LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore.

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

C-TPAT SECURITY AWARENESS TRAINING
Facilities Management and Design Chapter 4 Safety and Security systems.
Emergency Preparedness and Response
Secure Your Store Understand the measures used in securing a retail store.
Welcome to Telect’s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation.
Procedures For The Handling of Security Paper 2009 Local Issuance Training Presented by: Field Services Program Office of the State Registrar.
The Office Procedures and Technology
LOUISIANA GFOA 31 ST ANNUAL FALL CONFERENCE.  Currency  Coin  Checks  Debit Cards  Credit Cards.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
1 Introduction to Security Chapter 15 Institutional Security.
Lessons Learned Data and Asset Security FOCUS Spring 2006 Chuck Banner UVA-Wise.
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
Business Risks How much of a risk are you willing to take? Going out on a limb.
Section 34.2 Handling Business Risks
Express Stores Reducing Shoplifting. The Problem What can Express #892 do to reduce shoplifting?
CHAPTER 9 SECURITY VIRTUAL BUSINESS RETAILING 3.0.
Understand Merchandise Planning in Retailing. The Merchandise Plan A budgeting tool that helps retailer or buyer to meet department goals ▫Planned sales.
Operating a Retail Store Understand how to make a retail store operational.
Receiving, Storing, and Issuing
 Violence in the workplace is a potential source of injury or even death for workers.  Although most workers will never experience any form of workplace.
Chapter 9 Non-Cash Assets.
Chapter 16 Retail Security. Retail Establishment Crimes  Shoplifting.  Burglary.  Vandalism.  Bad checks.  Fraudulent credit cards.  Employee theft.
OH 9-1 Managing Shifts to Ensure a Quality Operation Human Resources Management and Supervision 9 OH 9-1.
CASH HANDLING Training Presentation
IT Server Receiving Dock Compactor Employee Entrance Cash Office Power, Water & HVAC Controls Identity Theft Contact Hilco For An Enterprise Exposure Check-Up.
FLOOR WARDEN TRAINING Presented by State Risk Management 2011.
Journal Question ► Why do companies have rules and processes to follow when dealing with cash?
LOSS PREVENTION & RISK MANAGEMENT PROGRAM Loss Prevention Program A loss prevention program is helpful to promote the organization safe along with create.
Perpetual Inventory System
Presented By: Michael Munaco
Security Issues with Vendors, Employees, and Customers Chapter 10.
 Arranging Cash › Smaller Denominations Should Start On The Right And Proceed Up  Recording Sales › Cash Registers And Point Of Sale (POS) Terminals.
The Office Procedures and Technology Chapter 6 Processing and Understanding Financial Information Copyright 2003 by South-Western, a division of Thomson.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Lesson 7.3 PROTECT YOUR BUSINESS
Fraud, Internal Control, and Cash
RISK MANAGEMENT. RISK IS INEVITABLE  From your research of local businesses, what Risk was unavoidable and why?  Speculative Vs. Pure Risk  Speculative=
Chapter 18 Institutional Security. Special Security Institutions  Hospitals and other health care facilities.  Educational institutions.  Libraries.
Cash Control and Banking Activities Making Accounting Relevant Businesses deposit all cash and checks into a bank account and make payments using checks.
Retail and sales management Session 15. Learning from the session Store management/operations management Store management/operations management.
Lesson 9: Security. Objectives  Calculate shrinkage based on merchandise book value and physical inventory counts  Give examples of internal and external.
CA$H and Internal Controls. Internal Control consists of... all the related methods and measures adopted within a business to: –safeguard its assets Employee.
Security Precautions. Common Security Problems ShopliftingShoplifting PilferagePilferage BurglaryBurglary RobberyRobbery FraudFraud.
Chapter 6 Enhancing Security Through Procedural Controls.
Chapter 3-1 The Islamic University of Gaza Accounting Information System The Revenue Cycle Dr. Hisham Madi.
BE HOSPITABLE, BE SAFE PERSONAL AND PROFESSIONAL SECURITY Ofc. B.P.Corrado Colorado Springs Police Department School Resource Officer Palmer High School.
Violence in the Workplace Module 14. Objectives Define violence Identify the problems of violence Explain methods to resolve problems rather than through.
Marketing Math Chapter 16. Functions of a cash register Record sales Record sales Store cash and sales documents Store cash and sales documents Provide.
Entrepreneurship: Ideas in Action 5e © 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Security Lesson 9. Objectives Calculate shrinkage based on merchandise book value and physical inventory counts Give examples of internal and external.
Business Security Marketing II Unit II. I. Why Businesses Need Security Protect Buildings EquipmentFixturesRecordsGoods Protect against theft of money.
Course of Study 6. Security Management  Security and its Importance  Security of the Guest and their Property  Security Needs for the Staff and the.
STAMP ACCOUNTABILITY MANAGEMENT Pacific Area Finance Training February 2008.
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
The Office Procedures and Technology Chapter 7 Time and Workstation Management Copyright© 2007 Thomson/South-Western.
Final Topics in Chp. 6 BUA111: Weeks 14 and 15.
Chapter 9 Non-Cash Assets.
Make it Operational: Food Sales
Larry Brownfield, CPO, OHE – KOA, Inc.
Prevent Shoplifting – Reduce Shrinkage
Sarbanes-Oxley, Internal Control, and Cash
Chapter 7 Part 1 Internal Control
Part I: Purchases and Cash Disbursements Procedures
Chapter 9 Non-Cash Assets.
Business Safety Options to be had for Business Owners.
Mrs. Alexander-Harrison Entrepreneurship
Sarbanes-Oxley, Internal Control, and Cash
Operations Management
Inventories LO 1 – Controlling Inventory.
Presentation transcript:

LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore

Internal –Removal of items from the store without payment –Overcharging customers to gain profit –Unauthorized benefits to gain sales –Padding paychecks through inaccurate time recording

Combatting External Theft –Surveillance Installation of cameras at all possible entrance and exit points Create a system allowing two Loss Prevention Officers per eight hour shift Increase employee awareness of potential areas and items of increased risk for customer theft –Increase employee patrol/monitoring of these areas

Combatting External Theft (cont.) –Alarms Inspect and install external entry alarm systems on all exit doors Active on all doors during nonoperational hours Active on generally unused doors during business hours Include roof access, vent access, and other nonconventional points of entry

Combatting External Theft (cont.) –Alarms (cont.) Inspect and install interior alarms to detect unauthorized access to areas containing high value items Inspect and install detection alarms at all customer exists to detect removal of merchandise without payment –Secure alarm deactivating devices to payment point to ensure deactivation after payment

Combatting External Theft (cont.) –Lighting Inspect and ensure areas are properly lit –Parking areas should lit for visibility across –Entrances should be well lit for identification by surveillance –Stockroom and floor areas should be properly lit to ensure safety from hazards »Tripping/fall risks »Overhead areas At least.2 foot-candles with overlapping illumination ( Fischer, 2008)

Combatting External Theft (cont.) –Vendors and Merchandise Logs and Invoices should be reviewed for accuracy to ensure services and merchandise match payment –Shipping / Receiving Logs »Check for merchandise paid for but not delivered »Damaged merchandise should be returned for credit –Vendor Invoices »Check for accuracy and overcharging »Ensure all parts billed were used and logical

Combatting Internal Theft –High Risk Areas Valuable items or popular items should be protected –Locked up and behind glass or in cages –Tagged with anti-theft devices Anti-Theft detection devices should be placed at all public exits Limit access to these areas by limiting keys and codes

Combatting Internal Theft (cont.) –Interior Surveillance Monitoring of high risk areas should be done by either overhead camera or through constant staffing, or both Exits should be monitored through cameras and by staff if possible Cash areas should be staffed at all times, especially those in public view

Combatting Internal Theft (cont.) –Sales and Cash Drawers Logs of each drawer should be kept and profit made should be removed from each drawer at a set point during each day Any overages or shortages should be reported to Loss Prevention Personnel Sales should be periodically reviewed to prevent overcharging for employee profit

Combatting Internal Theft (cont.) –Employee Time Sheets Employee punch system should be reviewed and updated Electronic punch timers with timestamps are usually the best option Timesheets should be reviewed weekly to ensure employees are not padding paycheck through unworked on-clock time.

Training –Training on all equipment, procedures and expectations should be completed by all associates and by new employees as they are hired Can be in form of –Computerized training –Meetings –Paperwork handouts Some form of compliance and test of knowledge should take place

Training (cont.) –Retraining and refreshment courses should be completed at a set interval at least once a year. Education –Employees should be educated on what to look for considering signs of both internal and external theft –Methods of anonymous reporting should be established

Education (cont.) –Employees should be educated on high risk areas and common personal habits of nervousness or anxiety that may be displayed –Employees and management should also be informed and education as to cameras being on the premises.

References Fischer, R. J., Halibozek E., & Walters, D. (2008). Introduction to security (8 th ed.). Burlington, MA: Elsevier Science/ Butterworth & Heinemann.