Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

The Top 8 Shrink Activities Your LP Team May be Missing

By Derek Rodner
February 22, 2011

 

According to the Global Retail Theft Barometer, retail shrink accounted for $107.284 billion in 2010.  As retailers begin to determine their goals and initiatives for 2011, they need to consider how to identify and prevent the margin-robbing activities that are cutting into their bottom lines.  Here are a few commonly missed fraudulent activities and operational errors, along with some tips on how to combat them.

  1. Gift Card Fraud

    Gift card fraud has become increasingly significant with the rise in popularity of gift cards.  When a credit card is stolen, the perpetrator only has a short amount of time to act until the incident is reported.  In a race against the clock, the thief will immediately purchase gift cards.  This essentially converts the stolen card to cash and makes the money virtually untraceable.  Educate your cashiers on this issue and make it a best practice to request identification on gift card purchases and all credit card transactions.
     
  2. Sweethearting

    Sweethearting is one of the most common types of employee theft and is as old as retail itself.  Traditionally, when the customer—typically a friend or relative of the employee—went through the checkout line with an expensive item, the cashier would bypass the scanner to avoid ringing up the item.  Although this is still a common practice, sweethearting techniques have evolved.  Today, it is not uncommon to find a cashier placing his thumb over the barcode on a filet mignon and instead scanning the barcode on a pack of gum, taped to his hand.  The result: the friend of the cashier just purchased $15 in meat for 25 cents.  When you suspect an employee of sweethearting, look for a repeat customer frequenting the same cashier, particularly during slow hours when lines are short.
     
  3. Packaging Errors

    Packaging errors often go undetected but can result in significant losses at the POS.  In one instance, a packaging issue was causing numerous scanning errors across a retail chain.  Here’s how: bottled water cases have barcodes on each individual bottle as well as on the bottom of the case.  Because this retailer’s cases were packaged in a clear plastic wrap that was transparent, the scanner was routinely picking up the UPC on the individual bottle rather than the correct UPC on the bottom of the case.  As a result, customers were purchasing cases of water bottles costing $5.49 for $0.69, a $4.80 loss that often went unnoticed in medium to large transactions.  By quickly identifying the scanning error, the retailer was able to avoid the widespread error that could have cost the chain over $80,000 annually.  Train cashiers to identify the correct UPC code when scanning packages that contain separate units, such as water bottle cases.
     
  4. Building a Bank in the Register

    Crooked cashiers often pull off this technique by identifying items that are priced at an even dollar amount, which seldom requires giving change to the customer.  Currently, cigarettes are being sold for approximately $9.99 in New York City.  For many, this item is a quick purchase that doesn’t warrant waiting for the penny or receipt, so they lay down ten dollars and walk out the door.  The employee then voids the order and puts the money in the cashier drawer.  This trick allows for large sums of money to be stolen because it appears the employee has completed the transaction.  At the end of his shift, he then takes the stolen money from the register and pockets the cash.  Be sure to watch for cashiers keeping money next to the register.  In many cases, they will use this cash for change and then void the transaction.
     
  5. Return Fraud

    According to the NRF, return fraud costs the retail industry an estimated $10 to $15 billion per year.  A significant percentage of these losses are due to repeat offenders.  To put this in perspective, consider the damage one person can do: in one case of customer return fraud, a woman repeatedly walked into 27 of a chain’s 133 stores, picked up an item from the shelves and “returned” it without a receipt.  She admitted to over $10,000 in return theft over the course of 90 days.  Pay close attention to return patterns and educate employees on company procedures and policies for refunds.
     
  6. Counterfeit Coupons

    The prevalence of online coupons is becoming increasingly evident to retailers, as consumers trek in with printouts from their favorite money-saver blog or website.  However, this popularity has also spawned an explosion of counterfeit coupons.  Although the loss of a few cents doesn’t sound very pressing, counterfeit coupons are extremely detrimental to retailers—especially grocers—who operate under tight profit margins of about one to two percent.  To understand the impact that one coupon can have on a store, consider this: one fraudulent coupon can costs a retailer hundreds of thousands of dollars over the course of one week.  Stay up-to-date on counterfeit coupons by monitoring websites such as centsoff.com.
     
  7. Hidden Items in the Cart

    Implementing two quick and easy procedures at the point-of-sale will reduce losses due to hidden products:  requesting sales circulars and checking for items on the bottom of the cart.  Sales circulars may seem harmless, but they can easily conceal costly items such as DVDs, make-up and over-the-counter medications.  Similarly, checking the bottom of a customer’s cart may seem excessive, but missing these products can result in substantial revenue loss.  Making these procedures habits ensures that all items are properly entered into the order and the customer cannot complete the transaction without paying for all of the products. 
     
  8. Poor Promotion Execution

    Promotions that are not properly established in the POS system can account for a significant amount of shrink.  When a retailer holds a promotion they pay for the product upfront and bill the vendor back for the items sold under the deal.  If the retailer cannot provide proper documentation to prove items were sold under the promotion, they will not receive the manufacturer’s refund.  For example, imagine that a retailer is hosting a Buy-One-Get-One (BOGO) deal, but the promotion is not entered correctly in the system.  When the employee scans the item, the promotion will not register, which often leads to the cashier bypassing the system and providing the customer with their item for free.  Without the POS data to prove that the item was sold under the promotion, the retailer has no way of receiving the manufacturer’s refund.  As a result, the chain will lose money for every item that was given to the customer for free.  To reduce these losses, hold a weekly meeting to walk the cashiers through the promotions.  This will ensure that they fully understand each deal and can explain it to the customer if it is unclear.  Give special attention to cross promotion items, such as Buy One A, Get One B for free.  Many customers and cashiers misread these offerings to be Buy One A, Get One A for free.
KEYWORDS: loss prevention retail theft theft prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek Rodner is VP of product strategy for Agilence

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • holiday

    May your digital payments be secure & your APIs be merry and bright

    See More
  • Chicago Courtrooms may be Shut During NATO, G-8 Summits

    See More
  • Cybersecurity with username and password

    It May be Time to Review Your Cyber Hygiene

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing