This document provides a security primer for small business owners, outlining steps to assess risks and implement security measures. It discusses recognizing threats, conducting inspections to identify vulnerabilities, implementing preventative measures like access controls and clutter removal, and identifying internal and external threats like employee misconduct, random visitors, and weather-related events. The document also provides solutions to common security issues like using CCTV systems, security fencing, and conflict de-escalation techniques to help small businesses safeguard against crime.
This document discusses strategies for managing workplace violence. It defines workplace violence and notes that workers in jobs involving money or transporting people/goods are most vulnerable. It recommends employers establish a zero-tolerance policy and violence prevention program. Employers should encourage reporting incidents and support victims, while employees should learn to recognize and avoid dangerous situations. The document also covers verbal threats, physical threats, and ways for employers and employees to prevent and deal with workplace violence.
The document discusses operational security (OPSEC) best practices for security analysts. It warns that adversaries are not necessarily enemies and have varying levels of resources. It advises analysts to be wary of mass surveillance by agencies and to use encrypted communication tools. When meeting suspicious people, analysts should not go alone, plan an exit, and have a dead man's switch. At borders, analysts should be collaborative with officers but not consent to searches or help without a warrant. Overall the document stresses preparation, having alternatives, and maintaining discipline over relying solely on tools when doing their work.
This presentation deals with important HR issues including employee harassment issues, absenteeism and the duty to accomodoate, obligations of departing employee and the Canada Labour Code.
This document discusses the role of HR after discovering employee fraud. It states that HR should take immediate steps to mitigate losses, consult experts, launch an investigation without delay, and involve departments like legal, security, and management if needed. It provides guidance on effectively conducting internal investigations, including documenting allegations, determining potential losses, reviewing controls and records, interviewing suspects, and gathering facts to prove guilt. The document stresses analyzing lessons learned and implementing deterrents. It also offers tips for fraud prevention, like vetting staff, promoting an anti-fraud culture, monitoring employees, and responding effectively to identified fraud cases.
This active shooter presentation was developed as a resource for all businesses to train employees in the event of an active shooter event. This presentation follows the principals of Run, Hide and Fight. Most companies have prepared emergency management plans, or crisis management plans, to assist their organizations in identifying possible circumstances, and training employees on their roles in such events. The Safety Alliance was created in 2012 to assist businesses with improving their workplace safety. We will continue to produce our SafeTalk® series of informative presentations. Please visit our website www.safetyalliance.org for additional information. Thank you!
This presentation teaches the technical support professional that the role they play in incident management is similar to the role played by law enforcement in the task of solving crimes. Both are based on a similar structured problem solving methodology.
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationBillyCheuk
1. The document provides guidance on conducting internal investigations into potential fraud, including receiving allegations, evaluating evidence, investigation protocols, interviewing suspects and witnesses, and reporting results.
2. Key steps discussed include categorizing issues, conducting objective fact-finding, developing confidential investigation plans, collecting and preserving evidence, and providing recommendations such as disciplinary action or criminal prosecution.
3. The presentation emphasizes the importance of lawful, fair, and impartial investigations to avoid legal risks like defamation or privacy violations while still thoroughly addressing potential fraud issues.
Here is a ppt that I used at the ASSE conference in Naperville on September 25, 2014, It focuses on real incidents and using techniques to solve them. The $87,000 cart issue was the toughest for the class to solve.
This document discusses strategies for managing workplace violence. It defines workplace violence and notes that workers in jobs involving money or transporting people/goods are most vulnerable. It recommends employers establish a zero-tolerance policy and violence prevention program. Employers should encourage reporting incidents and support victims, while employees should learn to recognize and avoid dangerous situations. The document also covers verbal threats, physical threats, and ways for employers and employees to prevent and deal with workplace violence.
The document discusses operational security (OPSEC) best practices for security analysts. It warns that adversaries are not necessarily enemies and have varying levels of resources. It advises analysts to be wary of mass surveillance by agencies and to use encrypted communication tools. When meeting suspicious people, analysts should not go alone, plan an exit, and have a dead man's switch. At borders, analysts should be collaborative with officers but not consent to searches or help without a warrant. Overall the document stresses preparation, having alternatives, and maintaining discipline over relying solely on tools when doing their work.
This presentation deals with important HR issues including employee harassment issues, absenteeism and the duty to accomodoate, obligations of departing employee and the Canada Labour Code.
This document discusses the role of HR after discovering employee fraud. It states that HR should take immediate steps to mitigate losses, consult experts, launch an investigation without delay, and involve departments like legal, security, and management if needed. It provides guidance on effectively conducting internal investigations, including documenting allegations, determining potential losses, reviewing controls and records, interviewing suspects, and gathering facts to prove guilt. The document stresses analyzing lessons learned and implementing deterrents. It also offers tips for fraud prevention, like vetting staff, promoting an anti-fraud culture, monitoring employees, and responding effectively to identified fraud cases.
This active shooter presentation was developed as a resource for all businesses to train employees in the event of an active shooter event. This presentation follows the principals of Run, Hide and Fight. Most companies have prepared emergency management plans, or crisis management plans, to assist their organizations in identifying possible circumstances, and training employees on their roles in such events. The Safety Alliance was created in 2012 to assist businesses with improving their workplace safety. We will continue to produce our SafeTalk® series of informative presentations. Please visit our website www.safetyalliance.org for additional information. Thank you!
This presentation teaches the technical support professional that the role they play in incident management is similar to the role played by law enforcement in the task of solving crimes. Both are based on a similar structured problem solving methodology.
ACCA-IIA Singapore Seminar 2015 Part 5 InvestigationBillyCheuk
1. The document provides guidance on conducting internal investigations into potential fraud, including receiving allegations, evaluating evidence, investigation protocols, interviewing suspects and witnesses, and reporting results.
2. Key steps discussed include categorizing issues, conducting objective fact-finding, developing confidential investigation plans, collecting and preserving evidence, and providing recommendations such as disciplinary action or criminal prosecution.
3. The presentation emphasizes the importance of lawful, fair, and impartial investigations to avoid legal risks like defamation or privacy violations while still thoroughly addressing potential fraud issues.
Here is a ppt that I used at the ASSE conference in Naperville on September 25, 2014, It focuses on real incidents and using techniques to solve them. The $87,000 cart issue was the toughest for the class to solve.
Following the tragic events that took place in Northland, it is a timely reminder that all Property Managers and Real Estate agents to keep themselves safe whilst working.
Not everything you find on the internet is public domain, even if it's labeled as such, attorney Brian Heidelberger warns. Virgin Mobile found that out the hard way.
2007 09 28 ELNs as Patent Evidence SystemsSimon Coles
The document discusses electronic lab notebooks (ELNs) and their role in patent evidence creation and preservation. It notes that lawyers need strong evidence to prove invention conception, diligence, and reduction to practice in patent disputes. This requires an ELN system focused on integrity and records management over long periods of time. The document recommends splitting the ELN system from the patent evidence system, keeping dependencies minimal, and conducting "fire drills" to ensure all needs are met. Simplicity, clear standard operating procedures, and attention to the types of records created are also emphasized.
The document discusses the importance of gathering evidence within the "golden hour" period immediately following an incident when evidence is least compromised. It emphasizes securing the scene, identifying and interviewing witnesses, and collecting physical evidence like photos and samples before they degrade. The document provides guidance on properly interviewing witnesses, including using open questions, allowing time to think, and avoiding leading questions. It also lists various types of evidence that could be relevant, such as video footage, drawings, competence records, and photos of injuries or damaged machinery.
Identify and Fight Fraudulent Impressions, Clicks, and Leads LeadiD
According to recent studies, fraudulent and non-human activity account for more than 60% of all web traffic, 36% of impressions and up to 30% of all leads. Fraudsters are growing ever more sophisticated making detecting and preventing fraud increasingly difficult.
Fortunately marketers have the power to stop fraud and its effect it on their business. Watch industry leaders, including noted AdExchanger researcher Joanna O'Connell, explain the new realities of digital media management.
The document discusses various topics related to loss prevention including vendor theft, employee theft, and shoplifting. Vendor theft can occur through altering invoices or delivery discrepancies, and warning signs are outlined. Employee theft is discussed including cash register theft, merchandise theft, collusion, and payroll fraud. Solutions for employee theft include good hiring practices, policy enforcement, and building employee morale. The legal elements of shoplifting and guidelines for reasonable detention and the six step rule for apprehension are also summarized. Suggestions are provided for detention procedures, use of force, searches, and prosecution options.
Workplace Investigations: Managing 5 Challenging WitnessesCase IQ
Workplace investigators encounter a wide variety of people over the course of an investigation, some more challenging than others. Effective handling of each complainant, alleged wrongdoer and witness is crucial to the outcome of the investigation, and good interviewing and investigation skills will always be needed, no matter what challenges they throw your way.
Watch as Bill Nolan, Managing Partner of Barnes & Thornburg LLP’s Ohio office and author of the popular blog series: The Witness Files, outlines strategies for handling five situations you may encounter in a workplace investigation.
Recent news of financial misappropriation by employees, brand hijacking and even natural disasters have left many businesses in the lurch and even closed many. As a business owner or leader, time and knowledge is critical. The pace of each day leaves little time for knowing every facet of your business. As budgets tighten, you are pressed to do more with less. It is not uncommon to have a myriad of things fall through the cracks - blind spots! This year's 7-7-7 panel will explore the many blind spots that exist and offer some simple and practical tips for identifying and preventing them from doing further damage.
Lukman Olaniyi is a security guard with over 3 years of experience in door management, CCTV operation, and security across various sectors including museums, supermarkets, and nightclubs. He has a friendly demeanor and is able to build rapport with the public while also recognizing situations that could escalate. His areas of expertise include emergency procedures, customer service, crowd control, and report writing. He has multiple security and safety certifications and seeks a new challenge with a high-profile security agency where he can continue his career in a field he enjoys and takes pride in.
The document discusses trade secrets and steps to protect them. It defines a trade secret as information that derives economic value from not being publicly known and is subject to reasonable secrecy efforts. Misappropriation includes improper acquisition, disclosure, or use of trade secrets. Penalties for misappropriation include civil damages and injunctions, as well as state and federal criminal charges. Reasonable steps to protect trade secrets involve controls over workplaces, marking confidential materials, electronic security, vigilance, employment practices like agreements, and prudent hiring and development documentation.
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfBen Linders
Psychological safety in teams is important; team members must feel safe and able to communicate and collaborate effectively to deliver value. It’s also necessary to build long-lasting teams since things will happen and relationships will be strained.
But, how safe is a team? How can we determine if there are any factors that make the team unsafe or have an impact on the team’s culture?
In this mini-workshop, we’ll play games for psychological safety and team culture utilizing a deck of coaching cards, The Psychological Safety Cards. We will learn how to use gamification to gain a better understanding of what’s going on in teams. Individuals share what they have learned from working in teams, what has impacted the team’s safety and culture, and what has led to positive change.
Different game formats will be played in groups in parallel. Examples are an ice-breaker to get people talking about psychological safety, a constellation where people take positions about aspects of psychological safety in their team or organization, and collaborative card games where people work together to create an environment that fosters psychological safety.
This presentation by Yong Lim, Professor of Economic Law at Seoul National University School of Law, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
The importance of sustainable and efficient computational practices in artificial intelligence (AI) and deep learning has become increasingly critical. This webinar focuses on the intersection of sustainability and AI, highlighting the significance of energy-efficient deep learning, innovative randomization techniques in neural networks, the potential of reservoir computing, and the cutting-edge realm of neuromorphic computing. This webinar aims to connect theoretical knowledge with practical applications and provide insights into how these innovative approaches can lead to more robust, efficient, and environmentally conscious AI systems.
Webinar Speaker: Prof. Claudio Gallicchio, Assistant Professor, University of Pisa
Claudio Gallicchio is an Assistant Professor at the Department of Computer Science of the University of Pisa, Italy. His research involves merging concepts from Deep Learning, Dynamical Systems, and Randomized Neural Systems, and he has co-authored over 100 scientific publications on the subject. He is the founder of the IEEE CIS Task Force on Reservoir Computing, and the co-founder and chair of the IEEE Task Force on Randomization-based Neural Networks and Learning Systems. He is an associate editor of IEEE Transactions on Neural Networks and Learning Systems (TNNLS).
This presentation by OECD, OECD Secretariat, was made during the discussion “Competition and Regulation in Professions and Occupations” held at the 77th meeting of the OECD Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found at oe.cd/crps.
This presentation was uploaded with the author’s consent.
This presentation by OECD, OECD Secretariat, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
This presentation by Thibault Schrepel, Associate Professor of Law at Vrije Universiteit Amsterdam University, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
This presentation by Juraj Čorba, Chair of OECD Working Party on Artificial Intelligence Governance (AIGO), was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
More Related Content
Similar to Safeguarding Against Crime: A Small Business Security Primer
Following the tragic events that took place in Northland, it is a timely reminder that all Property Managers and Real Estate agents to keep themselves safe whilst working.
Not everything you find on the internet is public domain, even if it's labeled as such, attorney Brian Heidelberger warns. Virgin Mobile found that out the hard way.
2007 09 28 ELNs as Patent Evidence SystemsSimon Coles
The document discusses electronic lab notebooks (ELNs) and their role in patent evidence creation and preservation. It notes that lawyers need strong evidence to prove invention conception, diligence, and reduction to practice in patent disputes. This requires an ELN system focused on integrity and records management over long periods of time. The document recommends splitting the ELN system from the patent evidence system, keeping dependencies minimal, and conducting "fire drills" to ensure all needs are met. Simplicity, clear standard operating procedures, and attention to the types of records created are also emphasized.
The document discusses the importance of gathering evidence within the "golden hour" period immediately following an incident when evidence is least compromised. It emphasizes securing the scene, identifying and interviewing witnesses, and collecting physical evidence like photos and samples before they degrade. The document provides guidance on properly interviewing witnesses, including using open questions, allowing time to think, and avoiding leading questions. It also lists various types of evidence that could be relevant, such as video footage, drawings, competence records, and photos of injuries or damaged machinery.
Identify and Fight Fraudulent Impressions, Clicks, and Leads LeadiD
According to recent studies, fraudulent and non-human activity account for more than 60% of all web traffic, 36% of impressions and up to 30% of all leads. Fraudsters are growing ever more sophisticated making detecting and preventing fraud increasingly difficult.
Fortunately marketers have the power to stop fraud and its effect it on their business. Watch industry leaders, including noted AdExchanger researcher Joanna O'Connell, explain the new realities of digital media management.
The document discusses various topics related to loss prevention including vendor theft, employee theft, and shoplifting. Vendor theft can occur through altering invoices or delivery discrepancies, and warning signs are outlined. Employee theft is discussed including cash register theft, merchandise theft, collusion, and payroll fraud. Solutions for employee theft include good hiring practices, policy enforcement, and building employee morale. The legal elements of shoplifting and guidelines for reasonable detention and the six step rule for apprehension are also summarized. Suggestions are provided for detention procedures, use of force, searches, and prosecution options.
Workplace Investigations: Managing 5 Challenging WitnessesCase IQ
Workplace investigators encounter a wide variety of people over the course of an investigation, some more challenging than others. Effective handling of each complainant, alleged wrongdoer and witness is crucial to the outcome of the investigation, and good interviewing and investigation skills will always be needed, no matter what challenges they throw your way.
Watch as Bill Nolan, Managing Partner of Barnes & Thornburg LLP’s Ohio office and author of the popular blog series: The Witness Files, outlines strategies for handling five situations you may encounter in a workplace investigation.
Recent news of financial misappropriation by employees, brand hijacking and even natural disasters have left many businesses in the lurch and even closed many. As a business owner or leader, time and knowledge is critical. The pace of each day leaves little time for knowing every facet of your business. As budgets tighten, you are pressed to do more with less. It is not uncommon to have a myriad of things fall through the cracks - blind spots! This year's 7-7-7 panel will explore the many blind spots that exist and offer some simple and practical tips for identifying and preventing them from doing further damage.
Lukman Olaniyi is a security guard with over 3 years of experience in door management, CCTV operation, and security across various sectors including museums, supermarkets, and nightclubs. He has a friendly demeanor and is able to build rapport with the public while also recognizing situations that could escalate. His areas of expertise include emergency procedures, customer service, crowd control, and report writing. He has multiple security and safety certifications and seeks a new challenge with a high-profile security agency where he can continue his career in a field he enjoys and takes pride in.
The document discusses trade secrets and steps to protect them. It defines a trade secret as information that derives economic value from not being publicly known and is subject to reasonable secrecy efforts. Misappropriation includes improper acquisition, disclosure, or use of trade secrets. Penalties for misappropriation include civil damages and injunctions, as well as state and federal criminal charges. Reasonable steps to protect trade secrets involve controls over workplaces, marking confidential materials, electronic security, vigilance, employment practices like agreements, and prudent hiring and development documentation.
Similar to Safeguarding Against Crime: A Small Business Security Primer (11)
Why Psychological Safety Matters for Software Teams - ACE 2024 - Ben Linders.pdfBen Linders
Psychological safety in teams is important; team members must feel safe and able to communicate and collaborate effectively to deliver value. It’s also necessary to build long-lasting teams since things will happen and relationships will be strained.
But, how safe is a team? How can we determine if there are any factors that make the team unsafe or have an impact on the team’s culture?
In this mini-workshop, we’ll play games for psychological safety and team culture utilizing a deck of coaching cards, The Psychological Safety Cards. We will learn how to use gamification to gain a better understanding of what’s going on in teams. Individuals share what they have learned from working in teams, what has impacted the team’s safety and culture, and what has led to positive change.
Different game formats will be played in groups in parallel. Examples are an ice-breaker to get people talking about psychological safety, a constellation where people take positions about aspects of psychological safety in their team or organization, and collaborative card games where people work together to create an environment that fosters psychological safety.
This presentation by Yong Lim, Professor of Economic Law at Seoul National University School of Law, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
The importance of sustainable and efficient computational practices in artificial intelligence (AI) and deep learning has become increasingly critical. This webinar focuses on the intersection of sustainability and AI, highlighting the significance of energy-efficient deep learning, innovative randomization techniques in neural networks, the potential of reservoir computing, and the cutting-edge realm of neuromorphic computing. This webinar aims to connect theoretical knowledge with practical applications and provide insights into how these innovative approaches can lead to more robust, efficient, and environmentally conscious AI systems.
Webinar Speaker: Prof. Claudio Gallicchio, Assistant Professor, University of Pisa
Claudio Gallicchio is an Assistant Professor at the Department of Computer Science of the University of Pisa, Italy. His research involves merging concepts from Deep Learning, Dynamical Systems, and Randomized Neural Systems, and he has co-authored over 100 scientific publications on the subject. He is the founder of the IEEE CIS Task Force on Reservoir Computing, and the co-founder and chair of the IEEE Task Force on Randomization-based Neural Networks and Learning Systems. He is an associate editor of IEEE Transactions on Neural Networks and Learning Systems (TNNLS).
This presentation by OECD, OECD Secretariat, was made during the discussion “Competition and Regulation in Professions and Occupations” held at the 77th meeting of the OECD Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found at oe.cd/crps.
This presentation was uploaded with the author’s consent.
This presentation by OECD, OECD Secretariat, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
This presentation by Thibault Schrepel, Associate Professor of Law at Vrije Universiteit Amsterdam University, was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
This presentation by Juraj Čorba, Chair of OECD Working Party on Artificial Intelligence Governance (AIGO), was made during the discussion “Artificial Intelligence, Data and Competition” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/aicomp.
This presentation was uploaded with the author’s consent.
This presentation by Tim Capel, Director of the UK Information Commissioner’s Office Legal Service, was made during the discussion “The Intersection between Competition and Data Privacy” held at the 143rd meeting of the OECD Competition Committee on 13 June 2024. More papers and presentations on the topic can be found at oe.cd/ibcdp.
This presentation was uploaded with the author’s consent.
This presentation by Professor Giuseppe Colangelo, Jean Monnet Professor of European Innovation Policy, was made during the discussion “The Intersection between Competition and Data Privacy” held at the 143rd meeting of the OECD Competition Committee on 13 June 2024. More papers and presentations on the topic can be found at oe.cd/ibcdp.
This presentation was uploaded with the author’s consent.
This presentation by OECD, OECD Secretariat, was made during the discussion “The Intersection between Competition and Data Privacy” held at the 143rd meeting of the OECD Competition Committee on 13 June 2024. More papers and presentations on the topic can be found at oe.cd/ibcdp.
This presentation was uploaded with the author’s consent.
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij
This is a workshop about communication and collaboration. We will experience how we can analyze the reasons for resistance to change (exercise 1) and practice how to improve our conversation style and be more in control and effective in the way we communicate (exercise 2).
This session will use Dave Gray’s Empathy Mapping, Argyris’ Ladder of Inference and The Four Rs from Agile Conversations (Squirrel and Fredrick).
Abstract:
Let’s talk about powerful conversations! We all know how to lead a constructive conversation, right? Then why is it so difficult to have those conversations with people at work, especially those in powerful positions that show resistance to change?
Learning to control and direct conversations takes understanding and practice.
We can combine our innate empathy with our analytical skills to gain a deeper understanding of complex situations at work. Join this session to learn how to prepare for difficult conversations and how to improve our agile conversations in order to be more influential without power. We will use Dave Gray’s Empathy Mapping, Argyris’ Ladder of Inference and The Four Rs from Agile Conversations (Squirrel and Fredrick).
In the session you will experience how preparing and reflecting on your conversation can help you be more influential at work. You will learn how to communicate more effectively with the people needed to achieve positive change. You will leave with a self-revised version of a difficult conversation and a practical model to use when you get back to work.
Come learn more on how to become a real influencer!
This presentation by Nathaniel Lane, Associate Professor in Economics at Oxford University, was made during the discussion “Pro-competitive Industrial Policy” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/pcip.
This presentation was uploaded with the author’s consent.
XP 2024 presentation: A New Look to Leadershipsamililja
Presentation slides from XP2024 conference, Bolzano IT. The slides describe a new view to leadership and combines it with anthro-complexity (aka cynefin).
This presentation by OECD, OECD Secretariat, was made during the discussion “Pro-competitive Industrial Policy” held at the 143rd meeting of the OECD Competition Committee on 12 June 2024. More papers and presentations on the topic can be found at oe.cd/pcip.
This presentation was uploaded with the author’s consent.
This presentation by Professor Alex Robson, Deputy Chair of Australia’s Productivity Commission, was made during the discussion “Competition and Regulation in Professions and Occupations” held at the 77th meeting of the OECD Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found at oe.cd/crps.
This presentation was uploaded with the author’s consent.
2. Objectives
Understanding threats to business, improving personal
safety and security.
• Recognize threats
• Assess risk
• Plan security measures
• Implement a security plan
2
5. Inspections
• Use your checklist
• Strike out irrelevant items
• Designate egress routes/plan
• Emergency procedures (Fire, medical,
police)
5
6. Preventive Measures
• Implement key controls
• Change store access when necessary
• Move merchandise away from
doorways/windows
• Look for unknown vulnerabilities during
formal inspection
6
7. Correct Problems
• Clear clutter
• Open spaces for better view
• Remove safety hazards
• Ensure locks and other measures are
maintained and are operational
• Make strong partners with merchants and
police
7
20. Lululemon Murder
• 331 wounds
inflicted with six
different weapons
• 226 of wounds
were defensive
• Dispute over stolen
goods
20
21. Verbal Cues
“I won’t hurt you if you stay quiet.”
“You smell good. You look like you got money”
“I’ll give you a ride if you promise not to hurt me!”
21
22. Telegraphing
Approached by stranger
in parking lot early am
hours:
• Suspect gained her
trust
• Victim revealed much
about herself
• Suspect must have
made victim nervous
22
23. Non-Verbal
23
• The eyes have it
• Blinking
• Dilated pupils
25. Solve Problems Before they
happen
• Acknowledge customers as they
enter the business
• Make eye contact
• Move about the store
• Train employees to monitor customer traffic
• Step in for employee dealing with difficult
customers
• De-escalate arguments promptly
25
26. If you carry a weapon
• Get certified by
training
• Go to range often
• Remember
responsibilities if
used
26
27. Have a plan
• Adrenaline
• Tunnel vision
• Plan YOUR battle strategy
• The bad guys have THEIR plan
27
Editor's Notes
Today I'd like to address some basic points of interest such as how to protect your business from theft, fire, and personal security. What I do is usually speak to the business owner and listen to concerns (If any) and give recommendations after conducting a threat vulnerability assessment. In English, that means simply that I walk through the store with the owner - and on occasion alone as a customer - to identify and document the many ways the business can lose profits.
Our objective today is to provide you with basic tools which will help you better identify and correct issues with your business' security. First, you'll need to take the time to walk through your shops to assess potential vulnerabilities exist. What exactly are we to look for in these assessments?
Before we move on we will have to break down the process of protecting your business with some basic elements.
Would you hire a big burly guy/gal to open this container of blueberries for you? Then why buy security products just because we can afford them or because we’re too concerned about unknown threats. Yes, we know if we open the container with too much force the berries will come flying out and you’ll basically lose that five bucks you spent on them.
When we prepare to purchase security products or come up with solutions, it is wise to find out first what we need then plan your strategy then implement it.
But there cannot be a plan without a clear picture of what you need so you will have to do a walk-through of your business property in order to determine what is needed instead of blindly purchasing solutions just because they sound good. This alone can save you money, time, and worry that your business isn't protected.
This is an abbreviated version of your basic checklists because in real life those items checked would be specific to your shop. There are three elements to take into consideration:
Preventive measures: which means whatever plan you have in place that will reduce your risk of attack or intrusions, slow down break-ins if in progress, or just plain foil criminal activity.
Corrective measures: in this case your plan must be sound enough to fix the proverbial leak and get your business back up and running. Either that, or it should at least fix your vulnerability while your store continues to operate.
Detective measures: those measures designed to prevent incidents from happening by giving you early warning before they happen.
Rather than prattle on about each item, go over your lists and in your mind ask yourselves if this or that applies. Keep those items that pertain to you. I'll look them over after the presentation with you if you'd like.
One of the worst practices in any business is storing of goods near doorways and entrances. An example of a good security practice is if you have a door near a window where you store or within the main sales floor, move items out of plain view. This alone minimizes an adversary's ability to locate and plan how to steal merchandise. You may also include this principle in displays as your customers walk in the door. Nothing you sell should be near areas where people can conceal themselves for so long you can't tell they have been stolen.
You may yourselves often how do I avoid shrink and other crimes in my business? The best way to know whether you're at risk or already have been victimized by crime is to list your vulnerabilities. This is best accomplished by getting organized so that you have accountability of your finances, merchandise, and employees. If you're running things on your own you may want to enlist an independent opinion when you organize your affairs to better give you a clear idea of where you will need to go next.
First get rid of junk. In general, even merchandise that goes unsold (It's still up on the shelves or hanging off a rack). If you have so much merchandise in your store that you can barely walk through, think of the threats this poses. Not only to you but your customer base. We'll discuss those threats shortly.
What do you do with all this stock?
Liquidate! There is no other way unless you have storage space available. I realize that storage may not be feasible for some reason but consider making room in your available space.
Second, make your work space safer by creating quick egress routes in case of emergency.
That means your doorways must be clear or merchandise and furniture. Avoid tripping hazards and also consider carrying fewer items on the floor to prevent fire hazard as well.
Third, you should prepare your work space to afford you two main things; a view across space and customers and clear view of all activity.
We're not quite ready to begin implementing security for your business. At this stage I'm giving you a general idea of how each threat can be prevented or at least managed. Nothing is perfect, but expect good results following careful planning. I'll go over these threats quickly for now then we can go back to them in the next section.
Just think about these actors while I go on and try to make your own connections to what you think are your security weaknesses. But first, we have to conduct and inspection of everything so that we can learn how to mitigate threats.
What are these threats? The following list is as comprehensive as I could make it without actually knowing what you need. Which is not entirely true because I've spent some time observing and visiting some of your businesses and taken in mental notes of what I thought could be problems. You shall set me straight or agree.
External
Other people (Transients, tourists)
LOCATION (Neighborhood)
Customer base
Vendors
Internal
Employees
Transaction
Cyberfraud
Credit card fraud
Poorly outlined policies - including key control
Closing
Cash handling
Layout of sales floor
Inefficient storage
Blocking exits
Too much stock/inventory
By addressing these factors and others we encounter we can work together in designing
Don’t be confused by security measure but understand how they can either protect or harm your business. If you for example only install a steel gate in the alley leading to your loading dock but the storefront is pretty much all glass and easily mitigated then your adversaries (Criminals) are smart enough to shift their attention to that instead. Fencing is a good overall measure that should be applied evenly to outside eyes. More sensitive areas within your store must be protected inside in a different way. Fencing would be one layer of security but if you’re in a small store the fence really is one obstacle for your customers. We don’t want to chase them away. The same goes for bars on windows. Then you have to think if there’s a fire how do you get out? If you have bars on your windows then you just removed a potential escape route. Choosing wisely how you spend money on security will help proven these issues.
Let’s take a look at how to prevent workplace violence. I’m not saying that this is always the case, and since we’re here today to discuss a rise in crime in your areas, I wanted you to also be exposed to problems from within your stores, not just focusing on a masked robber (A stranger) targeting your business. Many thefts happen inside the business carried out by people you know.
Many employers hire and fire employees over the life of their business. This is part of the deal and cannot be avoided. Sometimes employees are temporary and they simply leave for various reasons and then you have to hire a replacement or they went back to school; it really doesn’t matter what the circumstances always bear in mind that once a person has had access to your business from within, they will carry that knowledge with them elsewhere. Perhaps not your competition, but it happens, and that you also cannot stop however behaviors and business practices which go unreported or are dismissed could be the factor leading to thefts.
First have a sensible policy of zero tolerance and be serious about enforcing it, period. There should be very little wiggle room in the case of theft because one violation easily brings about other violations. This is all because if we allow it to happen the first time and fail to challenge it then we’re stuck with it.
Second, manage your people. That means that from day one your rules should have been addressed before they even reported for work. They should be given a copy of anything they sign prior to employment up to and including your theft policy clearly outlined in writing! Keep a employee folder someplace in your office and lock it up of course. Also, managing people means you know them well enough that when something happens you have a decent idea of how to discipline or admonish them when they err. If you employ more than one person and they work on the same shift then their personalities will be either complemented or challenged. Keep an eye on that.
Third, document everything, the good and the bad. If the employee is doing well and going above and beyond, please praise their performance. Have small tokens (Forms of appreciation) or incentives to show them that their efforts are not going unnoticed. If you’re talking with a customer while your employee is helping them you can praise them in public; that’s a good practice. Not every single time but choose an appropriate opportunity from time to time to praise publicly. Conversely, admonishing people in public is bad business etiquette anyway and must be discouraged. Don’t do it. If there’s a serious problem with a customer step up and handle the matter quickly yourselves and have the employee step away from the confrontation. Take over, that’s your job. They will have more trust in you and perhaps you can build a better working relationship if they see you will go to bat for them. But they must be right, that should be the only condition.
Get to know your employee(s) better. If it’s a minor consider knowing their parents and when they do something that totally breaks your rules you may consider letting them know. Whether a theft case is referred to police or not remember that the incident needs to be documented but if you want to keep the theft off the books and dismiss this employee then you should be aware that no one else will know.
Left argument then returned
Felt threatened
Fight over texting
He did this before and nobody reported it!!!
Where’s the background issue with these two women? They clearly worked together but something happened that turned one woman against the other leading to a gruesome murder. Why? Witnesses did not get involved over-thinking what they heard and let their brains fill-in the information gaps with what they wanted it to be.
If you have the ability to check on a fellow merchant without putting yourselves at risk, please do so. Think if the tables were turned and you’d hope for someone to call police for you.
Let me get you to think about verbal threats now but from a rather backwards perspective. What can you tell me about this statement?
What does it tell you?
I'd like to hear some ideas before moving on to the next slide because sometimes when we’re scared or stressed we say what we’re fearing, therefore giving an adversary an unfair advantage.
Think about what this young woman said to the man who ultimately assaulted her. Usually we would hear the assailant utter some words of caution to his victim but in this case the victim predicted what was about to happen. However, she did not act in fear of her own words. That is to say, while she must have picked up a negative vibe from the man yet strangely enough failed to get away from him.
In this case, and speaking only with limited information, the victim sensed something was wrong but instead of warning the part of the brain that makes escape the only option she allowed the man into her car. We often as women see cutting off an individual as rude and unladylike. This miscalculation nearly killed her. All she had to do was say sorry pal, the hospital is a four minute walk. I don't know you. She told herself out loud he would hurt her 'if' she gave him the ride. In reality he did with some body language and verbal combination but we know she ignored obvious signs of danger.