SlideShare uma empresa Scribd logo
1 de 46
MANAGEMENT WORKSHOP   INTERNAL THEFT
LOSS PREVENTION MANAGEMENT WORKSHOPTHE LOSS FROM WITHIN Internal theft is considered to be the most serious Loss Prevention problem facing companies today. Measuring the monetary loss of dishonest employees is extremely difficult, but many loss prevention executives have concluded that upwards of 40%-70% of losses and shrink is attributable to dishonest employees. Insurance companies presently estimate that a third of all business failures each year are due to employee theft, and many companies lose money and merchandise to internal theft than they earn in profits. Dishonest employees have a distinct advantage in that they are familiar with companies systems and with the strengths and weakness of the companiy.dishonest employees invariably have the trust of their manager which enables them to commit dishonest acts with comparative ease.
Why Do Employees Steal? The realization that we may have employees stealing from our company is extremely unpleasant. It is even more agonizing to apprehend such an individual. Internal theft is the most serious aspect of our loss prevention efforts. One of the major concerns is the case with which dishonest employees have been able to complete their crimes. This illustrates in some of the investigative videotapes ha s recovered and in speaking with several of the dishonest employees apprehended.
Why do employees steal Cont. When dishonest employees are asked how they were able to steal, common replies are: “It was so easy. There was nothing to stop me” “I knew no one was watching” “No one ever follows those procedures so I knew I wouldn’t get caught” Whenever a dishonest employee is apprehended, we, as management, must assume part of the responsibility.
‘What did I do or what didn’t I do, that encouraged the employee and made it possible for the crime to be committed” Creating an Environment for Internal Theft  There are some things that we as management do that contribute to creating an environment for internal theft: When we don’t set the proper examples When we don’t follow and enforce policy and procedures When we cut corners in the interest of expediency When we ignore infractions to avoid conflict When we bend rules for an favorite
Creating Environment for Internal Theft Cont. Most employees prefer and need to work in a disciplined environment where they treated fairly and equally, and are recognized for their efforts and achievements. This affords the feeling of company stability and personal security most employees seek. On the other hand, a complacent atmosphere may contribute to insecurity and encourage contempt for regulation and management. Dishonesty usually follows
Job Frustration  Frustration on and off the job can be a factor, which contributes to theft. Job related frustrations might occur because of: A lack of communication with management Unequal treatment true or only perceived Unfair pay Improper training Failure to implement the companies policies and procedures
Personal Need Personal need can be perceived on many different levels and to different extremes. One extreme would be an employee who needs to steal because they cannot pay bills. The other employee may need to steal because they cannot afford the type of shoe “everyone is wearing at school.
Know Your Employees The employee who is suffering financial difficulties: Recent divorce Car troubles Medical Expenses The employee who is overly materialistic: Always need the newest footwear style Always seem to need to have large amount of money
 Personal Habits Personal habits such as gambling, high spending or drugs can eventually affect the workplace and cause an employee to become dishonest. When an employee lives beyond their means, they will often do whatever necessary to continue their habit. As a member of management, you need to be aware of the employees who may fall into this category. Be aware of the following possible situations: An employee who frequently talks about gambling or going to an casino  The employee who always buying a new car, motorcycle, expensive golf clubs, or other high ticket items (does their rate of pay cover such things) Information related to drug use by an employee
No Feeling of Retribution Little fear of punishment is another crime causing element that is completely within our control as management. The aggressive, frustrated person who does not anticipate being caught and punished may be encouraged to engage in dishonest acts. Although most dishonest employees do not begin work with the intention of stealing money or merchandise, it is important that management is firm in setting down a policy to all employees that any dishonest activity will be quickly detected and severely punished.
No feeling of Retribution Cont. The task facing management is to prevent the motives of dishonest employees and to reduce opportunity for theft thereby following practices and procedures outlined by your company’s standard operating procedures.
Spotting the High-Risk Employee There is a fine line between suspicion and objective awareness of employee life styles. The prudent manager should evaluate the indicators of employee theft, which may exist in his or her location. If there is reason to suspect employee dishonesty, management should assure that methods and procedures for preventing and detecting theft are in use. Further, the Loss Prevention Department should be contacted to discuss your thoughts and suspicions and chart a plan of action to determine if the suspicions are warranted.
The following is a list of a number of the possible indicators of employee dishonesty:ALARM BELLS Employees who appear to live in access of their apparent economic means Employees requesting to work rather taking an earned vacation Employees inordinately resisting changes in procedures and rules Cliques of employees, particularly when the group includes representatives from several departments. Cashiers with high exception rates Employees known to use drugs, alcohol, or gamble heavily Employees who repeatedly borrow money from other employees Employees in high shrink locations Employees who bring personal problems to work Tips from customers and employees of wrong doings at your location Overly attentive employees An employee with serious financial problems Employees with friends that loiter in the employees department at their assigned location
Alarm Bells Cont. Experienced managers and supervisors can add their own thoughts to the preceding list. Bear in mind, the factors listed are only indicators of potential employee dishonesty, but where any one or more of the factors are present, the risk of loss is greater than it would be if they were not present.
Factors of Employee Dishonesty There are generally three stages in most incidents of employee theft. A number of employees, who would otherwise have committed a theft, did not do so because of their inability to move from one stage to the next are as follows: Element of need or desire for money or property Mental justification (rationalization) Opportunity or easy access to money or property
Factor 1: element or need or desire for money or property This factor is present to a degree in practically every person. Most individuals satisfy the immediate need for money than the occupation provides by drawing on savings, working overtime hours or obtaining a loan from a bank. The need for extra money may not be caused by something as serious as owing a gambling debt to a bookie or a professional card game When a person with either a real or an imagined need for money sees no alternative, they may begin to consider stealing from a company.intially; the person must justify the theft in their own mind before committing the dishonest act. The individual moves into the next stage.
Factor 2: Mental Justification (Rationalization) The dishonest employee will want to justify the intended dishonest act by making themselves believe taking the money won’t be stealing. Some of the factors, which will probably enter the mind of the individual, are listed below. These factors will help the individual rationalize the dishonest act: “Ill just borrow the money. Ill return it” “ I work hard and I deserve higher pay” “Management is overpaid. My hard work makes him/her look good” “ This company doesn’t care about us” “ I don’t think anyone cares anyway” “ My job performance has been saving the company money for a long time”
 Employees Aware of other Employees Stealing: The individual will weigh the possibility of getting caught. The employee will fear getting caught for stealing more than they fear the penalty for stealing. The controls and procedures the company uses-or doesn’t use-now become important. Some of the consideration will be: Management’s attention to cash overages/shortages, P.O.S Exceptions Frequency of professional shops and audits
Employees Stealing Cont. Frequency of weekly meetings in which policies and procedures are discussed Frequency of unannounced visits by corporate management Presence of a knowledgeable loss prevention personnel Knowledge of penalty and consequences if apprehended after committing the dishonest act.
Employee Stealing Cont. The presence of fair and consistent management practices and the application of company loss prevention and operating policies will make it difficult for an individual to justify a dishonest act. Even if the individual feels they deserve the cash/merchandise they want to steal, the obvious use of controls may serve to prevent the theft from taking place.
 Factor 3: Opportunity of Easy Access to Money and Property Though the corporate programs on loss prevention, training, and employee relations all serve to reduce the motives for stealing, some individuals will progress through the justification stage. They only need an opportunity to steal.  The controls and procedures discussed here and in company operating standards are intended to reduce the opportunity for theft and to detect theft if it has occurred. Management, District Management, Regional Managers must apply the controls efficiently and consistently.
Honesty We can reasonably expect successful applicants and existing employees to be able to distinquishbetween right and wrong, however, honesty and dishonesty are interpreted differently by many people. An act, which may be dishonest to one person, may be an honest and acceptable act to another person. There are many factors, which enter into a person’s attitude toward honesty. But on the other end of the spectrum taking a pair of shoes to replace a pair of damaged on the job may not necessarily be considered a dishonest act by every employee.
Honesty Cont. Regardless of personal beliefs, everyone recognizes the taking of money from an employer’s company for ones own use as theft-a dishonest act. Management must accept the fact that people enter the employ of the company with different attitudes towards honesty, even though each, in their own estimate, may believe themselves to be an honest person. Clearly, management must establish the standard for honesty, which is based on the premise that all monies and every item, machine, tool and fixture at the location belongs to the company. One must not take or convert any money or item for ones own use regardless of the value of the money or item.
Honesty Cont. ____________________________ expects every employee at every level to be totally honest in their actions while at work. It is the policy of our company to deal honestly and consistently with our employees, customers and suppliers. In turn, the company expects the highest degree of honesty and integrity from those you employ. When all employees know the standards we establish and expect to maintain for honesty, employees choosing to disregard the standard will do so knowing they committing a dishonest act. Management is responsible for relating company policy on honesty to their employees; and for assuring the policy is administrated consistently and universally.
Honesty Cont. Management must set the tone! Do not let complacency set in!
Screening the Job Applicant Your employees are the backbone of your business; therefore, it is the duty of management to do a thorough screening of job applicants.  Naturally, everyone who screens personnel wants to do a good job, but occasionally time limitations force us to put the applicant’s integrity at the bottom of our list of priorities.  If we fail to place character and integrity among the first requirements for any position in your company, we are making a basic mistake which can be costly to your company and all the employees who work there.
Job Applicate Cont. Far too many people rely on instinct to evaluate the honesty of an individual, and believe that if a person looks presentable and speaks well, they are undoubtedly honest.  however, we must bear in mind that every dishonest person who is discovered working for us was selected and hired by a representative of your company. Did they become dishonest after joining your company, or was there a weakness in the applicant’s character, which went undetected during the interview process?
Job Applicant Cont. It is an accepted act that people do not usually change. If a person has manifested certain characteristics in the past, the same traits will be demonstrated in their new environment.
The Cost of Employee Dishonesty When thinking about costs of dishonesty, we might keep in mind that internal theft is costly in more ways than one. Notwithstanding the value of the stolen product and loss of products, there are additional costs involved, some of which are hidden and more difficult to measure accurately. For example:
The Cost of Employee Dishonesty Cont. How dishonest employees impact customer service The cost involved in training new hires The possible contamination of other employees, leading to additional losses The cost and time employed with conducting the investigations
Shaping Attitude The most effective way to prevent internal losses is to create a Healthy and Positive loss prevention attitude in your company! Remember:   Loss Prevention is the first a state of mind, then a state of action
Shaping Attitude Cont. All employees must be thoroughly trained in the company loss prevention rules and should understand the reasons for regulations. Utilize every resource available to you for this purpose, such as: Loss Prevention handouts Recognition of employees efforts and contributions Total affirmation and support to company’s shrink reductions programs Management setting examples in following standard operating procedures
Shaping Attitude Cont. When a new employee comes on the job, management should sit down with the employee and explain the “why’s” and “how’s” of the company’s loss prevention program before they have had a chance to learn any bad habits. These should be inclusive of, but not limited to the: Orientation Handbook Alert line Employee Purchase Procedures
Shaping Attitude Cont. Once the new employee is on board, their attitude towards the company and its rules will be shaped very quickly. To make sure employees develop positive attitudes, they must be corrected on little things during the first days of employment. They will quickly realize that the company is serious about its rules, and intends to have them obeyed.
Do you receive everything for which your WAREHOUSE is charged? Collusion between receivers and drivers is not unheard of in this business. Truck drivers often try to get receivers to accept some form of gratuity. Once they do, no matter how insignificant the favor may be, the receiver becomes obligated to the potential thief who can do major damage to the profits of your store.
Things to look for in the shipping-receiving department: Monitor the shipping/receiving manifest to make sure dishonest employees are not shipping product to their home or a friend’s house. A constant auditing and signing off for all shipments/and or receiving merchandise by management should help control losses in this area Placing camera’s in strategic areas in the stockrooms will help you monitor receiving performance issues and potential acts of dishonesty.  Make sure all merchandise that is received is double checked by management and all discrepancies are researched. Insure all transfers, damages, are properly documented and signed off by management. Insure all high priced merchandise is counted at least two times a day to close the time frame during an internal investigation.   Insure all garbage bags are checked for concealed merchandise by management prior to throwing out the trash. Insure all dumpsters are locked when not in use Insure employees are not changing clothes in the receiving area
ACCOUNTING AND FINANCE FRAUD Statement Fraud Payroll Fraud Expense Fraud Travel Fraud Purchasing Department Fraud Computer Fraud Information Fraud Kickbacks
Shrink Statistics Areas where management should pay close attention too. Pricing 4% Accounting 3% Damages 5% Receiving 11%  Shipping Accounts Payable Purchasing Hiring Process
Why should your company conduct employee background screenings? 33% of job applicants falsify employment applications 30% of business failures are caused by employee theft $15 billion dollars are lost to employee theft per year Average employee embezzlement is over $125,000 Workplace violence cost $4.2 billion in lost work and legal fees
Physical Controls Here are some basic physical security controls to help you reduce theft/risk exposures. Data Mining Software Electronic Article Surveillance (EAS) Automatic Cashier Monitoring Systems Automatic DSD Receiving Quarterly Inventories CCTV/Remote Management Burglar and Fire Systems Safes with time locks (safe should be fire proof and burglar proof A well trained loss prevention department if applicable  Well trained management and staff Increase the level of detection and apprehension Proper pre-employment screening  Documented policies and procedures Counseling of unprofessional behavior Managing operations completely
Physical Controls Cont. Unfortunately these efforts will not be successful without well-trained loss prevention or management leadership
 In Summary Every company has an operating consciousness. It is made up of the collective positive (or negative) mental attitudes of its leaders, and hence, its total employee population. To understand what separates a great loss prevention or management from lesser consciousness from lesser alternatives,  let’s look at what separates great athletes. Basketball great Michael Jordan and tennis great Chris Evert might be two of the greatest athletes ever. Jordan, with all his natural talent, practiced and trained harder than his peers and is today the highest scoring player in professional basketball history. He knew the results he wanted to achieve would come from what he did before the game, not after the game.
In Summary Cont. Evert holds 18 grand slams titles and an overall record of 1,309 wins and 146 losses. She stated, the thing that separates good players from great ones is their mental attitude.  It might only mean the difference of one or two points, but it’s the difference between winning and losing. If you have a positive mental attitude, you can do almost anything you want. The same theory applies to loss prevention
In Summary Cont. Removing the opportunity for theft is much like defensive driving! You attempt to anticipate areas of probability and then shut the door on them before they occur. While you may never know if you prevented the theft, you certainly will be comfortable by a healthy shrink report
Thanks for attending

Mais conteúdo relacionado

Mais procurados

Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud InvestigationSalih Islam
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Presentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in IndiaPresentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in IndiaRammohanpnb
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
Fraud+Indicators(1)
Fraud+Indicators(1)Fraud+Indicators(1)
Fraud+Indicators(1)gj4u
 
Preventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banksPreventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banksAbinash Mandilwar
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplaceDecosimoCPAs
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresVeriti Consulting LLC
 

Mais procurados (20)

Phishing
PhishingPhishing
Phishing
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Phising
PhisingPhising
Phising
 
Fraud Investigation
Fraud InvestigationFraud Investigation
Fraud Investigation
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in IndiaPresentation on vigilance in banks and financial institutions in India
Presentation on vigilance in banks and financial institutions in India
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Fraud+Indicators(1)
Fraud+Indicators(1)Fraud+Indicators(1)
Fraud+Indicators(1)
 
Preventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banksPreventive Vigilance, Frauds & Security Measures in banks
Preventive Vigilance, Frauds & Security Measures in banks
 
Preventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the WorkplacePreventing and Detecting Fraud in the Workplace
Preventing and Detecting Fraud in the Workplace
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Destaque

Texas hurricane risk 2012
Texas hurricane risk 2012Texas hurricane risk 2012
Texas hurricane risk 2012davcrump
 
F&Es Risk Assessment On Garrison 082409
F&Es Risk Assessment On Garrison 082409F&Es Risk Assessment On Garrison 082409
F&Es Risk Assessment On Garrison 082409bobavsec
 
Hurricane Threat and Risk Analysis in Rhode Island
Hurricane Threat and Risk Analysis in Rhode IslandHurricane Threat and Risk Analysis in Rhode Island
Hurricane Threat and Risk Analysis in Rhode Islandriseagrant
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsKeith Harris
 
PMP - Risk Management plan & template
PMP - Risk Management plan & templatePMP - Risk Management plan & template
PMP - Risk Management plan & templateAllie Gentry
 
Loss Prevention Presentation
Loss Prevention PresentationLoss Prevention Presentation
Loss Prevention Presentationjpmcafee
 

Destaque (8)

Texas hurricane risk 2012
Texas hurricane risk 2012Texas hurricane risk 2012
Texas hurricane risk 2012
 
F&Es Risk Assessment On Garrison 082409
F&Es Risk Assessment On Garrison 082409F&Es Risk Assessment On Garrison 082409
F&Es Risk Assessment On Garrison 082409
 
Hurricane Threat and Risk Analysis in Rhode Island
Hurricane Threat and Risk Analysis in Rhode IslandHurricane Threat and Risk Analysis in Rhode Island
Hurricane Threat and Risk Analysis in Rhode Island
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
 
Atf bomb threats
Atf bomb threatsAtf bomb threats
Atf bomb threats
 
Citywide Emergency Action Plan & Response trng (dept template)
Citywide Emergency Action Plan & Response trng (dept template)Citywide Emergency Action Plan & Response trng (dept template)
Citywide Emergency Action Plan & Response trng (dept template)
 
PMP - Risk Management plan & template
PMP - Risk Management plan & templatePMP - Risk Management plan & template
PMP - Risk Management plan & template
 
Loss Prevention Presentation
Loss Prevention PresentationLoss Prevention Presentation
Loss Prevention Presentation
 

Semelhante a Management Internal Theft Workshop[1]

Occupational Fraud - What Dentists Need to Know
Occupational Fraud - What Dentists Need to KnowOccupational Fraud - What Dentists Need to Know
Occupational Fraud - What Dentists Need to Knowgppcpa
 
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...Scott & Baldwin CPAs
 
2 Fraud- Prevention, Detection and Management 072512.ppt
2 Fraud- Prevention, Detection and Management 072512.ppt2 Fraud- Prevention, Detection and Management 072512.ppt
2 Fraud- Prevention, Detection and Management 072512.pptJoWeeiPOllam
 
Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?BDO Indonesia
 
nlfraudinsideproof
nlfraudinsideproofnlfraudinsideproof
nlfraudinsideproofRene Pena
 
Embezzlement: What Dentists Need to Know
Embezzlement: What Dentists Need to KnowEmbezzlement: What Dentists Need to Know
Embezzlement: What Dentists Need to Knowgppcpa
 
Business Frauds - A Short Guide
Business Frauds - A Short Guide Business Frauds - A Short Guide
Business Frauds - A Short Guide Cut 2 Shreds
 
Binary Scam Watch Monitor Prohibit Online Scam
Binary Scam Watch Monitor Prohibit Online ScamBinary Scam Watch Monitor Prohibit Online Scam
Binary Scam Watch Monitor Prohibit Online ScamBinaryScamWatchMonitor
 
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium AuditLinda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium AuditThe Athletic Mindset
 
UNIT 4 BECG ethical practices in business management prof. kanchan.pptx
UNIT 4 BECG ethical practices in business management prof. kanchan.pptxUNIT 4 BECG ethical practices in business management prof. kanchan.pptx
UNIT 4 BECG ethical practices in business management prof. kanchan.pptxProf. Kanchan Kumari
 
Workshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXWorkshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXshwetadarak
 
While there is no blueprint or checklist that one can follow to .docx
While there is no blueprint or checklist that one can follow to .docxWhile there is no blueprint or checklist that one can follow to .docx
While there is no blueprint or checklist that one can follow to .docxalanfhall8953
 
Lecture 15 fraud schemes - james a. hall book chapter 3
Lecture 15  fraud schemes - james a. hall book chapter 3Lecture 15  fraud schemes - james a. hall book chapter 3
Lecture 15 fraud schemes - james a. hall book chapter 3Habib Ullah Qamar
 

Semelhante a Management Internal Theft Workshop[1] (20)

Occupational Fraud - What Dentists Need to Know
Occupational Fraud - What Dentists Need to KnowOccupational Fraud - What Dentists Need to Know
Occupational Fraud - What Dentists Need to Know
 
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
W:\Scott & Baldwin\Marketing\Business Leadership Seminars\September 2008\...
 
Fraud, it could happen to you
Fraud, it could happen to youFraud, it could happen to you
Fraud, it could happen to you
 
2 Fraud- Prevention, Detection and Management 072512.ppt
2 Fraud- Prevention, Detection and Management 072512.ppt2 Fraud- Prevention, Detection and Management 072512.ppt
2 Fraud- Prevention, Detection and Management 072512.ppt
 
Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?Why Fraud Exist in the Organization?
Why Fraud Exist in the Organization?
 
nlfraudinsideproof
nlfraudinsideproofnlfraudinsideproof
nlfraudinsideproof
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Embezzlement: What Dentists Need to Know
Embezzlement: What Dentists Need to KnowEmbezzlement: What Dentists Need to Know
Embezzlement: What Dentists Need to Know
 
Tackling Corporate Fraud
Tackling Corporate FraudTackling Corporate Fraud
Tackling Corporate Fraud
 
Business Frauds - A Short Guide
Business Frauds - A Short Guide Business Frauds - A Short Guide
Business Frauds - A Short Guide
 
Binary Scam Watch Monitor Prohibit Online Scam
Binary Scam Watch Monitor Prohibit Online ScamBinary Scam Watch Monitor Prohibit Online Scam
Binary Scam Watch Monitor Prohibit Online Scam
 
Why do people commit fraud.pdf
Why do people commit fraud.pdfWhy do people commit fraud.pdf
Why do people commit fraud.pdf
 
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium AuditLinda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
 
UNIT 4 BECG ethical practices in business management prof. kanchan.pptx
UNIT 4 BECG ethical practices in business management prof. kanchan.pptxUNIT 4 BECG ethical practices in business management prof. kanchan.pptx
UNIT 4 BECG ethical practices in business management prof. kanchan.pptx
 
The cost of fraud seminar, 14 July 2010
The cost of fraud seminar, 14 July 2010The cost of fraud seminar, 14 July 2010
The cost of fraud seminar, 14 July 2010
 
Workshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXWorkshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTX
 
While there is no blueprint or checklist that one can follow to .docx
While there is no blueprint or checklist that one can follow to .docxWhile there is no blueprint or checklist that one can follow to .docx
While there is no blueprint or checklist that one can follow to .docx
 
Lecture 15 fraud schemes - james a. hall book chapter 3
Lecture 15  fraud schemes - james a. hall book chapter 3Lecture 15  fraud schemes - james a. hall book chapter 3
Lecture 15 fraud schemes - james a. hall book chapter 3
 
Kick Start Your Fraud Prevention
Kick Start Your Fraud PreventionKick Start Your Fraud Prevention
Kick Start Your Fraud Prevention
 
Kick Start Your Fraud Prevention
Kick Start Your Fraud PreventionKick Start Your Fraud Prevention
Kick Start Your Fraud Prevention
 

Management Internal Theft Workshop[1]

  • 1. MANAGEMENT WORKSHOP   INTERNAL THEFT
  • 2. LOSS PREVENTION MANAGEMENT WORKSHOPTHE LOSS FROM WITHIN Internal theft is considered to be the most serious Loss Prevention problem facing companies today. Measuring the monetary loss of dishonest employees is extremely difficult, but many loss prevention executives have concluded that upwards of 40%-70% of losses and shrink is attributable to dishonest employees. Insurance companies presently estimate that a third of all business failures each year are due to employee theft, and many companies lose money and merchandise to internal theft than they earn in profits. Dishonest employees have a distinct advantage in that they are familiar with companies systems and with the strengths and weakness of the companiy.dishonest employees invariably have the trust of their manager which enables them to commit dishonest acts with comparative ease.
  • 3. Why Do Employees Steal? The realization that we may have employees stealing from our company is extremely unpleasant. It is even more agonizing to apprehend such an individual. Internal theft is the most serious aspect of our loss prevention efforts. One of the major concerns is the case with which dishonest employees have been able to complete their crimes. This illustrates in some of the investigative videotapes ha s recovered and in speaking with several of the dishonest employees apprehended.
  • 4. Why do employees steal Cont. When dishonest employees are asked how they were able to steal, common replies are: “It was so easy. There was nothing to stop me” “I knew no one was watching” “No one ever follows those procedures so I knew I wouldn’t get caught” Whenever a dishonest employee is apprehended, we, as management, must assume part of the responsibility.
  • 5. ‘What did I do or what didn’t I do, that encouraged the employee and made it possible for the crime to be committed” Creating an Environment for Internal Theft  There are some things that we as management do that contribute to creating an environment for internal theft: When we don’t set the proper examples When we don’t follow and enforce policy and procedures When we cut corners in the interest of expediency When we ignore infractions to avoid conflict When we bend rules for an favorite
  • 6. Creating Environment for Internal Theft Cont. Most employees prefer and need to work in a disciplined environment where they treated fairly and equally, and are recognized for their efforts and achievements. This affords the feeling of company stability and personal security most employees seek. On the other hand, a complacent atmosphere may contribute to insecurity and encourage contempt for regulation and management. Dishonesty usually follows
  • 7. Job Frustration  Frustration on and off the job can be a factor, which contributes to theft. Job related frustrations might occur because of: A lack of communication with management Unequal treatment true or only perceived Unfair pay Improper training Failure to implement the companies policies and procedures
  • 8. Personal Need Personal need can be perceived on many different levels and to different extremes. One extreme would be an employee who needs to steal because they cannot pay bills. The other employee may need to steal because they cannot afford the type of shoe “everyone is wearing at school.
  • 9. Know Your Employees The employee who is suffering financial difficulties: Recent divorce Car troubles Medical Expenses The employee who is overly materialistic: Always need the newest footwear style Always seem to need to have large amount of money
  • 10.  Personal Habits Personal habits such as gambling, high spending or drugs can eventually affect the workplace and cause an employee to become dishonest. When an employee lives beyond their means, they will often do whatever necessary to continue their habit. As a member of management, you need to be aware of the employees who may fall into this category. Be aware of the following possible situations: An employee who frequently talks about gambling or going to an casino The employee who always buying a new car, motorcycle, expensive golf clubs, or other high ticket items (does their rate of pay cover such things) Information related to drug use by an employee
  • 11. No Feeling of Retribution Little fear of punishment is another crime causing element that is completely within our control as management. The aggressive, frustrated person who does not anticipate being caught and punished may be encouraged to engage in dishonest acts. Although most dishonest employees do not begin work with the intention of stealing money or merchandise, it is important that management is firm in setting down a policy to all employees that any dishonest activity will be quickly detected and severely punished.
  • 12. No feeling of Retribution Cont. The task facing management is to prevent the motives of dishonest employees and to reduce opportunity for theft thereby following practices and procedures outlined by your company’s standard operating procedures.
  • 13. Spotting the High-Risk Employee There is a fine line between suspicion and objective awareness of employee life styles. The prudent manager should evaluate the indicators of employee theft, which may exist in his or her location. If there is reason to suspect employee dishonesty, management should assure that methods and procedures for preventing and detecting theft are in use. Further, the Loss Prevention Department should be contacted to discuss your thoughts and suspicions and chart a plan of action to determine if the suspicions are warranted.
  • 14. The following is a list of a number of the possible indicators of employee dishonesty:ALARM BELLS Employees who appear to live in access of their apparent economic means Employees requesting to work rather taking an earned vacation Employees inordinately resisting changes in procedures and rules Cliques of employees, particularly when the group includes representatives from several departments. Cashiers with high exception rates Employees known to use drugs, alcohol, or gamble heavily Employees who repeatedly borrow money from other employees Employees in high shrink locations Employees who bring personal problems to work Tips from customers and employees of wrong doings at your location Overly attentive employees An employee with serious financial problems Employees with friends that loiter in the employees department at their assigned location
  • 15. Alarm Bells Cont. Experienced managers and supervisors can add their own thoughts to the preceding list. Bear in mind, the factors listed are only indicators of potential employee dishonesty, but where any one or more of the factors are present, the risk of loss is greater than it would be if they were not present.
  • 16. Factors of Employee Dishonesty There are generally three stages in most incidents of employee theft. A number of employees, who would otherwise have committed a theft, did not do so because of their inability to move from one stage to the next are as follows: Element of need or desire for money or property Mental justification (rationalization) Opportunity or easy access to money or property
  • 17. Factor 1: element or need or desire for money or property This factor is present to a degree in practically every person. Most individuals satisfy the immediate need for money than the occupation provides by drawing on savings, working overtime hours or obtaining a loan from a bank. The need for extra money may not be caused by something as serious as owing a gambling debt to a bookie or a professional card game When a person with either a real or an imagined need for money sees no alternative, they may begin to consider stealing from a company.intially; the person must justify the theft in their own mind before committing the dishonest act. The individual moves into the next stage.
  • 18. Factor 2: Mental Justification (Rationalization) The dishonest employee will want to justify the intended dishonest act by making themselves believe taking the money won’t be stealing. Some of the factors, which will probably enter the mind of the individual, are listed below. These factors will help the individual rationalize the dishonest act: “Ill just borrow the money. Ill return it” “ I work hard and I deserve higher pay” “Management is overpaid. My hard work makes him/her look good” “ This company doesn’t care about us” “ I don’t think anyone cares anyway” “ My job performance has been saving the company money for a long time”
  • 19.  Employees Aware of other Employees Stealing: The individual will weigh the possibility of getting caught. The employee will fear getting caught for stealing more than they fear the penalty for stealing. The controls and procedures the company uses-or doesn’t use-now become important. Some of the consideration will be: Management’s attention to cash overages/shortages, P.O.S Exceptions Frequency of professional shops and audits
  • 20. Employees Stealing Cont. Frequency of weekly meetings in which policies and procedures are discussed Frequency of unannounced visits by corporate management Presence of a knowledgeable loss prevention personnel Knowledge of penalty and consequences if apprehended after committing the dishonest act.
  • 21. Employee Stealing Cont. The presence of fair and consistent management practices and the application of company loss prevention and operating policies will make it difficult for an individual to justify a dishonest act. Even if the individual feels they deserve the cash/merchandise they want to steal, the obvious use of controls may serve to prevent the theft from taking place.
  • 22.  Factor 3: Opportunity of Easy Access to Money and Property Though the corporate programs on loss prevention, training, and employee relations all serve to reduce the motives for stealing, some individuals will progress through the justification stage. They only need an opportunity to steal. The controls and procedures discussed here and in company operating standards are intended to reduce the opportunity for theft and to detect theft if it has occurred. Management, District Management, Regional Managers must apply the controls efficiently and consistently.
  • 23. Honesty We can reasonably expect successful applicants and existing employees to be able to distinquishbetween right and wrong, however, honesty and dishonesty are interpreted differently by many people. An act, which may be dishonest to one person, may be an honest and acceptable act to another person. There are many factors, which enter into a person’s attitude toward honesty. But on the other end of the spectrum taking a pair of shoes to replace a pair of damaged on the job may not necessarily be considered a dishonest act by every employee.
  • 24. Honesty Cont. Regardless of personal beliefs, everyone recognizes the taking of money from an employer’s company for ones own use as theft-a dishonest act. Management must accept the fact that people enter the employ of the company with different attitudes towards honesty, even though each, in their own estimate, may believe themselves to be an honest person. Clearly, management must establish the standard for honesty, which is based on the premise that all monies and every item, machine, tool and fixture at the location belongs to the company. One must not take or convert any money or item for ones own use regardless of the value of the money or item.
  • 25. Honesty Cont. ____________________________ expects every employee at every level to be totally honest in their actions while at work. It is the policy of our company to deal honestly and consistently with our employees, customers and suppliers. In turn, the company expects the highest degree of honesty and integrity from those you employ. When all employees know the standards we establish and expect to maintain for honesty, employees choosing to disregard the standard will do so knowing they committing a dishonest act. Management is responsible for relating company policy on honesty to their employees; and for assuring the policy is administrated consistently and universally.
  • 26. Honesty Cont. Management must set the tone! Do not let complacency set in!
  • 27. Screening the Job Applicant Your employees are the backbone of your business; therefore, it is the duty of management to do a thorough screening of job applicants. Naturally, everyone who screens personnel wants to do a good job, but occasionally time limitations force us to put the applicant’s integrity at the bottom of our list of priorities. If we fail to place character and integrity among the first requirements for any position in your company, we are making a basic mistake which can be costly to your company and all the employees who work there.
  • 28. Job Applicate Cont. Far too many people rely on instinct to evaluate the honesty of an individual, and believe that if a person looks presentable and speaks well, they are undoubtedly honest. however, we must bear in mind that every dishonest person who is discovered working for us was selected and hired by a representative of your company. Did they become dishonest after joining your company, or was there a weakness in the applicant’s character, which went undetected during the interview process?
  • 29. Job Applicant Cont. It is an accepted act that people do not usually change. If a person has manifested certain characteristics in the past, the same traits will be demonstrated in their new environment.
  • 30. The Cost of Employee Dishonesty When thinking about costs of dishonesty, we might keep in mind that internal theft is costly in more ways than one. Notwithstanding the value of the stolen product and loss of products, there are additional costs involved, some of which are hidden and more difficult to measure accurately. For example:
  • 31. The Cost of Employee Dishonesty Cont. How dishonest employees impact customer service The cost involved in training new hires The possible contamination of other employees, leading to additional losses The cost and time employed with conducting the investigations
  • 32. Shaping Attitude The most effective way to prevent internal losses is to create a Healthy and Positive loss prevention attitude in your company! Remember: Loss Prevention is the first a state of mind, then a state of action
  • 33. Shaping Attitude Cont. All employees must be thoroughly trained in the company loss prevention rules and should understand the reasons for regulations. Utilize every resource available to you for this purpose, such as: Loss Prevention handouts Recognition of employees efforts and contributions Total affirmation and support to company’s shrink reductions programs Management setting examples in following standard operating procedures
  • 34. Shaping Attitude Cont. When a new employee comes on the job, management should sit down with the employee and explain the “why’s” and “how’s” of the company’s loss prevention program before they have had a chance to learn any bad habits. These should be inclusive of, but not limited to the: Orientation Handbook Alert line Employee Purchase Procedures
  • 35. Shaping Attitude Cont. Once the new employee is on board, their attitude towards the company and its rules will be shaped very quickly. To make sure employees develop positive attitudes, they must be corrected on little things during the first days of employment. They will quickly realize that the company is serious about its rules, and intends to have them obeyed.
  • 36. Do you receive everything for which your WAREHOUSE is charged? Collusion between receivers and drivers is not unheard of in this business. Truck drivers often try to get receivers to accept some form of gratuity. Once they do, no matter how insignificant the favor may be, the receiver becomes obligated to the potential thief who can do major damage to the profits of your store.
  • 37. Things to look for in the shipping-receiving department: Monitor the shipping/receiving manifest to make sure dishonest employees are not shipping product to their home or a friend’s house. A constant auditing and signing off for all shipments/and or receiving merchandise by management should help control losses in this area Placing camera’s in strategic areas in the stockrooms will help you monitor receiving performance issues and potential acts of dishonesty. Make sure all merchandise that is received is double checked by management and all discrepancies are researched. Insure all transfers, damages, are properly documented and signed off by management. Insure all high priced merchandise is counted at least two times a day to close the time frame during an internal investigation. Insure all garbage bags are checked for concealed merchandise by management prior to throwing out the trash. Insure all dumpsters are locked when not in use Insure employees are not changing clothes in the receiving area
  • 38. ACCOUNTING AND FINANCE FRAUD Statement Fraud Payroll Fraud Expense Fraud Travel Fraud Purchasing Department Fraud Computer Fraud Information Fraud Kickbacks
  • 39. Shrink Statistics Areas where management should pay close attention too. Pricing 4% Accounting 3% Damages 5% Receiving 11% Shipping Accounts Payable Purchasing Hiring Process
  • 40. Why should your company conduct employee background screenings? 33% of job applicants falsify employment applications 30% of business failures are caused by employee theft $15 billion dollars are lost to employee theft per year Average employee embezzlement is over $125,000 Workplace violence cost $4.2 billion in lost work and legal fees
  • 41. Physical Controls Here are some basic physical security controls to help you reduce theft/risk exposures. Data Mining Software Electronic Article Surveillance (EAS) Automatic Cashier Monitoring Systems Automatic DSD Receiving Quarterly Inventories CCTV/Remote Management Burglar and Fire Systems Safes with time locks (safe should be fire proof and burglar proof A well trained loss prevention department if applicable Well trained management and staff Increase the level of detection and apprehension Proper pre-employment screening Documented policies and procedures Counseling of unprofessional behavior Managing operations completely
  • 42. Physical Controls Cont. Unfortunately these efforts will not be successful without well-trained loss prevention or management leadership
  • 43.  In Summary Every company has an operating consciousness. It is made up of the collective positive (or negative) mental attitudes of its leaders, and hence, its total employee population. To understand what separates a great loss prevention or management from lesser consciousness from lesser alternatives, let’s look at what separates great athletes. Basketball great Michael Jordan and tennis great Chris Evert might be two of the greatest athletes ever. Jordan, with all his natural talent, practiced and trained harder than his peers and is today the highest scoring player in professional basketball history. He knew the results he wanted to achieve would come from what he did before the game, not after the game.
  • 44. In Summary Cont. Evert holds 18 grand slams titles and an overall record of 1,309 wins and 146 losses. She stated, the thing that separates good players from great ones is their mental attitude. It might only mean the difference of one or two points, but it’s the difference between winning and losing. If you have a positive mental attitude, you can do almost anything you want. The same theory applies to loss prevention
  • 45. In Summary Cont. Removing the opportunity for theft is much like defensive driving! You attempt to anticipate areas of probability and then shut the door on them before they occur. While you may never know if you prevented the theft, you certainly will be comfortable by a healthy shrink report