{"id":4217,"date":"2021-08-19T09:52:22","date_gmt":"2021-08-19T13:52:22","guid":{"rendered":"https:\/\/iesmartsystems.com\/?p=4217"},"modified":"2021-08-19T09:52:22","modified_gmt":"2021-08-19T13:52:22","slug":"5-ways-to-limit-employee-theft","status":"publish","type":"post","link":"https:\/\/iesmartsystems.com\/5-ways-to-limit-employee-theft\/","title":{"rendered":"5 Ways To Limit Employee Theft"},"content":{"rendered":"

5 Ways To Limit Employee Theft<\/h1><\/div>
\"\"<\/span><\/div>
<\/div>

If you looked at employee theft as a criminal enterprise, it\u2019s big business. U.S. businesses lose more than $50 billion<\/a> to employee dishonesty on an annual basis. That\u2019s more than the gross domestic product of Iceland and El Salvador combined. The occurrence of employee theft is widespread, with 75% of employees admitting to stealing<\/a> from their employer at least once. The Association of Certified Fraud Examiners found that small business owners (those with less than 100 employees) saw the highest median loss at $150,000.<\/p>\n

While those numbers are alarming, it\u2019s useful to consider that a common category of employee theft is time theft, where an employee takes payment for hours they didn\u2019t work. However, a few fraudulently reported hours or long lunch breaks don\u2019t account for 30% of all company bankruptcies, which is the number of employee-caused business failures as reported by the Better Business Bureau.<\/p>\n<\/div>

Employees Commit Fraud In A Variety Of Ways<\/h2><\/div>

Let\u2019s examine some common ways that employees steal from corporations.<\/p>\n<\/div>

Inventory Theft<\/h3><\/div>

Removing goods or products without paying for them is an obvious and common form of theft. It could be as simple as consuming food intended for customers, or as complex as hiding the removal of medicines from a hospital pharmacy and reselling the drugs on the street. Inventory theft varies from business to business, but at its simplest, it is represented by a discrepancy between the amount of inventory your business produces or buys, and the amount of product or service that you sell.<\/p>\n<\/div>

Data Theft<\/h3><\/div>

If you\u2019ve heard it said that data is valuable, it shouldn\u2019t surprise you to learn that employees will steal it. It could be customer information with the intent to commit identity fraud or to offer the data for some other personal gain. This type of corporate theft is a significant issue on two levels: it can cost your business on a day-to-day level, and it can open you up to substantial liability.<\/span><\/p>\n<\/div>

IP Theft<\/h3><\/div>

Often referred to as corporate espionage, this type of theft occurs when an employee takes proprietary information. It could be source code, design plans for a product, or other trade secrets. Most often, the intent is to sell or transfer the intellectual property to a competitor.<\/p>\n<\/div>

Theft of Services<\/h3><\/div>

Stealing a service happens when an employee receives a service and neglects to pay for it. Although many businesses offer discounts to employees or may even offer certain services free of charge, the issue occurs when employees take advantage of the system and use the capacity intended for paying customers.<\/p>\n<\/div>

Payroll Theft<\/h3><\/div>

Payroll theft is a classic form of embezzlement due to the centralized power and trust placed with employees who handle payroll. Without proper controls and accountability, it\u2019s relatively straightforward to write a fraudulent check and cash it. Ideally, you should split the responsibilities between two or more people.<\/p>\n<\/div>

Steps To Prevent Corporate Theft<\/h2><\/div>

At the root, people stealing from their employers is human nature, and no system is good enough to change that. However, with suitable systems, your company can do a lot to mitigate the risks internal theft has on your business. A robust security system<\/a> should be just as capable of catching employee theft as it is intruder theft.<\/p>\n<\/div>

Onboarding And Separation Protocols<\/h3><\/div>

Background checks can help identify if a candidate has a criminal record, but you can look for other indicators, such as credit reports or thoroughly questioning references and prior employers. It\u2019s critical that you establish special procedures so that once you\u2019ve caught a thief, you can quickly and legally prevent them from causing additional damage. This may include changing passwords, re-keying locks, and having security escort the person from the premises. You should also be prepared to notify law enforcement and preserve evidence for the purposes of legal action.<\/p>\n<\/div>

Set Proper Expectations Through Training<\/h3><\/div>

By demonstrating the proper procedures for handling inventory, payments, and performing services, you make it clear what proper behavior looks like and what the consequences for theft are. People are more likely to follow the expectations you set, plus you reduce the risk of hearing excuses such as \u201cI was never taught the right way.\u201d<\/p>\n<\/div>

Track Your Equipment And Inventory Closely<\/h3><\/div>

Inventory and equipment control systems are just a good business practice period. Goods and equipment need to move through your business in predictable ways, and when they don\u2019t, a good system will help flag problems quickly. The advent of barcodes and RFID tags makes this process easier and more accurate.<\/p>\n<\/div>

\u201cWho Goes There?\u201d \u2014 Access Control Is A Must<\/h3><\/div>

Casual theft occurs when a visitor to your place of business spies an opportunity and takes it. It doesn\u2019t have to be premeditated, just the wrong person at the right place at the right time. Setting up a digital video surveillance camera network and visitor access control will help you eliminate those opportunities for theft.<\/p>\n<\/div>

Proactively Audit Your Operation<\/h3><\/div>

Put another way, you need to \u201cinspect what you expect.\u201d Hiring a certified fraud examiner is a good place to start. You don\u2019t need to suspect fraud before you perform an audit. If your employees know that regular audits happen, they\u2019ll think twice before attempting to steal from your corporation.<\/p>\n<\/div>

Strong Security Is A Benefit To Everyone<\/h2><\/div>

The very first cash register was designed to prevent employees from stealing money \u2014 a problem retail businesses still face to this day. It had the added benefit of making it harder for thieves to grab the cash without making a fuss. In essence, your security system<\/a> should be designed to give everyone peace of mind, even if that means protecting employees from some of their worst impulses as well as the intentions of hardened corporate thieves.<\/p>\n<\/div><\/div><\/div><\/div><\/div>

About i.e.Smart Systems<\/h4><\/div>

i.e.Smart Systems is a Houston, TX based technology integration partner that specializes in design and installation of audio\/visual technology and structured cabling. For more than three decades, our team of in-house experts has partnered with business owners, architectural firms, general contractors, construction managers, real estate developers, and designers in the Houston market, to deliver reliable, scalable solutions that align with their unique goals.<\/p>\n<\/div><\/div><\/div>

\"i.e.<\/span><\/div>
Contact Us<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"

As much as you trust your employees, the data doesn’t lie: 75% of people admit to stealing from the workplace at least once. Here are 5 tips to preventing corporate theft.<\/p>\n","protected":false},"author":1,"featured_media":4220,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[21],"tags":[],"class_list":["post-4217","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest-articles"],"_links":{"self":[{"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/posts\/4217"}],"collection":[{"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/comments?post=4217"}],"version-history":[{"count":0,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/posts\/4217\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/media\/4220"}],"wp:attachment":[{"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/media?parent=4217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/categories?post=4217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iesmartsystems.com\/wp-json\/wp\/v2\/tags?post=4217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}