Checkpoint Tags-4 WC Blog 170
Checkpoint Security Systems-3
Trying To Bypass Checkpoint Systems And Other Stories Of Dishonest Employees: Part 1
One of my favorite things to do during my time as a Loss Prevention Manager was to conduct internal investigations. We might begin an investigation based on exception reports we received, watching video that corresponded to the report. Some investigations originated from employee tips, alerting us to suspicious actions on the part of a fellow team member. Other investigations began with good old fashioned camera surveillance for no particular reason than what is called a gut feeling. During these employee investigations I saw all types of activity that solidified my cases, for example; deactivation of Checkpoint Tags on clothes at the point of sale when no one else was around. Ringing merchandise for a friend and removing security devices, then voiding the items so the friend could bypass the Checkpoint Security Systems in the store. Special offers of gift cards with purchases were good times to watch cashiers who would “forget” to give a customer a gift card they were supposed to have received and then the cashier kept the gift card themselves. Getting the dishonest employee to admit to their crime could be difficult and that was where a detailed investigation became critical. A good investigation meant that whether an employee confessed to the crime or not, there was enough evidence to successfully prosecute them anyways. Then there were the cases where an admission was either easy or funny to obtain. In the next two articles I would like to share a few of my favorite cases.
Before I continue with my story, I want to quickly explain what Checkpoint Tags are for those who may not be familiar with them. Checkpoint tags are small, electronic article surveillance (EAS) sensitive stickers that can be applied to almost any type of merchandise. In our stores we often applied them to a wide range of merchandise, from clothing to music CD’s. The tags are made to be set to a specific radio frequency (RF) and when brought into range of EAS antennas, set off the alarm built into the antennas. The tags are deactivated when passed over a deactivation pad at the point of sale and cannot be reset. Checkpoint Security Systems carry a wide variety of EAS antennas, deactivation pads, tags and labels as well as accessories such as detachment keys.
Returning to my favorite cases, in one of my investigations I had two young ladies who were cashiers and had been ringing merchandise for each other, deactivating Checkpoint Tags on clothing, bedding, and other merchandise, then voiding items from the transactions and giving the merchandise to each other anyways as if purchased. This activity went on for several weeks while I investigated to see how deep the activity went. When I finally had enough evidence, I went through my protocols, then pulled both employees at the same time and placed them in separate rooms for interviews. I had manager witnesses in each room, so I was able to walk back and forth between the rooms to talk to the young ladies. Initially neither was quick to confess to anything until one admitted to a small item her friend had “passed” to her. Well, once that started I had my opening and took the information to the other suspect and told her that her “friend” had admitted to a little of the theft, but said the other one had done most of the stealing. That did not sit well with friend number two who then turned on her former partner in crime and spilled all the beans. I continued going back and forth between the rooms, as the admissions and accusations flew. Eventually I had full admissions with a little bit I had not known about previously. Watching the two friends/thieves turn on each other was, admittedly, a somewhat humorous ending to this case. I never learned if they at least got to share a cell together in the local jail.
The fact that my two employees recognized the need to deactivate merchandise before trying to pass it confirmed for me that Checkpoint Security Systems do deter theft and make it more difficult for employees to steal from their place of business.
Get more information on Checkpoint Security Systems, contact us or call 1.770.426.0547 today.
One of my favorite things to do during my time as a Loss Prevention Manager was to conduct internal investigations. We might begin an investigation based on exception reports we received, watching video that corresponded to the report. Some investigations originated from employee tips, alerting us to suspicious actions on the part of a fellow team member. Other investigations began with good old fashioned camera surveillance for no particular reason than what is called a gut feeling. During these employee investigations I saw all types of activity that solidified my cases, for example; deactivation of Checkpoint Tags on clothes at the point of sale when no one else was around. Ringing merchandise for a friend and removing security devices, then voiding the items so the friend could bypass the Checkpoint Security Systems in the store. Special offers of gift cards with purchases were good times to watch cashiers who would “forget” to give a customer a gift card they were supposed to have received and then the cashier kept the gift card themselves. Getting the dishonest employee to admit to their crime could be difficult and that was where a detailed investigation became critical. A good investigation meant that whether an employee confessed to the crime or not, there was enough evidence to successfully prosecute them anyways. Then there were the cases where an admission was either easy or funny to obtain. In the next two articles I would like to share a few of my favorite cases.
Before I continue with my story, I want to quickly explain what Checkpoint Tags are for those who may not be familiar with them. Checkpoint tags are small, electronic article surveillance (EAS) sensitive stickers that can be applied to almost any type of merchandise. In our stores we often applied them to a wide range of merchandise, from clothing to music CD’s. The tags are made to be set to a specific radio frequency (RF) and when brought into range of EAS antennas, set off the alarm built into the antennas. The tags are deactivated when passed over a deactivation pad at the point of sale and cannot be reset. Checkpoint Security Systems carry a wide variety of EAS antennas, deactivation pads, tags and labels as well as accessories such as detachment keys.
Returning to my favorite cases, in one of my investigations I had two young ladies who were cashiers and had been ringing merchandise for each other, deactivating Checkpoint Tags on clothing, bedding, and other merchandise, then voiding items from the transactions and giving the merchandise to each other anyways as if purchased. This activity went on for several weeks while I investigated to see how deep the activity went. When I finally had enough evidence, I went through my protocols, then pulled both employees at the same time and placed them in separate rooms for interviews. I had manager witnesses in each room, so I was able to walk back and forth between the rooms to talk to the young ladies. Initially neither was quick to confess to anything until one admitted to a small item her friend had “passed” to her. Well, once that started I had my opening and took the information to the other suspect and told her that her “friend” had admitted to a little of the theft, but said the other one had done most of the stealing. That did not sit well with friend number two who then turned on her former partner in crime and spilled all the beans. I continued going back and forth between the rooms, as the admissions and accusations flew. Eventually I had full admissions with a little bit I had not known about previously. Watching the two friends/thieves turn on each other was, admittedly, a somewhat humorous ending to this case. I never learned if they at least got to share a cell together in the local jail.
The fact that my two employees recognized the need to deactivate merchandise before trying to pass it confirmed for me that Checkpoint Security Systems do deter theft and make it more difficult for employees to steal from their place of business.
Get more information on Checkpoint Security Systems, contact us or call 1.770.426.0547 today.
Alpha Thunder Tags-4 WC Blog 191
Checkpoint Classic N10-3
i-pad theft-3
Tablet theft – 3
Need a Prescription To Prevent Mobile Medical Device Theft? Use An Alpha Thunder Tag And Classic N10 Antenna.
The use of mobile technology in healthcare is becoming routine. Go into a hospital and laptop computers on carts are wheeled around from room to room as nurses assist patients and gather personal medical information. In a dentist office the staff are calling out patients from the tablet they are holding with the patient’s information at their fingertip. Go to a corner pharmacy for a nurse practitioner visit and the first thing to do is complete a patient profile on an i-pad device attached to the counter of a private both or table. Electronic storage of information is so much easier than the cumbersome task of filling out form after form of paperwork. The opportunities for dropping pages or losing a patient’s folder are less likely when the information is stored in a digital format. But Doctor’s offices aren’t the only ones that benefit from using mobile medical devices. Pharmacies are also finding that the same devices can help improve the delivery and accuracy of their services. One precaution that all medical providers must take however, is to protect against i-pad theft or tablet theft. Not only is the device itself an expense no one wants to replace, but the lost data is more of a concern since confidential patient information is at risk once a device is missing.
It is possible to protect against tablet theft or i-pad theft if an office will invest in two things, a Checkpoint Classic N10 antenna system for each point of exit to a building and Alpha Thunder Tags. The Classic N10 antenna is an electronic article surveillance (EAS) detection system that picks up radio frequency signals emitted from an EAS tag, such as Alpha Thunder Tags. When the tag is within a certain distance from the antenna, the antenna alarm activates and sounds loud enough that staff members can respond and recover an item being removed from the building. Occasionally a thief will drop an item when an alarm sounds, again offering an opportunity for recovery of stolen equipment.
The Thunder Tags are small enough that they can be applied to almost any mobile devices using an adhesive supplied by the manufacturer. Thunder Tags have a tamper alarm that will sound if someone attempts to remove it from a device without using the proper detachment tool. The 3-alarm Alpha Thunder Tags also have an internal alarm that sounds when an item protected with a tag is removed from a building through the EAS antennas. With the protection of the Checkpoint Classic N10 antenna and the tags, mobile medical devices will be safe within the hospital or office environment.
Pharmacies can benefit with the introduction of mobile medical technology, just as other medical fields are doing. According to a report titled “Evaluating Mobile Medical Applications” by Conor Hanrahan, Timothy Dy Aungst and Sabrina Cole, from the web site www.ashp.org, one application being explored used the camera in mobile devices. The researchers state, “Another ongoing project includes utilizing the camera of a smart device to conduct pill identification” (pg6). While the pill or a picture of a pill should be no cause for privacy concern, what if a patient shares information through a mobile device because they have mixed up pills or cannot recall what a pill is? A patient’s personal information may be on record with the pharmacy and that information helps them determine the pill a client sends in a picture. Strict control of mobile devices is critical so this information is not compromised. The report also claims that, “Future research will investigate the utilization of mobile apps to improve patient health through diet and exercise trackers, and as ways to increase medication adherence.”
Increased pharmacy apps will continue to drive mobile device use in drugstores, pharmacies and other drug dispensaries. Maintaining client confidentiality and protecting the devices is extremely important to the facility and the patients. I-pad theft and tablet theft can be prevented if Checkpoint Classic N10 antennas are placed at entrances/exits and Alpha Thunder Tags are installed on every mobile medical device.
Need information on Alpha Thunder Tags? Give us a call at 1.770.426.0547 now.
http://www.ashp.org/DocLibrary/Bookstore/For-Institutions/Mobile-Medical-Apps.pdf
The use of mobile technology in healthcare is becoming routine. Go into a hospital and laptop computers on carts are wheeled around from room to room as nurses assist patients and gather personal medical information. In a dentist office the staff are calling out patients from the tablet they are holding with the patient’s information at their fingertip. Go to a corner pharmacy for a nurse practitioner visit and the first thing to do is complete a patient profile on an i-pad device attached to the counter of a private both or table. Electronic storage of information is so much easier than the cumbersome task of filling out form after form of paperwork. The opportunities for dropping pages or losing a patient’s folder are less likely when the information is stored in a digital format. But Doctor’s offices aren’t the only ones that benefit from using mobile medical devices. Pharmacies are also finding that the same devices can help improve the delivery and accuracy of their services. One precaution that all medical providers must take however, is to protect against i-pad theft or tablet theft. Not only is the device itself an expense no one wants to replace, but the lost data is more of a concern since confidential patient information is at risk once a device is missing.
It is possible to protect against tablet theft or i-pad theft if an office will invest in two things, a Checkpoint Classic N10 antenna system for each point of exit to a building and Alpha Thunder Tags. The Classic N10 antenna is an electronic article surveillance (EAS) detection system that picks up radio frequency signals emitted from an EAS tag, such as Alpha Thunder Tags. When the tag is within a certain distance from the antenna, the antenna alarm activates and sounds loud enough that staff members can respond and recover an item being removed from the building. Occasionally a thief will drop an item when an alarm sounds, again offering an opportunity for recovery of stolen equipment.
The Thunder Tags are small enough that they can be applied to almost any mobile devices using an adhesive supplied by the manufacturer. Thunder Tags have a tamper alarm that will sound if someone attempts to remove it from a device without using the proper detachment tool. The 3-alarm Alpha Thunder Tags also have an internal alarm that sounds when an item protected with a tag is removed from a building through the EAS antennas. With the protection of the Checkpoint Classic N10 antenna and the tags, mobile medical devices will be safe within the hospital or office environment.
Pharmacies can benefit with the introduction of mobile medical technology, just as other medical fields are doing. According to a report titled “Evaluating Mobile Medical Applications” by Conor Hanrahan, Timothy Dy Aungst and Sabrina Cole, from the web site www.ashp.org, one application being explored used the camera in mobile devices. The researchers state, “Another ongoing project includes utilizing the camera of a smart device to conduct pill identification” (pg6). While the pill or a picture of a pill should be no cause for privacy concern, what if a patient shares information through a mobile device because they have mixed up pills or cannot recall what a pill is? A patient’s personal information may be on record with the pharmacy and that information helps them determine the pill a client sends in a picture. Strict control of mobile devices is critical so this information is not compromised. The report also claims that, “Future research will investigate the utilization of mobile apps to improve patient health through diet and exercise trackers, and as ways to increase medication adherence.”
Increased pharmacy apps will continue to drive mobile device use in drugstores, pharmacies and other drug dispensaries. Maintaining client confidentiality and protecting the devices is extremely important to the facility and the patients. I-pad theft and tablet theft can be prevented if Checkpoint Classic N10 antennas are placed at entrances/exits and Alpha Thunder Tags are installed on every mobile medical device.
Need information on Alpha Thunder Tags? Give us a call at 1.770.426.0547 now.
Security tags on clothes-4 WC blog 183
Checkpoint tags-5
Clothing security tags-3
Clothing Security Tags Aren’t Simply For Clothing Retailers: Part 1
I have a question for you and it may be a little more difficult than you might think at first glance. What kind of stores should use be using clothing security tags? The obvious answer is clothing stores right? Well, the answer is really yes AND no. Clothing retail stores should be using security tags on clothes, but so should other retail businesses you may not necessarily think about on a regular basis. I was in a grocery store the other day and noticed they were selling T-shirts for a local university which had recently won a very big college sports championship. Loss Prevention folks are always thinking about shortage and theft and tend to think about what they might do differently if it was their store. I noticed the store already had a Checkpoint electronic article surveillance antenna at the doors, so why not use Checkpoint tags on the clothes as well as the foods?
For those readers who may not be familiar with Checkpoint tags, these are both soft tags and hard tags that can be attached to clothes or stuck on hang tags. The soft tags have adhesive backings, and can be stuck to any number of surfaces, but for clothes they are best applied to manufacturer hang tags. Because Checkpoint clothing security tags are designed to be radio frequency sensitive, they are tuned to be picked up by the EAS antennas if they come into the range of the antennas. Hard tags differ from the soft tags because they are applied directly to the article of clothing. They are two-part devices that are pinned to the garment and clamp together. They are extremely strong and difficult to tamper with and remove without a detachment tool available from Checkpoint.
Checkpoint tags can be applied to any article of clothing. If there is concern about delicate fabrics like silk or satin, soft tags may be used. Hard tags can be applied to all materials including leather and denim. Inserting the pin in the seam of a garment protects from concerns about pin holes, while providing proven protection of the merchandise. Hard tags are large enough to be visible to customers and simply the sight of them on clothing is often a deterrent to potential shoplifters.
So what other stores may carry clothing that we may not traditionally think about for clothing security? I will discuss several types of retail businesses in this article and continue the discussion in part two of this series. As you read, think about any retail stores I may have missed that could also benefit from using security tags on clothes.
Sporting Goods stores may come to you fairly quickly as you think about the items they carry, baseball caps, running shoes, warm-up attire, sweat shirts, t-shirts and socks. Even merchandise such as baseball gloves can be protected with Checkpoint tags. Pin one end through the hand strap that goes across the back of the hand and the second piece secures it inside the strap.
Lingerie stores can decrease theft by using security tags on clothes. As mentioned previously, some people may be concerned about delicate materials being pinned but if that is the case, soft tags can be placed on the manufacture labels fastened by the plastic hang tag attachment.
One retail business you may not have thought of was an automotive parts store. Some of these stores sell t-shirts and ball caps advertising parts companies or their own business. Some are sponsors of race car teams and therefore carry team gear.
Clothing security tags used with EAS antennas are a strong deterrent to theft and increase profits through reduced shortage. Any number of businesses, including clothing stores can improve profits by investing in Checkpoint tags. Consider whether you might be overlooking the benefits of using security tags on clothes in your business.
Need information on Checkpoint tags? Give us a call at 1.770.426.0547 now.
have a question for you and it may be a little more difficult than you might think at first glance. What kind of stores should use be using clothing security tags? The obvious answer is clothing stores right? Well, the answer is really yes AND no. Clothing retail stores should be using security tags on clothes, but so should other retail businesses you may not necessarily think about on a regular basis. I was in a grocery store the other day and noticed they were selling T-shirts for a local university which had recently won a very big college sports championship. Loss Prevention folks are always thinking about shortage and theft and tend to think about what they might do differently if it was their store. I noticed the store already had a Checkpoint electronic article surveillance antenna at the doors, so why not use Checkpoint tags on the clothes as well as the foods?
For those readers who may not be familiar with Checkpoint tags, these are both soft tags and hard tags that can be attached to clothes or stuck on hang tags. The soft tags have adhesive backings, and can be stuck to any number of surfaces, but for clothes they are best applied to manufacturer hang tags. Because Checkpoint clothing security tags are designed to be radio frequency sensitive, they are tuned to be picked up by the EAS antennas if they come into the range of the antennas. Hard tags differ from the soft tags because they are applied directly to the article of clothing. They are two-part devices that are pinned to the garment and clamp together. They are extremely strong and difficult to tamper with and remove with a detachment tool available from Checkpoint.
Checkpoint tags can be applied to any article of clothing. If there is concern about delicate fabrics like silk or satin, soft tags may be used. Hard tags can be applied to all materials including leather and denim. Inserting the pin in the seam of a garment protects from concerns about pin holes, while providing proven protection of the merchandise. Hard tags are large enough to be visible to customers and simply the sight of them on clothing is often a deterrent to potential shoplifters.
So what other stores may carry clothing that we may not traditionally think about for clothing security? I will discuss several types of retail businesses in this article and continue the discussion in part two of this series. As you read, think about any retail stores I may have missed that could also benefit from using security tags on clothes.
Sporting Goods stores may come to you fairly quickly as you think about the items they carry, baseball caps, running shoes, warm-up attire, sweat shirts, t-shirts and socks. Even merchandise such as baseball gloves can be protected with Checkpoint tags. Pin one end through the hand strap that goes across the back of the hand and the second piece secures it inside the strap.
Lingerie stores can decrease theft by using security tags on clothes. As mentioned previously, some people may be concerned about delicate materials being pinned but if that is the case, soft tags can be placed on the manufacture labels fastened by the plastic hang tag attachment.
One retail business you may not have thought of was an automotive parts store. Some of these stores sell t-shirts and ball caps advertising parts companies or their own business. Some are sponsors of race car teams and therefore carry team gear.
Clothing security tags used with EAS antennas are a strong deterrent to theft and increase profits through reduced shortage. Any number of businesses, including clothing stores can improve profits by investing in Checkpoint tags. Consider whether you might be overlooking the benefits of using security tags on clothes in your business.
Need information on Checkpoint tags? Give us a call at 1.770.426.0547 now.