Studyspark Study Document

Security -- Hip Trends Clothing Store Security Term Paper

Pages:4 (1129 words)

Sources:5

Subject:Crime

Topic:Shoplifting

Document Type:Term Paper

Document:#15061538


Security -- Hip Trends Clothing Store

Security Plan Part a -- Overall Description -Business Divided into three areas: Parking Lot, Main Store, Storage and Receiving:

Parking Lot

Approximately 50 car limit

Security Lighting, automatically timed for Dusk -- guarantees that the lot is never dark for clients or employees.

Main Entrance -- two security cameras continually sweeping parking lot; allows for monitoring of potential criminal activity.

Bullet-proof glass infused with titanium threads for window security; inability for rioters to break in or loot.

Main Store

Double closed front gate (metal); security tested.

Security Detection Devices at Door; coded to merchandise.

Continuously moving cameras within store (ceiling mounted)' continuously monitored during open hours, taped during closed hours.

Motion sensor alarm set during off hours.

Security office monitored cameras and two way mirrored glass

Posted signs: "Shoplifters Will Be Prosecuted -- You are being taped"

Receiving Area

Double sided metal door, key coded on delivery door

Security cameras in back room; prevent employee theft or potential danger to employees.

Security lighting on loading dock; dock and read lot never in the dark.

Security camera in Manager's office near safe with feed to Security Company -- prevents in-store collusion.

Part B -- Physical Security -- Three part structure; appropriate locking doors with appropriate access codes for employee entrance and loading dock; Lighted front and rear parking lots; Continuously monitored ceiling mounted cameras (during business hours); Metal doors for front and rear entrance; panic buttons at both registers and in back room (2 places; 1 in Mgr. office, 1 near outside door of break room) (Nadel, 2004).

Part C -- Information Security -- Four part information security structure:

1. Data continuously backed up every 5 minutes to central hard drive.

2. Data backed up offsite at 3am daily.

3. Hard drive code encrypted and limited access.

4. Employee records and data kept in encrypted files.

Part D -- Personnel Security -- Above all, a single employee (including managers) are never to be in store alone after hours. Security personnel scheduled 30 minutes before and 30 minutes after first and last employee. On major shopping days, add additional human security to front entrance. Panic button at register alters security, if security does not respond within 45 seconds, automatically dials local police office with emergency notification. Adequate smoke and fire alarms, 3 fire exits accessible to employees and customers. Part of employee training is understanding store security, locations of exits,

Part E- Liability Issues -- Pre-opening walk through with insurance representatives to ensure:

Compliance with local and State regulations

Non-skid and back support pads at both registers.

Try not to schedule employees over 4 hours without sit down break.

Flooring, wall material, and decorations all UL tested an in compliance.

Employees trained in proper way to load, pick up, and handle merchandise; signed release on file based on training period.

Dock and back room workers wear back support.

Security office monitors that all appliances are turned off at closing.

Contracted with snow and ice removal company for front and back lots based on weather related issues.

Employees sign agreement and acknowledgement regarding monitoring procedures.

Adherence to State laws regarding breaks and meal periods.

Train staff to greet everyone and offer help regularly; Use phones to page security for suspected shoplifters (Shoplifting procedures in Appendix C).

$100 bills are slid through small safe opening at both registers; cash is picked up…


Sample Source(s) Used

REFERENCES and WORKS CONSULTED

Cupchick, W. (2002). Why Honest People Shoplift. Booklocker.com.

Landoll, D. (2006). The Security Risk Assessment Handbook. McCraw Hill.

Nadel, B. (2004). Building Security Handbook.Graw Hill.

Perkins, K. (2009). "Workplace Threats." Diversified Risk Management. Cited in:

Cite this Document

Join thousands of other students and

"spark your studies".