Property Theft FY 2014 July - May Reported Thefts Unfounded Actual UGA as Victim Total Loss 384 82 302 71 $321,058.

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
By Marla Williams, CPPM President, Integrated Asset Management, Inc. Executive Vice President, Federal Center Chapter.
GETTING TO KNOW YOUR FIXED ASSETS/EQUIPMENT INVENTORY Kathy Schultz.
Property Custodian Meeting
Asset Management Overview of asset procedures How to have assets removed or transferred to another department Contact information for asset staff.
ASU Fixed Assets Departmental Training. Purpose of This Session Requirement of the business process compliance standards Provide Information for new employees.
Purdue University Calumet Counseling Center Gyte
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Cleveland School District Gerald Finley, Property Manager Friday, July 27, 2012.
Property Management Overview
 Importance of property management.  Understand your financial liability for fixed assets.  Recognize all employees have responsibilities for equipment,
PII – Identifying and Managing Risk Presented by: UNL Office of Internal Audit and ITS Security March 2014.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Fixed Assets Policies and Procedures that directly affect Your work, Your budget And your responsibility for protection of WSSU assets as custodian department.
Property Custodian Meeting June 18, Final Tally for FY 14  We are currently missing approximately 3.5% of the inventory (5.7% last year). The total.
Title IX of the Education Amendments of 1972 prohibits sex discrimination in educational programs and activities.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Brooke Banks Information Security. Security is your business.
PERSONAL RECORDS.  What is Personal Identification?  Do you have any forms of Personal Identification? Is so, What?  When would you need Personal Identification?
UNIVERSITY OF NORTH DAKOTA Reporting a Loss & Filing a Claim.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Thefts, Floods, Fires…. OH MY! A primer on renter’s insurance Off-Campus Student Services
 REPORT Cost Center’s Uncapitalized Tangible Property Inventory Report (PCS #3-2918) is completed any time after the fiscal year begins by conducting.
Purchasing Card Record Keeping & Retention REVISED
When are You Insured? Georgia Department of Administrative Services (DOAS) Risk Management provides insurance for all state agencies through a self-insured.
You Track it: Decentralized Access and Control with Electronic Cradle to Grave Inventory Management.
Property Custodian Meeting July 10, Review of USM Internal Auditor Findings  Excerpt from the USM Internal Auditors report dated May 31, 2012:
Stalking Stalking is a serious crime that occurs when one person engages in actions directed at another person (the target) which causes this person to.
MANAGEMENT OF TECHNOLOGY EQUIPMENT Resource Management Associates (RMAs) will be responsible for Technology Equipment at their schools which includes:
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Office of Risk Management Annual Conference. AGENDA  Remembering 2009  Types of Claims Handled by the Property Unit  What to do after a loss  How.
1 Unit 6 – Various Required Reporting. Unit 6 Various Required Reporting Goals: What is reportable in PEMS Escalation / actionable report vs. Escalation.
Mansfield University Developing Tomorrow’s Leaders New and Changing Laws and the Impact on Mansfield University 1.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
University Equipment May 6, Who is Property Accounting  Janice Harrison – Director of Property Accounting  Poli Navarro – Fiscal Support Analyst.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
Rapid Security Risk Analysis Farrokh Alemi, Ph.D. Georgetown University.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Course # Unit 6 - Various Required Reporting.
New Principal Training Property Control July 7, 2015.
James Page Information Security. Levels of Data  Level 3  Publicly available data  Level 2  University Sensitive data  Student Records  Employee.
Texas Law Enforcement Best Practices Mid Year Training Conference.
Title I Bookkeepers’ Training Property Control October 7, 2015.
Dept. of Contracts & Property Presented by: Property Office
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Records Management Program Records Management 101.
Property Custodian Meeting December, Review of USM Internal Auditor Findings  Capital and sensitive equipment inventory was not properly tracked.
Hazard Communication City of Burlington. Introduction What’s it all about: Workplace chemical usage How we use them How we protect ourselves Chemical.
Advantage of Security Systems.  Today security camera is a much needed thing to protect us and to preserve valuable properties.  Along with the home.
Chapter 7. Identifying Assets and Activities to Be Protected
“Safety is everyone’s responsibility”
Equipment Inventory Management
Chapter 9 Non-Cash Assets.
Make it Operational: Food Sales
Bookkeeper’s Workshop
Information Security Seminar
Chapter 9 Non-Cash Assets.
UGA Extension Credit Card Processing Training
asset tracking and inventory management
Gaston STAFF INVENTORY
Vulnerability Management Team Information Security Office
Asset Management Overview of Asset Management function and procedures
Kentucky County Treasurer’s Fundamentals Course
Welcome to the 2019 Property Control Inventory Update
Property Control Asset Forms
Requisition Training Lana Sacks Senior Administrative Associate
Presentation transcript:

Property Theft FY 2014 July - May Reported Thefts Unfounded Actual UGA as Victim Total Loss $321,058

Theft of Lost or Mislaid Property Reports Filed for Property Discovered Missing During Inventory Fiscal Year FY2012 FY2013 FY2014 Reported Total Loss $101,360 $104,765 $145,343 In FY2014, theft of lost or mislaid property reports involving inventoried equipment represents 2% of all theft reports on campus. However, the dollar amount represents 45% of total loss amount of all theft reports taken. Over the 3 year period, the largest reported time frame of when the property was last seen to when discovered missing was 67 months. Average time frame was 16 months.

Items Reported Missing During Inventory FY Property Type Laptop Computers Desktop Computers Tablets Cameras / Video Recorders Projectors Network Switches Servers Reported Missing What is the likelihood that any of the property unaccounted for is host to sensitive or confidential information?

Common Themes Property assigned to an employee that is not retrieved before an employee’s date of separation. Can be months before property is discovered missing. Property is stored in a secure location and checked off during annual inventory. However, reported time frame is greater than 12 month inventory cycle. Property Custodian believes they know where property is located without visually verifying. Property is stored in a location with access by everyone. Possibilities of “who done it” are endless. Can be rectified with proper procedures or by adhering to procedures already in place.

UGA Police Department Programs Personal Safety for Women and Workshop Risk Reduction for Men Workplace Safety / Security Tips for Office Personnel Workplace Violence General Safety DUI & Alcohol Awareness Cybersafety The UGA Police Department’s Crime Prevention Unit will also tailor a course to meet a department’s needs. For more information regarding program content or to schedule a program in your area, please contact Sgt. Virgil Stephens at