Curbing retail fraud

February 2016 CCTV, Surveillance & Remote Monitoring, Asset Management, EAS, RFID, Integrated Solutions

In the retail industry, companies rely on their point-of-sale (POS) personnel to act as their representatives, provide excellent service and protect the interests of the company by preventing in-store theft. Unfortunately, companies also open themselves up to loss in revenue from these very same employees through various POS frauds and theft.

This is common in all sectors of the retail industry and companies have tried to budget for the loss in revenue by adding a percentage to product prices. The problem with this is that companies are losing competitive edge by increasing product prices and employees that do commit POS fraud, or theft, feel free to commit the crime over and over until they are eventually caught red-handed.

Source: EMPS, Annual Background Screening Report for 2015 (<a href="http://www.emps.co.za/2016/01/15/2015-annual-screening-report-top-findings/" target="_blank">http://www.emps.co.za/2016/01/15/2015-annual-screening-report-top-findings/</a>).
Source: EMPS, Annual Background Screening Report for 2015 (http://www.emps.co.za/2016/01/15/2015-annual-screening-report-top-findings/).

Catching employees in the act has spawned an entire new range of technology solutions, such as NUUO’s POS Solution. The NUUO POS Solution combines surveillance video with transaction data from POS and ATM. All scanned items can be displayed on live view, playback and used to trigger user-defined alarms. For example, NUUO POS solution sends an alarm to alert the manager when a transaction is voided. The system will store all the transactions and special events in a secured, keyword-searchable database with video attached for easy review.

NUUO’s POS Solution allows the manager to instantly playback a transaction or search for a specific video months after a transaction. This helps to reduce the hidden shrink from employee theft, sweet-hearting and other POS frauds.

Source: EMPS, Annual Background Screening Report for 2015 (<a href="http://www.emps.co.za/2016/01/15/2015-annual-screening-report-top-findings/" target="_blank">http://www.emps.co.za/2016/01/15/2015-annual-screening-report-top-findings/</a>).
Source: EMPS, Annual Background Screening Report for 2015 (http://www.emps.co.za/2016/01/15/2015-annual-screening-report-top-findings/).

POS fraud

There are two main methods of committing point of sale fraud (Information source: brisbaneacfe.org):

• When a sale is targeted (a real customer is involved):

Void sales: Void sales fraud generally target cash sales. The employee will sell an item to a customer, hand the item to the customer and take the money from the customer, but will either not ring up a sale or ring up a void sale.

Sales processing: No matter what system is used, a dishonest employee may process a sale to an accomplice but recording the sale price for a cheaper item than actually taken by the accomplice. Of course, this fraud may be done without the sales person knowingly involved. They may just not notice that the price tag does not match the item – and this will be their defence even if they are involved.

Sweet-hearting: This is when employees give away merchandise without charge to a ‘sweetheart’ (family member or friend) by making as though they scan the product but don’t. Different sweet-hearting techniques include covering the barcode, stacking items and only scanning the bottom one, and bagging the item without even scanning it.

• When a false return is made (fictitious customer is used):

False returns: The aim of a false return fraud is to process a fake return of goods and to steal the money allegedly paid back to the (fake) customer.

For more information contact MIRO Distribution, 086 123 MIRO, riandi@miro.co.za, www.miro.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Read more...
Drones and cybersecurity?
October 2019 , CCTV, Surveillance & Remote Monitoring
Hacker drones can eavesdrop electronically on conversations, can perform network attacks, or can create fake wireless access points.

Read more...
Body-worn cameras transforming security
October 2019 , CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
Police Service Northern Ireland now has over 7 000 officers using 2 500 cameras covering approximately 173 000 incidents each year.

Read more...
Camera Selection Guide 2019
CCTV Handbook 2019 , CCTV, Surveillance & Remote Monitoring
The Camera Selection Guide 2019 includes a range of IP, analogue, thermal and speciality cameras aimed at a broad range of surveillance functions.

Read more...
Intelligent analytics and the brains to match
September 2019, Bosch Building Technologies , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
What if the brains behind our security cameras could be trained to improve their cognitive ability to pay attention, learn, and problem-solve according to specific rules and situations?

Read more...
AI-powered autonomous Drone-in-a-Box
September 2019 , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Organisations in the mining, energy and industrial, oil and gas, ports and terminals sectors can optimise security and business operations, whilst reducing risks and operational costs

Read more...
Cybersecurity for video surveillance systems
September 2019, Mobotix , Cyber Security, CCTV, Surveillance & Remote Monitoring
Video surveillance systems are increasingly accessible over any IP network, which has led to the rise of potential cyberattack.

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...
What are the cybersecurity issues in video surveillance?
November 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
he importance of the data captured by surveillance cameras – and what can be done with it – has led to a new breed of cybercriminals, looking for insights to steal and sell.

Read more...