Presented by Bill Haining

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

Introduction The Consumer Guarantees Act (CGA) sets out guarantees that goods and services must meet when sold by someone in trade - that is, a retailer.
Secure Your Store Understand the measures used in securing a retail store.
E-Commerce Drawbacks Although e-commerce is a tremendous opportunity for businesses, there are also downsides which need to be explored.
Unit 358. There are three learning outcomes to this unit.  1. Understand the process of improving store operations.  2. Understand how to communicate.
Review Questions Business 205
Understanding security and loss prevention in a retail business
USC Health and Safety Training Workplace Violence.
Child Protection Training
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
Lecturer: Miljen Matijašević Session 8, 7 May 2014.
Police And Criminal Evidence Act 1984 (PACE)
The Adult Support and Protection (Scotland) Act 2007 (“the Act”) Level 1.
Customer Service & Customer Protection in MANSELL
Understanding the management of risks to health and safety on the premises of a retail business Unit 352.
Lecturer: Miljen Matijašević G10, room 6, Tue 15:30-16:30 Session 9, 16 Dec 2014.
Understanding customer service in the retail sector
LOSS PREVENTION & RISK MANAGEMENT PROGRAM Loss Prevention Program A loss prevention program is helpful to promote the organization safe along with create.
Stock Control Today you will know what stock control is.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
Occupational health and safety
Aggressive behaviour increases during the Christmas period Drinking too much alcohol reduces tolerance and even the most mild mannered people can lose.
Practical Information Management
Security Issues with Vendors, Employees, and Customers Chapter 10.
Presented by Bill Haining
Sexual Harassment for Managers. Definition: According to the EEOC, sexual harassment is defined as: Any unwelcome sexual advances, Requests for sexual.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Accommodation & Hospitality Services STAFF BRIEFING – No 8 Personal Safety.
A European campaign on Risk Assessment Work-related stress and Risk Assessment.
© Business & Legal Reports, Inc Alabama Retail is committed to partnering with our members to create and keep safe workplaces. Be sure to check out.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
© Business & Legal Reports, Inc Alabama Retail is committed to partnering with our members to create and keep safe workplaces. Be sure to check out.
FOUR TYPES OF IDENTITY THEFT. 1. FINANCIAL IDENTITY THEFT  Just using your stolen credit card details to buy things is the example we all know about.
Child sexual exploitation training for hotel staff Operation Makesafe.
Chapter 8 Preventing Losses from Criminal Actions.
1 Workplace Violence and Other Unsafe Conditions By Dawn Kitz-Wekerle.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Violence at work Dr Malgorzata Milczarek European Agency for Safety and Health at Work.
HOW TO SOLVE PROBELMS An Adventure in Professionalism.
Accounting & Financial Analysis 111 Lecture 8 Source Documents, Day accounts/Specialised Journals, Debtors & Creditors Subsidiary Ledgers.
Information Systems Unit 3.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Workplace violence is violence or the threat of violence against workers. It includes harassment, verbal abuse, threatening behavior, fighting and physical.
Bullying in the Workplace
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
3D LEISURE - Health & Safety Refresher Training Manual.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Session 11 Data protection. 1 Contents Part 1: Introduction Part 2: Applicability and responsibility Part 3: Our procedures on data protection Part 4:
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Scientific data storage: How are computers involved in the following?
Warehousing and Storage Principles Session 12 – Security Day 6 / PM.
Dealing with aggressive behaviour A guide for staff University of Aberdeen Estates Section Presented by Risk Trainer (V+A) NHS Grampian.
VIOLENCE AT WORK Samuel Nii Tettey (Ergonomist) 1.
Chapter 6 Accounting for Sales.
7-1 7 Sarbanes-Oxley, Internal Control, and Cash Student Version.
ETHICAL ISSUES IN HEALTH AND NURSING PRACTICE CODE OF ETHICS, STANDARDS OF CONDUCT, PERFORMANCE AND ETHICS FOR NURSES AND MIDWIVES.
Protecting Your Credit Identity
Chapter 7 Raising money to repay debts: Making good choices and
Make it Operational: Food Sales
Data protection headaches: GDPR, brexit AND perimeter risk
Retail Security & Loss Prevention
Immigration law in the united states
The new data protection rules
Unit 101 Element 4 Maintain a Secure environment for customers, staff and visitors. Maintaining effective security should be the concern of everyone working.
Clemson University Red Flags Rule Training
The Health Insurance Portability and Accountability Act
Health and Safety Refresher Training
Presentation transcript:

Presented by Bill Haining UNIT 353: Understanding security and loss prevention in a retail business Presented by Bill Haining

Understanding security and loss prevention in a retail business There are five learning outcomes to this unit. 1. Know the range of security risks faced by a retail business. 2. Understand the effect which crime has on a retail business and its colleagues. 3. Understand the loss prevention procedures used in a retail business. 4. Know how security incidents should be dealt with. 5. Know how to carry out an assessment of security risks. Tip: Add your own speaker notes here.

Security risks Retailers face a variety of threats to their security. Externally they are at risk from break-ins, which occur when the premises are closed, terrorism, which are attacks for political purposes, and violence and aggression, usually from angry customers who may physically attack colleagues but will more usually verbally abuse them. Internally they are at risk from staff collusion which includes under-ringing on the till, passing unauthorised refunds, ignoring shoplifting or signing for undelivered goods. Other risks may be external or internal:

Security risks ✓✓ Theft of cash and products may be carried out by customers or colleagues ✓✓ Product contamination, which may be an attempt at extortion but is more often mindless damage ✓✓ Harassment, which is usually committed by customers against colleagues, but may sometimes be between colleagues ✓✓ Fraud, which may involve customers using stolen or cloned cards, counterfeit cash or claiming refunds for stolen stock, but includes suppliers or drivers claiming to deliver stock which they have not. Also colleagues can be involved in fraudulent activities All of these risks involve losses to the business either through the loss of cash or stock or through the cost of replacing or repairing damage. Tip: Add your own speaker notes here.

The effects of crime Retailers will also be affected by crime if colleagues have to take additional time off because of the effects on them. If colleagues are physically threatened or attacked by criminals they will suffer psychologically; working in a threatening environment or being harassed will lead to poor staff morale and a loss of confidence, which could affect their health and well-being. Retailers must carry out risk assessments on security at regular intervals which should identify the risks and the areas exposed to risk, estimate the amount of risk and decide what needs to be done. Findings should be recorded so that they can be reviewed if circumstances change.

The effects of crime The risk assessment will identify which security procedures will need to be put in place. This may include some or all of the following: ✓✓security staff ✓✓electronic tags on stock ✓✓CCTV ✓✓passwords on cash registers ✓✓staff searches The most important action to reduce security risks is to train all colleagues to follow procedures and be vigilant.

Loss prevention Retailers use technology to help prevent loss. CCTV is used to monitor the activity of customers and colleagues. Images produced may be monitored live by security staff or recordings may be reviewed later in order to provide evidence. CCTV cameras are positioned in areas of high risk or to cover specific areas where theft is suspected, for instance a till where regular shortages are reported. Many items will be electronically tagged so that if the tag is not removed at the till, the tag will set off an alarm when the item is removed from the store. Other tags are used which, if not removed at the till, will irrevocably damage the item when removed by the thief. Bar coding also helps to prevent loss as it encourages accurate recording of sales.

Loss prevention Other measures used to prevent loss include stock taking, shrinkage control and recording. Regular stock taking prevents loss by indicating problem areas so that loss prevention measures can be directed to that area. In order for this to be effective, stock records must be accurately maintained so that it is possible to differentiate between stock loss through criminal activity and stock loss through error. One of the major causes of inaccuracy in stock records is the failure to properly control and record shrinkage. Any price reductions must be accurately recorded, as must any stock written off because it is un-saleable. Shrinkage can be controlled by handling stock carefully and by reducing stock approaching its sell by date in order to sell it at a reduced price rather than having to throw it away.

Dealing with security incidents Colleagues faced with a security incident must ensure that they comply with the Police and Criminal Evidence Act (PACE). Under this legislation, only the police have the authority to search people, cars or premises. Many retailers will have a company policy of not confronting criminals where this might put the staff at risk. Colleagues who see criminal activity should try to keep the suspicious character in view and maintain vigilance so that the suspect cannot dump stolen items or pass them on to someone else. When they are sure a theft has taken place, they should make a mental note of the description of the suspect and report the incident as promptly and accurately as they can to a nominated or authorised person.

Dealing with security incidents Security staff and management have the authority to arrest a suspect and to ask them to empty their pockets or bags, but do not have the authority to insist. Searching someone without permission risks an assault charge so make sure there is a third person present, especially if the suspect is of the opposite sex. Remember, this applies if the suspect is a member of staff just as much as a member of the public; once suspected of theft or fraud, the member of staff must be treated in accordance with PACE. Be careful not to disclose the personal details of colleagues to anyone other than the police as this may cause problems in the future.

Dealing with security incidents Threatening and violent behaviour may occur in a number of different types of situation. When a customer is asked to provide proof of age in order to purchase age-restricted products, particularly alcohol, they may react aggressively if they are unable to produce it. Refusing a refund can also lead to a threatening situation, as the customer may feel aggrieved that what they see as a perfectly reasonable demand is being refused. Customers who feel that there is insufficient staff to deal with their needs during busy trading hours can also become threatening, especially if queues are not controlled, so that people are served out of turn.

Dealing with security incidents Some threatening and violent behaviour is premeditated, rather than occurring as a result of an unexpected situation. Shoplifting gangs will sometimes enter the premises in large groups or use distraction tactics by causing a disturbance which diverts the attention of security staff away from an area where attempted theft is taking place. The most effective technique for controlling threatening and violent behaviour is staff training. Colleagues who understand how to deal with each situation on its merits, within the law and company policy, will be able to defuse situations. Colleague scheduling to ensure that the customers’ needs will be met promptly, queue control to ensure that customers are not waiting longer than necessary and are served in turn and restricting numbers of customers in shops with only minimal numbers of colleagues will all help to control these situations.

THE END Thank you and good luck