Business Security Marketing II Unit II. I. Why Businesses Need Security Protect Buildings EquipmentFixturesRecordsGoods Protect against theft of money.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Secure Your Store Understand the measures used in securing a retail store.
CHAPTER 25 Checking Accounts. CHAPTER 25 Checking Accounts.
The Expenditure Cycle: Purchasing to Cash Disbursements
The Office Procedures and Technology
Section Objectives Explain why risk is inevitable.
By : Captain Rick Ollic Berkeley County Sheriff’s Office.
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
Chapter 2 Skimming.
Business Risks How much of a risk are you willing to take? Going out on a limb.
1 Identity Theft and Phishing: What You Need to Know.
Employee, Vendor, and Other Frauds against the Organization Other Frauds against the Organization McGraw-Hill/Irwin Copyright © 2012 by.
BUSINESS CRIME How to Stop!!!. OBJECTIVE Be able to define “Shrinkage” Anything that leads to an unexplained loss of money to the business.
Consumer Issues Chapter 28.
Chapter 16 Retail Security. Retail Establishment Crimes  Shoplifting.  Burglary.  Vandalism.  Bad checks.  Fraudulent credit cards.  Employee theft.
Presented By The Plano Police Department Crime Prevention Unit.
Chapter 3 Cash Larceny.
Cash Management: Revenue Deposits Financial Affairs Office of the Bursar.
CASH HANDLING Training Presentation
Section 16.1 Cash Registers
Chapter 3 Cash Larceny.
Prepared by the Department of Cash Management and the Office of Audit,Compliance and Privacy of the University of Pennsylvania.
Sarbanes-Oxley, Internal Control & Cash
Security, Privacy, and Ethics Online Computer Crimes.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Copyright © 2007 Prentice-Hall. All rights reserved 1 Internal Control & Cash Chapter 8.
Chapter 4 Billing Schemes.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
LOSS PREVENTION & RISK MANAGEMENT PROGRAM Loss Prevention Program A loss prevention program is helpful to promote the organization safe along with create.
©2008 Pearson Prentice Hall. All rights reserved. 4-1 Internal Control & Cash Chapter 4.
Internal Control and Cash Chapter 8 Define internal control. Objective 1.
Unit 231: Process payments for purchases in a retail environment
Presented By: Michael Munaco
Security Issues with Vendors, Employees, and Customers Chapter 10.
The Office Procedures and Technology Chapter 6 Processing and Understanding Financial Information Copyright 2003 by South-Western, a division of Thomson.
Douglas County Sheriff’s Office
Cash Handling Cash Handling Policies and Procedures May 27, 2015.
Lesson 7.3 PROTECT YOUR BUSINESS
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
CASH RISK ASSESSMENT. Fraud OverviewFraud SchemesWhen & How Fraud HappensOur Approach to Fraud Deterrence Overview.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
RISK MANAGEMENT. RISK IS INEVITABLE  From your research of local businesses, what Risk was unavoidable and why?  Speculative Vs. Pure Risk  Speculative=
Chapter 7 Internal Control and Cash
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
OH 9-1 Protecting Revenue 10 OH 9-1. OH 9-2 Learning Objectives After completing this chapter, you should be able to: Identify and explain the three parts.
Lesson 9: Security. Objectives  Calculate shrinkage based on merchandise book value and physical inventory counts  Give examples of internal and external.
Security Precautions. Common Security Problems ShopliftingShoplifting PilferagePilferage BurglaryBurglary RobberyRobbery FraudFraud.
Chapter 6 Enhancing Security Through Procedural Controls.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Chapter 4 Billing Schemes.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Marketing Math Chapter 16. Functions of a cash register Record sales Record sales Store cash and sales documents Store cash and sales documents Provide.
Chapter 6 Payroll Schemes.
INTERNAL CONTROLS What are they? Why should I care?
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Security and Ethics Safeguards and Codes of Conduct.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
CASH HANDLING POLICIES AND PROCEDURES TRAINING
LMZ Retail: Asset Protection through Robbery Prevention Nate Toon Unit 7 Project CJ 180 Prof. Bashore.
Internal Control and Cash
Prevent Shoplifting – Reduce Shrinkage
Chapter 7 Part 1 Internal Control
Chapter 9 Non-Cash Assets.
Cash Handling Policies and Procedures
Security in the Purchasing Function
Presentation transcript:

Business Security Marketing II Unit II

I. Why Businesses Need Security Protect Buildings EquipmentFixturesRecordsGoods Protect against theft of money or valuables Loss of life Protect against business failure

II. Employee’s Role in Business Security Recognizing the importance of business security Follow employer’s recommended safeguards

III. Identify and Explain Areas of Security Problems ShopliftingPilferageBurglaryRobberyFraud

Shoplifting – Theft of goods by customers

Pilferage – Theft of small sums of money or inexpensive items from the business

Burglary – Any illegal entry into a building to commit theft

Robbery – Theft that involves the use of force, violence or fear

Fraud – Deceiving or cheating a business out of money or property Fraud – Deceiving or cheating a business out of money or property

IV. Distinguish Among The Common Types Of Fraud

Common Types of Fraud Price ticket switching Internal theft (Embezzlement) Point-of-sale fraud (bad checks) Point-of-sale fraud (credit cards) Point-of-sale fraud (cash)

Types of Cash Fraud By Customers Customer distractions Split bills Marked bills Counterfeit bills

By Employees Pocketing cash from a customer’s sale Overcharging customers Stealing money from the register Undercharging family and friends Abusing discount privileges

Record Keeping and Payroll Fraud Issuing padded payroll checks Increasing wage rates and number of hours worked on time sheets Making out unauthorized checks Entering false payments in the company books to hide stolen funds Creating false credit card accounts for their own use

Computer Fraud Gaining access to product development plans, market research data, etc. Gaining access to and revealing personnel information Stealing money Altering computerized business operations records Altering computerized business operations records

V. Various Security Devices to Prevent Business Security Problems

I. Devices That Help To Prevent Shoplifting Electronic Sensors Ink Tags Closed-Circuit Television Locked Display Cases Chains And Locks Convex, One-Way, And Two-Way Mirrors Security Guards

II. Methods Used to Prevent Security Problems Shoplifting Greet Customers Entering The Business. Keep A Watchful Eye On Customers. Monitor Dressing Rooms And Hard-To- See Areas On The Sales Floor. Observe Customers As They Leave To Make Sure They Aren’t Wearing Or Hiding Goods They Didn’t Purchase. Be Familiar With Security Devices.

Preventing Pilferage Preventing Pilferage Be Alert And Attentive. Be Honest, And Follow Company Rules. Don’t Take Excess Goods And Supplies Home Unless You Are Told To Do So. Ask Your Supervisor About Rules Of Which You Are Unsure.

Preventing Burglary Know The Proper Procedures For Closing A Business At The End Of The Day. Never Leave Cash In The Register Overnight. Don’t Keep Large Amount Of Cash Anywhere On The Business Premises. Check Every Room In The Business Before Closing. Turn Lights On Inside And Outside The Business At Closing Time, Or Have Them Set To Come On Later In Order To Reduce The Risk Of Burglary. Know How To Operate The Business’s Security System.

Preventing Robbery Handle Cash In A Systematic, Cautious Manner. Turn In The Contents Of Cash Drawers Every Hour Or Whenever The Cash Level Reaches A Specified Amount. Use Drop Boxes. Vary Routes And Times When Making Bank Deposits. Don’t Travel To The Bank Alone When Making Deposits. Avoid Discussing The Business’s Cash Procedures In Public Places.

Preventing Fraud Price-Ticket Switching –Be Familiar With The Prices Of Items Sold By The Business. –Check Prices When They Don’t Seem Correct. Internal Theft –Follow Policies And Procedures Established By The Business. –Know What Steps To Take In Order To Report A Dishonest Employee. –Know What Steps To Take In Order To Report A Dishonest Employee.

Point-Of-Sale Fraud Point-Of-Sale Fraud Remember There Are 3 Types Of Fraud, Which Deal With Credit Cards, Checks, And Cash.

For Checks Make Sure That The Check Is Filled Out Completely, The Amount And Date Are Accurate, The Signature Matches That Are On A Driver’s License Or Other Acceptable Form Of Identification, And That Another Form Of Identification Is Recorded On The Back Of The Check. Have A Manager Approve The Check If The Amount Of The Check Is Higher Than A Specified Amount. Have A Manager Approve The Check If The Amount Of The Check Is Higher Than A Specified Amount.

For Credit Cards Check The Status Of The Card, The Card’s Expiration Date, And The Signature On The Back Of The Credit Card. Obtain An Approval Code From The Credit Card Company By Telephone Or By Passing The Card Through A Machine Designed For That Purpose If The Amount Of The Purchase Is Higher Than The Floor Limit. Obtain An Approval Code From The Credit Card Company By Telephone Or By Passing The Card Through A Machine Designed For That Purpose If The Amount Of The Purchase Is Higher Than The Floor Limit.

For Cash Be Aware Of Various Bill Tricks Used By Con Artists. Follow The Procedures You Were Given By Your Supervisor In A Consistent, Step-By-Step Manner. –Unfold All Bills And Straighten Edges. –Examine Every Bill On Each Side. –Place Bills In The Cash Drawer Facing The Same Direction. Know How To Detect Counterfeit Bills. Never Turn Your Back On An Open Cash Drawer. Lock Your Register If You Need To Leave The Sales Counter. Wait Until You Have Completed Making Change Before Talking With A Customer. Wait Until You Have Completed Making Change Before Talking With A Customer.

For Embezzlement Adopt a policy of mandatory vacations and mandatory duty rotations. Adopt a policy of mandatory vacations and mandatory duty rotations. Establish a hotline for whistleblowers and train employees how and when to use it. Establish a hotline for whistleblowers and train employees how and when to use it. Don’t hire thieves. Always check references Conduct periodic surprise internal audits. Conduct periodic surprise internal audits.

Record Keeping And Payroll Record Keeping And Payroll Be Honest. Follow The Steps Learned For Record Keeping And Payroll When You Are Trained. Follow The Steps Learned For Record Keeping And Payroll When You Are Trained.

Computer Understand How To Operate Your Hardware And Software. Use And Protect Your Own Identification Codes And Password Regularly Copy Your Computer Work So That It Will Always Be Accessible To The Business.

Report Any Suspicious Computer Conditions to a Supervisor. Protect the Business’s Sensitive Computer Data. –Do Not Allow Unauthorized Individuals, Such as Customers, to See The Computer Screen. –Exit a Confidential File Or Turn The Computer Off If You Need To Leave Your Terminal. –Exit a Confidential File Or Turn The Computer Off If You Need To Leave Your Terminal.

Analyze Current Laws Regarding All Areas of Business Security Guest Speaker