Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

security issues in retailing.pptx

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Chargement dans…3
×

Consultez-les par la suite

1 sur 26 Publicité
Publicité

Plus De Contenu Connexe

Plus par Renu Lamba (19)

Publicité

security issues in retailing.pptx

  1. 1. security issues in retailing
  2. 2. Security issues in retailing • security assumes paramount importance in retailing • Internationalization, Varied cultures, HRM • growth of various retailing formats • stocking a range of categories across smaller sized-high value items • large data generation which needs to be to secured by a sound Information Technology (IT) back-end infrastructure so as to provide real time information
  3. 3. Security in retailing Internal security Data security External security
  4. 4. • external security – Layout should be properly designed which is easy for the administration/security staff – 24/7 stores or stores working for long hours-cabs – Parking lots especially the underground must have closed circuit cameras, electronic security tags – compulsory physical checking of shoppers – Proper illumination
  5. 5. • Internal security: – in-store security basically for preventing Instances of shop-lifting, thefts and pilferage resulting in commercial loses to the retailer. – twin advantage of controlling consumer oriented as well store driven thefts
  6. 6. • Appropriate planning of Store design – Small and theft prone items should never be kept near entrances. – possible customers should be allowed to carry only one or two items for trial – All staff must make it mandatory to leave the store only after having their bags checked at the exit by an senior. – The layout should be that the staff gets a full view of an aisle or section of the store from a single point – The security room or surveillance room must be located close to the entrance so as to take immediate action in case of any problem – The check-out counters may be placed in such locations so as to enable the cashiers to act as a second line of security for each of checking out customer – well-illuminated after closing to ensure high visibility and increase the likelihood of intruders being noticed.
  7. 7. • Employee training and screening: – Compulsory pre employment screening – good training and greater sense of ownership with transparent rewards and appraisal system can go a long way in reducing thefts • Technology driven measure – Bar coding – Electronic article surveillance – Electronic shelf labels (warehousing) – CCTVs(Closed Circuit Televisions
  8. 8. As per surveys 43% of store pilferage/shrinkage occurs on account of employee theft 30% due to shop lifting and remaining on account of mistakes and inaccurate record management.
  9. 9. Planning for theft presentation of the product, the hardware used to secure it
  10. 10. Product Focused planning • Product presentation – should be realistic, as customers want to experience the product – Use the features of the product to help secure it. • For example, use the product’s power cord to anchor the machine to the merchandiser.
  11. 11. Bottle Cap Liquor Security • easy to use and effective method to help reduce shoplifting and theft or your liquor bottles on display. • Caps are fitted with a simple twist and removed single handed on a conventional magnetic detacher.
  12. 12. •Visibility •from multiple sides may dictate certain materials like clear vacuum form cases. •For example, Lego used a vacuum form case to display a fully assembled toy that is sold as individual building blocks in a box
  13. 13. High Security Hooks • Used in Display of hang and sell merchandise • authorized personnel has access to these hooks.
  14. 14. Security mirrors • convex mirrors having maximum visibility in hidden spots of your store at a glace • Helps enhance the level of customer service/instore experience just by looking if the customer needs assistance. • 20% brighter than glass mirrors
  15. 15. Cable Coat Lock System • Discreet security cables can be used on handbags and jackets. • Heavy-gauge steel cable coat lock box with U- bolt attachment
  16. 16. Smokie Domes • put a CCTV camera inside it or leave it empty – shoplifters won’t know which domes are live.
  17. 17. Cabinet and Door Alarm – Magnetic Alarm Guard • Alarm sounds when door is opened
  18. 18. Double Lock Cash Drop Box • Double Lock key system which requires two keys to open. • One for the manager keeps cash is in the cash box, authorised personnel should be taking it out.
  19. 19. Hardware focused planning • Locks – programmable radio frequency (RF) card is a solution that can replace traditional locks. – one key code or multiple key codes
  20. 20. Cabinet and Door Lock – with RFID key card • Electronic locking mechanism is attached to the inside or rear of a cabinet or drawer and opened with the RFID Key Card. • Easy to program the lock with the programming card. No PC or software required Locking mechanism RFID Key Card
  21. 21. • Doors and cabinets: – Glass vs. plastic – Sliding vs. roll-top doors
  22. 22. • Tethers: – satisfies the objective of allowing customers to touch and try before they buy. – Retractable tethers allows the shopper to handle a product within a specified distance and return product to its original position – Tethers can be alarmed or unalarmed – Used in displaying mobile phones, digital cameras, iPods, mp3 players, tablet devices
  23. 23. • Tags n Alarm: – wired alarm or flashing sensor that is triggered when someone tries to remove displayed product • Magnetic Electronic Article Surveillance tags – applied to product and work in conjunction with store entry security systems. • Integrated systems that allow – central monitoring
  24. 24. • Cctv
  25. 25. • Low profile shelving: – Retailers who redesign their stores to utilize shelving i.e 60 inches or less have lesser shoplifters as lower height facilitates natural surveillance
  26. 26. 3 data security • Should be implemented at both store-level and head-office level security – Access level by user – Recovery management – Payment gate-ways • encryption standards – Periodic security audits • certified Quality assessment auditors like PwC, Ernst and Young, Deloitte Consultancy

×