50 PRODUCTS THAT SHOULD BE PROTECTED WITH CHECKPOINT LABELS – PT 11
This is it! We’ve made it to the final segment in my 50 items to secure with Checkpoint Labels. At this point, I hope that you’ve found at least one item in here and thought that it made sense to tag. Maybe it helped you to see just how many items were at risk in your store. Whatever the case, I’m glad you stuck around this long and without adieu; I give you the remaining 5 items on my list.
46. Pre-Paid Cell Phones
Popular amongst folks that don’t want to be tied to a monthly contact; and also criminals. Burner phones are the way to go if you’re dabbling in the crime syndicates. With a small percentage of the market catering to a criminal element, it would only make sense to protect these against theft. EAS labels are a fantastic alternative to big bulky cases or cable wraps.
47. Toys
More specifically, Legos. These are some of the hottest targets for ORC groups. They are expensive, small and easy to conceal and can be resold in a matter of minutes on any number of online retail sites. Having Checkpoint Labels on the box with your store name/number will cut down on ORC activity. The boosters don’t want any way for product to be traced back to a specific store and this is one way to make that happen.
48. Denim Jeans
Over my career, I’ve tried dozens of way to protect denim product. From bulky hard tags front and center, to sewn in labels in the rear. Nothing has been quite as effective as a Checkpoint Label dropped into the back pocket of the pants. Thieves never check there and I’ve had huge success using this method. Heck, I can remember one thief in particular who pleaded with me in my office one day to show him where the tag was, as he couldn’t figure out how he missed it. Of course I didn’t give away my secret, and it’s still working for me today.
49. Socks
Another great category that drives shrink and is often overlooked in terms of product protection. While placing the EAS label on the packaging can easily be defeated, I’ve found great success by simply dropping a checkpoint label into one of the socks.
50. Underwear
No one really understands that underwear is one of those hot targets for ORC activity. Next time you’re at a flea-market, pay attention to how many “vendors” are selling packs of undies. Do you really think that each of these people have an account with the major underwear brands? Of course not. Make it easy for law enforcement (and yourself) to identify your stolen goods by using an EAS label with your store name printed on it. Chances are, that alone will keep your product in the store to begin with.
For more information about Checkpoint Labels contact us or call 1.770.426.0547.
This is it! We’ve made it to the final segment in my 50 items to secure with Checkpoint Labels. At this point, I hope that you’ve found at least one item in here and thought that it made sense to tag. Maybe it helped you to see just how many items were at risk in your store. Whatever the case, I’m glad you stuck around this long and without adieu; I give you the remaining 5 items on my list.
46. Pre-Paid Cell PhonesPopular amongst folks that don’t want to be tied to a monthly contact; and also criminals. Burner phones are the way to go if you’re dabbling in the crime syndicates. With a small percentage of the market catering to a criminal element, it would only make sense to protect these against theft. EAS labels are a fantastic alternative to big bulky cases or cable wraps.
47. ToysMore specifically, Legos. These are some of the hottest targets for ORC groups. They are expensive, small and easy to conceal and can be resold in a matter of minutes on any number of online retail sites. Having Checkpoint Labels on the box with your store name/number will cut down on ORC activity. The boosters don’t want any way for product to be traced back to a specific store and this is one way to make that happen.
48. Denim JeansOver my career, I’ve tried dozens of way to protect denim product. From bulky hard tags front and center, to sewn in labels in the rear. Nothing has been quite as effective as a Checkpoint Label dropped into the back pocket of the pants. Thieves never check there and I’ve had huge success using this method. Heck, I can remember one thief in particular who pleaded with me in my office one day to show him where the tag was, as he couldn’t figure out how he missed it. Of course I didn’t give away my secret, and it’s still working for me today.
49. SocksAnother great category that drives shrink and is often overlooked in terms of product protection. While placing EAS labels on the packaging can easily be defeated, I’ve found great success by simply dropping a checkpoint label into one of the socks.
50. UnderwearNo one really understands that underwear is one of those hot targets for ORC activity. Next time you’re at a flea-market, pay attention to how many “vendors” are selling packs of undies. Do you really think that each of these people have an account with the major underwear brands? Of course not. Make it easy for law enforcement (and yourself) to identify your stolen goods by using an EAS label with your store name printed on it. Chances are, that alone will keep your product in the store to begin with.
For more information about Checkpoint Labels contact us or call 1.770.426.0547.
Alpha Thunder Tags-5 WC blog 159
i-pad theft-3
i-pads Fill A Need In Pediatric Intensive Care Units; Protect Those Devices With Alpha Thunder Tags Part I
Imagine being the parent of a newborn baby and not being able to see your child because they are in a Pediatric Intensive Care Unit and being closely monitored by doctors and nurses. Some of these infants are in incubators hooked up to monitors and feeding tubes. Then there are the mothers who are occasionally unable to be moved from their rooms due to C-sections or difficult deliveries that keep them bedridden. These moms are not always able to go to the Pediatric ICU to visit their child(ren). There are now hospitals that provide i-pads to patients who may not be able to get see their baby right away due to circumstances beyond their control. These hospitals must take precautions to protect against i-pad theft or computer tablet theft. They can do so by using Alpha Thunder Tags on their mobile devices.
Alpha Thunder Tags can be attached to mobile medical devices and when used in conjunction with electronic article surveillance (EAS) antennas, such as the Checkpoint Classic N10 antenna, help to both deter and detect theft. The tag is designed to activate the alarm built into an EAS antenna when it is carried into the proximity of the antenna. The antenna emits a loud beeping noise and LED lights flash during an activation, drawing the attention of anyone in the area. When staff hear the noise, they respond to the door and can stop the person setting off the alarm and determine the cause of the alert. If the cause is due to a mobile device being removed from the building, employees have the opportunity to recover it. The Alpha Thunder Tag also has a built in alarm that will activate even if someone gets through the doors and into the street or parking lot.
Additionally, when attached to a mobile device, there is a tamper alarm that sets. Should a thief attempt an i-pad theft, by removing an Alpha Thunder Tag, the tamper alarm will sound a loud, piercing noise. Again, hospital staff can respond to the location and recover the device. The tag and the Checkpoint N10 antennas together provide a physical and visual deterrent which keep i-pads or computer tablets in hospitals and available to the patients who need them.
Where are i-pads being used to help moms and babies connect? One place that the connection is being made is at Cedar-Sinai Neonatal Intensive Care Unit. On their website, cedars-sinai.edu, in an article, “iPads Help New Moms Connect With Their Infants in the Neonatal Intensive Care Unit”, the story describes how some mothers are unable to see their newborns right away and this can cause anxiety and stress. They have called their program “Baby Time” and it allows the mother to see her newborn when she is in another area of the hospital and cannot get to her child. The hospital brings an i-pad to the mother and then an i-pad is used at the other end to allow the mother to see her baby and see how he/she is doing. The mother is able to see her baby and feel more at ease at the situation. One mother mentioned in the article said that “… the program meant feeling just a little closer to her baby girl and the comfort of being able to hear the physician explain her infant’s condition.”
In part two of this article we will look at other areas where similar use of i-pads and tablets are being used to bridge the divide when parents can’t visit their newborns. Suffice it to say, the thought of a possible i-pad theft from a program such as this is unconscionable, but the possibility exists. Alpha Thunder Tags can help prevent such a situation.
Get more information on Alpha Thunder Tags, contact us or call 1.770.426.0547 today.
Imagine being the parent of a newborn baby and not being able to see your child because they are in a Pediatric Intensive Care Unit and being closely monitored by doctors and nurses. Some of these infants are in incubators hooked up to monitors and feeding tubes. Then there are the mothers who are occasionally unable to be moved from their rooms due to C-sections or difficult deliveries that keep them bedridden. These moms are not always able to go to the Pediatric ICU to visit their child(ren). There are now hospitals that provide i-pads to patients who may not be able to get see their baby right away due to circumstances beyond their control. These hospitals must take precautions to protect against i-pad theft or computer tablet theft. They can do so by using Alpha Thunder Tags on their mobile devices.
Alpha Thunder Tags can be attached to mobile medical devices and when used in conjunction with electronic article surveillance (EAS) antennas, such as the Checkpoint Classic N10 antenna, help to both deter and detect theft. The tag is designed to activate the alarm built into an EAS antenna when it is carried into the proximity of the antenna. The antenna emits a loud beeping noise and LED lights flash during an activation, drawing the attention of anyone in the area. When staff hear the noise, they respond to the door and can stop the person setting off the alarm and determine the cause of the alert. If the cause is due to a mobile device being removed from the building, employees have the opportunity to recover it. The Alpha Thunder Tag also has a built in alarm that will activate even if someone gets through the doors and into the street or parking lot.
Additionally, when attached to a mobile device, there is a tamper alarm that sets. Should a thief attempt an i-pad theft, by removing an Alpha Thunder Tag, the tamper alarm will sound a loud, piercing noise. Again, hospital staff can respond to the location and recover the device. The tag and the Checkpoint N10 antennas together provide a physical and visual deterrent which keep i-pads or computer tablets in hospitals and available to the patients who need them.
Where are i-pads being used to help moms and babies connect? One place that the connection is being made is at Cedar-Sinai Neonatal Intensive Care Unit. On their website, cedars-sinai.edu, in an article, “iPads Help New Moms Connect With Their Infants in the Neonatal Intensive Care Unit”, the story describes how some mothers are unable to see their newborns right away and this can cause anxiety and stress. They have called their program “Baby Time” and it allows the mother to see her newborn when she is in another area of the hospital and cannot get to her child. The hospital brings an i-pad to the mother and then an i-pad is used at the other end to allow the mother to see her baby and see how he/she is doing. The mother is able to see her baby and feel more at ease at the situation. One mother mentioned in the article said that “… the program meant feeling just a little closer to her baby girl and the comfort of being able to hear the physician explain her infant’s condition.”
In part two of this article we will look at other areas where similar use of i-pads and tablets are being used to bridge the divide when parents can’t visit their newborns. Suffice it to say, the thought of a possible i-pad theft from a program such as this is unconscionable, but the possibility exists. Alpha Thunder Tags can help prevent such a situation.
Get more information on Alpha Thunder Tags, contact us or call 1.770.426.0547 today.
Checkpoint Systems-5 WC Blog 156
Stop shoplifting-3
Checkpoint tags-3
Checkpoint Systems Help Recover Stolen Merchandise – But For A Day, Not The Way You Might Think
Checkpoint systems have the tools to stop shoplifting. From electronic article surveillance antennas to deactivation units, hand verifiers and Checkpoint tags, I have had the pleasure of using all types of Checkpoint equipment. On one occasion I even used a piece of equipment to stop shoplifting but I don’t think it was the way anyone at Checkpoint systems had intended the device to work. The item I am speaking of is a DV1000 deactivation verifier.
The deactivation verifier is a small, gray box with a button on top that is pressed to determine if an EAS deactivation pad is working. When held over a functioning pad, and the button is pushed a small light on the front of the unit turns green. When pushed any other time the light turns red. The verifier is simple to use but extremely helpful in troubleshooting equipment to ensure it is operating correctly.
One day I was working and observed a young boy enter our store by himself. I recognized him as a regular in our store who was usually accompanied by friends. I had suspected the youngster of shoplifting for some time but our Loss Prevention Team could not catch him. This particular day I observed him when he entered and so I was able to keep surveillance on him his entire time in the store. I watched the boy as he walked around looking at merchandise and picking things up and putting them back down. The youngster eventually picked up a handful of collector cards/ball cards and continued through the store, opening the cards and selecting the ones he wanted. After several trips back to the cards, he was done with his “shopping” spree and headed for the exit.
I followed the young man when he walked out the store, stopped him and brought him back in. The cards that had been chosen had Checkpoint tags source tagged in the packages but our Checkpoint Systems antennas did not sound because the packages and some of the cards had been discarded in the store. I took the culprit to the security office and told him to return the cards to me. He told me he did not have any cards. I made every effort to get him to admit to the theft and give me the merchandise back but he was tough and wouldn’t crack.
At this point I decided it was time to pull out all of the stops. I reached in my desk drawer and pulled out my lie detector, which happened to also look suspiciously like a Checkpoint DV 1000 deactivation verifier. I told the young man that the item I was holding was a lie detector and if he told me a lie the light would turn red. My would-be criminal’s mouth dropped open and the look on his face was priceless. I asked him if he had any stolen cards in his pocket. He told me he did not and I held down the button on the verifier. The light turned red and I told the boy that the lie detector proved he was lying. At that the boy sheepishly pulled the cards from his pocket and gave them to me. He also admitted to his prior thefts, confirming what I had suspected. I contacted the boy’s mother who picked him up and took him up.
Checkpoint systems are designed to stop shoplifting starting with the deterrence value of the antennas at the front doors to the Checkpoint tags and labels placed on merchandise. Contact Checkpoint and find out how they can help you prevent theft, but don’t bother asking about their DV 1000 “lie detectors”, they probably won’t know what you are talking about.
Get more information on Checkpoint Systems, contact us or call 1.770.426.0547 today.
Checkpoint systems have the tools to stop shoplifting. From electronic article surveillance antennas to deactivation units, hand verifiers and Checkpoint tags, I have had the pleasure of using all types of Checkpoint equipment. On one occasion I even used a piece of equipment to stop shoplifting but I don’t think it was the way anyone at Checkpoint systems had intended the device to work. The item I am speaking of is a DV1000 deactivation verifier.
The deactivation verifier is a small, gray box with a button on top that is pressed to determine if an EAS deactivation pad is working. When held over a functioning pad, and the button is pushed a small light on the front of the unit turns green. When pushed any other time the light turns red. The verifier is simple to use but extremely helpful in troubleshooting equipment to ensure it is operating correctly.
One day I was working and observed a young boy enter our store by himself. I recognized him as a regular in our store who was usually accompanied by friends. I had suspected the youngster of shoplifting for some time but our Loss Prevention Team could not catch him. This particular day I observed him when he entered and so I was able to keep surveillance on him his entire time in the store. I watched the boy as he walked around looking at merchandise and picking things up and putting them back down. The youngster eventually picked up a handful of collector cards/ball cards and continued through the store, opening the cards and selecting the ones he wanted. After several trips back to the cards, he was done with his “shopping” spree and headed for the exit.
I followed the young man when he walked out the store, stopped him and brought him back in. The cards that had been chosen had Checkpoint tags source tagged in the packages but our Checkpoint Systems antennas did not sound because the packages and some of the cards had been discarded in the store. I took the culprit to the security office and told him to return the cards to me. He told me he did not have any cards. I made every effort to get him to admit to the theft and give me the merchandise back but he was tough and wouldn’t crack.
At this point I decided it was time to pull out all of the stops. I reached in my desk drawer and pulled out my lie detector, which happened to also look suspiciously like a Checkpoint DV 1000 deactivation verifier. I told the young man that the item I was holding was a lie detector and if he told me a lie the light would turn red. My would-be criminal’s mouth dropped open and the look on his face was priceless. I asked him if he had any stolen cards in his pocket. He told me he did not and I held down the button on the verifier. The light turned red and I told the boy that the lie detector proved he was lying. At that the boy sheepishly pulled the cards from his pocket and gave them to me. He also admitted to his prior thefts, confirming what I had suspected. I contacted the boy’s mother who picked him up and took him up.
Checkpoint systems are designed to stop shoplifting starting with the deterrence value of the antennas at the front doors to the Checkpoint tags and labels placed on merchandise. Contact us and find out how we can help you prevent theft.
Get more information on Checkpoint Systems, contact us or call 1.770.426.0547 today.