Checkpoint Security Systems Are Key To Your Inventory Control: Part 1

 

Checkpoint Security System-3                                                                                                    WC Blog 263
Checkpoint Systems-3
Checkpoint Tags-5
Checkpoint Labels-4
Stop Shoplifting-3
Checkpoint Security Systems Are Key To Your Inventory Control: Part 1
     Loss Prevention professionals like to throw around the term inventory control whenever we are discussing merchandise shrinkage and how to prevent it.  While the idea of inventory control is valid, there are many facets about it that must be considered when we are making reference to it.  Often, I believe we in Loss Prevention start to discuss tactics to control inventory and we can lose sight of the object of those tactics.  Here is what I mean; inventory control is the ability to accurately know what is coming into your building, knowing where it is in your building, knowing all that transpires with that merchandise (ie; markdowns, buy backs, vendor credits, etc.) and knowing how it leaves the building (via point of sale, vendor returns, chargebacks, etc.).  When you have all that knowledge you have control over inventory.  Implementing strategies to control inventory includes such things as Direct to Store Delivery processing, receipt of vendor credits, building alarm controls, key controls, stockroom access controls and so on.  Each process can make a significant impact on shortage come inventory time.  What I would like to discuss are several strategies a retailer can use to exert more control over their inventory.  The first strategy I want to strongly encourage is to invest in a Checkpoint Security System.  
     By purchasing a Checkpoint Security System you are taking measures to stop shoplifting and you can also deter internal theft and vendor theft as well.  Checkpoint systems include electronic article surveillance (EAS) antennas in a variety of models, Checkpoint tags and Checkpoint labels, deactivation pads and detachment tools for checkout stands. When used together, Checkpoint Tags and Checkpoint Labels are placed on merchandise to stop shoplifting and when shoplifting is attempted, these devices cause the EAS antennas to sound their alarms and alert employees that merchandise is being removed from the store.  Deactivation pads basically “turn off” Checkpoint labels after an item is purchased so the EAS antennas don’t alarm.  Removal tools allow cashiers to take the hard Checkpoint tags off of items as they are purchased.
     Store goods can be protected with soft Checkpoint Labels that can be applied to a variety of different products, from meat soaker pads to blister packed merchandise and even cosmetics.  Hard Checkpoint Tags provide protective solutions for almost any other product carried, including but not limited to clothing, softlines accessories, peg hole protection, the list goes on.  My point is, once merchandise is protected it is hard for anyone to sneak products out of a store.  Not only do Checkpoint tags stop shoplifting but the employee who wants to steal has a difficult time getting past security measures.  I have apprehended dishonest employees who had stolen merchandise that was protected but had to go to significant lengths to try to bypass our Checkpoint Security System.  There are also vendors that will try to steal, taking merchandise out in purses, bags, between empty cartons and Checkpoint Systems detect them too making no distinctions between shoplifters, employees or vendors.
     Where does inventory control begin with tagging?  It begins as soon as merchandise is received.  Arrangements can be made through Checkpoint for vendor source tagging of some items and other merchandise a store will be responsible for tagging.  Tagging products immediately eliminates most opportunities for any type of theft and store owners/managers have exerted control over how that product will leave their building.
     Inventory Control is a simple concept, controlling where your merchandise is or where it is going.  Checkpoint Systems can help ensure your merchandise stays in the store until it goes out through a point of sale and drive up profits.
Need information on Checkpoint Security Systems?  Give us a call at 1.770.426.0547 now.

Loss Prevention professionals like to throw around the term inventory control whenever we are discussing merchandise shrinkage and how to prevent it. While the idea of inventory control is valid, there are many facets about it that must be considered when we are making reference to it. Often, I believe we in Loss Prevention start to discuss tactics to control inventory and we can lose sight of the object of those tactics. Here is what I mean; inventory control is the ability to accurately know what is coming into your building, knowing where it is in your building, knowing all that transpires with that merchandise (ie; markdowns, buy backs, vendor credits, etc.) and knowing how it leaves the building (via point of sale, vendor returns, chargebacks, etc.). When you have all that knowledge you have control over inventory. Implementing strategies to control inventory includes such things as Direct to Store Delivery processing, receipt of vendor credits, building alarm controls, key controls, stockroom access controls and so on. Each process can make a significant impact on shortage come inventory time. What I would like to discuss are several strategies a retailer can use to exert more control over their inventory. The first strategy I want to strongly encourage is to invest in a Checkpoint Security System.  

 

By purchasing a Checkpoint Security System you are taking measures to stop shoplifting and you can also deter internal theft and vendor theft as well. Checkpoint systems include electronic article surveillance (EAS) antennas in a variety of models, Checkpoint tags and Checkpoint labels, deactivation pads and detachment tools for checkout stands. When used together, Checkpoint Tags and Checkpoint Labels are placed on merchandise to stop shoplifting and when shoplifting is attempted, these devices cause the EAS antennas to sound their alarms and alert employees that merchandise is being removed from the store. Deactivation pads basically “turn off” Checkpoint labels after an item is purchased so the EAS antennas don’t alarm. Removal tools allow cashiers to take the hard Checkpoint tags off of items as they are purchased.

 

Store goods can be protected with soft Checkpoint Labels that can be applied to a variety of different products, from meat soaker pads to blister packed merchandise and even cosmetics. Hard Checkpoint Tags provide protective solutions for almost any other product carried, including but not limited to clothing, softlines accessories, peg hole protection, the list goes on. My point is, once merchandise is protected it is hard for anyone to sneak products out of a store. Not only do Checkpoint tags stop shoplifting but the employee who wants to steal has a difficult time getting past security measures. I have apprehended dishonest employees who had stolen merchandise that was protected but had to go to significant lengths to try to bypass our Checkpoint Security System. There are also vendors that will try to steal, taking merchandise out in purses, bags, between empty cartons and Checkpoint Systems detect them too making no distinctions between shoplifters, employees or vendors.

 

Where does inventory control begin with tagging? It begins as soon as merchandise is received. Tagging products immediately eliminates most opportunities for any type of theft and store owners/managers have exerted control over how that product will leave their building.

 

Inventory Control is a simple concept, controlling where your merchandise is or where it is going. Checkpoint Systems can help ensure your merchandise stays in the store until it goes out through a point of sale and drive up profits.

 

Need information on Checkpoint Security Systems? Give us a call at 1.770.426.0547 now.

 

 

Do’s And Don’ts In Responding To A Clothing Alarm Part 1

 

Checkpoint tags-4                                                                                                                       WC blog 237
Clothing alarm-3
Clothing security tags-3
Do’s And Don’ts In Responding To A Clothing Alarm Part 1
     You may be considering the important decision to invest in Checkpoint tags to prevent the theft of clothes from your store.  If you do decide to take this important step you will certainly make your store more profitable. But did you know that there is more to do once electronic article surveillance antennas are installed and you have placed security tags on clothes?  In order to have an effective plan for clothing security you will need to train employees on how to properly respond to alarm activations.  I have been involved with Retail Loss Prevention for a long time and I have witnessed positive and negative results from EAS alarms based on how employees respond to those alarms.  When a store has an Electronic Article Surveillance (EAS) system installed the company will provide initial training but it is incumbent on the store to conduct ongoing training to its employees.  In this article I will be addressing the DO’s and DON’Ts of EAS alarm response when security tags on clothes trigger an alarm.
     Let’s begin the discussion with a review of what clothing security tags are and how they work.  Checkpoint tags for clothes are designed to be pinned to clothing and only removed with a special detachment key.  Any attempt to forcibly remove the tags or pry them off of a garment damages the product and undermines the reason someone would steal the merchandise in the first place.  Clothing security tags are designed and built to emit a radio frequency signal that can be picked up by an EAS antenna when carried within the receiving range of the antenna.  Once carried into that range or field a tag will cause the antenna to sound an alarm.  It is this alarm that employees respond to in order to recover merchandise.  There are times when the alarm itself is enough to cause a criminal to drop the item they were going to steal.  In many instances it is how effectively an employee responds to the alarm that determines whether merchandise is recovered.
     I mentioned that my point in writing this is that there are proper ways to respond to a clothing alarm and there are certainly ways NOT to respond.  Employees get initial training when a system is installed and after that it is up to the store owner or supervisors to conduct ongoing training.  It is important to train correctly and these are my tips.
     DON’Ts to EAS alarm responses:
Don’t approach the person with an accusatory tone or aggressive stance.  Aggressive attitudes tend to elicit a similar response which can escalate a situation.
Don’t automatically take a person’s bag, purse or backpack from them.  
Don’t accuse someone of trying to steal, even if a receipt check or bag inspection results in recovering merchandise.
Don’t assume that if garments have Checkpoint tags on them that they have been stolen.  The receipt check could reveal the cashier failed to remove clothing security tags.
Don’t make a scene.
Don’t stand in front of the person with whom you are interacting.  If they are stealing they may stop for an alarm, however if they feel you are finding something they may assume you are going to put them in jail and they may try to run.  You could be pushed out of the way, possibly getting injured in the process.
If you make a recovery due to a clothing alarm, don’t follow the suspect into the parking lot to get a tag number from the car.  I have seen people back all the way to the end of a parking lot, endangering other drivers in order to avoid their license plate number being seen.
In part 2 I will be discussing the steps an employee should DO in the event of a clothing alarm.  The old saying goes that you attract more flies with honey than vinegar, and the same principle applies to recovering merchandise when Checkpoint tags sets off an EAS antenna alarm.  Train employees on proper responses to alarms and see how much your clothing security can pay off.
Clothing security is important and we can help you with it.  Call 1.770.426.0547 and let’s talk.
    

You may be considering the important decision to invest in Checkpoint tags to prevent the theft of clothes from your store. If you do decide to take this important step you will certainly make your store more profitable. But did you know that there is more to do once electronic article surveillance antennas are installed and you have placed security tags on clothes?  In order to have an effective plan for clothing security you will need to train employees on how to properly respond to alarm activations. I have been involved with Retail Loss Prevention for a long time and I have witnessed positive and negative results from EAS alarms based on how employees respond to those alarms. When a store has an Electronic Article Surveillance (EAS) system installed the company will provide initial training but it is incumbent on the store to conduct ongoing training to its employees.  In this article I will be addressing the DO’s and DON’Ts of EAS alarm response when security tags on clothes trigger an alarm.
     

Let’s begin the discussion with a review of what clothing security tags are and how they work. Checkpoint tags for clothes are designed to be pinned to clothing and only removed with a special detachment key. Any attempt to forcibly remove the tags or pry them off of a garment damages the product and undermines the reason someone would steal the merchandise in the first place. Clothing security tags are designed and built to emit a radio frequency signal that can be picked up by an EAS antenna when carried within the receiving range of the antenna. Once carried into that range or field a tag will cause the antenna to sound an alarm. It is this alarm that employees respond to in order to recover merchandise. There are times when the alarm itself is enough to cause a criminal to drop the item they were going to steal. In many instances it is how effectively an employee responds to the alarm that determines whether merchandise is recovered.
     

I mentioned that my point in writing this is that there are proper ways to respond to a clothing alarm and there are certainly ways NOT to respond. Employees get initial training when a system is installed and after that it is up to the store owner or supervisors to conduct ongoing training.  It is important to train correctly and these are my tips.
     

DON’Ts to EAS alarm responses:

Don’t approach the person with an accusatory tone or aggressive stance.  Aggressive attitudes tend to elicit a similar response which can escalate a situation.

Don’t automatically take a person’s bag, purse or backpack from them.  

Don’t accuse someone of trying to steal, even if a receipt check or bag inspection results in recovering merchandise.

Don’t assume that if garments have Checkpoint tags on them that they have been stolen.  The receipt check could reveal the cashier failed to remove clothing security tags.

Don’t make a scene.

Don’t stand in front of the person with whom you are interacting. If they are stealing they may stop for an alarm, however if they feel you are finding something they may assume you are going to put them in jail and they may try to run. You could be pushed out of the way, possibly getting injured in the process.

If you make a recovery due to a clothing alarm, don’t follow the suspect into the parking lot to get a tag number from the car. I have seen people back all the way to the end of a parking lot, endangering other drivers in order to avoid their license plate number being seen.

 

In part 2 I will be discussing the steps an employee should DO in the event of a clothing alarm. The old saying goes that you attract more flies with honey than vinegar, and the same principle applies to recovering merchandise when Checkpoint tags sets off an EAS antenna alarm. Train employees on proper responses to alarms and see how much your clothing security can pay off.

 

Clothing security is important and we can help you with it. Call 1.770.426.0547 and let’s talk.    

 

 

Mobile Medical Devices Allow Doctors To Visit Patients Online – Those Devices Need To Be Protected With Alpha Thunder Tags Part 1

Alpha Thunder Tag-4                                                                                                                 WC Blog 216
Checkpoint Classic N10-3
i-pad theft-4
Tablet Theft-4
 Mobile Medical Devices Allow Doctors To Visit Patients Online – Those Devices Need To Be Protected With Alpha Thunder Tags Part 1 
     Have you ever had to go to a doctor’s office and then wait to be seen?  It isn’t much fun, especially when it’s your first visit and you have to complete all of the background information, medical history, insurance information, etc.  The other day I had to make such a visit to a doctor’s office/clinic for a family member.  The one upside was that this was a new facility so we were the only people waiting to be seen except, the television monitor indicated one other patient was being seen “online”.  Online?!  It was interesting that someone not at the clinic was being seen before us.  We finished our paperwork and my family member was called in to see the doctor.   The wait wasn’t as long as I am used to from other experiences so I was pleasantly surprised.  While I waited in the lobby I was reading some of the literature about this particular medical provider chain.  I found that they have on online consultation they can provide to their patients.  That would explain the online patient that was ahead of us. The picture they showed on the advertisement had a patient with a tablet and their website information.  Now, since I write about mobile medical devices and protecting against i-pad theft and tablet theft using Alpha Thunder Tags, I couldn’t help but have my curiosity piqued.  Does this provider use medical tablets or i-pads on their end to conduct online visits?  If they do, are they taking precautions to protect those devices from theft?
     Facilities that are using mobile medical devices must be careful to protect those devices or they risk compromising patient information.  Medical i-pad theft or tablet theft can be prevented if a facility uses an Alpha Thunder Tag on a device and installs Checkpoint Classic N10 antennas on their entrances/exits.  The Alpha Thunder Tag is attached to each mobile device with an adhesive backing.  The tags are electronic article surveillance ready, and emit a radio frequency signal that can be read by the Checkpoint Classic N10 antenna.  If someone tries to steal one of the devices protected with a tag, an alarm in the antenna activates an audible signal and the built in flashing LED lights are set off.  Employees from the clinic or hospital can respond to the alarm and recover the stolen goods.  The Thunder Tag has a tamper alarm so that if someone decides to try to be clever and remove the tag, the alarm built into the tag activates.  
     If space for an electronic article surveillance antenna (EAS) in your doorways is a concern, the Checkpoint Classic N10 is the perfect solution.  It is designed to take up very little room, fitting comfortably in standard entry ways.  Though they do not take up the area that the antennas in large retail stores do, they still provide the same high level detection capabilities.  If a tablet theft or i-pad theft is taking place and the device is concealed in a briefcase, purse or in a pocket, the antenna will still detect the Thunder Tag.
     So, getting back to my clinic visit, I was intrigued by the advertisement and when I got home, I looked up information on the company’s website.  According to their information, a patient only needs to set up an account and they can see a doctor using their phone, tablet or computer.  The information did not specify how the doctor “sees” the patient.  My inkling is that with a computer, the doctor is somewhat locked into one place for consultations.  With a mobile device, they could be moving within the clinic and multitasking.  It is even possible that an i-pad or tablet would be the better solution so they can do the consultation and still have the ability to look up medical information using medical apps that are now available to healthcare providers.  Of course, this is speculation on my part, but with the growing use of mobile medical devices and the fact this provider seems to be on the cutting edge of technology, I would be surprised if they were not using mobile devices for their service.
     It is great that healthcare providers are using the power of technology to improve patient services and cutting down the length of time required to see a doctor.  Mobile devices are helping to make great strides in medicine, even to the point that doctors can consult with each other in remote locations.  With all these advances, it only makes sense to protect against medical i-pad theft and tablet theft with Alpha Thunder Tags and Classic N10 antennas.  Why risk losing a device when security is a phone call away!
Need information on Alpha Thunder Tags?  Give us a call at 1.770.426.0547 now.
     

Have you ever had to go to a doctor’s office and then wait to be seen?  It isn’t much fun, especially when it’s your first visit and you have to complete all of the background information, medical history, insurance information, etc. The other day I had to make such a visit to a doctor’s office/clinic for a family member. The one upside was that this was a new facility so we were the only people waiting to be seen except, the television monitor indicated one other patient was being seen “online”. Online?!  It was interesting that someone not at the clinic was being seen before us. We finished our paperwork and my family member was called in to see the doctor. The wait wasn’t as long as I am used to from other experiences so I was pleasantly surprised. While I waited in the lobby I was reading some of the literature about this particular medical provider chain. I found that they have on online consultation they can provide to their patients. That would explain the online patient that was ahead of us. The picture they showed on the advertisement had a patient with a tablet and their website information. Now, since I write about mobile medical devices and protecting against i-pad theft and tablet theft using Alpha Thunder Tags, I couldn’t help but have my curiosity piqued. Does this provider use medical tablets or i-pads on their end to conduct online visits? If they do, are they taking precautions to protect those devices from theft?
     

Facilities that are using mobile medical devices must be careful to protect those devices or they risk compromising patient information. Medical i-pad theft or tablet theft can be prevented if a facility uses an Alpha Thunder Tag on a device and installs Checkpoint Classic N10 antennas on their entrances/exits. The Alpha Thunder Tag is attached to each mobile device with an adhesive backing. The tags are electronic article surveillance ready, and emit a radio frequency signal that can be read by the Checkpoint Classic N10 antenna. If someone tries to steal one of the devices protected with a tag, an alarm in the antenna activates an audible signal and the built in flashing LED lights are set off. Employees from the clinic or hospital can respond to the alarm and recover the stolen goods. The Thunder Tag has a tamper alarm so that if someone decides to try to be clever and remove the tag, the alarm built into the tag activates.       

 

If space for an electronic article surveillance antenna (EAS) in your doorways is a concern, the Checkpoint Classic N10 is the perfect solution. It is designed to take up very little room, fitting comfortably in standard entry ways. Though they do not take up the area that the antennas in large retail stores do, they still provide the same high level detection capabilities. If a tablet theft or i-pad theft is taking place and the device is concealed in a briefcase, purse or in a pocket, the antenna will still detect the Thunder Tag.
     

So, getting back to my clinic visit, I was intrigued by the advertisement and when I got home, I looked up information on the company’s website. According to their information, a patient only needs to set up an account and they can see a doctor using their phone, tablet or computer. The information did not specify how the doctor “sees” the patient. My inkling is that with a computer, the doctor is somewhat locked into one place for consultations. With a mobile device, they could be moving within the clinic and multitasking. It is even possible that an i-pad or tablet would be the better solution so they can do the consultation and still have the ability to look up medical information using medical apps that are now available to healthcare providers. Of course, this is speculation on my part, but with the growing use of mobile medical devices and the fact this provider seems to be on the cutting edge of technology, I would be surprised if they were not using mobile devices for their service.
     

It is great that healthcare providers are using the power of technology to improve patient services and cutting down the length of time required to see a doctor. Mobile devices are helping to make great strides in medicine, even to the point that doctors can consult with each other in remote locations. With all these advances, it only makes sense to protect against medical i-pad theft and tablet theft with Alpha Thunder Tags and Classic N10 antennas. Why risk losing a device when security is a phone call away!

 

Need information on Alpha Thunder Tags?  Give us a call at 1.770.426.0547 now.