2. Where did it come from?
Founder – Yuseta A. Caiton
Founded in 2000
Located in LA, California
“Organic only” policy
Asian and American products
Store Motto: “Live Fresh, eat fresh”
3. Stealing another person's identity in which
someone pretends to be someone else in order to
obtain credit and other benefits in that person's
name.
4. Types of Identity theft
Criminal identity theft (posing as another person when
apprehended for a crime)
Financial identity theft (using another's identity to obtain
credit, goods and services)
Identity cloning (using another's information to assume his or
her identity in daily life)
Medical identity theft (using another's identity to obtain
medical care or drugs)
Child identity theft (using a child’s identity to commit any of
the above actions)
5. Budget Breakdown for 2005
Identity Theft
Customer Theft
Employee Theft
Store Expenses
6. Budget Breakdown for 2010
Identity Theft
Customer Theft
Employee Theft
Store Expenses
7. Skimming
The theft of credit
card information that
is used in an
otherwise legitimate
transaction.
8. How is it done?
It is typically an "inside job" by a dishonest employee.
Usually committed by photocopying receipts or using a
small electronic device (skimmer) to steal hundreds of
credit card numbers.
10. Countermeasures
• The only way to control the problem with
electronic skimming is to ensure the security
of the terminals by manually inspecting
them.
• Severe penalties (fines) can be issued if the
machines are compromised.
11. Other defenses against identity
theft
Pan Truncation
not displaying the full number on receipts
15. Theft of money
Money is one of the most
common assets that are
stolen from Employers
16. Theft of time
Employee is paid for
time which they did
not work
Employee who are
not working while
on the job
17. Theft of supplies
Theft of supplies is
another prevalent form
of employee theft.
Common examples of
this form of theft are
office supplies and
restaurant supplies
20. Types of Customer Theft
Customers using their children
Steaming (a technique where a large gang enters a
store to steal large quantities of goods before leaving)
Customers using bags, purses, and coats
21. First Solution
Hire a security team
Members of the security team:
head of security, surveillance system monitor,
two doors guards, and secret shoppers
All security members are required to have certain skills
22. Second Solution
Electronic Article Surveillance System
An EAS system is a technology used to recognize
stolen merchandise as it passes through a gated area in
a store.
23. Third Solution
Lock up expensive merchandise
Merchandise that exceeds a certain limit of value then
we will keep the items locked in a clear case that only
an employee can unlock.