Home Tags Types of data security
Tag: types of data security
At first, this may seem like an issue that involves only the retailer. However, the decision to ignore generally accepted cash and merchandise controls has far-reaching implications.
At some point in your retail loss prevention career, if you haven’t done so already, you will be called upon to help make procurement decisions on new technology, such as electronic article surveillance (EAS) or video surveillance.
According to a survey by SDR/LPM, loss prevention executives are more likely than security counterparts in other industries to believe that a pilot study or field test is an effective way to show senior management that a project is a good idea.
Surveillance footage is most effective when used to impeach a plaintiff’s credibility as to the extent of his or her injuries. Since the tape is factual, not opinion, it is not subject to traditional credibility attacks, note Rubin and Stempler.
Am I sure that he is attempting to steal this merchandise? "Yes, I am sure."
How are shoplifting and other retail shrink concerns managed in retail stores with no loss prevention team?
Envision the following scenario. You are at home around 8:15 at night watching television with your wife or kids when the phone rings. The...
At some point in your retail loss prevention career, if you haven’t done so already, you will be called upon to help make procurement decisions on...
Currently in its twenty-fifth year, the National Retail Security Survey continues to offer not only insightful research into retail crime but also successful countermeasures....
EVOLVE-Store™ is the latest innovation from Checkpoint Systems, involving a real-time app. In addition, the new Density Tag™ from Checkpoint's Alpha high-theft line of products protects valuable items inside packaged merchandise by “sensing” presence through the box. Visit Booth #1001 to learn more.