Is there a shoplifting epidemic in the United States in 2023. What is the economic impact to the retailer and consumer?

Is there a shoplifting epidemic in the United States in 2023. What is the economic impact to the retailer and consumer?

As of my last update in September 2021, I don’t have enough new data on any shoplifting epidemic in the United States. However, shoplifting and retail theft continue to be an escalating issue for retailers, causing economic impacts on both the retail industry and consumers. Let’s discuss the potential effects and implications of shoplifting on the retailer and the consumer.

Economic Impact on Retailers:
a. Loss of Revenue: Shoplifting leads to direct financial losses for retailers as stolen merchandise cannot be sold, resulting in a decrease in revenue.
b. Increased Security Costs: To combat shoplifting, retailers need to invest in security measures such as surveillance systems, security personnel, and anti-theft technology such as a Sensormatic System. These added expenses can strain a retailer’s budget.
c. Higher Insurance Premiums: Frequent theft incidents can lead to higher insurance premiums for retailers, adding further financial burden.
d. Cost of Restocking: Replacing stolen items can be costly for retailers, especially if the thefts are frequent or involve high-value goods.
e. Impact on Small Businesses: For small retailers, shoplifting can be particularly devastating, potentially leading to closures or financial instability. Smaller Retailers suffer the most because they cannot spread out the losses. In most cases prevention techniques such as employee training, Sensormatic Systems, and CCTV are critical to the small to medium size Retailer.

Impact on Consumers:
a. Price Increase: To offset losses from theft and increased security measures, retailers may raise prices on their products, which ultimately affects consumers by increasing the cost of goods.
b. Reduced Product Selection: In extreme cases, retailers may discontinue certain products if they are frequently targeted by shoplifters, limiting choices for consumers.
c. Impact on Retail Experience: Shoplifting can lead to more stringent security measures, such as increased bag checks or restrictions on browsing, affecting the overall shopping experience for consumers. Application of an Electronic Article Surveillance (EAS) system such as a Sensormatic System protect the Retailer without impacting their customer.
d. Loss of Trust: Consumers might lose trust in a retailer if shoplifting incidents are not effectively managed, leading to a negative perception of the brand.

Societal Impact:
a. Increased Crime Rates: Shoplifting can contribute to overall crime rates, affecting the safety and security of communities.
b. Legal and Law Enforcement Costs: Dealing with shoplifting cases can be burdensome for law enforcement agencies and add to the already-strained legal system.
c. Diversion of Resources: The diversion of law enforcement resources to address shoplifting may impact their ability to tackle more serious crimes.

It’s important to note that the situation may have evolved since my last update, and more recent data would be necessary to determine if there is a current shoplifting epidemic in the United States. Addressing shoplifting requires a comprehensive approach involving retailers, law enforcement, and communities working together to minimize its impact and ensure a safer retail environment for everyone.

For more information visit our website. You can also visit our FREE monthly Loss Prevention Magazine for more theft prevention techniques and information.

CONTACT US

What types of shoplifters are there and when are shoplifters most likely to try to steal from a Retailer?

What types of shoplifters are there and when are shoplifters most likely to try to steal from a Retailer?

Shoplifting is a common form of theft that occurs in retail settings, and it’s essential for retailers to understand the different types of shoplifters and the factors that influence when they are most likely to attempt stealing. Shoplifters can be classified into several categories based on their motivations and behaviors. Let’s explore the different types of shoplifters and the times when they are more likely to target retailers:

  1. Amateur Shoplifters: These are individuals who engage in shoplifting impulsively and without much planning. They might steal small items or goods that they personally desire. Amateur shoplifters are often inexperienced and easily deterred. They are more likely to strike during busy shopping periods when there is less attention on individual customers.
  2. Professional Shoplifters: Unlike amateurs, professional shoplifters are well-organized and experienced in stealing merchandise. They often operate in groups and may use distractions or shoplifting tools to evade detection. Professional shoplifters tend to target high-value items that can be easily resold for profit. They might strike during busy periods when store staff is preoccupied and security is spread thin.
  3. Opportunistic Shoplifters: This group includes individuals who spot an easy opportunity to steal, often due to negligence or lack of proper security measures. Opportunistic shoplifters may not have a history of theft but seize the chance when they notice vulnerabilities in the store’s surveillance or employee awareness.
  4. Employee “Shoplifters”: These shoplifters are retail staff members who steal from their own workplace. Employee theft can be particularly damaging as insiders have better knowledge of store operations and security. They may try to conceal their actions by manipulating inventory records or tampering with security systems. Employee shoplifting can happen at any time when they feel they can go undetected.
  5. Addictive Shoplifters: Some individuals shoplift due to underlying psychological issues, such as kleptomania or substance addiction. These shoplifters may not necessarily have a motive to use or sell the stolen items; instead, the act of stealing itself serves as a coping mechanism for their emotional struggles. Addictive shoplifters may strike at any time, and they might be more prone to stealing during stressful periods in their lives.
  6. Flash Mob Shoplifters: In recent years, there have been instances of organized groups, often referred to as “flash mobs,” participating in coordinated shoplifting activities. These groups assemble quickly, overwhelm store personnel, and steal a large quantity of items before dispersing rapidly. Flash mob shoplifting can be challenging to predict, but it often occurs during periods of mass gatherings or events.
    When are shoplifters most likely to try to steal from a retailer?
  7. Peak Shopping Seasons: Shoplifting incidents tend to increase during peak shopping seasons like holidays (e.g., Christmas, Thanksgiving) when stores are crowded, and staff is busier than usual.
  8. Weekends and Evenings: Shoplifting attempts are more common on weekends and during evening hours when stores are generally busier, and surveillance may be less stringent.
  9. During Sales and Promotions: Shoplifters might take advantage of sales events and promotions when discounts attract more customers, making it easier for them to blend in.
  10. Store Opening and Closing Times: Shoplifters might target stores during opening or closing hours when employees are occupied with setting up or shutting down, and security may be lax.
  11. Understaffed or Overwhelmed Stores: Shoplifters are more likely to strike when stores are understaffed or during busy periods when employees are overwhelmed, making it easier to go unnoticed.
  12. During Distractions: Major in-store events, demonstrations, or entertainment might serve as distractions, enabling shoplifters to take advantage of reduced vigilance.
    It’s important to note that retailers can take preventive measures to deter shoplifters, such as investing in a Sensormatic System, training staff to identify suspicious behaviors (Loss Prevention Systems does this for you free of charge when you purchase a system), and maintaining good visibility throughout the store. Understanding the different types of shoplifters and their tendencies can assist retailers in developing effective strategies to combat theft and minimize losses.
    For more information CONTACT US. You can also VISIT OUR WEBSITE.
Is shoplifting becoming more violent in the US? How can retailers counter the potential violence in their stores?

Is shoplifting becoming more violent in the US? How can retailers counter the potential violence in their stores?

Shoplifting incidents can vary in nature and severity, and trends can differ across regions and time periods. While some instances of shoplifting may involve violence, it is important to approach the topic with caution and not generalize based on isolated incidents. Shoplifting-related violence is not necessarily a widespread phenomenon, but retailers should still take precautions to ensure the safety of their employees and customers. Here are some potential strategies retailers can consider:

Employee training: Retailers can provide comprehensive training to their employees on how to handle potentially difficult situations, including shoplifting incidents. This training can include de-escalation techniques, conflict resolution skills, and when to involve security or law enforcement. Loss Prevention Systems provides this LIVE training in person or on-line.

Visible store presence: Maintaining a visible presence of staff and security personnel in the store can act as a deterrent to potential shoplifters. When individuals perceive a higher risk of being caught, they may be less likely to engage in shoplifting or violence.

Effective store layout and surveillance: Retailers can design their stores with clear sightlines and unobstructed views to minimize blind spots. Installing surveillance cameras strategically can help deter theft and provide evidence if incidents occur. However, keep in mind that CCTV is more “after the fact”. There is some deterrence value however, there are better methods for prevention.

Collaboration with law enforcement: Establishing strong relationships with local law enforcement agencies can be beneficial. Retailers can work together with the police to share information, report incidents promptly, and coordinate efforts to prevent and address shoplifting incidents. You should set up an in person meeting with a member of your local law enforcement agency. Have them give you input about your stores vulnerabilities, how they respond and what other measures they can provide such as more frequent marked patrol car drive byes, walking patrol…. You should make it clear that they are always welcome in your store and encourage them to stop by. A cup of coffee, bottle of water…. sends the right message. Most law enforcement agencies have “Zone” type meetings, crime prevention meetings… You should join and go every time. This will keep you up to date on crime in your specific area.

Technology-based solutions: Retailers can explore the use of advanced security technologies, such as electronic article surveillance (EAS) systems like a Sensormatic System, RFID tagging, video analytics, and inventory management systems. These technologies can help detect theft attempts, track inventory, and improve overall store security. Again, Loss Prevention Systems has all of these technologies and we sell, install and service nationwide.

Safety protocols and emergency planning: Retailers should develop and communicate clear safety protocols to their employees in case of emergencies or violent situations. This may involve creating evacuation plans, implementing panic buttons on your burglar alarm system. These panic buttons should be installed in places that employees can retreat to in the event of an emergency. Having them at the POS is fine but, the back office, stock rooms are better. Train your staff on how to respond appropriately in different scenarios.

It’s important for retailers to conduct a thorough risk assessment based on their specific store locations, customer demographics, and historical incidents to determine the most appropriate security measures to implement. Consulting with a Loss Prevention Expert or industry associations can provide valuable insights tailored to the retail environment.

For more information Contact Us. You can also visit our website.

Enhance Patient Data Security With A Bug Tag

iPad theft – 3                                                                                                                       WC Blog 551
Bug Tag-5

Enhance Patient Data Security With A Bug Tag

     The problem of patient medical information being stolen is not going away any time soon nor is the threat of medical iPad theft.  As an example in a Jan. 3, 2018 article in beckershospitalreview.com by Julie Spitzer, “Stolen computer at Penn Medicine compromises 1k patient records”, the writer says, “Philadelphia-based Penn Medicine mailed letters to roughly 1,000 patients, alerting them to a potential compromise of their personal information after an unencrypted laptop was stolen from the hospital…” The facility claimed that credit card, bank account information and social security numbers were not included in the computer but other patient data was. The solutions many medical institutions want to implement are stricter encryption and security password implementation to prevent potential hacking should a device be stolen. The team at Loss Prevention Systems Inc. has a better means of protecting against iPad theft and medical tablet theft and that is the use of a Bug Tag on all devices.

     The Bug Tag uses electronic article surveillance (EAS) technology working with Checkpoint pedestals to create a virtual electronic barrier to theft. The tag emits a constant radio frequency signal. When that signal is detected by a Checkpoint pedestal a sound is activated that is so loud that in a big box retail store it can be heard from one end of the building to the other. LED lights in pedestals flash drawing more attention to an attempted breach (it also alerts someone who may be hearing impaired that a tagged device is being removed from the building). When an alarm is set off employees respond to the exit and retrieve the device from the offending party. What if the thief runs out after an alarm? Use the 3-alarm Bug Tag and an internal alarm in the tag activates and the criminal can be picked out in a crowd. What if someone just pulls a tag off and then steals the iPad? No problem. The same internal alarm activates if the tag is tampered with and employees respond to the sound of the alarm and recover the unit. As a Loss Prevention Manager I saw the effectiveness of Checkpoint pedestals and how the alarms saved untold thousands of dollars in merchandise in my store. That same protection can keep mobile medical devices in a medical facility.

     The concern over continued medical device theft and data breaches is extensive enough that a story in delawareonline.com Dec 18, 2017 by Meredith Newman, “Delaware doctors, hospitals increase security as medical data breaches continue nationwide” said that the Delaware Health Information Network “…recently hired a privacy and security compliance manager whose sole job is to monitor the safety of patient data and address any concerns that might come up.” The story also reported that there is insurance medical providers can purchase to cover data breaches and these policies can include prebreach and postbreach services! I understand the importance of protecting yourself against lawsuits but when you have to talk about PREBREACH coverage something seems very out of whack to me.

     Encrypting of devices and using strong password protection is important to keep hackers out but the bigger issue is the loss and theft of devices. Many of these mobile computers and handheld devices are being taken home and leaving the security of the building. Use dedicated devices that are held in the building and protect them with a Bug Tag. It might be a bit inconvenient to have to check a device in and out at the beginning and end of the day but the risk of leaving it where it could be stolen is a bigger concern. Many of the HIPPA violations involving data breaches that are reported to the Department of Health and Human Services are caused by computers that have been stolen from cars or homes when taken home. Wouldn’t it make more sense to keep them in a building and protected with anti-theft devices?

      Medical computer tablet theft and iPad theft are happening on a regular basis. As more and more healthcare providers become reliant on electronic resources and digital documentation it is important that patient information is a priority. Use all of the security resources that are available to you and that includes securing the devices you rely on to do your work. Use the Bug Tag and stop criminals before they can spirit a device out of your building.
Get more information on a Bug Tag, contact us or call 1.770.426.0547 today.  

The problem of patient medical information being stolen is not going away any time soon nor is the threat of medical iPad theft.  As an example in a Jan. 3, 2018 article in beckershospitalreview.com by Julie Spitzer, “Stolen computer at Penn Medicine compromises 1k patient records”, the writer says, “Philadelphia-based Penn Medicine mailed letters to roughly 1,000 patients, alerting them to a potential compromise of their personal information after an unencrypted laptop was stolen from the hospital…” The facility claimed that credit card, bank account information and social security numbers were not included in the computer but other patient data was. The solutions many medical institutions want to implement are stricter encryption and security password implementation to prevent potential hacking should a device be stolen. The team at Loss Prevention Systems Inc. has a better means of protecting against iPad theft and medical tablet theft and that is the use of a Bug Tag on all devices.
     

The Bug Tag uses electronic article surveillance (EAS) technology working with EAS pedestals to create a virtual electronic barrier to theft. The tag emits a constant radio frequency signal. When that signal is detected by a EAS pedestal a sound is activated that is so loud that in a big box retail store it can be heard from one end of the building to the other. LED lights in pedestals flash drawing more attention to an attempted breach (it also alerts someone who may be hearing impaired that a tagged device is being removed from the building). When an alarm is set off employees respond to the exit and retrieve the device from the offending party. What if the thief runs out after an alarm? Use the 3-alarm Bug Tag and an internal alarm in the tag activates and the criminal can be picked out in a crowd. What if someone just pulls a tag off and then steals the iPad? No problem. The same internal alarm activates if the tag is tampered with and employees respond to the sound of the alarm and recover the unit. As a Loss Prevention Manager I saw the effectiveness of EAS pedestals and how the alarms saved untold thousands of dollars in merchandise in my store. That same protection can keep mobile medical devices in a medical facility.
     

The concern over continued medical device theft and data breaches is extensive enough that a story in delawareonline.com Dec 18, 2017 by Meredith Newman, “Delaware doctors, hospitals increase security as medical data breaches continue nationwide” said that the Delaware Health Information Network “…recently hired a privacy and security compliance manager whose sole job is to monitor the safety of patient data and address any concerns that might come up.” The story also reported that there is insurance medical providers can purchase to cover data breaches and these policies can include prebreach and postbreach services! I understand the importance of protecting yourself against lawsuits but when you have to talk about PREBREACH coverage something seems very out of whack to me.
     

Encrypting of devices and using strong password protection is important to keep hackers out but the bigger issue is the loss and theft of devices. Many of these mobile computers and handheld devices are being taken home and leaving the security of the building. Use dedicated devices that are held in the building and protect them with a Bug Tag. It might be a bit inconvenient to have to check a device in and out at the beginning and end of the day but the risk of leaving it where it could be stolen is a bigger concern. Many of the HIPPA violations involving data breaches that are reported to the Department of Health and Human Services are caused by computers that have been stolen from cars or homes when taken home. Wouldn’t it make more sense to keep them in a building and protected with anti-theft devices?
     

Medical computer tablet theft and iPad theft are happening on a regular basis. As more and more healthcare providers become reliant on electronic resources and digital documentation it is important that patient information is a priority. Use all of the security resources that are available to you and that includes securing the devices you rely on to do your work. Use the Bug Tag and stop criminals before they can spirit a device out of your building.

 

Get more information on a Bug Tag, contact us or call 1.770.426.0547 today.  

Take A Balanced Approach To Prevent Medical Tablet Theft

Tablet Theft-5                                                                                                                             WC Blog 514
i-Pad Theft-3
Bug Tag-4


Take A Balanced Approach To Prevent Medical Tablet Theft

     Computer tablet theft and iPad theft in hospitals are an increasing threat as the use of personal hand-held computers grows more prevalent in the medical field. There are new applications for computer tablets to improve the care of patients on a regular basis. I recently came across a new use for computer tablets that aids in the prevention of fall accidents in hospitals. This new technology involves special socks with sensors in them that monitor the movements of a patient. In a story from Cincinnati.com, Dec. 8, 2017 by Anne Saker, titled “How can we prevent falls? Hospitals could find an answer in Cinc-designed ‘smart’ socks”, Ms. Saker reports on a patient in a Madison County hospital. The patient was wearing a pair of Palarum socks, “made by the renowned French textile company Perrin” designed to help prevent patient falls before they can happen. The socks have sensors in them that can send a signal to a nurse monitoring the patient who is wearing the socks. “Using a Palarum tablet computer in a patient room or at a main desk, a nurse tells the monitor about the patient, including weight…When the socks detect downward pressure past a certain threshold, the filaments in the fabric signal the monitor on the sock. The wireless alarm goes out to the three nurses closest to the patient.”     https://www.cincinnati.com/story/news/2017/12/08/how-can-we-prevent-falls-hospitals-find-answer-cincinnati-designed-smart-socks/904983001/
Sensor socks and a computer tablet that can save patients from potential falls, that is incredible! I hope you noticed as I did when reading the article, the nurse tells the monitor about the patient. That means private patient data is in these computers and therein lies to risks associated with mobile device theft and i-Pad theft in hospitals. Bill Bregar, the CEO of Loss Prevention Systems Inc. (LPSI) recognizes the dangers associated with computer theft from medical facilities of all types and has an answer for them with the Bug Tag.

     A simple design, the Bug Tag is a small device that uses electronic article surveillance (EAS) technology to prevent theft. The tag is attached directly to the back of a mobile computing device with an adhesive sled. The facility has EAS pedestals installed at all entrances and exits (and even outside of restrooms if so desired) and in the event of an attempted tablet theft the Bug Tag sends out a signal that sets off alarms in the pedestals before the perpetrator even gets to the door to walk out. The lights and alarms of the pedestals alert employees who respond and recover the tablet or i-Pad. Concerned that a criminal could just remove a tag from a unit and still commit i-Pad theft? No need to worry, the tags have tamper alarms built in that will sound their own warning if a criminal tried to pull one off of a device. The wonderful part about the use of these anti-theft devices is that they allow for total freedom of movement within a facility for care providers they just keep the devices from being taken out.

     There a readers who may be scoffing at the idea that a tablet theft is really all that big a deal. Most hospitals and clinics are going to encrypt their devices, right? Besides, we are talking about socks here, how much information can a criminal get other than a patient’s shoe size? There are several things readers should consider. First, we are only addressing one use of mobile devices in the medical field here. The proliferation of handheld computers is enormous in medicine. They are being used by doctors to video conference to remote locals to aid in treatment of patients. They are being used by doctors and nurses to check on patients rather than carrying the old charts around. It wasn’t long ago I was in a hospital emergency room and the doctors were doing rounds with interns carrying i-Pads or tablets and discussing patient statuses. I have signed into a waiting room at a care clinic on an i-Pad rather than registering with the old forms. All of that patient information becomes available to criminals when a tablet theft or i-pad theft takes place. If encryption were a cure all then I would ask the skeptics, why does DHHS levy severe fines on medical facilities that have mobile and computer devices stolen? Would it be necessary to penalize if there were no risk of patient data loss?

        Whether it is protecting a patient using special balance socks and a computing device or any other medical computer using a Bug Tag is a step in the right direction. Let LPSI help you get started in preventing tablet theft with EAS pedestals and tags.
Get more information on a Bug Tag, contact us or call 1.770.426.0547 today.

Computer tablet theft and iPad theft in hospitals are an increasing threat as the use of personal hand-held computers grows more prevalent in the medical field. There are new applications for computer tablets to improve the care of patients on a regular basis. I recently came across a new use for computer tablets that aids in the prevention of fall accidents in hospitals. This new technology involves special socks with sensors in them that monitor the movements of a patient. In a story from Cincinnati.com, Dec. 8, 2017 by Anne Saker, titled “How can we prevent falls? Hospitals could find an answer in Cinc-designed ‘smart’ socks”, Ms. Saker reports on a patient in a Madison County hospital. The patient was wearing a pair of Palarum socks, “made by the renowned French textile company Perrin” designed to help prevent patient falls before they can happen. The socks have sensors in them that can send a signal to a nurse monitoring the patient who is wearing the socks. “Using a Palarum tablet computer in a patient room or at a main desk, a nurse tells the monitor about the patient, including weight…When the socks detect downward pressure past a certain threshold, the filaments in the fabric signal the monitor on the sock. The wireless alarm goes out to the three nurses closest to the patient.”     https://www.cincinnati.com/story/news/2017/12/08/how-can-we-prevent-falls-hospitals-find-answer-cincinnati-designed-smart-socks/904983001/Sensor socks and a computer tablet that can save patients from potential falls, that is incredible! I hope you noticed as I did when reading the article, the nurse tells the monitor about the patient. That means private patient data is in these computers and therein lies to risks associated with mobile device theft and i-Pad theft in hospitals. Bill Bregar, the CEO of Loss Prevention Systems Inc. (LPSI) recognizes the dangers associated with computer theft from medical facilities of all types and has an answer for them with the Bug Tag.
     

A simple design, the Bug Tag is a small device that uses electronic article surveillance (EAS) technology to prevent theft. The tag is attached directly to the back of a mobile computing device with an adhesive sled. The facility has EAS pedestals installed at all entrances and exits (and even outside of restrooms if so desired) and in the event of an attempted tablet theft the Bug Tag sends out a signal that sets off alarms in the pedestals before the perpetrator even gets to the door to walk out. The lights and alarms of the pedestals alert employees who respond and recover the tablet or i-Pad. Concerned that a criminal could just remove a tag from a unit and still commit i-Pad theft? No need to worry, the tags have tamper alarms built in that will sound their own warning if a criminal tried to pull one off of a device. The wonderful part about the use of these anti-theft devices is that they allow for total freedom of movement within a facility for care providers they just keep the devices from being taken out.
     

There a readers who may be scoffing at the idea that a tablet theft is really all that big a deal. Most hospitals and clinics are going to encrypt their devices, right? Besides, we are talking about socks here, how much information can a criminal get other than a patient’s shoe size? There are several things readers should consider. First, we are only addressing one use of mobile devices in the medical field here. The proliferation of handheld computers is enormous in medicine. They are being used by doctors to video conference to remote locals to aid in treatment of patients. They are being used by doctors and nurses to check on patients rather than carrying the old charts around. It wasn’t long ago I was in a hospital emergency room and the doctors were doing rounds with interns carrying i-Pads or tablets and discussing patient statuses. I have signed into a waiting room at a care clinic on an i-Pad rather than registering with the old forms. All of that patient information becomes available to criminals when a tablet theft or i-pad theft takes place. If encryption were a cure all then I would ask the skeptics, why does DHHS levy severe fines on medical facilities that have mobile and computer devices stolen? Would it be necessary to penalize if there were no risk of patient data loss?
       

Whether it is protecting a patient using special balance socks and a computing device or any other medical computer using a Bug Tag is a step in the right direction. Let LPSI help you get started in preventing tablet theft with EAS pedestals and tags.


Get more information on a Bug Tag, contact us or call 1.770.426.0547 today.