Loss prevention and risk management

Assignment Help Other Subject
Reference no: EM13803117

Introduction

In retail, carefully applied security measures clearly benefit the bottom line, however retail security and loss prevention covers a lot of ground. The list of security threats includes direct theft from random shoplifters to organized retail crime and dishonest clerks, as well as accidental loss and product diversion. Digital issues are no minor concern either, given high-profile attacks like card skimming and data theft through wireless networks.

Point of sale

Cash, cards, inventory and customer data intersect at the point of sale. Card skimming, under-ringing, and sleight-of-hand are a few points of sale security issues that I would identify and eliminate first. Point of sale issues are not just committed by a bad employee. We need to take in consideration the self-checkouts as well. Sleight of hand on certain small items cannot always be stopped. We should ensure all the self checkout counters have all of the proper security such as video scanning, (explained... video camera that views the items as they are slid across the self checkout counter.) Placing the monitor for the self checkout counters on the associates help stand located near the self check out section. This will allow security to act fast on merchandise that is not scanned. We should also ensure that the baggage weight scales as well as any other security tools located in this area are also working properly.

Employee ran checkout counters should also be equipped with video scanning as well as a camera set on each cash drawer in order to monitor its usage. RDIF tags should be used to monitor the movement of high value goods. These tags can only be de activated by dragging it across a magnetic pad located on the registers.

Demonstrating consistent attention to security and to investigation of theft helps discourage insider crimes. Conduct occasional field tests involving complicated purchases, and closely document sales prices and cashier behavior. Security tests should also note and improve customer service procedures.

With these requirements to our security protocol we should add money escort's to our list of security tasks. (explained... during a shift change, cash drawer change, or bank drop a qualified security personnel will escort the money rather it be the cash drawer or the safe bags, from point A to point B if these locations are out of sight of video surveillance.

Network security

The role of wireless networks continues to grow in retail operations. These networks can be a weak spot where criminals can intercept important data. We should ensure that we have the proper network security and firewalls that prevent criminals from intercepting information from customers as well as important data such as bank drop schedule, security patrol routes, and any other information that can be used against the organization.

Shop lifting

It can be complicated to prevent against every shoplifter. With the access of cameras we can keep an eye on most points in the store; however we are going to have blind spots.

One of my top suggestions for this problem is having all small electronics and other high value items that are most likely to be stolen either behind a locking class or on locking racks. This may take more time and effort for the associates, although this will cut down on items being pocketed. Another program that we should look into would be secret shoppers. (Explain... Security personnel dressed in civilian attire browsing the surveillance cameras blind spots to ensure there is no one slipping items off the shelves and into their pockets.)

Loading dock

Unloading trucks with newly received merchandise is a great opportunity for a criminal to strike. In some cases the worry would be on the employee unloading trucks full of merchandise, for these instances we should have a surveillance camera on the inside and outside of the loading dock.

A problem with the receiving process is the back access to the organizations building is open and unsecure, this leaves opportunity for an outside criminal gain access to the supply area. The take from these incidents could be as small as snatching a box of electronics to as large as driving off with a truck full of merchandise. Therefore I purpose that we post security personnel at every entrance and exit while there accessible. If the door is unlocked it needs to be protected.

Robbery

An armed robbery is a cashier's greatest fear while standing behind that counter. In any situation where there is an armed suspect the steaks are greatly raised. Standard procedures Sais during an armed robbery you should comply with all the demands that you can possible control. And secondly you should stay as low to the ground as possible until the suspect leaves or the area has been cleared by the law enforcement.

We should put a training program in place to ensure each employee knows what to do during a robbery. We should also install silent alarms that can be pressed without too much notification to the suspect.

Conclusion

As we go over all of the security measures listed above as well as any other problems we may run into along the way, we start to understand what measures create a safe work environment and still have the freedom to allow self service. Security within the retail organization will help to minimize loss in merchandise as well as minimize loss in money and in property theft or damage. The opportunity for crime is continuing to rise more and more. We may not have the ability to completely stop the loss, however we can improve more and more with each weakness we find in the security protocols.

Reference no: EM13803117

Questions Cloud

Developed to solve the energy crisis : Given the current state of energy use, which continues to grow exponentially in such countries as China and India, what measures can the United States and other Western countries take to produce more fuel-efficient and environmentally-friendly fue..
How will the new standard for building web pages : Based on the article by Mulroy (2010), how will the new standard for building web pages, HTML5, improve the web experience for a typical end-user
Explain the use of web standards : Search the Internet for reliable information regarding web standards, and explain the use of web standards. Why they are important when designing and developing websites? List three examples of standards and how they are used
What are web applications and how are they used : What are web applications and how are they used? Provide two examples of web applications
Loss prevention and risk management : Normal 0 false false false EN-US X-NONE X-NONE Loss Prevention and Risk M..
Design a database to track the company products : Design a database to track the company's products and orders. Choose either an open-source product or a proprietary product to use, and explain your reasons for choosing it. Identify some of the characteristics of database configuration used in yo..
What are the current voice network standards : Discuss the history and progression of the voice telecommunications industry. What are the current voice network standards
Discuss the various standards organizations : Standards are important in any industry. Discuss the various standards organizations utilized in this industry. Do they have conflicting charters or have they worked in different areas to form a coordinated industry overview

Reviews

Write a Review

Other Subject Questions & Answers

  Compare and contrast the two types of organizational culture

Compare and contrast the two types of organizational culture that develop within a prison: management culture and relationship culture. Explain the continuum ranges for each type of culture and what they mean

  Domestic terrorism report

Address specifically the human toll, economic effect, and public policy changes that have resulted from domestic terrorist events within the United States during that period.

  Write a brief explanation about the supreme courts

Write a brief explanation about "The Supreme Court's establishment of enforcement power"

  Legally under federal securities laws

Industry or "sector" experts who by their own intelligence and knowledge and using public sources of information deduce and ascertain a company's confidential information and then trade on that information can be said to be acting:

  Which property of the real numbers is illustrated

Which property of the real numbers is illustrated by the following statement? (18 + 3) + 14 = 18 + (3 + 14) a. Associative property of addition b. Identity property for addition c. Distributive property d. Commutative property of addition

  Social expectations of business

List and describe the consumer rights that have become social expectations of business. Should these rights be considered ethical standards?

  Cost of capital this potential purchaser

You have a perpetuity that pays you $10000 per year. The TV advertisement says you can sell this income for "CASH TODAY". they offer you $77,000 for your perpetuity. What is the cost of capital this potential purchaser is applying to the proposed tra..

  Cardiac concerns arise when hypertension is a factor

It's obvious that cardiac concerns arise when hypertension is a factor, and this is a direct correlation to heart failure?

  Jack maclean has entered into a real estate development

jack maclean has entered into a real estate development partnership with bill lyons and june reese. bill owns of the

  A federal statute applies

A federal statute applies:

  Dependent variable and confounding variable

A psychologist believes he has developed a new teaching method which will cause significantly greater learning to occur. To prove this he selects 2 college classes with professors A and B teaching the classes respectively. Professor A uses the new te..

  In a hypothesis test-the critical region consists

In a hypothesis test, the critical region consists of __________.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd