Electronic Article Surveillance-5 WC Blog 523
Checkpoint Hard Tags-4
Stop Shoplifting-3
Reduce Shortage With Checkpoint Hard Tags And Training
Electronic Article Surveillance tags are effective in stores to reduce internal theft and to stop shoplifting. Go to almost any national retail chain store and you will see them in use. It may be a soft adhesive tag attached to a package or Checkpoint hard tags attached to clothing and softlines goods. As a Loss Prevention Manager I was blessed with consistently low shortage results after my store inventory cycles. Out of 13 years of taking inventory, 11 of those were well under 1% shrinkage. Two years I had shortage results slightly over 1% and those both offset with the following year inventory and one of those was an overage. There were a number of factors that I credit to that success but one of the biggest was that our company required the use of Checkpoint tags on a LOT of merchandise. I found that they deterred many criminals who were intending to steal. When deterrence didn’t work and someone was determined to try to take tagged merchandise, the electronic article surveillance towers at the doors would alarm. In many cases our employees recovered merchandise that was dropped as the criminal was more concerned with running away and I can’t begin to tell you the number of recoveries made as a result of a detailed receipt check by a trained staff member. This brings me to the main point of this article. The other day I made a purchase and was leaving this store (a national big box retailer) and another customer was walking out at the same time. The alarm sounded and we both stopped but no one came to check our receipts. We looked at each other and continued on our way. As an experienced Loss Prevention Manager I know how effective tags can be but they will only be effective if store management makes them a security priority.
It is easy for me to get carried away on a topic and forget that not all of the readers are going to know exactly what Checkpoint hard tags are or how electronic article surveillance works. Hard tags are anti-theft devices that are pinned to softlines goods which can include clothing, bedding, towels, shower curtains, accessories such as purses, hats and belts. I have even seen creative Loss Prevention Managers use them on blister packages such as multi-tools, and small power tools. The tags are designed to close so tightly that they are almost seamless. This means they are nearly impossible to defeat through tampering. The great thing about the tags is that they come in several design such as the Gen 3 tag so that even a designer dress can have one attached and it will still have a sleek look. The Checkpoint hard tags are also built so that the pins won’t damage material. There is no excuse for a store owner or manager not to use them. The way the tags work is first through visual deterrence. They stop shoplifting because criminals see them and know what they are and usually don’t want to take the risk of getting caught when the alarm at the door sounds. The second way is that they activate the electronic article surveillance alarm towers positioned at the front doors. The alarm is meant to attract an immediate response from a store employee who conducts a receipt check and locates the cause of the alarm. The would-be thief either buys the merchandise or leaves empty handed and store employees now know who they are.
Retailers, Checkpoint tags work. I have provided evidence from my own experience but I want to stress that it required employees to respond to those alarms and they had to be properly trained. Installing an electronic article surveillance system and placing EAS tags on merchandise will deter some theft but if no one responds to alarms criminals catch on pretty quickly. In the same manner the customer and I left the big box store and noticed no one checked on the alarm as we exited, thieves will do the same to your business. Oh and as a side note, employees who are stealing will also get comfortable if they know that no one is going to check on them if they set off an alarm.
You can have great shortage results but it requires the right tools and training. Loss Prevention Systems Inc (LPSI). can help set you on the road to success with Checkpoint hard tags and EAS towers. LPSI founder Bill Bregar can provide you with the training you need to stop shoplifting and employee theft and the proper ways to handle EAS alarms. Check out LPSI and learn how you can make your store more profitable.
Checkpoint hard tags are important and we can help you with it. Call 1.770.426.0547 and let’s talk.
Electronic Article Surveillance tags are effective in stores to reduce internal theft and to stop shoplifting. Go to almost any national retail chain store and you will see them in use. It may be a soft adhesive tag attached to a package or Checkpoint hard tags attached to clothing and softlines goods. As a Loss Prevention Manager I was blessed with consistently low shortage results after my store inventory cycles. Out of 13 years of taking inventory, 11 of those were well under 1% shrinkage. Two years I had shortage results slightly over 1% and those both offset with the following year inventory and one of those was an overage. There were a number of factors that I credit to that success but one of the biggest was that our company required the use of Checkpoint tags on a LOT of merchandise. I found that they deterred many criminals who were intending to steal. When deterrence didn’t work and someone was determined to try to take tagged merchandise, the electronic article surveillance towers at the doors would alarm. In many cases our employees recovered merchandise that was dropped as the criminal was more concerned with running away and I can’t begin to tell you the number of recoveries made as a result of a detailed receipt check by a trained staff member. This brings me to the main point of this article. The other day I made a purchase and was leaving this store (a national big box retailer) and another customer was walking out at the same time. The alarm sounded and we both stopped but no one came to check our receipts. We looked at each other and continued on our way. As an experienced Loss Prevention Manager I know how effective tags can be but they will only be effective if store management makes them a security priority.
It is easy for me to get carried away on a topic and forget that not all of the readers are going to know exactly what Checkpoint hard tags are or how electronic article surveillance works. Hard tags are anti-theft devices that are pinned to softlines goods which can include clothing, bedding, towels, shower curtains, accessories such as purses, hats and belts. I have even seen creative Loss Prevention Managers use them on blister packages such as multi-tools, and small power tools. The tags are designed to close so tightly that they are almost seamless. This means they are nearly impossible to defeat through tampering. The great thing about the tags is that they come in several design such as the Gen 3 tag so that even a designer dress can have one attached and it will still have a sleek look. The Checkpoint hard tags are also built so that the pins won’t damage material. There is no excuse for a store owner or manager not to use them. The way the tags work is first through visual deterrence. They stop shoplifting because criminals see them and know what they are and usually don’t want to take the risk of getting caught when the alarm at the door sounds. The second way is that they activate the electronic article surveillance alarm towers positioned at the front doors. The alarm is meant to attract an immediate response from a store employee who conducts a receipt check and locates the cause of the alarm. The would-be thief either buys the merchandise or leaves empty handed and store employees now know who they are.
Retailers, Checkpoint tags work. I have provided evidence from my own experience but I want to stress that it required employees to respond to those alarms and they had to be properly trained. Installing an electronic article surveillance system and placing EAS tags on merchandise will deter some theft but if no one responds to alarms criminals catch on pretty quickly. In the same manner the customer and I left the big box store and noticed no one checked on the alarm as we exited, thieves will do the same to your business. Oh and as a side note, employees who are stealing will also get comfortable if they know that no one is going to check on them if they set off an alarm.
You can have great shortage results but it requires the right tools and training. Loss Prevention Systems Inc (LPSI). can help set you on the road to success with Checkpoint hard tags and EAS towers. LPSI founder Bill Bregar can provide you with the training you need to stop shoplifting and employee theft and the proper ways to handle EAS alarms. Check out LPSI and learn how you can make your store more profitable.
Checkpoint hard tags are important and we can help you with it. Call 1.770.426.0547 and let’s talk.
Bug Tag-5 WC Blog 460
iPad Theft-3
iPads For Aiding Wounded Veterans In Recovery Should Be Protected from Theft With A Bug Tag And Electronic Article Surveillance Tower
As a veteran I have a special fondness for programs that assist and aid our wounded and disabled veteran warriors. Whether it is physical therapy that is needed, medical care or mental health related our soldiers deserve to receive any help necessary to get them as healthy and functional as possible. I was interested when I found information on a place called The Western Blind Rehabilitation Center (WBRC) on the website with a link to the 2016 WBRC annual review to the right side of the page https://www.paloalto.va.gov/services/wbrc/program.asp
The WBRC mission statement states: “The Western Blind Rehabilitation Center serves Veterans and Active Duty Service Members with vision impairment through a comprehensive evidence-based rehabilitation program that promotes independence and community reintegration…” From my reading of their 2016 FY assessment I was impressed by the programs they offer to veterans and their families that include among other things an iProgram designed to coach these visually impaired men and women on the use of iPhones and iPads. I noticed in one section of the report that they do provide Technology Security and Safety Tips which is a common sense measure. One concern I have about this or any other clinic or rehab center that uses iPads in their programs is the security of the devices to prevent iPad theft or tablet theft if they use Android devices. It is my desire to see these locations use a Bug Tag to prevent criminals from stealing such a valuable asset.
iPad theft is a very real problem for medical facilities. The devices are small enough to slip into a purse or a jacket pocket. There have been documented instances where thieves have removed devices mounted in hospital lounges for patron use and the devices have been stolen in spite of being in the open and under camera surveillance. At risk is the device and the cost it carries along with any potential client information that may be on a device. For public use devices people will log in to their Apple accounts or they sync up with their personal device and forget to log off. For those that are being used for a patient or client there is a good chance patient data is maintained in the device. It could be something that seems as innocuous as name, address or phone numbers or it could be HIPPA protected information that is stored in an iPad or computer tablet. Should a criminal get that information the patient is at risk and the facility faces possible fines and lawsuits from the Department of Health and Human Services. The good news is a Bug Tag can prevent such thefts from taking place. A Bug Tag uses electronic article surveillance (EAS) technology that can interact with EAS towers to initiate an alarm if a tagged device is carried near a door. An alarm elicits an immediate response from staff workers who can recover a device before it is removed from the building. This is the same type of technology that has been successfully employed for years by retailers to stop shoplifters.
Getting back to the WBRC report it I noted that they found “96% of iProgram participants reported increased levels of satisfaction in iPad or iPhone training and use. 97% of iProgram participants reported a decrease in perceived levels of difficulty in using the iPhone or iPad.” If these veterans are becoming more comfortable in the use of these mobile devices it can be a gateway to greater independence and “normalization” in their lives.
Another program that I have found that aids our wounded soldiers with iPads and computers is Soldier’s Angels. Their “Valor-IT” program provides voice controlled laptops that allow soldiers in V.A. Medical Centers to remain in contact with “the rest of the world while during recovery”. The other part of this program provides iPads and personal GPS devices to soldiers to “build self-confidence and independence by compensating for short-term memory loss and organizational challenges related to severe TBI and severe PTSD.” Because I would hate to see an iPad theft from a person who has sacrificed so selflessly for our nation. I would like to see the units protected with a Bug Tag.
Confidence gained from learning how to use new technologies and being able to become more independent is priceless for our injured veterans. We owe them our gratitude and a sense of security. Make sure that personal devices are protected with a Bug Tag and an EAS system so there is one less thing for them to be concerned about on their road to recovery.
Get more information on the Bug Tag, contact us or call 1.770.426.0547 today.
As a veteran I have a special fondness for programs that assist and aid our wounded and disabled veteran warriors. Whether it is physical therapy that is needed, medical care or mental health related our soldiers deserve to receive any help necessary to get them as healthy and functional as possible. I was interested when I found information on a place called The Western Blind Rehabilitation Center (WBRC) on the website with a link to the 2016 WBRC annual review to the right side of the page https://www.paloalto.va.gov/services/wbrc/program.asp
The WBRC mission statement states: “The Western Blind Rehabilitation Center serves Veterans and Active Duty Service Members with vision impairment through a comprehensive evidence-based rehabilitation program that promotes independence and community reintegration…” From my reading of their 2016 FY assessment I was impressed by the programs they offer to veterans and their families that include among other things an iProgram designed to coach these visually impaired men and women on the use of iPhones and iPads. I noticed in one section of the report that they do provide Technology Security and Safety Tips which is a common sense measure. One concern I have about this or any other clinic or rehab center that uses iPads in their programs is the security of the devices to prevent iPad theft or tablet theft if they use Android devices. It is my desire to see these locations use a Bug Tag to prevent criminals from stealing such a valuable asset.
iPad theft is a very real problem for medical facilities. The devices are small enough to slip into a purse or a jacket pocket. There have been documented instances where thieves have removed devices mounted in hospital lounges for patron use and the devices have been stolen in spite of being in the open and under camera surveillance. At risk is the device and the cost it carries along with any potential client information that may be on a device. For public use devices people will log in to their Apple accounts or they sync up with their personal device and forget to log off. For those that are being used for a patient or client there is a good chance patient data is maintained in the device. It could be something that seems as innocuous as name, address or phone numbers or it could be HIPPA protected information that is stored in an iPad or computer tablet. Should a criminal get that information the patient is at risk and the facility faces possible fines and lawsuits from the Department of Health and Human Services. The good news is a Bug Tag can prevent such thefts from taking place. A Bug Tag uses electronic article surveillance (EAS) technology that can interact with EAS towers to initiate an alarm if a tagged device is carried near a door. An alarm elicits an immediate response from staff workers who can recover a device before it is removed from the building. This is the same type of technology that has been successfully employed for years by retailers to stop shoplifters.
Getting back to the WBRC report it I noted that they found “96% of iProgram participants reported increased levels of satisfaction in iPad or iPhone training and use. 97% of iProgram participants reported a decrease in perceived levels of difficulty in using the iPhone or iPad.” If these veterans are becoming more comfortable in the use of these mobile devices it can be a gateway to greater independence and “normalization” in their lives.
Another program that I have found that aids our wounded soldiers with iPads and computers is Soldier’s Angels. Their “Valor-IT” program provides voice controlled laptops that allow soldiers in V.A. Medical Centers to remain in contact with “the rest of the world while during recovery”. The other part of this program provides iPads and personal GPS devices to soldiers to “build self-confidence and independence by compensating for short-term memory loss and organizational challenges related to severe TBI and severe PTSD.” Because I would hate to see an iPad theft from a person who has sacrificed so selflessly for our nation. I would like to see the units protected with a Bug Tag.
Confidence gained from learning how to use new technologies and being able to become more independent is priceless for our injured veterans. We owe them our gratitude and a sense of security. Make sure that personal devices are protected with a Bug Tag and an EAS system so there is one less thing for them to be concerned about on their road to recovery.
Get more information on the Bug Tag, contact us or call 1.770.426.0547 today.
Retail Anti-Theft Devices- 3 WC Blog 413
Checkpoint Security Tags- 4
Double Trouble For Employees Trying To Bypass Retail Theft Prevention Devices Part 2
In Part 1 of this two-part series I reviewed my disdain for dishonest employees. They have no consideration for their employer. They have no respect for the person or business willing to hire them for a job and provide them an opportunity to earn a living. I’ve heard so many different excuses for theft that I became numb to them over the years. Since I feel so strongly about dishonest employees and especially those who go to the added trouble of trying to find ways to circumvent retail anti-theft devices like Checkpoint Security tags that I had a desire to be able to catch them a second time. I would also have been happy to help another Loss Prevention Manager catch them at another store after I was done with them. Of course, I also considered that it could have been fun to catch someone stealing at two different stores but that would require working for two different stores. Well, I did nearly run into this situation. I worked as a Loss Prevention Officer for a department store and we caught an employee for stealing who was taking a purse into the presentation office. This employee would look for tags on clothes and try to remove them. More on this story in a moment but it is important that I clarify what Checkpoint Security Tags are before I continue since there may be readers who are unfamiliar with them.
Checkpoint Security Tags are retail anti-theft tools used to prevent the theft of merchandise. They may come in a soft label that is adhered to merchandise, merchandise tags or labels. The security tags also come in hard versions that can be pinned to clothing, softlines merchandise, bedding and I have even seen them pinned through blister packages. Whether a soft tag or hard tag, all are designed to cause electronic article surveillance alarm towers to activate if someone tries to walk out without paying for merchandise. It makes no difference if the thief is an employee or a shoplifter, tags that have not been removed with a detachment key or detuned on a deactivation pad will set off the tower. Tower alarms summon a response from an employee who carefully follows procedures for determining the cause of the alarm. Regardless of who it is that has caused the alarm the same procedures apply. Therefore retail anti-theft devices can identify an internal thief.
In part 1 I told of an employee I prosecuted for stealing and several months later noticed him working in another store and the subsequent actions when he saw me. In the incident I was referring to above I had recently been hired as the Loss Prevention Manager of a store. It was a promotional opportunity from the store I had been working for as a Loss Prevention Associate. We went through several mass orientations for our new store opening. One of the associates seemed awfully familiar to me but I couldn’t put my finger on where I knew her from. I noticed she seemed to be watching me a lot. After several weeks, I saw her taking her purse into the signing room. THEN it dawned on me, I had assisted my boss in apprehending her for employee theft at my former store. Our Regional Loss Prevention Manager would not give the go-ahead for prosecution at that time so she only ended up being fired without going to court. At the department store she had been taking her purse into the signing and presentation office and looking for retail theft prevention devices and Checkpoint Security Tags on clothing. She would remove them if found, put the clothes in her purse and walk out. There was no reason for not pursuing a prosecution of the case except the Regional Loss Prevention Manager didn’t understand the laws of our state at the time concerning employee theft and would not defer to my boss. When it dawned on me that I finally realized where I recognized her from, she was following her old pattern, I guess I changed in my demeanor towards her changed. She abandoned her job in the new store. Not quite caught, but a great feeling of satisfaction for me that I believe I stopped her before she could start cleaning us out!
It isn’t often we get a shot at catching an employee twice for theft but I had two close calls. Regardless, I can honestly say that the use of Checkpoint Security Tags does deter theft, making it hard for employees to steal and they lower stock shortage.
Get more information on Checkpoint Security Tags contact us or call 1.770.426.0547 today
In Part 1 of this two-part series I reviewed my disdain for dishonest employees. They have no consideration for their employer. They have no respect for the person or business willing to hire them for a job and provide them an opportunity to earn a living. I’ve heard so many different excuses for theft that I became numb to them over the years. Since I feel so strongly about dishonest employees and especially those who go to the added trouble of trying to find ways to circumvent retail anti-theft devices like Checkpoint Security tags that I had a desire to be able to catch them a second time. I would also have been happy to help another Loss Prevention Manager catch them at another store after I was done with them. Of course, I also considered that it could have been fun to catch someone stealing at two different stores but that would require working for two different stores. Well, I did nearly run into this situation. I worked as a Loss Prevention Officer for a department store and we caught an employee for stealing who was taking a purse into the presentation office. This employee would look for tags on clothes and try to remove them. More on this story in a moment but it is important that I clarify what Checkpoint Security Tags are before I continue since there may be readers who are unfamiliar with them.
Checkpoint Security Tags are retail anti-theft tools used to prevent the theft of merchandise. They may come in a soft label that is adhered to merchandise, merchandise tags or labels. The security tags also come in hard versions that can be pinned to clothing, softlines merchandise, bedding and I have even seen them pinned through blister packages. Whether a soft tag or hard tag, all are designed to cause electronic article surveillance alarm towers to activate if someone tries to walk out without paying for merchandise. It makes no difference if the thief is an employee or a shoplifter, tags that have not been removed with a detachment key or detuned on a deactivation pad will set off the tower. Tower alarms summon a response from an employee who carefully follows procedures for determining the cause of the alarm. Regardless of who it is that has caused the alarm the same procedures apply. Therefore retail anti-theft devices can identify an internal thief.
In part 1 I told of an employee I prosecuted for stealing and several months later noticed him working in another store and the subsequent actions when he saw me. In the incident I was referring to above I had recently been hired as the Loss Prevention Manager of a store. It was a promotional opportunity from the store I had been working for as a Loss Prevention Associate. We went through several mass orientations for our new store opening. One of the associates seemed awfully familiar to me but I couldn’t put my finger on where I knew her from. I noticed she seemed to be watching me a lot. After several weeks, I saw her taking her purse into the signing room. THEN it dawned on me, I had assisted my boss in apprehending her for employee theft at my former store. Our Regional Loss Prevention Manager would not give the go-ahead for prosecution at that time so she only ended up being fired without going to court. At the department store she had been taking her purse into the signing and presentation office and looking for retail theft prevention devices and Checkpoint Security Tags on clothing. She would remove them if found, put the clothes in her purse and walk out. There was no reason for not pursuing a prosecution of the case except the Regional Loss Prevention Manager didn’t understand the laws of our state at the time concerning employee theft and would not defer to my boss. When it dawned on me that I finally realized where I recognized her from, she was following her old pattern, I guess I changed in my demeanor towards her changed. She abandoned her job in the new store. Not quite caught, but a great feeling of satisfaction for me that I believe I stopped her before she could start cleaning us out!
It isn’t often we get a shot at catching an employee twice for theft but I had two close calls. Regardless, I can honestly say that the use of Checkpoint Security Tags does deter theft, making it hard for employees to steal and they lower stock shortage.
Get more information on Checkpoint Security Tags contact us or call 1.770.426.0547 today