Printer Friendly
The Free Library
22,725,466 articles and books

A plan to prevent pilfering.



A COMPANY'S STRUCTURE and the manner in which various functions are assigned, may contribute significantly to the opportunity for embezzlers to act. One of a security manager's first tasks should be to examine the company's policies and procedures Policies and Procedures are a set of documents that describe an organization's policies for operation and the procedures necessary to fulfill the policies. They are often initiated because of some external requirement, such as environmental compliance or other governmental  to locate windows of opportunity for crime and then to close those windows.

The most effective embezzlement embezzlement, wrongful use, for one's own selfish ends, of the property of another when that property has been legally entrusted to one. Such an act was not larceny at common law because larceny was committed only when property was acquired by a "felonious taking," i.  prevention program combines general loss prevention techniques designed for daily operations with specific techniques that prevent losses from employees.

The embezzler embezzler n. a person who commits the crime of embezzlement by fraudulently taking funds or property of an employer or trust. . There is no such person as an average embezzler. There is no exact description of how an embezzler looks, acts, or thinks. Experience and statistical information, however, can help to develop an embezzler profile.

Embezzlers are generally profiled in one of two categories: chronic/compulsive or needy. An embezzler generally is a high school graduate; a staff employee, if female; a company officer, if male; a bright, competent, and superior employee; and neat, precise, and attentive to detail. He or she leads a progressively complex life and has worked and continues to work in the same industry and job category.

The individual embezzles to repay increasing debts, not to accumulate wealth, and believes that he or she will never be discovered. The individual does not see himself or herself as a criminal and incorporates lying, cheating, and stealing into every facet of his or her life. This individual has embezzled em·bez·zle  
tr.v. em·bez·zled, em·bez·zling, em·bez·zles
To take (money, for example) for one's own use in violation of a trust.
 from his or her last four employers prior to discovery, is rarely criminally prosecuted, does not receive a jail sentence jail sentence jail npeine f de prison  upon conviction, and does not repay the victim or court costs court costs n. fees for expenses that the courts pass on to attorneys, who then pass them on to their clients or, in some kinds of cases, to the losing party. .

Needy embezzlers may have an acute, short-term need for money for a legitimate purpose. They may have knowledge of other employees' embezzlement activity and ask to become temporarily involved in those activities. They may feel the need to retaliate for perceived promotion discrimination or sexual harassment sexual harassment, in law, verbal or physical behavior of a sexual nature, aimed at a particular person or group of people, especially in the workplace or in academic or other institutional settings, that is actionable, as in tort or under equal-opportunity statutes.  and feel cheated, unrecognized, or unrewarded for their efforts on behalf of the institution. They may also feel there is a lack of promotional opportunity; suffer from minor personality conflicts and related problems; be occasional substance abusers; or possess altered mental and emotional states caused by a dependency on drugs or alcohol.

These individuals may be facing what appears to them to be overwhelming debts, and they fear the loss of reputation and esteem of co-workers. They feel unprepared or uncomfortable in their jobs and perceive a lack of interest and attention by the institution.

In addition to the common characteristics shared by most embezzlers and the more specific characteristics shared by needy embezzlers, chronic/compulsive embezzlers consider themselves to be superior to management and other employees in intellect or ability and think of embezzlement as a game they can win. They may lie, cheat, and steal to either receive a reward or to avoid punishment, and they have a desire to prove how clever they are.

Professional embezzlers generally develop a strategic plan for their activities much the same way the companies they work for do. The strategic plan most frequently used by embezzlers resembles an auditor's review worksheet. It tests the opportunity afforded by the company's policy and procedures on managing its personnel and record keeping. The security manager must not leave vulnerabilities for the would-be embezzler to exploit.

Personnel. Comprehensive written internal control techniques should be established that provide employees with the ability to notify the security officer and auditor of suspicious incidents without fear of reprisal reprisal, in international law, the forcible taking, in time of peace, by one country of the property or territory belonging to another country or to the citizens of the other country, to be held as a pledge or as redress in order to satisfy a claim. . This information should be included in the employee orientation training program and employee handbook An employee handbook (or employee manual) details guidelines, expectations and procedures of a business or company to its employees.

Employee handbooks are given to employees on one of the first days of his/her job, in order to acquaint them with their new company and
. The internal control policies should also provide for the documentation of all suspicious incidents.

Comprehensive safeguards should also be set up against abuses by officers and directors or other insiders. For example, employees' schedules and work assignments should be rotated at unpredictable intervals.

A code of conduct should be written and shared with all employees and board members. Employees need to be shown where they fit into the company; they need to know what the company stands for and what it will not allow; and they need to be led by example. If the company fails to communicate its response to any of these needs, it is preparing the means for its own destruction. Embezzlers themselves often cite these reasons for the discontentment that led them to commit their crimes.

A code of conduct is an excellent way to communicate with employees and to describe standards of behavior. The company's code of conduct statement can be used to describe an employee's rights and obligations. Employees who believe that they are treated fairly are less likely to become discontented dis·con·tent·ed  
adj.
Restlessly unhappy; malcontent.



discon·tent
.

Key positions at all levels should be filled by qualified personnel who create the necessary security-conscious atmosphere. Written position descriptions, levels of authority, and reporting routines for all employees should also be provided.

The roles of security officer and auditor should not be shared by one individual. Each role may report directly to the board of directors or an audit committee.

If the company is a corporation, an audit committee should be formed and composed solely of independent directors. The committee should be provided with the necessary guidance, resources, authority, and training to oversee the company's affairs effectively.

All new employees should provide handwriting and fingerprint samples and a current personal photograph. The company should provide notice that it will conduct credit checks on all applicants and that it may conduct credit checks on employees at unspecified intervals during any employee's term of employment. A written security training program should also be developed for employees at all levels within the company.

The company should develop, implement, monitor and periodically update a policy that requires at least two employees to open and close a facility. This policy should also govern the issuance, control, and collection of keys; security and alarm access codes and devices; security procedures for cash; cash-handling facility countdown after an unusual incident; and other security devices maintained as dual control techniques.

Record keeping. Company policy should require an employee to be present when customers sign documents such as signature verification cards, payable instruments, delivery receipts, and credit applications. These documents should include any original materials that may be used in court as evidence, including payroll records payroll record,
n a printed form on which detailed records are kept of the amounts of money paid to auxiliaries. The record has columns for all the necessary tax deductions so that a detailed record is available for tax reporting and cost accounting.
 and delivery receipts. The removal of original company documents and computer files from the workplace should be prohibited, and copies of critical original documents should be required. The company should also have a policy prohibiting disbursements as a result of the presentation of an authorization letter, rather than the presentation of a check, draft, or an official company document.

The negotiation of payable instruments that have facsimile signatures, are computer-generated, or have stamped markings, where the facsimile signature or stamped markings are printed with what appears to be black ink, should also be monitored. The use or negotiation of any document written with a red ballpoint pen, which is commonly used to commit statement-cycle crimes, should be prohibited. Generally red ballpoint pens create the most highly reflective color. Depending on the type of equipment, lenses of copiers or microfiche Pronounced "micro-feesh." A 4x6" sheet of film that holds several hundred miniaturized document pages. See micrographics.  machines usually reflect off the red so that when the copy is completed the penned area appears blank or the image that appears is not acceptable by a document examiner (hypertext, tool) Document Examiner - A high-performance hypertext system by Symbolics that provides on-line access to their user documentation.  to positively identify the writing characteristic. Those who kite checks, for example, prefer to write with red ballpoint pens since copies of these checks do not show the red penned area and are returned to the perpetrator A term commonly used by law enforcement officers to designate a person who actually commits a crime.  as blank, thus ready to be used again. A process should also be devised to reconcile official checks and wire transfer records.

Policies should address use of or restrictions on issuance of a power of attorney used to open new accounts and to direct disbursements. The company should also address the prohibition of "less cash" deposits to the company's checking or savings accounts Savings Account

A deposit account intended for funds that are expected to stay in for the short term. A savings account offers lower returns than the market rates.

Notes:
, as well as restrictions on the negotiation of any payable instrument or document containing alterations or illegible il·leg·i·ble  
adj.
Not legible or decipherable.



il·legi·bil
 information.

Employees should photocopy identification and related documents, such as a driver's license Noun 1. driver's license - a license authorizing the bearer to drive a motor vehicle
driver's licence, driving licence, driving license

license, permit, licence - a legal document giving official permission to do something

 or Social Security card, furnished to open a new account, such as payroll accounts, lines of credit, direct-deposit accounts, and securely store the photocopies with the account file. Customers should also be required to furnish copies of appropriate business records when opening an account, and employees should securely store the photocopies with the account file.

Sole proprietorship A form of business in which one person owns all the assets of the business, in contrast to a partnership or a corporation.

A person who does business for himself is engaged in the operation of a sole proprietorship.
 accounts should be reviewed closely--particularly general contractors A general contractor is an organization or individual that contracts with another organization or individual (the owner) for the construction of a building, road or any other execution of work or facility. , restaurants and bars, and senior citizen personal accounts. Sole proprietorships are notorious for employing one person to handle several account-handling responsibilities without oversight. Dual controls in the bookkeeping bookkeeping, maintenance of systematic and convenient records of money transactions in order to show the condition of a business enterprise. The essential purpose of bookkeeping is to reveal the amounts and sources of the losses and profits for any given period.  department can provide protection against embezzlement. In other words Adv. 1. in other words - otherwise stated; "in other words, we are broke"
put differently
, those preparing the checks should not be signing them. All transactions should undergo checks and balances.

A program should be implemented to monitor all new account activity--particularly employees' accounts--for at least ninety days, and all suspicious or unusual activity should be documented and followed up. This applies to all credit accounts no matter what kind of business is involved.

A company's corporate culture is a significant factor when determining the company's vulnerability to misuse and misappropriation misappropriation n. the intentional, illegal use of the property or funds of another person for one's own use or other unauthorized purpose, particularly by a public official, a trustee of a trust, an executor or administrator of a dead person's estate, or by any . Corporate culture is an environment influenced by the prevalent morals, ethics, ideals, and standards for behavior as developed, implemented, and demonstrated by management: the company's conscience. By taking a preventive role in designing and implementing strategic loss control procedures, management can focus significant attention on the embezzlement problem.

Shopping for an Anti-Theft Service

EMPLOYEE THEFT IS the leading cause of shrinkage Shrinkage

The amount by which inventory on hand is shorter than the amount of inventory recorded.

Notes:
The missing inventory could be due to theft, damage, or book keeping errors.
 in the retail industry. One tool in the security professional's arsenal to fight this problem is a shopping service. Shopping services are often used to help evaluate the honesty, work performance, salesmanship, or product knowledge of a retail company's employees.

In most states, a private investigation license is required to operate a shopping service. Before selecting a service, the security manager should first determine what licensing is required and which companies have them. The agency in charge of such regulation can provide this information by either supplying a list of licensed agencies or referring the manager to a professional association that supplies a list of local agencies with experience in the shopping venue. The regulating agency differs from state to state. Individuals should call their state's general government information line to determine the appropriate agency to call. Personal referrals from other security professionals are also an excellent tool.

Once the prospective candidates are selected, any agency under consideration should be asked to supply copies of the required license, workers' compensation workers' compensation, payment by employers for some part of the cost of injuries, or in some cases of occupational diseases, received by employees in the course of their work.  coverage, liability insurance and bonding certificate, and at least three verifiable references.

The license holder should be interviewed regarding direct experience in the security manager's specific area of need as well as professional certifications Professional certification, trade certification, or professional designation, often called simply certification or qualification, is a designation earned by a person to assure that he/she is qualified to perform a job or task.  and training. The security manager should also visit the shopping service's business office to see if it is a viable operation, properly staffed, and equipped to handle the account.

The following questions should be asked when the prospective contractor is interviewed:

* Do the agents to be used have experience in the security manager's specific business, and if so, how much?

* Can the agents who will service the contract for the company be interviewed?

* Who will supervise the work done to ensure it is done in a professional, timely fashion?

* Does the agency have both male and female operatives and in sufficient number to accomplish the stated goals?

* Have any complaints been lodged against the agency? If so, what was the nature of those complaints and what was the disposition of them? (The Better Business Bureau and the state regulatory agency state regulatory agency A state body responsible for establishing professional standards, and for certifying professionals or organizations through appropriate documentation  administering the license can be of help in these areas.)

* Does the agency have sufficient office personnel to produce reports in a timely fashion?

* Can the agency provide a generic sample report to show how reports will be composed for the client? Can the agency include specific details that the client may want incorporated in the reports and, if so, will they be provided in a timely manner?

* Can the agency supply service on short notice, and if so, are there extra charges for such service?

* Will the agency customize a report geared to the company's needs?

* Is a copy of the contract the security manager will sign available to be reviewed by the company's legal department?

* Is a list of fees and charges available? Are there fees for extras, such as report writing, mileage, travel time, expenses, or court and administrative hearings administrative hearing n. a hearing before any governmental agency or before an administrative law judge. Such hearings can range from simple arguments to what amounts to a trial. There is no jury, but the agency or the administrative law judge will make a ruling. ?

This valuable tool is only as good as the people performing the job. Therefore, the security manager must be a wise consumer and select with care. Using this guide should enable him or her to select a quality service suited to company needs.

James P. Muuss, CPP cpp - C preprocessor. , is general manager of Reliant Protective Services in Tempe, Arizona Tempe (pronounced /tɛm.'piː/) is a city in Maricopa County, Arizona, USA, with a population of 169,712 according to 2006 Census Bureau estimates. . He is a member of ASIS 1. ASIS - Application Software Installation Server.
2. (language) ASIS - Ada Semantic Interface Specification.
.

Dana L. Turner is a partner with Security Education Systems, a research, consulting, and training firm in Palo Cedro, California Palo Cedro (pop. 4,000) is 8 miles east of Redding, California. The towns of Bella Vista (pop. 1,218), Millville (pop. 610), Shingletown (pop. 2,222), Oak Run (pop. 760), Whitmore (pop. 593), and Round Mountain (pop. 122) lie within a fifteen-mile radius. . He is a member of ASIS. Richard G. Stephenson is a partner with the law firm of Troughton & Soter in San Francisco San Francisco (săn frănsĭs`kō), city (1990 pop. 723,959), coextensive with San Francisco co., W Calif., on the tip of a peninsula between the Pacific Ocean and San Francisco Bay, which are connected by the strait known as the Golden  and is the co-author of The Embezzlement Prevention and Investigation Manual.
COPYRIGHT 1994 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 1994 Gale, Cengage Learning. All rights reserved.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:includes related article on shopping for shopping services
Author:Turner, Dana L.; Stephenson, Richard G.
Publication:Security Management
Date:Jun 1, 1994
Words:2163
Previous Article:Low cost computer security.
Next Article:Rechanneling security toward changing threats.
Topics:

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters