I. Introduction Loss Prevention Surveys



Yüklə 2,18 Mb.
səhifə3/31
tarix17.08.2018
ölçüsü2,18 Mb.
#71497
1   2   3   4   5   6   7   8   9   ...   31

Procedures

What follows are procedures and techniques that will significantly reduce losses to

employee theft. They include, but are not limited to, the following:


  • Conspicuously mark all hotel property for identification. This includes computer

  • equipment, furniture, appliances, tools, radios, etc.

  • Schedule, announce and conduct inventories on a regular basis.

  • Conduct unannounced, unscheduled inventories. Surprise inspections can help

  • eliminate the "risk free" perception that leads to internal theft. Frequently "spot

  • check" banks, deposits, tills, liquor, food, surplus property and employee handbags,

  • subject to applicable laws.

  • Make frequent bank deposits. If at all possible, utilize an armored car pick-up service.

  • If this is not an option, transport the deposit using two employees traveling in

  • separate vehicles. Set a limit on the amount of money allowed on property.

  • Remove bank deposit verification slips from the previous year. Corrupt employees

  • have sought to conceal their theft of deposits by attaching the deposit verification slip

  • from the previous year to the report of deposit from which they are stealing.

  • Integrity Tests: Interject an element of risk into employee theft by letting your staff

  • know that you will periodically conduct random "Integrity Tests". For example, on

  • the pretense of auditing a till drawer at the front desk, take the drawer at mid-shift

  • and, without being seen, slip a $10.00 bill into the drawer. If at end of shift the till is

  • over by $10.00, inform the staff of what you did and give the $10.00 to the clerk. If

  • the till balances, you have obtained important information at a very low cost.

  • Pre-employment background investigations (subject to applicable laws) which

  • include criminal history background checks, employment verification, education

  • verification, and credit history checks.

  • Drug Testing (subject to applicable laws): Chemical dependency is a common motive

  • in cases of employee theft.

  • Routine Inspection of Potential "Stash" Sites: Be certain that potential "stash" sites

  • (trash receptacles, closets, storage areas, loading dock, etc.) are routinely inspected in

  • order to help prevent employees from using those locations to hide hotel property

  • which they intend to retrieve later.

  • Set the standard. If the staff perceives that the General Manager is converting

  • company property to his/her personal use they often take license to do the same.

Employee Procedures & Controls

II-22


  • Utilize "Shoppers" or "Mystery Customer" investigations. A professional "Shopping

  • Service" can be effectively used to identify employee theft, provided sufficient

  • controls are in place to insure the integrity of any evidence generated by the

  • undercover effort.

  • Quarterly market survey of vendor services/goods. To insure that the purchasing

  • agent is acting in the best interest of the company, conduct quarterly market surveys

  • of vendors for services and goods to insure that you are paying a competitive price.

  • Liquor Control. Mark liquor bottles for identification/inventory. Utilize strict one-forone

  • bottle exchange with requisition. Break or mark returned bottles. Maintain an

  • inventory control list on the door to the liquor storage room that will reflect the

  • amount of alcohol on property. Check behind the bar during the shift for unauthorized

  • bottles.

  • The liquor storage room should have walls extending from the floor to the roof of the

  • building, otherwise use a cage and lock to secure liquor.

  • Reconcile the register tape with guest checks.

  • Frequently change safe combinations, computer passwords, lock cores, PIN numbers,

  • etc. Require combination or password changes whenever an employee having

  • knowledge of a combination or password leaves the hotel’s employment.

  • Require that all management staff members take vacation for a period of time

  • sufficient to determine the presence of accounting/financial improprieties.

  • Keep freezers locked at all times. Use cages inside freezers to lock away red meat and

  • seafood.

  • Encourage all employees to report anything they suspect might indicate internal theft

  • or misconduct by providing them with a method of confidentially communicating

  • their suspicions.

  • Monitor frequency-marketing programs that reward employees for enrolling new

  • members.

  • Employees have been known to submit fraudulent enrollment data into computer

  • databases.

  • Limit or minimize employee access to hotel computer databases.

  • Recognize that your inclination to communicate your "trust" to your staff by allowing

  • them to conduct business with little or no supervision creates the risk-free perception

  • that motivates some employees to steal. Accept the fact that given the right set of

  • circumstances even, a trusted staff member may steal.

  • General Managers new to their property should be required to conduct a

  • comprehensive audit and inventory of all money and property. Experience has taught

  • that much embezzlement occurs during a transition in management. The perception is

  • that the outgoing general manager is preoccupied with relocating while the new

  • general manager will be unable to detect theft.



Employee Procedures & Controls

II-23


  • Document all reported security incidents (particularly those alleging theft).

  • Documentation will enable you to identify and track significant patterns.

  • All empty cardboard boxes must be broken down flat.

  • Control guest restaurant/bar checks by issuing sequentially numbered checks. Record

  • beginning and ending check numbers. Unused checks are to be accounted for at the

  • end of each shift.

  • Workers' Compensation Fraud is another form of internal theft. Consider (subject to

  • applicable laws) implementing a post accident drug testing policy, requiring that

  • employees utilize a physician or clinic that has set fees, reviewing all medical

  • expenses, and developing modified duty programs that may enable an employee to

  • return to work.

Employee Procedures & Controls

II-24


Detecting Internal Theft

Detecting an internal theft requires very little effort. The trick to picking up the “trail”

begins with learning to recognize and respond to those things indicative of employee

theft. Avoid the “codependent” behavior of making excuses for discrepancies and deficiencies

and learn that what might appear to be an unintentional oversight or error might be a

warning that you are being victimized by one of your employees.

It is important to understand that an indicator of internal theft is not evidence. Any of the

following items could be accounted for as something other than employee theft.

Extreme caution must always be exercised in communicating any allegation of employee

misconduct. The following “indicators” should function only as a signal that employee

theft is a possibility and that further inquiry should be made.

Some indicators of potential employee theft include, but are not limited to, the following:



  • Deposits not being made the next business day. Any delay in a deposit should be

  • immediately addressed.

  • Missing deposits.

  • Discrepancy between deposit verification amount and inn daily activity report.

  • Increase or variation in food or liquor costs (ghost inventory or bartender selling out

  • of his/her own bottle).

  • “Ghost” employees on the payroll.

  • Un-reconciled accounts.

  • Inconsistent, confused or unreliable reporting from finance.

  • Un-reconciled change orders or change orders not reconciled in a timely manner.

  • Vendor rebate checks not posted to mail check register or discovered in cash tills.

  • Reports of missing advance deposit payments, commission checks or rebates.

  • Guests complaints concerning incorrect credit card billing.

  • Housekeeping discrepancy reports indicating clean vacant rooms found dirty.

  • Copious pay outs/salary receipts with little or no backup documentation.

  • Invoices for “services” from unfamiliar vendors.

  • Invoices which do not provide a detailed itemization of goods or services provided.

  • Invoices which do not provide a telephone number.

  • Employees who come to work on their day off.

  • Conspicuous or inappropriate social activity involving the controller/purchasing agent

  • and vendors.

Employee Procedures & Controls

II-25


  • An absence of competitive bids.

  • Exclusive use of a particular vendor.

  • Unmarked liquor bottles at the bar or in the service area.

  • More than one open bottle of a particular brand of liquor.

  • “Stacks” of paper clips, mints, toothpicks or other “markers” near a cash register in a

  • bar or restaurant. When a bartender is pouring out of their bottle, they often have to

  • keep track of the number of drinks sold in order to extract the corresponding amount

  • of cash from the till when they close out at the end of their shift.

  • Waiters/waitresses not using correct or chronologically numbered tickets when taking

  • orders.

  • Restaurant/bar customer tickets being altered to “knock down” the price. Look for

  • orders taken in pencil.

  • Accounting anomalies. Embezzlement is often first detected by line level

  • administrative staff who spot inconsistent or inappropriate accounting entries. It is

  • important to train your staff to trust their instincts and to report anything suspicious.

  • Reports of theft or “break-ins” which seem improbable or conspicuously convenient.

  • Embezzlers have often sought to conceal or camouflage their theft by fabricating an

  • event which they can use to explain missing funds or property.

  • Unusual, inappropriate or bizarre behavior.

  • Unlocked linen closets after hours.

  • Employees who spend conspicuous or inappropriate amounts of time on hotel

  • computer terminals.

  • Redundant or duplicate invoices.

  • Invoices with common zip codes, addresses, telephone numbers.

  • Conspicuous consumption. Employees who appear to be living beyond their means.

  • Employees experiencing a personal financial crisis.

Employee Procedures & Controls

II-26


Workplace Violence

Violence in the workplace can have a devastating effect on the productivity and the quality

of life for the entire staff. This section focuses on management strategies used to deal with

violence committed by non-strangers within the workplace. To reduce the hazards of

violence in the workplace you should consider the following:


  • The potential impact of one or more violent incidents.

  • The likelihood of violent incidents occurring.

  • The effectiveness of the measures taken to reduce your risk.

  • Threats made by employees or other individuals.

  • A risk assessment should consider the likelihood of incidents occurring by reviewing

  • such information as:

  • The hotel’s incident history.

  • Police data concerning the type and number of violent acts in your area.

  • Published reports comparing the violent rates across different types of related business.


Threat Management Team

Hotel Management may establish a Threat Management Team consisting of

representatives from security, human resources and a designated executive committee

member. It may also include external consultants such as psychologists, psychiatrists or

threat assessment experts. The primary responsibility of this team is to develop a threat

management plan to resolve bona fide threats or acts of violence. In addition, team

members may be responsible for managing violence prevention programs, including

needs assessment and awareness training.

The plan might include:


  • A liaison with outside agencies.

  • Procedures for collecting and preserving evidence, including interviews of involved

  • parties.

  • Managing communications regarding the incident. For example, media relations,

  • internal communications, and the possible use of a rumor control desk.

  • Managing the release of sensitive information where appropriate.

  • Making decisions about returning to work.

  • Managing operations and trauma care in the event of a crisis.

  • Developing a policy on reporting threats.

  • A weapons policy.


Employee Procedures & Controls

II-27


(Sample)

Policy for Workplace Threats and Violence

Nothing is more important to JANKO HOSPITALITY LLC than the safety and

security of its employees and guests. Threats, threatening behavior or acts of

violence against employees, visitors, guests, or other individuals by anyone on hotel

property will not be tolerated. Violations of this policy will lead to disciplinary

action that may include dismissal, arrest, and prosecution.

Any person who makes substantial threats, exhibits threatening behavior or engages

in violent acts on hotel property shall be removed from the premises as quickly as

safety permits. Those individuals shall remain off hotel premises pending the

outcome of an investigation. The hotel will initiate an appropriate response. This

response may include, but is not limited to, suspension and/or termination of any

business relationship, reassignment of job duties, suspension or termination of

employment, and/or criminal prosecution of the person or persons involved.

No existing hotel policy, practice, or procedure should be interpreted to prohibit

decisions designed to prevent a threat from being carried out, a violent act from

occurring or a life-threatening situation from developing.

All hotel personnel are responsible for notifying management of any threats which

they have witnessed, received, or have been told that another person has witnessed

or received. Even without an actual threat, personnel should report any behavior they

have witnessed which they regard as threatening or violent. This is especially true

when that behavior is job related, might be carried out on hotel premises, or is

connected to company employment. Employees are responsible for making this

report regardless of the relationship between the individual who initiated the threat

or threatening behavior and the person or persons who were threatened or were the

focus of the threatening behavior. If a management representative is not available,

personnel should report the threat to their supervisor.

All individuals who apply for or obtain a protective or restraining order which lists

company locations as being protected areas should provide to management a copy of

the petition and declarations used to seek the order. In addition, a copy of any

temporary protective or restraining order which is granted and a copy of any

protective or restraining order which is permanent should also be provided to

management.

JANKO HOSPITALITY LLC understands the sensitivity of the information

requested and will strive to protect the confidentiality of the information provided.


Employee Procedures & Controls

II-28


Threat Incident Report

Hotel policy should require employees to report all threats or incidents of violent behavior,

which they observe or are informed about, to hotel management. Hotel management should

take steps necessary to complete an incident report as quickly as possible, including private

interviews of the victim(s) and witness(es). This report will be used by hotel management to

assess the safety of the workplace and to help determine a plan of action. The following

facts should be included in the incident report:


  • Name of the threat-maker and his/her relationship to the hotel and to the recipient.

  • Name(s) of the victims or potential victim.

  • When and where the incident occurred.

  • What happened immediately prior to the incident?

  • The specific language of the threat.

  • Any physical conduct that would substantiate an intention to follow through on the

  • threat.

  • How the threat-maker appeared (physically and emotionally)

  • Names of others who were directly involved and any actions they took.

  • How the incident ended.

  • Names of witnesses.

  • What happened to the threat-maker after the incident?

  • What happened to the other employees directly involved after the incident.

  • Names of any supervisory staff involved and how they responded.

  • What event(s) triggered the incident?

  • Any history leading up to the incident.

  • The steps that have been taken to ensure that the threat will not be carried out.

  • Suggestions for preventing workplace violence in the future.

  • Statement by witnesses.

Warning Signs of Potentially Violent Individuals

There is no exact method to predict when a person will become violent. One or more of

these warning signs may be displayed before a person becomes violent, but does not

necessarily indicate that an individual will become violent. A display of these signs should

trigger concern.


  • Irrational beliefs and ideas.

  • Verbal, nonverbal or written threats or intimidation.

  • Fascination with weaponry and/or acts of violence.

  • Expressions of a plan to hurt themselves or others.

  • Externalization of blame.

  • Unreciprocated romantic obsession.

  • Fear reaction among coworkers.

  • Drastic change in belief systems.

  • New or increased source of stress at home or work.

  • Inability to take criticism.

Employee Procedures & Controls

II-29


  • Feelings of being victimized.

  • Intoxication from alcohol or other substances.

  • Expressions of hopelessness or heightened anxiety.

  • Productivity and/or attendance problems.

  • Violence towards inanimate objects.

  • Stealing or sabotaging projects or equipment.

  • Lack of concern for the safety of others.


Recognizing Inappropriate Behavior

Inappropriate behavior is often a warning sign of potential hostility or violence. When left

unchecked, it can escalate to higher levels. Employees who exhibit the following behaviors

should be reported and disciplined:



  • Unwelcome name-calling, obscene language, and other abusive behavior.

  • Intimidations through direct or veiled verbal threats.

  • Throwing objects in the workplace regardless of the size or type of object being thrown

  • or whether a person is the target of a thrown object.

  • Physically touching another employee in an intimidating, malicious, or sexually

  • harassing manner. That includes such acts as hitting, slapping, poking, kicking,

  • pinching, grabbing, and pushing.

  • Physically intimidating others including such acts as obscene gestures, “getting in your

  • face” and fist shaking.


Suggestions to Minimize Violence

Train employees to notify hotel management or security if a person’s behavior escalates

beyond their comfort zone. Notify local authorities if there is evidence of threats or

violence. The following are suggestions you can use in your daily interactions with people

to deescalate potentially violent situations:

Do


  • Project calmness: move and speak slowly, quietly and confidently.

  • Be an empathetic listener: encourage the person to talk and listen patiently.

  • Focus your attention on the other person to let them know you are interested in what

  • they have to say.

  • Maintain a relaxed yet attentive posture and position yourself at a right angle rather than

  • directly in front of the other person.

  • Acknowledge the person’s feelings. Indicate that you can see that he or she is upset.

  • Ask for small, specific favors such as asking the person to move to a quieter area.

  • Establish ground rules if unreasonable behavior persists. Calmly describe the

  • consequences of any violent behavior.

  • Use delaying tactics that will give the person time to calm down. For example, offer a

  • drink of water (in a disposable cup).

  • Be reassuring and point out choices. Break big problems into smaller, more manageable

  • problems.

  • Accept criticism in a positive way. When a complaint might be true, use statements like

  • “You’re probably right” or “It was my fault.” If the criticism seems unwarranted, ask

  • clarifying questions.

Employee Procedures & Controls

II-30


  • Ask for recommendations. Repeat back to them what you feel they are requesting of

  • you.

  • Arrange yourself so that your access to an exit is not blocked.

  • Utilize company employee assistance programs.

Do Not

  • Use a style of communication which generates hostility, such as apathy, brush off,

  • coldness, condescension, roboticism, going strictly by the rules, or giving the runaround.

  • Reject all of the person’s demands from the start.

  • Pose in a challenging stance, such as standing directly opposite someone, hands on hips

  • or crossing your arms.

  • Use any physical contact, finger pointing or long periods of fixed eye contact.

  • Make sudden movements, which can be seen as threatening. Instead, notice the tone,

  • volume and rate of your speech.

  • Challenge, threaten, or dare the individual. Never belittle the person or make him/her

  • feel foolish.

  • Criticize or act impatiently towards the agitated individual.

  • Attempt to bargain with a threatening individual.

  • Try to make the situation seem less serious than it is.

  • Make false statements or promises you cannot keep.

  • Try to impart a lot of technical or complicated information when emotions are high.

  • Take sides or agree with distortions.

  • Invade the individual’s personal space. Make sure there is a space of 3’ to 6’ between

  • you and the person.

Employee Procedures & Controls

II-31


Yüklə 2,18 Mb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   ...   31




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin