in North America Apparel Specialist Retailers reduced spending on Loss Prevention as a % of Total Sales from .39% in 2013-2014 to .24% in 2014-2015 (pg. 57). What happened to their shortage? It increased from .60% in 2013-2014 to 2.28% in 2014-2015 (pg. 52). Investing in Loss Prevention DOES make a difference, the numbers tell the story.
Can Loss Prevention be free? Yes, it can over time. Reduce your shrinkage by purchasing a Checkpoint System. The Free Loss Prevention Calculator is easy to use and will help you see that this is one decision that does not need to be hard to make. The Return On Investment is clear and will improve your bottom line.
The Loss Prevention ROI Calculator is important and we can help you with it. Call 1.770.426.0547 and let’s talk.
I have worked in the retail business for a long time and I have seen the challenges that store managers and owners face in trying to make a profit. Some have tried reducing payroll to save money, stretching the employees as much as possible and pushing for more productivity. Large retailers use different measuring tools to try to assess this measurement. Cashier scorecards, backroom employee diagnostic measures, salesfloor call button response times and customer satisfaction surveys just to name a few. When I worked as a Loss Prevention Officer for one department store, we joked that a competitor store anchoring the other end of the mall was having a poor sales quarter when the Loss Prevention staff was cut. I am aware of one company that has reduced the number of replenishment trucks it sends each week to its stores, but the pallets of freight have been increased for each load sent. My point to all of this is that each time a decision is made or a new strategy is implemented there is an expected Return On Investment. Small businesses have even more difficult decisions to make because they don’t have the financial resources to invest like the big box stores. What if investing in a strategy would pay for itself in the long run and cost nothing, would that entice you to buy in to it? Can Loss Prevention be free? The Loss Prevention ROI Calculator can answer that question and the results may be pleasantly surprising to you.
The Loss Prevention ROI calculator allows a user to enter their annual sales dollars and a dollar amount for the investment they are willing to make in Checkpoint equipment. Based on an estimated shortage rate of 1.2% which is about average for most stores, and an estimated reduction in shrinkage to .65% the calculator shows the estimated number of months it would take for a Checkpoint system to pay for itself. Can Loss Prevention be free? Over time it can be free by the amount of money a store will save in shortage reduction. I also know that any business person worth their salt is also going to want to know what it is going to cost to use the Loss Prevention ROI calculator. Did I mention it is a Free Loss Prevention Calculator? No, I suppose I did fail to mention it. There is absolutely no cost to use the Free Loss Prevention Calculator. Users are welcome to go to the website, enter as many variations and estimates as they want and spend zero dollars to do so. Are you required to enter an email address first, register, sign in, leave a phone contact? There is no risk or follow up, no signing in or signing up, simply go to the site and use the Loss Prevention ROI calculator, no catch. When you see it is worth the investment, there is contact information YOU may use to get additional information.
You may be wondering if investing in Loss Prevention does make a difference. Can it really save you money? Let me give you an example to show it does make a difference. According to the 2014-2015 Global Retail Theft Barometer, in North America Apparel Specialist Retailers reduced spending on Loss Prevention as a % of Total Sales from .39% in 2013-2014 to .24% in 2014-2015 (pg. 57). What happened to their shortage? It increased from .60% in 2013-2014 to 2.28% in 2014-2015 (pg. 52). Investing in Loss Prevention DOES make a difference, the numbers tell the story.
Can Loss Prevention be free? Yes, it can over time. Reduce your shrinkage by purchasing a Checkpoint System. The Free Loss Prevention Calculator is easy to use and will help you see that this is one decision that does not need to be hard to make. The Return On Investment is clear and will improve your bottom line.
The Loss Prevention ROI Calculator is important and we can help you with it. Call 1.770.426.0547 and let’s talk.
AA Blog 48
Bug Tag 2: 5
Tablet theft: 3
I-Pad theft: 3
The Bug Tag 2 Is The Best Way To Prevent The Theft Of Your Computer Devices And The Sensitive Information They Contain.
My daughter was recently in the hospital to do some testing for some stomach issues she has been having. It was her first time ever getting blood work done and her very first ultrasound. She was pretty excited about the ultrasound. She got to see mine when I was pregnant so she was excited to have one of her own. The doctor was really nice and pointed out all of her organs and stuff while she was looking around. My daughter was pretty into it, asking questions and getting an anatomy lesson. Mom wasn’t very excited because I was worried, but luckily they found no issues. While we were there I couldn’t help but notice that all of the nurses and technicians were using tablets to document patient information and testing procedures. I have noticed that this has become common place in today’s society. Our reliance on technology to manage information, increase convenience, and reduce waste has increased exponentially, and in such a short period of time. I remember when I was a kid we didn’t even have cell phones or computers in my home. I don’t think I even really used a computer in school until high school, and yet here we are a couple decades later and they are everywhere. Kids as early as elementary school are using computers on a regular basis and the average 10 year old has the newest smart phone. I do think this has created some negative impacts on society, but I also think it has improved certain areas as well. In the medical field it has streamlined some of the processes, reduced paper use and filing issues and it makes the information readily accessible. There is no delay waiting for the records clerk to push patient files down to the exam room or for retrieving files from other practitioners anymore. Although, it does on the other hand pose a significant security risk. The use of technology requires that the medical office take certain security precautions to protect sensitive patient information, including personal information and health records, in order to avoid litigation. There are various options available to prevent tablet theft and i-Pad theft, this facility was using the Bug tag 2 on their devices.
The Bug tag 2 is a great way to prevent tablet theft. Whether it is in the medical field or a retail setting, this tag offers a convenient and cost-efficient means to protect your property and sensitive information. These tags are easily applied to the computer device with an adhesive, which prevents the tag from being removed. These tags come with a replaceable adhesive sled, which allows you to re-use the tag on multiple devices. The Bug tag 2 is equipped with 2 &3 Alarm technology, which incorporates EAS notification in the event of tampering or theft. These compact tags are very easy to apply and can be placed on any computer device to help prevent tablet theft and i-Pad theft. These devices are an excellent way to protect sensitive patient information in the medical field, but can also be used by any company that has sensitive work product information they need to protect.
I was impressed with the protective measures utilized by this medical facility to ensure my daughter’s health information was secure. As a customer it gave me a real sense of security, and also suggested to me a high level of professionalism and care, which I look for in a hospital. Choosing a health care provider isn’t always a simple task, but knowing they are making a viable effort to prevent i-Pad theft containing my families’ personal information, is reassuring. Regardless of what industry you are in the Bug tag 2 can protect your entire computer related devices and equipment.
The Bug tag 2 is important and we can help you with it. Call 1.770.426.0547 and let’s talk.
My daughter was recently in the hospital to do some testing for some stomach issues she has been having. It was her first time ever getting blood work done and her very first ultrasound. She was pretty excited about the ultrasound. She got to see mine when I was pregnant so she was excited to have one of her own. The doctor was really nice and pointed out all of her organs and stuff while she was looking around. My daughter was pretty into it, asking questions and getting an anatomy lesson. Mom wasn’t very excited because I was worried, but luckily they found no issues. While we were there I couldn’t help but notice that all of the nurses and technicians were using tablets to document patient information and testing procedures. I have noticed that this has become common place in today’s society. Our reliance on technology to manage information, increase convenience, and reduce waste has increased exponentially, and in such a short period of time. I remember when I was a kid we didn’t even have cell phones or computers in my home. I don’t think I even really used a computer in school until high school, and yet here we are a couple decades later and they are everywhere. Kids as early as elementary school are using computers on a regular basis and the average 10 year old has the newest smart phone. I do think this has created some negative impacts on society, but I also think it has improved certain areas as well. In the medical field it has streamlined some of the processes, reduced paper use and filing issues and it makes the information readily accessible. There is no delay waiting for the records clerk to push patient files down to the exam room or for retrieving files from other practitioners anymore. Although, it does on the other hand pose a significant security risk. The use of technology requires that the medical office take certain security precautions to protect sensitive patient information, including personal information and health records, in order to avoid litigation. There are various options available to prevent tablet theft and i-Pad theft, this facility was using the Bug tag 2 on their devices.
The Bug tag 2 is a great way to prevent tablet theft. Whether it is in the medical field or a retail setting, this tag offers a convenient and cost-efficient means to protect your property and sensitive information. These tags are easily applied to the computer device with an adhesive, which prevents the tag from being removed. These tags come with a replaceable adhesive sled, which allows you to re-use the tag on multiple devices. The Bug tag 2 is equipped with 2 &3 Alarm technology, which incorporates EAS notification in the event of tampering or theft. These compact tags are very easy to apply and can be placed on any computer device to help prevent tablet theft and i-Pad theft. These devices are an excellent way to protect sensitive patient information in the medical field, but can also be used by any company that has sensitive work product information they need to protect.
I was impressed with the protective measures utilized by this medical facility to ensure my daughter’s health information was secure. As a customer it gave me a real sense of security, and also suggested to me a high level of professionalism and care, which I look for in a hospital. Choosing a health care provider isn’t always a simple task, but knowing they are making a viable effort to prevent i-Pad theft containing my families’ personal information, is reassuring. Regardless of what industry you are in the Bug tag 2 can protect your entire computer related devices and equipment.
The Bug tag 2 is important and we can help you with it. Call 1.770.426.0547 and let’s talk.