Discover the Keys to understanding causes that affect shrinkage 2


The first step to solving a problem is recognizing.hurtos4

Deepening is needed in the study of the problem as the only way to get control keys. It begins with an analysis as a joint of the factors involved, in order to facilitate their study, and comes to the causes. We analyze deeper to find the root causes of crime in order to address it in the bud. We have to understand the causes of the problem to choose and apply the appropriate measures in each case.

Avoid impulsive decisions. An analysis without sufficient depth only brings palliative. Ej.: Detection of lack of interest in work. An impulsive decision would be the dismissal of an employee without detecting what the reason for his attitude; in return, an analytical evaluation can point out a lack of motivation at work by the existence, for example, exceeding a troubled.

Too often impulsive decisions are made with the intention to rectify the problem, without determining its cause. Example of a Case Study:

 

  • Certain commercial establishment had a high level of losses, so we proceeded to dismiss all employees, including the head of the establishment. A whole new staff were hired thinking they had escaped the problem; but with the new template losses continue to occur at the same level. The adoption of an impulsive decision not only has not solved the problem, but also generated additional problems in the form of rotation and firing costs.

Theft prevention through observation and analysis. What is lost? How is lost? Who steals? How? Why? What elements have been given prior to such damages?

Según George Bates, Vice President of Scott Carson Price & Co. (department store chain with 150 year history), the implementation of a good loss prevention program can reduce them to a 80%. Sample Application:

We have a facility with a loss of 1% and a net margin of 2%. Apply a reduced 80% in such losses. The drawback is the difficulty of finding the measures for the reduction of 1% to the 0,2% without the price paid exceeds the 0,8% saving. We assume some expenses 0,4%. Such a reduction would mean an increase in yield of 20%.

Use of systems. In a large percentage of the systems are not used properly. Although it may seem irrational from common sense, waste of resources invested in prevention and control is alarming. Disconnected Cameras, poorly located that nobody looks. The deterrent element ends up losing all effectiveness. Rangers without proper training and motivation. The watcher can spend all day running through the property believing that this is the productivity criterion, to have an immediate superior that values ​​the observation that the presence, thus its capabilities are reduced by 50%.

For his part, Companies should understand that employee collaboration in fighting shrinkage is essential. It is useless to have proper equipment if staff do not know or are not inclined to use it correctly. Hence the importance, not only of the formation, but also staff motivation, to be integrated into the expertise and culture of the company, assimilating the problem of shrinkage as a problem in itself that should be involved.

Find where to direct efforts. To give you an idea of ​​the importance of focus where the greatest problems are, considered the standard universal 20-80% which is fully applicable to food establishments. The 20% Merchandise, the 20% of retail space and 20% employees and customers are responsible for 80% losses.

In talking about a shrink even more radical proportion: The 4% references of a medium can be assumed the property 80% of shrinkage.

Exceptions:

  • In the local DIY 65% products can be stolen.
  • In local electronic entertainment and fashion textile-stealing may eventually include the 100% products for sale.hurto8

 

Justification of investment in safety. No one is willing to spend to save a hard free lunch. All business project is valued, among other parameters, by economic. All expenses must be justified, if you want the solution becomes an added problem. Often the solutions adopted, more as a justification for taking measures in order to justify before higher, that serve as instruments profitability by reducing losses. The fundamental principle that any security investment must be justified on the recommendation of a previous study that considers profitability.

 

INVENTORY DIFFERENCE

For shrinkage is necessary to calculate the difference between the theoretical stock (which tells us that there must be accounting) y el stock real (which tells us that there is inventory). Hence the term "inventory difference".

Some points to consider in the remainder of the book inventory:

  • Sales and other outlets stock inventory conducted in the observed period.
  • Discarded furniture: Record low whenever discards furniture, as with sales stock inventory.
  • Departures and changes recorded: Subtract the book inventory shrinkage causes whose legitimate or illegitimate knows exactly. Only then will get calculate which inventory difference corresponds to shrink and which belongs to certain loss (which is also a valuable data).
  • Administrative errors detected, tested regarding the exact causes that led, and measured in respect of damage caused. Ej.: Returns unregistered, labeling errors to correct lower register, etc..
  • Natural wastage and accidental loss you were able to find and measure regarding the exact causes that led, rated with respect to the damage caused. Remember they have to be unintentional loss to not enter the area of ​​"sabotage" internal or external.
  • Products damaged. Ej.: Broken items, Furniture damaged the broken. Difference Evaluation regarding baseline characteristics.
  • Consumer product: Subtract the products used or consumed. Ej.: Any direct use of products by janitors, as cleaning fluid, etc..
  • Thefts: Amount missing in the manifestos theft and damage.

Qualitative measurement. In qualitative measuring the condition of the property is located or accounted for stock checks.

  • Use value, an article that does not work, while still being in place, if it works or not done properly and the cause of the failure is unknown, then the price decline in pricing of the product will shrink.
  • Appearance. A visible and difficult to repair wooden furniture or clothing damage can lower your assessed value considerably. If you meet the premise of not knowing the cause of deterioration, reducing the price of the appraisal will also be part of shrinkage.
  • Integrity. If you missed a shoe, the other loses its value despite being in perfect condition. The new appraisal null shoe remains shall be recorded in the inventory and will mean a loss of two shoes, although there is still one.

It is obvious that the goods referred to in the book inventory must correspond exactly to those observed in the physical inventory, in order to find the corresponding difference in inventory accuracy. The external audit or a combination of external and internal audit will prevent errors and fraud.

Once identified items that suffer greater loss, You can make the necessary changes on the prevention and control systems. Knowledge of the amount of shrinkage will also serve to remove the book entry that will help us to reconcile accounts with stocks and real data revealed by the physical inventory.

Analyze the results that gives us the difference of Stock. Once you know what the most stolen products are, ask, How are protected? Why this product disappears and no other? Are there unexplained declines in sales? If depth answers to questions you may come to find that no details had entered rating.

When faced with a problem of wastage, Where should determine the'm experiencing? What part of the establishment are located the affected items? What are the most expensive areas of loss?

hurto6

STARTED TO GIVE CLEAR TRACKS unknowns and

Decisions on the implementation of measures be taken not only for the present study data, but also trend graphs. (Fashion products, easy resale, etc.)

Product with box. We face the problem of facial cream especially X disappears, that is attached to box. Why both the product disappears?

Consider non records by cashiers, because practice, supported by statistics, tells us that the products are safe by having an index of shoplifting considerably less than if they are in other areas of the property. Theft is lower by the "natural surveillance" imposed by the proximity of the ATM.

Product amount unfractionated. We find a curious event that we come to understand: Why is the X product disappears especially at this (Price not split), in other establishments if a product is stolen shortly?

It may be that in other places the price is fractionated, which will discourage employees who attempt no registration, by having to deliver the change the customer, with consequent risks of cash out of position and then not enter the exact amount of change delivered to the customer. The fact that a price is slightly split increases the likelihood of customers to deliver the right amount, increasing at the same rate temptation cashier perform no registration by not even having to open the box to deliver change.

The heavy bulky product. How could disappear panoramic X TV that weighs more than 20 kilos?

As bad as the situation is control external theft or robbery, is difficult enough has been done this way without leaving any evidence, as a broken lock or window left open. Make no mistake, this will be almost certainly a case of internal theft. The product may have been stolen by a mere registration no box or outside working hours, when there are no witnesses.

Control of bad labor practices (intangibles to consider)

The difference intangible resources inventory aims to detect the degree of compliance required explicitly in the content of training, in the labor contract and the Regulations of the employee, and therefore, theoretically should be fulfilled. It is the difference between compliance required by the company to the quality levels of service objective (equivalent to theoretical inventory); and objective measure of these levels (equivalent to "physical" inventory).

Just as there are employees who steal and do not know who they are, there are also causing economic losses with their attitude, but does not know who they are.

When the objective performance requirements are not met there is an intangible shrink; so we have to observe the action of the employee in respect of such demands. Examples:

  • Responsible for maintaining stock rotation of outdated products on the shelves. Failure to comply with safety procedures, No verification of the identity of the customer to pay by credit card, Cash selling snuff or alcohol to minors, etc..
  • Requirements of Quality of service provided to customers: Wearing the uniform, wear the tie, inscribed with the word hello, offering bag in box, deliver ticket purchase, delivery of the correct change after buying.
  • Product knowledge required, Information entered criteria promotions, Offering customer support cases and those reported in other variables of attention and customer relations. "For any company, a request for information is not satisfied not only causes problems in the image of the organization, but also involves the risk of lost sales ".
  • Demands on the internal customer service (company employees): Compliance with obligations to other employees, Payment compliance with internal rules of employee, correct record sales, check bags or carts for cashiers, fulfillment of the workday.

WHAT IS ISOC?

Intangible resources are an asset that can be objectively inventoried by inferential measurement techniques, such as participant observation (mystery shopper). The result of this measurement is inferential ISOC (Objective Index Customer Satisfaction), based on compliance aspects of management has found the key to customer satisfaction, both internal (company and other employees) and external (customers).Cliente Misterioso

The variables chosen are quality indicators to the extent that compliance coincides with the fulfillment of the objectives of the company. The qualitative study is key choice variables, have elected the variables that are important to real customers, through a survey or other means of qualitative assessment. The employees will be marked 0 to the 10 on compliance with those variables.

Considering the type of measurement to be undertaken, simple random sampling is presented as the most appropriate. A requirement of simple random sampling is, subsequent measurements in the random selection without repetition continue until completion of the review to all employees performing functions with the public or clients.

How many controls will be necessary to know the ISOC Property? An example shows usually occurs reliably with controls 50% template.

The presentation of the data has to follow the same criteria as the observation-inference: Precision, Relevance and Objectivity. Presentation targets are: Present overall results and custom, and highlight priorities for improvement.

Knowledge of ISOC is for employees to learn to approach the optimal model, focusing attention on the most important points. The seriousness in obtaining results, will lead to respect what is extracted from them. The ISOC becomes an instrument that fosters healthy competition.

Knowledge of results is an invaluable aid to management in assessing the work done and decisions; however, one mystery shopper is not a judge, It is just an observer. The address of the property will be to interpret, by company policy, observed data. A comparative chart will easily perceive trends.

The employee information aims at knowledge by the employee of the work, communicating his ISOC and handing a card reminding test points, so you can improve the aspects that sets, o bien, know that your assessment is positive and that they know their superiors. The majority of employees are interested to know what is the criterion of objective assessment of your business regarding your work.

WHY THE INTERNAL THEFT OCCURS?

Internal theft is a very thorny path loss and tactfully needed to focus and treat the problem correctly. Internal theft is the most important route of shrinkage according to most assessments, which falls within the logic, since employees have privileged access to money and merchandise, allowing them to prepare larger thefts.

Internal theft is very difficult to detect by all the implications. Due to its special features. Its discovery and obtaining clear incriminating evidence of crimes depend on the adoption of appropriate security measures.

Where occurs. A 41,07% of companies believe that the place in which a greater number of thefts occurs internally is Banks outlet, Warehouse and followed with Trastienda 26,78% response.

Conditions for internal theft occurs. The conditioning elements of employee theft have been extensively studied, and defined in what has been called "Triangle of Theft": Opportunity, Need and Rationalization. According to criminologists, employees steal only when the three elements of the triangle are given.

Often the opportunity makes the thief. The opinion opportunity is the perception of performing a dishonest act without fear of being discovered; while objective chance is the actual probability of making a dishonest act undetected.

The risk-free opportunity is the basic factor that moves the theft. The best way to prevent theft is to prevent the opportunity exists. Normally, if not hurtador loudly in his favor had opportunities get away, no hurtaría. If you reduce the chance reduce losses. The opportunity previously causes honest employees are attracted to steal. The hurtador not think about the possible personal consequences of his action, since such a clear opportunity determines the elements of rationalization and planning.

6 Generators opportunity.

  • Overconfidence, be above suspicion is added motivation.
  • Knowledge of the company, employees are among its advantages both physical and informative privileged access, times, customs control, security systems (themselves often turned on and off), etc..
  • Exclusive Control, sole control occurs when an employee monopolizes several administrative steps, without remotely controlled. Employee theft is triggered when they perceive they can get something without anyone knowing. Ej.: Only employee in the company. No witnesses, no test, nobody knows because he knows the company monitors.
  • Lack of control, the employee may argue that "in such a small amount uncontrollably lack will be imperceptible". "The boss does not know". Samples looseness compliance standards of honesty fosters employees theft imagine as something mild.
  • Systems focused on shoplifting, most security systems of distribution centers do not prevent internal theft.
  • Delegation of power, the command and control situations have the greatest opportunities for fraud.

Second item: Need

Need is defined as a material or psychological desire. Before you want to steal a product, the employee usually has a reason for wanting this product. Consider this track because it can give you the keys to guide research.

  • Internal forces: They are the sum of the experiences and values ​​that shape the attitude of the employee, summarized in, Ideological reasons, Reasons psychopaths, Egocentric motives. Ej.: Attitude to life, Attitude toward work, Attitude towards the community, Attitude toward law.
  • External forces: They are circumstantial tensions that plague the subject in any of the areas of their professional and private life. When the employee has engaged in a desperate financial situation where honest misses out feasible. Ej.: Liabilities, Lack of resources to meet the aspirations, Lack of resources to the obligations.
  • The need for debt It can even be from a legitimate and desperate need for money: The operation of a child, Books for school children.
  • Unpredictable combination. The criteria change as circumstances change or the context. The last motivation behind the theft only be explained by an unpredictable combination of situational factors and personal. Remember that above any previous typology that has been able to build on their employees, must contemplate supervening elements that encourage a change of attitude.

Third item: Rationalization

"He that will not work always has excuses. As if the factory is not mine, why go to work for others… If they pay me for… Working directors, that's why they charge… I are sucking the sweat… and all you want to add ".

Rationalization is a mental mechanism to justify theft, and so is the ability to justify dishonesty. It is called "justification", that allows consciousness to override or circumvent becoming commonly acceptable reprehensible acts.

3 Flattering elements of rationalization.

  • Negative social contacts, formal and informal social contacts are an important negative influence facilitator dishonest justifications. Have the opposite effect that positive social contact internalization of ethical standards, dissuasive acts of dishonesty.
  • The feeling of contempt, the betrayal INJUSTICIA: When workers are not proud of the organization or the work done in the company, appears inevitable demoralization. A negative perception of the superiors of the company is usually the cornerstone justification for dishonesty, to promote a revenge which often leads to justification of theft, abuse and sabotage.
  • Lack of incentives to prevent theft: If you have not done a good awareness campaign for employees to detect and prevent theft, most likely the default position will be that of indifference when crimes are witness or have knowledge of them.

The theory of Gary Becker, Nobel laureate in economics 1992, says that the mind of the offender is rational relation to the offense. Según Becker, offenders perform a calculation of costs and benefits, resulting in probabilities of steal. Becker calls "expected costs" of punishment that the dishonest employee can provide according to their own perception. Ej.: A lack of punitive action is a removal of the expected cost of crime.

Impunity means that observed when other employees steal inconsequential. Impunity results in perceived opportunity. The general function with respect to the variable under control would be, decreases by increasing the fine penalizes what.

According to an old theory, Which employees offenders? The 25% employees routinely steal, other 25% not steal under any circumstances, and 50% you would if you had a chance.

Types of possible robbers. According to the researchers who studied the 9,000 staff, discontent is at work and not the direct pursuit of money, the main reason leading to theft. He confirmed IMF survey, on employee theft in supermarkets, found that the theft was seven times higher among disgruntled employees with their work or thought leave.

8 Points to Consider:

  • Those who rebel against the imposition of rules and symbols of authority.
  • Those who feel exploited as they are required to consider excessive productivity.
  • Those who feel aggrieved, compared to other employees with similar merits may be the source of problems. Unhappy with the lack of opportunities for career advancement.
  • Those who believe that their pay does not correspond with the work done. Problems with salaries beyond the need to cover needs in accordance with the level of aspirations.
  • Ambitious unrealistic: They are employed at a level of higher aspirations to real possibilities. Often turn into believing treated unfairly criticized for.
  • Employees who want more money and more power without paying the corresponding price target effort required to achieve such improvements in a legitimate way, sooner or later be a source of problems that can have its output in dishonest behavior.
  • Those who abuse the trust. Will encounter unpleasant surprises that probably never would have expected. Avoid excessive trust is not distrust, is a professional standard designed to prevent the loss of legitimacy of the usual controls. The ideal solution is to keep both controls routinely as trust.
  • Those who have little to lose. Low-paid workers: Employees with low pay or no promotion prospects rating, is very difficult to come to value their work and often find opportunities to compensate for their "unfair situation".

When a company makes its employees feel satisfied both materially and psychologically, making them feel proud of the prestige of the company, be much harder to bring up the temptation to theft. Mainly Hurta who for one reason or another do not feel identified with the company. There is an important difference between internal theft companies that have managed to involve employees in a common project with respect to which they have not succeeded.

Evidence to start investigating

There is a critical level at which the accumulation of evidence should lead to an investigation.

21 Suspicious behavior and situations:

  • Sudden abandonment of the job.
  • Complaints about attitude. Be suspicious when you receive many signs or complaints about the employee. Disgruntled employees often download other anger and frustration. Tend to experience psychological and interpersonal stress.
  • Suspect to sudden changes in behavior or insubordination challenges. Ej.: Antisocial behavior and convictions. Conflictual.
  • When an employee shows signs of wanting sole control of your accounts or your workspace, checks or trying to avoid segregation of duties and isolation from others, is probably intended to conceal some kind of irregularity, otherwise difficult to maintain such an attitude.
  • Be suspicious of newcomers are received very suspiciously by other employees. This attitude may mean there is unspeakable secrets in an old core workers and fear that a new employee can reveal or refuse the use of their methods.
  • Tolerance towards crime. Those who do not conceive of punishment and are inclined to indulgence.
  • Who allow the presence of an employee stealing. This is a remarkable indicator of predisposition to theft due to lack of resistance dishonest rationalization.
  • Who imagines that the direction is all forgiving and lenient forms if gets stolen.
  • Those who think or fantasize often about possibilities of theft. Think Like a Thief. Attribute more theft to others. They believe that most people steal. "Think of the thief, everyone is like him ". Proverbio popular.
  • Negative conception of work. Dishonest employees tend to have a negative view of work. Have frequent thoughts of leaving.
  • Absenteeism. According to statistics, a high level of absenteeism is associated with an increased likelihood of theft. The study advises suspicious when the level of absenteeism exceeds approximately 8%.
  • Employees who have deceived the company simulating low are clearly predisposed to internal theft.
  • Unnaturalness. A little can mean a natural attitude will cover. Gaze in what specific situations tenses. Should also be suspected if the employee always shows a stressed character; employees with that profile are more prone to theft.
  • Curiosity suspicious. Be suspicious when the employee shows too curious about the operation of safety systems, or when it has been caught in a suspicious manner, maybe attempting to manipulate the correct operation of any of these.
  • Customer-cashier Agreements: Drives without logic box, when a customer goes to a teller machines busy having unemployed may mean that plans to obtain an illegal passing off set box.
  • Relatives or friends of the cashier: Be suspicious when you go to buy too often family or friends cashier. Managers should be aware of the operations carried out an employee who shows too familiar with a client.
  • Hanky-panky: Keep under control in situations where an establishment employees maintain pair bonds, Family, Neighbourhood, etc.. agreements that might favor dishonest.
  • Kickbacks and manipulations: Suspect extreme confidence when relations between purchasing managers and suppliers are perceived. If an employee receives gifts from a company with which you are conducting business and collecting the cost is too high to consider complimentary gift, You can play almost without fear of error that is trying to buy a favor or is paying a favor and made.
  • Be wary when direct or indirect relations interests that may make you think of possible manipulations that include perceived interests related. Ej.: A purchasing manager who takes their orders to a supplier that you a some particular interest.
  • Parking suspect. Investigate which habitually those employees park their cars in dubious places. Ej.: Along with almost hidden access doors, Alongside dumpsters.
  • Bags with box. When employees leave with cash or near the workplace a place of hidden access, personal items like bags, Folders, clothing or other objects whose normal function is difficult credibility. Investigate the possibility of using them to hide merchandise.

Statistical correlations of clues to follow. Figure out who the suspects of theft by comparing the days decline was detected with the workdays of each employee. You can analyze key indicators.

  • Sales: Are there unexplained declines in sales?
  • Cancellations: What is the normal average of cancellations for ATM?
  • Integrity payment (degree of fractionation of the amounts recorded): What is the integrity of the payment of the total registered establishment? And on each box? What results sheds compared to other periods and ATMs?
  • False Alarms. False alarms security system can be caused by employees to take advantage of the security hole created or caused the diversion of attention.
  • Lack of witnesses. Entrance / Out after hours: Be suspicious when employees use any excuse to get out the last of the work or when arriving early for no apparent reason for this.
  • Simulation of theft. Witness: The employee is the sole witness to the robbery.
  • Narrative of events. Too detailed: The employee may be striving to give a veneer of reality to his story. Too Cold: An employee is usually nervous when I was just a victim of a robbery. Vacancy: When you try to avoid not enter descriptions for contradictions.
  • Recording pre-theft: In the display of the VCR tape check whether the employee had a strange expression or nervous even before the robbery.

Suspected case no records

  • Passes: It happens with clients who are in a hurry, when a cashier allows clients are ahead in the queue, contrary dictate standards, leaving them with the exact amount box. This can be exploited by the cashier for not registering the corresponding amount.
  • Exact amounts: Especially suspicious when possible records do not correspond to rounded figures. Remove a fractional amount is not more comfortable for the cashier.
  • Manual Marcaje: Suspected when the cashier proceeds to manual stamping instead of the scanner, Non logical assumptions. It may mean a non-conducting partial record.
  • Excess drawer openings: When the cash register drawer opens more times than theoretically necessary.
  • Annotations: The cashier makes a parallel accounting by any signs to know exactly how much money has been retracted.
  • Accumulation of Coins: "Fortuitous" of € uros with box representing airline 10 € or 20 € you can withdraw at the end of the day with the accumulation Cuadre made.
  • With the calculator: Using a calculator next to digital storage box with concealable. Ej.: In each alleged not register the cashier enters the amount in the calculator, and then press the memory button more (M ). Then hidden zero marking operation (C), and finally see the sum of the pressing unregistered memory recall (RM).
  • For the situation: Deviates to one side of the cash drawer Unregistered.
  • By brand: Are marked with a pencil airline unregistered.
  • State: Airline unregistered Dual.
  • Parallel query log: Be suspicious when you discover the cashier a query log data owners who can not explain. Registration may indicate exact prices of certain products.
  • Weird Rituals: Be alert to any generally strange ritual.
  • No deliveries: Observe suspicious when no deliveries till receipt or card charge. A record not assumed in almost all cases a non-delivery ticket.
  • Cancellations: Suspect in domestic roll when cash numerous cancellations are observed outside the usual logic. Especially suspicious when cancellations correspond to round numbers. Remove a fractional amount is not more comfortable for the cashier.
  • As a means of justification retain some ATMs box next to a collection of products allegedly canceled, ask factual details. Be suspicious when registration cancellations are almost always the same reason mentioned.
  • Inconsistency of data cancellation: Be suspicious when customer data has supposedly made the return do not match each other or with respect to any database that can be checked.
  • If the cashier is responsible for the data add up, and has even been agreed with the subject of the alleged nullification, then you have exhausted that route of symptoms suggestive. (It can be a friend or relative)
  • Unfractionated excess cash: Suspect especially when excess cash is for an amount not fractionated. Ej.: The cashier may not have had an opportunity to withdraw the amount of unrecorded cash drawer, or doubts you may have had to do. In this manner, will try to simulate administrative error.
  • Alterations in the internal roll box: The theft made by ATM may also be indicated by the concealment of evidence of improper balancing of the box.
  • Loss: Disappearance of box internal roll.
  • Break: Assumption jam roll, causing them to break. Disappearance of the inner segments roll box. A good sign that there is a missing segment is that the cut area not physically fit or accounting (by record number, time, etc.).
  • Not Print: Emergence count unprinted roll. This may be a sign that the cashier has used the technique of bringing paper to the print head.
  • Overlay: Assumption jam roll, A records appear above other, being impossible to prove anything.
  • Handling: Strange maneuvers during change or view internal roll.
  • Cross Firms: Cashiers cross rolls firms cash to promote confusion and avoid legal responsibilities.

Types of theft and domestic abuse. As is the case with shoplifting, There is an occasional binge or chronic employee theft and employee theft.

According to a study AECOC the merchandise theft involves 53,74% of total internal theft. Theft in the form of cash accounts for 36,25% of total internal theft. Discounts for family and friends: Pose a 9,40% the total losses through internal.

Internal theft occurs first in the boxes outside the property, and second in the reception area of ​​the goods and third stores.

The types of internal theft, as happens with shoplifting, are as limitless as the imagination of employees. In contemplating be alarmed by a list of ways to Robar. Dishonest employees are the ones to worry about getting their secrets exposed.

THERE ARE MANY WAYS TO UNDERMINE ENTERPRISE, PUT SOME OF THEM AND EXPOSED prevent lay the foundation for

  • Phone Abuse. Calling hidden for matters unrelated to the company: Ej.: Erotic lines, Lines Horoscope.
  • By accepting collect calls disguised as normal calls, avoiding the suspicion of having to dial the number from property.
  • Copier: Making photocopies for purposes different from those established in regulations employee.
  • The Internet: Using the internet differently than as specified in the rules of the employee. Ej.: Utilizando Internet with fines lúdicos, Using the password to access the Internet from outside the company.
  • Theft time: Theft of time is to use the time working in the company for purposes other than those set out in the regulations of the employee. Ej.: Using personal time, arriving late, above allowable breaks the rules of employee, the employee record by other.
  • Feigned Baja: The floor consists of simulating feigned ailments to cash without working. According to study by the Ministry of Labour (Madrid), the 38,82% of sick Temporary Disability Employment (ILT) are fraudulent. It is a form of theft that is not socially perceived as a crime, on the contrary, often admired those who have the ability to fake sick leave with impunity.

Arrangements Employees with acquaintances or relatives

  • Returns: The employee makes a monetary return corresponding to a returned product, without collecting the returned product, thereby pocketing the corresponding amount.
  • Illegal deductions: Making illegal or unauthorized discounts to acquaintances or relatives.
  • Distractions: Diversionary tactics of employees to other employees in order to facilitate the theft of known.
  • Insider: Employees provide privileged information that facilitate the theft of known.
  • Fraud pass: The pass is the sign of a closed sale and paid, so that products can legally take property: The employee prepares a false to let out a product or making "blind eye" pretending to pass fake checks pass.
  • Arrangements between employees: One of the most common types of theft offenders is by invitation or pressure of friends within the company. Employees exchange products of the sections, either directly or indirectly, letting steal each other.

Broken or damaged items

  • Breakage simulation: Can be simulated, for example, the breaking of a bottle of whiskey or perfume, taking advantage of an empty town, cause partial or break a bottle to keep the contents.
  • Knowledge of the allowable range: Employees know that there is a tolerance that can take advantage of breaks regularly.

Consumption on the premises

Besides the economic value of consumption, how dangerous is the precedent it creates. Theft is usually the next step in establishing habitual consumption. The consumption of products in the establishment is not usually seen as a crime among employees. To this should be so common. Ej.: Taking the food for lunch. "Chop" food: There are sections of employees perishables that the habit "sting" of the products they sell. The fact that the employees bite the bulk also gives a bad image to customers. Ej.: Section pastry.

CORRUPTION. The word corruption is a metaphor for the ethical degradation in dealings.

Kickbacks: A kickback is basically receiving payment for a favor done or making. His injuries are as many forms of commission. The damage to the company usually comes in a worsening of the terms of purchase for giving a best possible (opportunity cost). Often paying commissions hides a lack of competitiveness of the product "placed".

Agreements between suppliers: Manufacturers or suppliers agree to improve their conditions of sale, increasing the price of the product or service. This type of agreement is especially true in monopoly or near monopoly conditions. In this case it's a shrink cost associated with atypical undetected.

  • Arrangements with suppliers employees: "Between two products of the same quality, people buy your friend. Where products have different quality, people still continue buying from your friend ". Includes all possible varieties of commission agreements and altered invoices and control systems.
  • Supply contracts "armored": For the friendship relationship family. Serve an example that will illustrate how these relationships are articulated:
  • A receptionist always called the same taxi company. When one visits requested, never called another company cheaper competition and closer. One day showed why the door: A huge Christmas basket with a card bearing his name. Maybe it was just a gesture of gratitude to the taxi company, It is also true that the purchase of a decision can be a bitter sweet for those who have to end up paying out of pocket, ignorance, a more expensive taxi.
  • Discuss all situations products or services that are provided to your business. Who makes the decisions? What criteria does?

Embezzlement. Embezzlement is theft taking advantage poles is performed in the control or manipulation of the nominal money or cash. In embezzlement comes in the fact for himself a flow that was under obligation to custody, aspect implies that the perpetrators are almost always Directors, employees of the office in charge.

Inflated salaries. When a manager with power to set wages, preferably reward to an employee with no professional reasons for this. It will be a case of favoritism or collusion when the money is distributed target.

Confusion and simulation items destroyed. Multiple steal valuables are stored in a fire-prone section and placed in place items that once let them charred remains. Then a fire that serves to conceal the theft is raised. This embezzlement end up paying what the insurance or the establishment.

Alteration of stock data. In this case the person responsible for the accounting of stock takes a voluntary error in accounting, creating a surplus commodity becomes "ghost". Should not be the error, proceed to remove excess merchandise usually taking advantage of privileged access to the site.

Confusion of stock and purchase prices. When purchasing agent mistakes a lot of items purchased at a price, with another batch of items purchased another price, manipulating the anterior and posterior figures stock and pocketing the difference. Ej.: A cargo of oil purchase. The price goes up significantly soon after. Given this opportunity, Shopping in charge decides to fake the date of purchase, making believe that oil was bought shortly after, trusting that nobody will check these terms or bribing who needed. This type of embezzlement is very difficult to detect if controls do beyond the general balancing of figures.

Payment facilities "ghost". With a fake receipt obtained by any trick, remember justify the payment by the company, facilities "ghost". The amount allegedly charged by the supplier shall be shared among those who monopolize information. The amount of the bill will become physical inventory difference if the cake is not discovered.

Simulating a charge lower interest. According to the bank, agreeing with the bank interest spreads. This also corresponds to the fraud section kickbacks.

Downtime Money. Leveraging downtime Cash Money, payroll, checks without charge, etc., to invest and collect interest thereon. Ej.: Simulating lower cash collections in an earlier period, and higher in a subsequent period, until you get to reconcile all, whereby a temporary "loan" is achieved by 0% interest.

Theft of bag. When the charge of bringing the collection enters the bank less than the sum of the amounts collected. If this theft is based on breach of trust not discover until someday calculations were made to compare figures.

Payroll. Rounding payroll "abandoned": Remove with forged signature amount it collected in payroll confusion by deception al empleado.

Collection for fictitious employees payroll. In companies with many employees it may be that people who monopolize information area payrolls "invent" an employee to cash your payroll. Ej.: Agreement with a subcontractor to a contest with the previously agreed is corrupt "favor" is awarded.

Alterations to the terms of payroll: Less pay rate assigned, number of hours, pluses, etc.. If over time is not the error, withdraws the cash target, squaring the overall figures.

Impaired voluntary items. If your company has a policy of possible purchase by employees of those items that have been damaged by unknown causes found, You can never be sure if the item is damaged fortuitously.

Customer Deception. Altering the bill or charge to the customer having to pay more, citing the possibility of errors in issuing the invoice or press the keys.

Electronic invoices without mechanical backup. Invoices may be performed without logging, thanks to computer. Ej.: The invoice is printed directly and copies of charcoal are thrown if any. This can happen when the invoice software allows you to print the invoice unregistered, or when there is no process control restrictive enough. Ej.: Lack of numbers on printed invoice, thus can not ask for explanations if they have disappeared printed from shopping.

Document fraud. Counterfeit checks. Proceed to check counterfeiting leveraging information or privileged access. Ej.: Al Access book of checks, knowing that the boss does not control the sequential numbering and bank reconciliations.

Falsification of the amount appropriated. Shaved: This is a fraud that is done by taking advantage of a legitimate check and proceeded to scrape the paper. Once deleted the original amount, fraudulent amount is written. Added: Strokes are added imitating the original calligraphy. New lines indicate a higher amount. Ej.: Adding one ahead of the figure.

Added costs. Adding documents for collection expenses. It is common to use the credit card company to pay expenses without sufficient justification for the utility company.

Theft register. No records: A no registration is also a "theft of information" since the cashier hidden conducting a sale. The most common case of no registration is to introduce a customer paying cash directly without register, opening another advantage Cart. The beneficiary no registration need not necessarily be the Cashier, but there may be agreements with outside persons.

Fraudulent Returns. Dummy returns are often not a common method of operation log, pretending that the crediting of a return. This may rely on the ability to return a defective item, then be next to box as factual justification of payment of the refund, giving it greater credibility.

Cancellation of registration. We proceed to the cancellation of a registration by entering the same record but with a negative sign. Customers "conpinchados".

Partial record. Only records of the total amount. Ej.: Marking € 2 instead of € 20, in order to simulate a clerical error involuntary. To do this proceed to the cashier manually register the item as pretending that the scanner could not read. Partial registration can also be as a gift to friends and family discount.

“Sliding”. Is to "slide" the article without reading or to register the barcode, passing the product by the opposite face to the barcode.NO PASSING SCANER

Discounts not applied. Arguing the application of discounts that have not actually done, making the customer pay for personal gain. Be any discount with manipulation possibilities for lack of control. Ej. 1: Sales of the company to employees: Is passed as buying employee purchasing a customer, the employee goes to the difference. Ej. 2: Volume discounts confusing in multiple purchases, so the cashier gets a discount that has not existed for customers.

Registration no multiplier. Register one article when several of the same type.

Different registry. Place a different article pretending that there has been confusion with another very similar article which also comes in the shopping cart. This type of fraud can be made only when the marking is manual.

Incorrect change. Mislead the customer by delivering less relevant change. Many dishonest employees know they are being closely monitored by the company and prefer to steal from unsuspecting customers to reduce risk and hide behind the possibility of customer error.

Court of intentional voltage. The employee causes an electrical short circuit or overload on site, thereby disconnecting the possible security systems that do not have "power supply". The employee fail the momentary diversion of attention, or weakening of the same functions caused by power failure. Ej. 1: The lack of light is used to perform subtractions. Ej. 2: When the power goes, cash registers do not work, consequently registration is done manually on a sheet of paper, which facilitates the excuse of administrative error of habit.

Fake Money. Deliberately accepting counterfeit money.

Incorrect prices. Taking advantage of the marking errors price tags of some of the products, whether they agreed with incidental or who place prices.

Customer leaves without paying. Employees bar or counter can face a dilemma: Confused of charge to any client, or escape it without paying. To hide the error and not having to be accountable to the Chief, employees can get silence those facts, especially when they have weaknesses because of his controlling, and often choose not to report the missing merchandise, and of course, not register.

Credit Cards. When the extracted amount is recorded dataphone, leaving a cash surplus. It happens when an employee charge card to an amount higher than the actual invoice, pocketing the difference.

Theft of tools. Maintenance workshop tools are usually steal when not classified or locked.

Theft of information. Any leakage of vital business information, primarily for the benefit of dishonest employees and competition. Ej.: Investment Programme, Market plans, Openings local long-term expected, Program controls, Profit margins, Marketing Plans, Sheets employee, Price list, Customer List, etc..

Methods of obtaining information. Introduciendo virus programmed to seek and get information via email, Leyendo illegitimately emails, Listening to voicemail messages, Utilizando passwords ilegítimamente, Clicking the phone, Dumping data from the hard disk, Using a directional microphone, Using a stethoscope to hear conversations through walls, etc..

Registration waste. Garbage containers Director recorded to check for information that may be strategic.

Hurto technological equipment. The high technological material meets all hurtador: High price, Reduced size, Access, Easily resalable. Ej.: Microprocessors, Memory RAM, modems, laptops, Desktops, mobile, photocopiers, cash registers.

Theft samples and promotions. Objects that are given away with a purchase discounted or given away can cause serious internal problems. As the consumption of products on site, theft of samples is usually perceived by employees as a misdemeanor or "they are entitled to because 'gives the' provider '. The fact that certain employees can take these objects and other employees not, generates unrest in the company. Favoritism that are created are not good. This discomfort can be translated into the theft of such samples or other products, as compensation by employees who have not "touched the gift" them.

Sweepstakes. The sweepstakes promotions can also raise certain rogue employees. The employee in question can have free access to the ballot entry for Draw. You can fill a number with the name of a relative or friend, or several of these. With this greatly increase the chances of getting prize.

Small furniture theft. Ej.: Staplers, Scissors, Notebooks, Pens, Folios, Ceniceros, Lamps, kit items.

Theft of maintenance. Ej.: Cleaning Fluids, Garbage bags, Toilet Paper, Paper towels, Sugar in the coffee machine.

Theft by stealth. The employee concealed the merchandise in bags of food, on clothing, etc., as with shoplifting. A variant is to conceal the goods within the facility, surveillance in low-, and then removed at a time of low risk.

Intentioned Dysfunctions. The main consequence is the loss of working hours per simulation or inducing dysfunction. Ej.: Dummy bomb threats.

Simulation of theft. There are three types, in which the loss is deemed to shrink assigned to known loss:

  • Robbery without witnesses: You can simulate an employee only or more conspirators, inventing the whole story.
  • Robbery witness: A situation of real burglary occurs, but with the help of an employee, indicating the thief the best way to commit theft (form and schedule).
  • Alterations on actual theft: It happens when a real robbery fail to seize the thief money undelivered.

Subtraction by openings to the outside. The articles are released by opening to the outside, where they are collected by someone slope of the maneuver. Ej.: Windows, Vents, Skylights, WC, emergency doors.

Transfer of goods dishonest. Own chain of stores, or organizations that have several local, among which is the usual transfer of goods unexpectedly.

Subtraction via waste. Separating them: The stolen items are discreetly away in the dumpster to collect later.

Going out with garbage bags. You leave the establishment with bag full of stolen objects refuse to take the car directly, parked near the container.

According collection. Material pickup is agreed by another person.

Transport is one of the most important functions used in the distribution, and also one of the steps in which the goods are more exposed to theft. Often during transport many internal security controls to which the goods are subjected during storage period weaken. According to estimates made by the American Association of Transportation, the truck drivers themselves are the cause of 70% all losses of load. It also indicates that most of the theft of goods occurs during loading and unloading, not during transport and.

Possible dishonesty. Replacement of goods or parts: Both the transport vehicle and the goods and equipment are subject to contingencies that make it necessary to change damaged parts. Goods carried, or certain parts, are replaced by less expensive replicas, the lower quality deteriorated.

Exchange between carriers: When multiple trucks parked next to each other in the process of loading or unloading; exploit oversights or agreements are made to exchange merchandise retracted.

Arriving after hours to avoid controls: The carrier can calculate your arrival at odd times to avoid security checks, knowing that they are times when checking weakens. Ej.: Night, In holiday, During a shift change, At critical moments of maximum work.

Time: Transportation time, Charging and discharging.

Food costs: Drawing tickets not delivered to other customers in restaurants, or negotiating a ticket price inflation.

Cost of accommodation: Aprovechando tickets deal.

Phone calls: Loading call unrealized.

Fuel cost inflation: Tickets inflados, collected from gas stations or for the personal consumption.

Theft of Gasoline: Removing fuel tank vehicles to fill a Car.

Deception pass. The carrier comes with the good and comes back with the same after making a detour, as if it were a new box truck pulled. Podra charging ports.

Downloading at a "wrong": The carrier may unload the goods at a place where I can remove it later, once checked his dislocation was detected. If you will discover will argue he did not know the exact place of download. (Cobra the poise and gets the goods)

Causing a ghost ships: The shipping process usually begins when a responsible authorized firm orders approving the shipment of goods from the seller to the retail or distribution center to individual stores. (Covenant between carrier and responsible)

An unauthorized shipment begins the same way; but without having made any legitimate request. Then the goods are sent directly to a collection point where I can retire comfortably. Such activity is usually covered by destroying or altering or invoices telltale reaching an agreement with the supplier.

Harnessing the deterioration of the goods: Aprovechando merchandise voluntary unintentionally broken during transport him. Ej.: If two boxes are broken and involuntarily trucker had to get rid of them, You can say that it was more, relying on any clear evidence that there was involuntary deterioration of the merchandise.

ALL COMMENTED ON THIS ARTICLE ON THE LOSS INPACTA UNKNOWN. If you want a comprehensive solution to the problem please contact me, email me from the contact form on the right of the Blog www. ferranruiz.net.

If you liked this article, leave me a comment and share it all, can we help someone.


About Ferran Ruiz

Hello friends, I am Security Consultant, he sido Director de Desarrollo y Expansión de GRUPO EME, Provinen previously CEO of Security SA, Business Advisor at PIC GROUP S.À. and Safety Director. He studied at the UOC, UAO and the Universal Mutual, Psychology, Security Directorate, Business Management and Administration, Strategic Planning and Risk Prevention. Miss Pasiones, Integral Security, Psychology, ICT and Business Management. After 25 years of professional experience, I'm still learning, studying and developing new applications, the benefit of business management and personal growth.

Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

2 thoughts on “Discover the Keys to understanding causes that affect shrinkage