Security tags on clothes and the benefits and other efforts to stop shoplifting.

Security tags on clothes is an important effort softline retailers should intensely understand. Many retailers seem to think clothing thieves only steal merchandise inside of fitting rooms. Sure, fitting room theft happens a lot, but most shoplifters looking to take merchandise simply conceal the selected items right there on the salesfloor. In their efforts to help curb the increase in shoplift activity, retailers must consider putting security tags on clothes . security tags on clothes provides two things, an obvious deterrence to would-be thieves and a sense of security to the business owner and management.

Active apparel, men’s wares, ladies intimates and many types of jeans seem to be the highest theft items when it comes to softlines. In order to help prevent retail theft, and enforce clothing security , it is recommended to attach clothing security tags to the areas of merchandise identified in a business as high shrink. For instance, a retailer having trouble controlling leather jackets attaches the leather jackets to the display fixture. This impacts the salability of the merchandise and ultimately impacts profits.

What this business should have done is use the latest technology and attached a clothing alarm to these jackets. A clothing alarm used with a Checkpoint security system allows the merchandise to be shopped, without the inconvenience of being attached to a fixture display.

Now, if a thief decides he’d like to own one of these jackets without paying for it, he’ll have to try and defeat the clothing alarm . With many types of clothing alarms to choose from, he’ll have no chance of getting away quietly. Once a clothing alarm is tampered with, it makes an audible alarm alerting the nearest associate. The shoplifter is quickly identified and will drop the merchandise, quickly leaving the store. In the event he doesn’t mess with the clothing tag and simply wants to walk out, the Checkpoint Security System will recognize the tag and activate an audible alarm, again taking away the privacy.

For more information on clothing security, Checkpoint Security system or clothing alarm contact us at security tags on clothes or call 1.770.426.0547

Protective Measures to Prevent Shoplifting

It is vital for a company to take certain protective measures to prevent shoplifting because it can singularly be the cause of thousands of dollars in lost revenue to a retailer. The first and most important protective measure is to make the shoplifters feel watched.  Elevate the cashier’s platform, install mirrors that enable cashiers and sales people to see over and around displays, install a closed circuit television system with visible cameras. Ultimately most shoplifters want to remain concealed. Anything that threatens that concealment may cause them to take their “business” elsewhere.

 Other ways to prevent shoplifting are to post signs warning against shoplifting.  Emphasize that your company policy is to prosecute all shoplifters. Many shoplifters, even once caught, believe that they can talk their way out of the situation. Let it be known that is not an option in your establishment. Encourage checking bags and packages on entry. Require receipts for merchandise returns for cash and insist upon a photo ID and signature for returns without a receipt. Even then only give the customer a gift card or voucher to be spent in the store.

 Install surveillance cameras to cover cash registers, high-value merchandise displays, entrances, loading docks and any rear entrances. There is a constant battle that occurs every day between the retailer and the shoplifter. Of course it’s a battle that we would like to win, but more over it’s a battle we would like the shoplifter to choose not to fight. The best way for us to prevent shoplifting in a store is to discourage the shoplifter at the onset. Make him/ her think it will be more trouble than its worth to escape unseen with their ill-gotten goods and you will successfully prevent shoplifting in your establishment.

For more information contact us: prevent shoplifting or call 1.770.426.0547

Embezzlement: The Corporate Fraud Investigation – Atlanta Georgia

Now, most of us hear the word embezzlement or the phrase corporate fraud investigation and instantly think big business. Large publicly traded companies such as Enron, Coke or AT&T come to mind. The truth is that these “big” words describe a simple and far too common act of employee dishonesty. Corporate fraud is defined as “a crime committed by a person of respectability and high social status in the course of his occupation”. In other words it’s anyone who uses their job, position or standing in order to commit a crime. Embezzlement is defined as “the act of dishonestly appropriating or secreting assets by one or more individuals to whom such assets have been entrusted”, sounds like a simple case of employee theft to me.

Embezzlement is often performed in a manner that is premeditated, systematic and methodical, with the conscious intent to conceal the activities from coworkers or superiors, usually because it is being done without their knowledge or consent. Often it involves the trusted person embezzling only a small proportion of money at a time, in an attempt to minimize the risk of detection. If done properly, and by ‘properly’ I mean underhanded and sneaky enough, embezzlement can continue for years, or even decades, without detection. This is why corporate fraud and employee theft in general can be so dangerous to a company.

So, why the big word ‘embezzlement’? Why not just call it stealing? Well, because they’re 2 distinct differences in the two. Embezzlement requires conversion, or a misappropriation of funds. Stealing is straight-forward theft by someone who had no business with the money or property.

Embezzlement is performed by someone who had the right and necessity to handle the money or property but simply decided to use those funds for their own personal gain. This and other corporate fraud crimes can be difficult to understand, that’s why I would advise consulting a lawyer or other experts in the field.

For more information about corporate fraud investigation or corporate fraud investigator or employee theft or employee theft investigation or internal theft contact us at corporate fraud investigation or call 1.770.426.0547 – Atlanta Georgia

Background Checks and Social Security Traces

Background Checks and Social Security Traces

Background checks may be made up of a number of elements such as criminal background checks, credit reports, motor vehicle reports, and references of various types.

A valuable but often omitted check that can be used in several ways is the social security trace.  When you order and receive a trace from your background check company, what should you expect to see?

The information contained in a social security trace comes from various sources, but mainly from credit reporting agencies.  It is sometimes referred to as credit header information, although there is no actual credit information in it.

What you will see is when the social security number was issued, the state in which it was issued, and that it is a legitimate number.  You will also receive a history of addresses associated with the social security number, as well as all names associated with the number.

The address history will reveal locations where the subject of the background check resided, whether they listed on the resume or application or not.  If not, was the subject deliberately concealing the fact that he or she lived in a particular place? And if so, was it done so that a criminal background check would not be conducted in that jurisdiction?  Or perhaps the person moves frequently without cause.

Your background check company will suggest that you order a social security trace and that you check all jurisdictions and courts where the subject resided, in order to get a complete picture of your potential employee.

The trace should not, however be used by itself as a reason to deny or exclude an individual from employment.

The social security number trace is a quick and economical way to enhance the value your employee related background checks.

For further information on background checks, please call 770-426-0547 or click here.

The Internal Theft Interrogation Process – Atlanta Georgia

Depending on which source you decide to go by internal theft can be responsible for up to 75% of all retail losses. With that type of money at stake it’s only natural to want to grab a suspect by the collar and shake a confession out of him/ her. However, for obvious reasons, this is not the way we do business. A proper interrogation should include a mix of technology (i.e. transaction reports, video surveillance footage) and proven, professional interrogation techniques used to solicit a confession.

Let’s say you have an employee that has been ringing multiple returns without using the original purchase information – an obvious red flag. Gather your reports on all such transactions then pull up the corresponding video footage of these transactions. Once you’ve found proof of wrong-doing, go back and investigate their other transactions. Everyone will tell you that it’s their first time, but that is almost always a lie. Once you’ve gathered your evidence, call the individual in for an interview. No water boarding or electro-shock torture necessary, an internal theft interrogation should always be handled calmly and professionally.

Give the suspect several examples of internal theft , including refund fraud. Then explain all the different loss prevention methods you have in place to combat criminal activity. Explain that you’re there to help them and you want to hear their side of the story. Personally I’m not a fan of showing the suspect the footage of them engaging in the theft. However, I do like to explain what I saw in the footage in extreme detail. This generally leaves no doubt in the suspects head that they’ve been caught. It’s usually around this point that the average suspect crumbles into a pile of warm goo. The confession is now imminent; from there you can get into restitution agreements to recover your losses. Every case is going to be different, however if your approach to the interrogation process is solid you will get results and reduce the internal theft within your organization.

For more information about employee theft investigation or employee theft or corporate fraud investigation or corporate fraud investigator contact us at internal theft or call 1.770.426.0547 – Atlanta Georgia

What Should Be Included in Your Background Checks

At this point we should all be aware of just how important employee background checks are to your company, its’ security and your bottom line. However, what you may not know is just how extensive your employee background checks need to be. After all, your employees aren’t handling nuclear launch codes or perfecting your patented cure for cancer, right? Right, but they are holding one of your most prized possessions in the palms of their hands; your money. Therefore it behooves you to make extra sure that they can be trusted with it.

Employee background checks are the process of looking up and compiling criminal records, commercial records and financial records. They most typically include past employment verification, credit score and criminal history. The first, past employment verification, is pretty self-explanatory. You want to be able to verify that the person has the necessary experience to do the job you’re hiring them to do. The second, credit score, is often debated. Why is it necessary to check a potential employee’s credit score? Well, in the timeless words of Forest Gump’s mama: “Stupid is as stupid does.” If an individual is irresponsible or unable to diligently control their own finances do you really want them working with yours?

The third, and possibly most important, thing that should be included in your employee background checks is a criminal history. Nobody wants to work next to the next Jeffrey Dahmer or Bernie Madoff and you certainly don’t want to be responsible for their actions. True, lack of a criminal history is no guarantee that an individual won’t indulge in criminal behavior in the future, however past criminal activity can be a good indication of things to come. Employee background checks can be as extensive as you feel necessary for the position being sought, but they should at the very least include the 3 steps mentioned above.

For more information on pre employment screening or background check company contact us at background checks or call 1.770.426.0547

Employee Theft: The Importance of a Confession – Atlanta Georgia

There comes a point in every recognized case of employee theft where you, the investigator, know that you’ve got the suspect. Whether it’s clear video footage of the individual slipping a large wad of money into the pocket of their khaki’s or simply multiple transaction reports all pointing to obvious wrong-doing by the suspect, you’ve got them. Now what? Well, now the company is still out of money; now you have a dishonest employee in your midst that you need to get rid of with as little fuss as possible. The best way to do that is by eliciting an admission of guilt or confession from the subject.

The last thing you want to do is have more time and money going to a lengthy court case. That is exactly what can happen if the subject decides to fight the case or claim wrongful termination. An admission of guilt is a good way to avoid all of that. Additionally it’s the first step to recovering the moneys lost by the company as a result of the individuals’ employee theft activity.  A monetary recovery agreement should accompany all admissions of guilt. The company will then go after the employee for civil recovery and if they deem it necessary they will call in the police and prosecute the crime.

Employee theft is the highest cause of shrink in any retail company. Therefore if you want to combat it properly you need to follow through on all investigations. Obtain the necessary proof of wrong-doing by using both technological means and a solid interrogation technique. Finally, finish with getting a confession. Make the subject believe that you’re there to help them and it is in their best interest to simply “come clean” and then you can all move forward. Sure, it’s possible that they’ll be moving forward to a jail cell but that’s the price they pay for employee theft .

For more information about internal theft , employee theft investigation , corporate fraud investigation or corporate fraud investigator contact us at employee theft or call 1.770.426.0547 – Atlanta Georgia

Various Types of White Collar Crime – Atlanta Georgia

The term “ white collar crime ” was coined in 1949 by Edwin Sutherland. It is defined as: “a crime committed by a person of respectability and high social status in the course of his occupation”. However, in today’s business climate there are so many different kinds of white collar crime it can be difficult to understand what falls under that heading. Therefore, I’ve compiled a short list of examples and their definitions.

Blackmail: A demand for money or services under threat to do bodily harm, to injure property, to accuse of a crime, or to expose secrets.

Bribery: When money, goods, services, information or anything else of value is offered with intent to influence the actions, opinions, or decisions of the taker.

Computer fraud: Where computer hackers steal information sources contained on computers.

Embezz1ement: When a person who has been entrusted with money or property appropriates it for his or her own use and benefit.

Extortion: Occurs when one person illegally obtains property from another by actual or threatened force, fear, or violence, or under cover of official right.

Insider Trading: When a person uses inside, confidential, or advance information to trade in shares of publicly held corporations.

Kickback: When a person who sells an item pays back a portion of the purchase price to the buyer.

Money Laundering: The investment or transfer of money from racketeering, drug transactions or other embezzlement schemes so that it appears that its original source is legitimate.

Racketeering: The operation of an illegal business for personal profit.

Tax Evasion: When a person commits fraud in filing or paying taxes.

There are several other types of white collar crime , these are just a few examples and definitions that we should all become familiar with.

For more information about employee theft , internal theft or employee theft investigation contact us at white collar crime or call 1.770.426.0547 – Atlanta Georgia

Anti Shoplifting wave hits the retail world

As if an anti shoplifting wave needs to hit any retailer. If a retailer is waiting to experience shoplifting to engage in anti shoplifting efforts, he’ll close his business first.

Anti shoplifting is a large part of the retail world. Every day, managers and business owners walk their stores and shops wondering if they are doing enough to protect their assets and boost their profits. Are they making any impact? That’s hard to say. Loss Prevention Consultants specialize in overseeing a business and making the necessary recommendation to help a retailer protect them, and encourage sales growth.

A manager/owner I once worked with was under the impression that his shop(s) was not experiencing shoplifting and if it was happening, it was minimal. He sold high end beauty products and believed that since his stores were in a “higher income” area, he wouldn’t suffer from shoplifters.

True, he may not have the same amount of shoplifters, but he will experience shoplifting and with the product he sells, one or two shoplifters could really hurt his business. After a long discussion, and me showing him several instances of shoplifting at surrounding stores and shops, he decided to install a Checkpoint Security system . As I told the manager, a Checkpoint Security system would provide a better sense of security in his store and would truly protect his profits and encourage better customer service. The day of final installation, 3 shoplifters were identified as they drop or threw merchandise as they fled the store. They merchandise dropped was worth several hundred dollars from each shoplifter. The Checkpoint Security system deterred the shoplifters by taking away their privacy.

Now, and since the installation, the store has increased their profits because merchandise is in the store and available for purchase. Anti shoplifting is any everyday task for this manager and his store team.

For more information about checkpoint security system or checkpoint security tags or checkpoint labels or retail anti theft devices or retail theft prevention visit us at anti shoplifting or call us at 1.770.426.0547

Employer Requirements for Background Checks

Employer Requirements for Background Checks

The FTC and the FCRA give certain responsibilities to the end users of background checks.

There are basically three entities involved in the procurement of background checks.  They are

1. The consumer – or the subject of the background check
2. The end user – or the employer requesting the background check
3. The Consumer Reporting Agency (CRA) – the company that provides the information on background check

The requirements for the end user are explained in the Act (FCRA), but consist of four basic steps.

1. Disclosure and consent.  The disclosure that a consumer report may be obtained for employment purposes.  This should be done on a separate document and not included as a part of the employment application. The employee’s or applicant’s written consent must be obtained, and it may be included on the same document as the disclosure.
2. The end user must certify to the CRA that disclosures and consents have been made and obtained from the consumer.  Pre-adverse action disclosures will be made if necessary. (See number 3 below.)  If requested, further disclosure regarding investigative consumer reports will be provided.  The end user will comply with all federal and state Equal Employment Opportunity laws as they pertain to background checks.
3. If the end user contemplates adverse action, either not hiring, not retaining, or not promoting an employee based on information contained in the consumer report, the employer must provide to the applicant a copy of the consumer report provided by the CRA, the FTC’s Summary of Consumer Rights notice, a statement that adverse action is contemplated, and allow a reasonable time for the consumer to submit a dispute to the employer.
4. The Adverse Action Notice to the consumer after adverse action is taken will include the CRA’s name and contact information.  A statement will also be included that adverse action (not hiring, retention, promotion) is being taken, that the CRA is not the decision maker and can’t provide a reason for the decision, the consumer has a right to a free copy of the report and that the consumer has the right to dispute the accuracy of the report with the CRA.

It seems odd that the end user should be required to submit both a pre-adverse action and an adverse action notice, but the Act is very clear that both are required.  The Act does  not define a “reasonable time” to wait after a pre-adverse notice, but many companies specify five days.

For further information on these topics and on background checks, call 770-426-0547 or click here.