Retail Loss Prevention - PowerPoint PPT Presentation

About This Presentation

Retail Loss Prevention


Internal and External Retail Theft Loss Prevention Training Public Service Presentation – PowerPoint PPT presentation

Number of Views:7871


Transcript and Presenter's Notes

Title: Retail Loss Prevention

Crime Prevention for Commercial and Retail
  • Association of Crime Prevention Professionals

Scope of the Problem
  • Employee theft costs businesses over 40 billion
  • The U.S. Chamber of Commerce estimates that 30
    of all business failures are due to employee
  • It takes 20 in sales to offset
  • every 1 lost to theft

Scope of the Problem
  • Business crime costs the U.S. economy at least
    186 billion annually
  • Goods and services are priced 15 higher to make
    up for business losses from theft
  • Nearly 40 of all thefts occur at the register

Scope of the Problem
  • Shoplifting cost U.S. retailers 10.23 billion
    dollars a year, or 28 million per day, or about
    1 million dollar per hour
  • Suffice it to say, commercial and retail loss,
    both internal and external, is a major concern
    for every retail operator.

Why People Employees Steal
  • Researchers and behavioral scientists
  • have debated the
  • reasons why people
  • commit crime since
  • the beginning of time.

Why People Employees Steal
  • Today there is still no single
  • theory or explanation that
  • provides a direct
  • correlation of why
  • people commit crime
  • and how law
  • enforcement
  • can best impact
  • the situation.

Why People Employees Steal
  • Some of the more common theories of why
    people commit crime
  • Classical Theorycrime
  • is caused by free will
  • Biological Theory
  • determined by genetics

Why People Employees Steal
  • Psychological Theorycombination of biological
    and psychological determinates predisposition
  • Sociological Theorysocial environment causes
    criminal behaviorfamily school, and the church
    are catalysts

Why People Employees Steal
  • Rational Choice Theory
  • In criminology, the RCT adopts a belief that
    man is a reasoning actor who weighs means and
    ends, costs and benefits, and makes a rational

Why People Employees Steal
  • The RCT can be viewed as an event that occurs
    when an offender decides to risk violating the
    law after considering circumstances surrounding
    the possible violation.

Why People Employees Steal
  • If we believe the RTC is accurate (we police,
    crime prevention officers, loss prevention
    officer, and business owners) can positively
    impact thief by reducing opportunity

Why People Employees Steal
  • Without understanding why a behavior exists,
    logical strategies to mitigate that behavior is
    left to chance and error.

Why People Employees Steal
  • A macro analysis of the why people commit crime
    is further illustrated in the micro analysis of
    why employees steal from employers.

Why People Employees Steal
  • The 1 reason why employees commit crime against
    employers is that they had the opportunity and
    thought that the chances of being caught were
  • Which directly relates back to RTC

Why People Employees Steal
  • The single most often
  • cited reason for
  • employee theft is
  • real or perceived
  • opportunity.

Why People Employees Steal
  • Why do employees steal?
  • Early answers to this question centered upon
    employee based economic pressures
  • Sudden crisis
  • Living beyond means
  • Keeping up with the Jones

Why People Employees Steal
  • Personal problems
  • Alcoholism

Why People Employees Steal
  • Drug Addiction
  • Gambling
  • Martial affairs

Why People Employees Steal
  • The external pressure theory asserts that when
    economic pressures become greater than the
    individuals personal ability to meet their real
    or perceived needs, the employee will turn to
    illegitimate means to achieve financial

Why People Employees Steal
  • Youthful Worker
  • Another significant
  • causation factor
  • involving employee
  • theft is youthful
  • worker aspect.

Why People Employees Steal
  • A commonly held belief is that the youthful
    worker is not as honest as older individuals

Why People Employees Steal
  • Studies have demonstrated that age
    in and of itself is not a clear
    indication that criminal behavior will

Why People Employees Steal
  • However, those same studies indicate that
    occurrences of criminal behavior will escalate
    when workers
  • Lack equitable compensation and a perceived
  • Are viewed as expendable or temporary
  • Subjected to a inequitable cast system
  • Given limited access to formal and
  • informal reward systems

Why People Employees Steal
  • Unfortunately, youthful workers often find
    themselves in the above listed criteria.

Why People Employees Steal
  • The Association of Certified Fraud Examiners
    report that older workers are more likely to
    steal greater amounts than youthful employees
    with managers and long trusted employees the most
    often cited position that commit fraudulent acts
    against their employers.

Why People Employees Steal
  • Part-time and Temporary Workers
  • A 2006 National Retail Security Survey
    confirmed the long standing relationship between
    part-time employees and shrinkage.

Why People Employees Steal
  • Shrink Rate of Part-Time
  • Employees
  • 1.17 lt 25
  • 1.5 26-50
  • 1.6 51-75
  • 1.95 gt 75

Why People Employees Steal
  • Job Dissatisfaction
  • This theory suggests that the organization
    from which the employees steals may influence
    behavior because management, directly or
    indirectly, is responsible for their own personal
  • dissatisfaction.

Why People Employees Steal
  • Common Employee Rationalizations
  • Employee beliefs that the employer is rich and
    will not miss the funds or merchandise they
  • Entitlementthey earned it!
  • Compensation for lack of formal rewards (salary).

Why People Employees Steal
  • Rationalizations are not based on economic
    earning power or statusEnron executives indicted
    were not minimum wage earners!

Why People Employees Steal
  • This theory is based solely on the
    perception of the employee.

Why People Employees Steal
  • Social Control
  • This theory suggests that the broadly shared
    formal and informal social structures within an
    organization greatly influences behavior.

Internal Risks
  • Criminal acts or risk threats in the commercial
    and retail arena can be divided into two broad
    categoriesinternal or external.

Internal Risks
  • Internal Threats are
  • those vulnerabilities and
  • risks that originate from
  • within the company or
  • business.

Internal Risks
  • Employees represent
  • the 1 criminal
  • occurrence
  • threat to
  • businesses.

Internal Risks
  • Typical methods employees use to steal from
  • Cash
  • Voids
  • Sweetheart Deals
  • Value Cards
  • Embezzlement

Internal Risks
  • Cash is King!

Internal Risks
  • Stealing cash is not complicatedthe simplest and
    easiest way for the dishonest employee to steal
    is simply remove the currency from the cash
    register and slip the money into their pocket.

Internal Risks
  • Generalizations involving employee cash theft
  • Most frequently occurs at the cash register
  • (term to remember Point of Sale)
  • Not complicated
  • Disposability
  • Not traceable
  • Easily assimilated into the thiefs possession
  • No waiting period

Internal Risks
  • A 2005 Supermarket
  • Security and Loss
  • Prevention Association
  • report listed cash
  • theft as the most
  • frequently experienced
  • criminal occurrence.

Internal Risks
  • Cash theft can be categorized by either
  • Skimming
  • Larceny

Internal Risks
  • The difference is technical, but good to be aware
    ofCash larceny is the theft of money that
    already appeared on the business books.

Internal Risks
  • Whereas, skimming is
  • the theft of cash
  • that has not
  • yet been recorded
  • in the accounting
  • system.

Internal Risks
  • The difference between cash larceny and
    skimming completely depends upon when
    the cash was stolen.

Internal Risks
  • Variations of cash register theft
  • Giving customers incorrect change and keeping the
  • Cash register manipulation
  • Ringing no-sale function
  • Unrecorded sales
  • Price check
  • Voids

Internal Risks
  • Dishonest employees may also steal cash from
    other employees registers or cash tills. This
    form usually takes place when the dishonest
    employee seeks change for large bills.

Internal Risks
  • Refund Fraud
  • Refund fraud can be both an internal and external
  • Both varieties of refund fraud are examples of
    the imbalance of customer service and loss or
    crime prevention.
  • Loss prevention strategies would focus upon
    strict policy and procedures while customer
    service targets convenience.

Internal Risks
  • Voids
  • Voiding a sale can occur for a number of
    legitimate seasons
  • The customer does not have sufficient funds to
    pay for the transaction
  • The customer changed his or her mind after the
    sale was rung up.
  • The customers check or credit card was not

Internal Risks
  • The proper discount was not applied at the time
    of purchase
  • The employee made a technical error in the
    processing of the purchases

Internal Risks
  • The dishonest employee can utilize
    a void process as an additional
    opportunity to steal from their employer.

Internal Risks
  • Fraudulent voids
  • are committed
  • when a cashier rings
  • up a purchase,
  • accepts payment,
  • then voids the
  • transaction, and
  • pockets the money.

Internal Risks
  • Dishonest employees
  • will attempt to
  • maintain a
  • semblance of
  • balance in an
  • attempt to
  • continue their criminal activity while not
    drawing attention to themselves.

Internal Risks
  • This desire may manifest itself with informal
    accounting clues such as match sticks, paper
    clips, or other commonly found items that can
    assist the thief in maintaining balance. These
    clues will be found in the cash drawer or close

Internal Risks
  • Sweetheart Deals

Internal Risks
  • Sweethearting at the cash register refers to a
    dishonest employee who gives away merchandise or
    discounts sales to friends, family, or other

Internal Risks
  • Sweethearting is accomplished in several methods
  • Cashiers ring up only the lower-priced items
  • Manually override the prices of the items they do
    ring up
  • Give improper change.more than required

Internal Risks
  • Sweethearting is a favorite method of
    theft with dishonest employees.

Internal Risks
  • Sweethearting usually
  • involves the recipient
  • kicking back part of
  • the ill gotten gain
  • to the employee.

Internal Risks
  • Embezzlement

Internal Risks
  • Embezzlement refers to the stealing of money from
    an employer by someone in a position of trust.

Internal Risks
  • Embezzlement has ranked as America's number one
    financial crime for more than 30 years, and it
    will likely hold that distinction for years to

Internal Risks
  • Key elements
  • Access to company finances
  • Position of trustexecutive or senior position

Internal Risks
  • For the victim,
  • embezzlement is
  • an emotional crime
  • that involves the
  • sense of betrayal
  • and shock!

Internal Risks
  • Most embezzlement cases begin
    with an employee covering a
    small, short-term financial need with the
    intention to give the money back.

Internal Risks
  • Six classifications of methods loss prevention
    specialists consider to be standard
    embezzlement tactics
  • Bank Deposit Rolling
  • Check Kiting
  • Lapping
  • Payroll Fraud
  • Expense Account Fraud
  • Creating Factious Accounts

Internal Risks
  • Employee Pilfering
  • Employees steal company merchandise and
    inventory in small quantities for their own
    personal use. Most often cited examples office
    equipment, postage stamps, and company products.

Internal Risks
  • Pilfering is not as dramatic as embezzling
    100,000 dollars or not as news worthy as an ORT
    ring stealing thousands of dollars worth of
    merchandise, but the compounded act of pilfering
    costs employers millions of dollars annually.

Internal Risks
  • Grazing
  • Refers to the
  • unauthorized practice
  • of employees
  • eating or
  • drinking
  • the companys
  • merchandise or products.

Internal Risks
  • Never underestimate
  • the creativity of
  • employees to
  • develop new
  • schemes or
  • modify known
  • schemes.

Internal Risks
  • The one common denominator that is consistent in
    most employee generated frauds is when given the
    opportunity, criminal acts against the employer
    will likely occur.

Internal Risks
  • The number one asset
  • of most business
  • is their employees
  • but unfortunately,
  • they are also the
  • number one threat.

Mitigating Employee Theft
  • Proactive Strategy
  • A six step proactive
    prevention strategy
    that is focused on employee

Mitigating Employee Theft
  • Arguably, eliminating or reducing employee theft
    can make the difference between a companys
    success or failure.

Mitigating Employee Theft
  • Step 1 Know your Employees The first step in
    preventing employee theft starts with the hiring
    process. The best way to prevent an employee from
    stealing is not to hire them at all.

Mitigating Employee Theft
  • Personal interest
  • Pre-employment screening
  • Background checks
  • Changes in personal or
  • professional behavior
  • Clues

Mitigating Employee Theft
  • The average interview in the retail
    industry lasts only about 20 minutes.

Mitigating Employee Theft
  • Step 2 Building Company
  • CultureIn order to maintain a workforce that
    resists stealing from the company, a "culture of
    honesty" must be created.

Mitigating Employee Theft
  • If employee pilfering and grazing are
    condoned by management, what message
    does this send to employees?

Mitigating Employee Theft
  • To build awareness within a company, the
    organization must communicate with employees
    about inventory shrinkage and theft
    issuesregardless of the size of the business.

Mitigating Employee Theft
  • In order to generate ethical behavior,
    management must first clarify the
    company's code of conduct and identify
    unacceptable behavior.

Mitigating Employee Theft
  • How to creating a positive company culture?
  • Give employees greater sense of authoritywhen
    employees are given more control, they are more
    likely to do what is in the best interest of the

Mitigating Employee Theft
  • Building the overall positive attitude of the
  • Employees who have a respectful attitude are less
    likely to steal because it is difficult to
    violate the trust of a good boss or company.

Mitigating Employee Theft
  • Profit Sharing
  • When employees have a vested interest in the
    profitability of the company, they will develop a
    sense of ownership and put the companys
    interests in a higher standing.

Mitigating Employee Theft
  • Provide a means for employees who observe illegal
    or in-appropriate behavior a way to report them
  • One solution to this problem is for a company to
    provide a confidential 1-800 number hotline where
    employees can report observed theft
  • Ethics Line

Mitigating Employee Theft
  • Even with the best
  • company attitude,
  • it still takes
  • deterrents to
  • prevent
  • internal
  • theft.

Mitigating Employee Theft
  • Step 3 Integrating Technology
  • The third area of focus in preventing internal
    theft is technology. It is simply not enough to
    have a loyal and committed company culture.

Mitigating Employee Theft
  • President Jimmy Carter once said,
    I trust all my employees but I
    always verified their activities.

Mitigating Employee Theft
  • Good loss management systems reduce the
    opportunities for theft to occur.
    Remember RTC!

Mitigating Employee Theft
  • Another
  • way companies can
  • use technology to
  • prevent
  • opportunities for
  • theft is by restricting
  • access to certain areas
  • and information.

Mitigating Employee Theft
  • Step 4 Aiming at the Target
  • The fourth step in developing an effective loss
    management system involves the act of targeting.

Mitigating Employee Theft
  • Targeting in the context of preventing internal
    theft has two meanings
  • Focusing on high-risk merchandise and
    locations. Often, 10 of a store's inventory
    accounts for as much as 40 of the total store's
    inventory loss.

Mitigating Employee Theft
  • Being cognizant of the potential warning signs
    of internal thieves. There are several behaviors
    that can alert a company that a problem exists

Mitigating Employee Theft
  • There is often a marked change in both the
    employees behavior and appearance due to the
    guilt and anxiety caused by the criminal
  • This is the reason why its important to know
    your employees!

Mitigating Employee Theft
  • Step 5 Keeping A Watchful EyeThe fifth step in
    preventing internal theft is auditing and
    monitoring the previous four areas. No prevention
    step can be truly effective if it is not
    frequently checked and observed for flaws.

Mitigating Employee Theft
  • Step 6 Building the Power of KnowledgeIn order
    to establish an effective loss management system,
    business owners and managers need to increase
    their understanding of the problem of employee
  • Thats why youre here!!!

External Threats
  • Robbery

External Threats
  • By definition, robbery is the unlawful taking of
    property from someone by the use of force or the
    threat of violence.

External Threats
  • Robbery is a vicious and
    sometimes violent crime.

External Threats
  • The average robbery lasts
    approximately two minutes.

External Threats
  • Although all businesses are possible targets for
    robberies, several categories of retail outlets
    have a significantly higher incident rate

External Threats
  • Convenience stores
  • Service stations
  • Liquor stores
  • Jewelry stores
  • Supermarkets

External Threats
  • Predisposition factors
  • Locations that have readily available escape
  • Isolated locations
  • Open late at night
  • 24 hour operations
  • Limited staff
  • Cash laden business
  • Desirable or quickly converted merchandise
  • Maintenance factors

External Threats
  • Robbers generally
  • fall into three
  • categories
  • the amateur,
  • the intermediate,
  • and the professional.

External Threats
  • The method of attack will vary but it will
    usually correspond with the degree of experience,
    discipline, and available resources.

External Threats
  • Developing A Comprehensive Prevention Strategy
  • The development of a comprehensive robbery
    prevention program should encompass three phases
  • Before the Incident
  • During the Incident
  • After the Incident

External Threats
  • No one action alone
  • will deter robbers,
  • but by combining
  • all of the three
  • elements into a
  • prevention program,
  • the business
  • will become a less
  • inviting target.

External Threats
  • The integration of all three phases must be
    accomplished if the comprehensive strategy is
    going to be successful.

External Threats
  • Before
  • The before phase consists of the creation of
    physical deterrents and procedural deterrents.

External Threats
  • Developing a strategy that involves making a
    particular business unattractive and undesirable
    for robbers, while maintaining attractiveness to

External Threats
  • The goal of the before phase is to displace the
    potential robber to another business location
    that did not develop a prevention strategy.

External Threats
  • Deterrents
  • Can be both tangible and intangible

External Threats
  • Perception of Attentiveness
  • Attentiveness is established by the combining the
    outward appearance of the physical building and
    surrounding area where the business is located.

External Threats
  • A clean, uncluttered, and well lit business sends
    a clear and indisputable message to customers of
    welcome and to potential
  • criminals youre going to get
  • caught.

External Threats
  • A half asleep clerk in a sloppy store invites

External Threats
  • Attentiveness also involves providing good
    visibility into and out of the premises.
  • Good visibility allows employees to observe any
    suspicious persons loitering, or lingering either
    inside the business or on the outside of the

External Threats
  • Attentiveness includes
  • having the business
  • premises well lit.

External Threats
  • The outside of the
  • business structure
  • and parking lot
  • should have
  • sufficient lighting
  • to provide visibility
  • at night.

External Threats
  • Training employees is another critical factor in
    the attentiveness element.
  • All employees should be provided with intense
    training in regard to robbery incidents.

External Threats
  • The way a business is managed can also help
    prevent robberies.
  • Procedures
  • Cash management
  • Habits and predictability
  • Operational laziness
  • Customer service

External Threats
  • Application of technology
  • CCTV
  • Access control
  • Alarms
  • Safes

External Threats
  • During
  • In the event that a robbery occurs, how the
    employee interacts with the robber can literally
    be the difference between life and death.

External Threats
  • The most life saving, critical element of robbery
    prevention is the During aspect!
  • The first step in surviving a robber encounter is

External Threats
  • Preparation should focus upon
  • Remain calm.
  • Dont try to be a hero.
  • Do not resist.
  • Dont argue with the robber.

External Threats
  • Do not make any overt or possibly threatening
  • Mentally note, remember, and recall all personal
    identification details, weapons used, vehicles
    used, escape route taken.

External Threats
  • After
  • Once the immediate danger has passed, the
    employee should call the police immediately. If
    available the 911 emergency number should be

External Threats
  • The employee should not delay in calling the
    police even if the robber has threatened the
    employee. The employee should hesitate only long
    enough to ensure that the robber has fled.

External Threats
  • The faster the police are notified, the quicker
    they can respond and launch an investigation.
    Employees should not call the business owner
    until after the police have been notified.

External Threats
  • The employee should secure the area and
    preserve the crime scene. Exterior doors should
    be locked and no one admitted into the business
    until the police arrive.

External Threats
  • Regular business should be discontinued until the
    police advise to do so.

External Threats
  • The employee should request that all witnesses
    remain until the police arrive.
  • Employees should not discuss the robbery with
    others until all statements have been taken by
    the police department. This is especially true
    with media representatives that may show up at
    the business

External Threats
  • After Hours Calls
  • Whenever a business owner receives an emergency
    call to return to his or her business location,
    the owner should be cautious of the true nature
    of the emergency and the possibility that the
    call is a hoax.

External Threats
  • Business Burglaries

External Threats
  • Burglaries occur four times more often against
    businesses than homes, and small business are
    targeted in over half of the commercial
    burglaries committed
  • Insurance Institute of America

External Threats
  • Commercial establishments are a tempting target
    because the overwhelming majority of commercial
    and retail outlets are known to possess desirable
    goods and merchandise.

External Threats
  • Commercial burglaries are more likely to be
    planned than residential burglaries. Whereas
    residential burglaries normally involve a single
    perpetrator, commercial burglaries often involve
    more than one individual.

External Threats
  • Commercial premises are targeted because they are
    often vacant on weekends and after hours and are
    situated in isolated non-residential areas,
    thereby limiting the amount of natural
    surveillance in the vicinity.

External Threats
  • Target Hardening
  • Burglars seek out the most vulnerable and easiest
    targets. In some ways, burglary is a crime of
    opportunity. A business owner can decrease
    their chances of being victimized by increasing
    or strengthening their exterior and interior
    security systems.

External Threats
  • Since the physical security of the business
    premise is the most significant deterrent
    variable, target hardening is the primary goal.

External Threats
  • The degree of physical barriers and deterrents
    that are utilized should match the potential risk
    of the business.

External Threats
  • Shoplifting
  • Shoplifting is a crime and occurs when someone
    steals merchandise offered for sale in a retail

External Threats
  • Shoplifting is by far one of the most prevalent
    crimes committed in the United States. The
    National Association for Shoplifting Prevention
    estimates that one in eleven people in the United
    States shoplifts, that equates to 23 million

External Threats
  • The University
  • of Missouri-Columbia
  • estimates that 3 of
  • all retail prices are
  • Surcharges resulting
  • from shoplifting occurrences.
  • These surcharge equates to
  • about 300
  • a year for a family of four.

External Threats
  • Developing a workable profile of a shoplifter has
    never successfully been accomplished because past
    violators represent a wide spectrum of
    demographic factors.

External Threats
  • Shoplifters are a
  • diversified group.
  • The only consistent
  • variable is age, and
  • that factor is not
  • reliable.

External Threats
  • Most loss prevention experts agree that observing
  • A customer is dressed.
  • How they act.
  • How they move.
  • What they are carrying.

External Threats
  • Behavioral predicators are
    better predictors of criminal intent
    than the
  • customers age, gender, or race.

External Threats
  • Techniques
  • Shoplifting methods
  • can be broken down
  • into three categories

External Threats
  • Padding Items
  • This method involves stuffing extra items into
    boxes or bags of items they intend to purchase.
    If the items are found by the cashier, the
    shoplifter generally claims that they didn't know
    the items were in there, and refuse to pay for

External Threats
  • Using Their Children Some parents will
    use their children to get away with a
    crime. Parents may use their infant's
    stroller to conceal items.

External Threats
  • Parents can also use small children to carry
    items out of a store, either by handing the
    merchandise to the child, or even directing the
    child to take the item and conceal it. If they
    are caught, the parent will scold the child, and
    claim that they had no idea that this was

External Threats
  • Hiding Items
  • Merchandise can be
  • hidden up the sleeve,
  • in boots or socks, and
  • even in underwear.

External Threats
  • Wearing it Out
  • This is a favored technique for clothing and
    shoes. Often the shoplifter will wear the item
    around the store for several minutes, before
    simply walking out with it.

External Threats
  • Hiding in Plain Sight This is a favored
    technique for large or heavy items. By holding an
    old receipt in one hand, the shoplifter will walk
    out of the store as if the item has already been
    paid for.

External Threats
  • Another variation of this method is when the
    shoplifter brings empty bags usually hidden in a
    pocket, or full bags and packages into the store
    and when they feel they are not being watched,
    they will start filling them with merchandise.

External Threats
  • A variation of this method is to simply pick an
    (usually) expensive item, and to simply walk out.
    This method is favored by professionals, because
    they are usually in and out of the store with
    their item in less than one minute, without
    anyone noticing.

External Threats
  • Grab and Run
  • Similar to the previous two methods, but this one
    involves very little skill, and is usually done
    with an accomplice who waits in a running car.
    The shoplifter will walk into the store, grab
    what they can carry, and run out again.

External Threats
  • These are the most dangerous types of
    theft, because they are usually carried
    out by desperate people, such as drug

External Threats
  • Steaming
  • This is a technique where a large gang will enter
    a shop and intimidate, threaten, or distract
    staff in order to steal large quantities of goods
    before running off.

External Threats
  • This type of shoplifter tends to be violent.

External Threats
  • Accomplice Shoplifters
  • may use an accomplice
  • to distract the merchant.
  • This method is one
  • of the smartest routines
  • its quick and clean.

External Threats
  • Collusion
  • Sometimes store staff help thieves steal, either
    actively or passively by turning a blind eye to
  • A form of sweethearting.

External Threats
  • Inexpensive Retail Theft and Loss Prevention
  • Customer Service Without a doubt, customer
    service is the number one cited deterrent to
    shoplifting (and other fraudulent acts) by loss
    prevention specialists.

External Threats
  • An alert employee is the most cost-effective
    deterrent to preventing shoplifting incidents.
    Attentive employees can thwart potential thieves
    simply by doing their jobs well.

External Threats
  • Fix The Fixtures In most cases, shoplifters
    require privacy in order to conceal merchandise.
  • Arrange the fixtures with the goal of minimizing
    "blind spots" on the sales floor. From their
    usual vantage point, the staff should be able to
    look down almost every aisle.
  • Designing Out Crime

External Threats
  • Alternate Clothing Hanger Directions
  • One way shoplifters can steal a tremendous amount
    of clothing is to quickly grab as much clothing
    from a display as they can carry, and run out of
    the store into a waiting car, before the staff
    can react.

External Threats
  • A simple way to thwart this is to alternate the
    direction of each hanger on the display,
    especially on those near the store exit. This
    makes it impossible to take an entire armful of
    clothing off of a circular rack at once, and
    makes it difficult on a tree rack.

External Threats
  • Require A Receipt For All Returns Many
    shoplifters steal with the express intent of
    returning the merchandise to the store, the same
    or another branch, for a cash refund.
  • This can be addressed by requiring a purchase
    receipt for all returns. This creates some
    conflict, however, with the interest in
    delivering quality customer service

External Threats
  • Lock Up Shoplifter - Attractive Merchandise
  • As a general rule, the smaller and more
    valuable an item is, the more attractive it is to
    a shoplifter particularly to those who steal
    with intent to either sell the merchandise
    themselves, or return it for a refund.

External Threats
  • Keep small, expensive items behind the counter
    or locked in a display case. If the display case
    has a lock, lock it do not assume that the case
    alone will dissuade a shoplifter.

External Threats
  • EAS Tag Placement
  • Electronic Article Surveillance (EAS) is a
    system in which merchandise has a small "tag"
    affixed to it which is either removed or
    deactivated when the item is purchased. If not
    removed or deactivated, it triggers an alarm as
    it passes sensors near the store
  • exit.

External Threats
  • EAS systems are
  • inexpensive, about
  • 5 cents per unit
  • (tag, not the
  • system) and are
  • fairly effective.

External Threats
  • Monitor Fitting Rooms
  • Do not let customers enter and exit your
    fitting rooms without encountering
    your staff.

External Threats
  • A fitting room is an ideal place to conceal
    merchandise if shoplifters can get merchandise
    into the fitting room, they have complete
    privacy, and even a mirror to gauge how nicely
    the merchandise is concealed.

External Threats
  • Fitting rooms are a high risk area for
    theft and concealment.
  • -Privacy issues
  • -Customer service issues

External Threats
  • Signage
  • Posting the correct signs around your store can
    deter many shoplifters, even experienced

External Threats
  • CCTV
  • A shoplifting study has shown that closed circuit
    television cameras are now the most feared
    anti-shoplifting device.
  • Evidencehistorical record
  • Expensive
  • Monitoring issues

  • Questions?????
Write a Comment
User Comments (0)