H

Handcuffs

CAS, JHC

Handcuffs are a restraint and safety device used on uncooperative arrestees to serve as a temporary restraint until the suspects can be incarcerated (see Figure H-1).

image

FIGURE H-1 Handcuffs.

Some companies prohibit loss prevention personnel from using handcuffs, while others impose limitations on their use, such as prohibiting their use on juveniles, pregnant women, and senile individuals; some prohibit handcuffing a suspect to a permanent object such as a bench or wall which has been equipped with a ring or other means of securing one of the cuffs to it.

Several factors are important when using handcuffs:

Handcuffs do not immobilize a person.

You must maintain constant control over the handcuffs.

You must maintain a reasonable degree of tightness of application. Tight enough to touch the skin is considered correct. If a person is handcuffed too tightly, nerves can be damaged, blood circulation can be reduced, and the cuffs can be very painful.

Double locking prevents the cuffs from tightening beyond that intended.

You must maintain proper position of key outlets (facing out) and double locks (on exterior side).

You must maintain proper positioning of the suspect’s hands–palms facing out.

You should handcuff a person with hands behind his or her back.

The purpose of restraint devices is to limit the following actions:

Attack on agent by prisoner

Escape of prisoner

Destruction or concealment of evidence

Self-inflicted injury

Whenever a security/loss prevention agent has a person in custody, the agent is responsible for that person’s well-being. If the person in custody attacks someone, destroys evidence, or harms himself or herself, the agent is responsible and may be liable.

The use of handcuffs must be part of the loss prevention policy and procedure manual which spells out their use and any and all limitations and restrictions.

We encourage the proper use of handcuffs for their above-stated reasons; however, some form of certification should be required; i.e., agents must be trained in their use by an authorized trainer or police officer with the local police department. The training material must be part of the LP department’s training manual or LP operation manual. Attendance at the training must be memorialized in the agent’s file, specifying the date of the training, amount of time spent, and name of the trainer.

Finally, remember that handcuffs can be used as a weapon against an officer if control is not maintained throughout the cuffing process.

Highjacking Prevention

CAS, JHC

Preventing highjacking is a worldwide activity of many sorts, but for the sake of some insight into how it might apply to the retail community, the best example, based on our experience, deals with the movement by truck of high-price goods for whatever reason.

For example, when the company would plan, advertise, and conduct a fashion sale of furs, pieces would be transferred from various branch stores throughout the division to the distribution center (DC) in preparation for shipment to the store in which this special event was to be held. We recall a major event in one of our Las Vegas stores. The “collection” of pieces, ranging from full-length sable coats to fox throws, would represent a significant amount of value and, from security’s point of view, an attractive target for highjacking.

The strategy employed was as follows: A nondescript box truck designed for movement of hanging goods was rented and backed into a dock at the distribution center. The furs were loaded during the late afternoon prior to the end of the shift. All documents pertaining to the load did not reflect the normally required destination, by design. Once the truck was locked and sealed, and the dock door was closed, a call was made to the dispatcher of the driver’s pool that regularly provided drivers for all inter-store transfers (the company did not employ drivers, but rather contracted for that service). An order was made for one driver to report to the DC at midnight for an assignment that would require 20 hours, including a paid rest period. Invariably, the dispatcher would ask where the driver was going and was informed the final decision had not yet been made but the driver would be informed upon arrival at midnight.

When the driver appeared at midnight to the distribution center’s security office, he was met by a security department special agent. “Where we going?” the driver would ask.

“Let me check and I’ll tell you in a couple of minutes,” the agent would reply. The driver had his thermos of coffee and sandwiches for the road, as did the special agent. The agent would escort the driver to the loaded and waiting truck, hand the driver the keys, and the two would drive through the yard gates onto the street. The agent would direct the driver to the appropriate freeway on-ramp and, once underway, the agent would say, “We’re on our way to Las Vegas, store #19. Do you know the way to that store?”

“Yes, sir. Wow! What’s our load?

“Just a million one-dollar bills, my friend, just a million one-dollar bills,” and the agent would laugh.

Today, with the advent of GPS and cellular technology, many trailers are equipped with electronic devices which, when queried, report on their location. These same devices can trigger an alarm, along with their location under specified circumstances, such as road breakdown, excessive speed, or highjacking.

History of Private Security

CAS, JHC

Contrary to popular belief, private security, particularly as a profession, is not a relatively modern development. A study of history from the beginnings of mankind shows that the protection of life and property is one of the oldest tasks both faced and undertaken by man.

Thus, the security and loss prevention industry today is a multifaceted and broad-based business and profession with specialties and subspecialties, employing more people than law enforcement, and financially representing over 1% of the entire gross national product of the United States, with projections of continued growth, particularly in light of the post-9/11 emphasis on security at all levels of the public and private fabric. Private security has experienced an evolutionary growth, with its roots buried deep in history and extending back to antiquity.

Because private security as we know it today has developed as a result of a multitude of ideas, concepts, historical events, and identifiable individuals and personalities, and because private security has become an essential and necessary ingredient of modern business, industry, and society, some knowledge of how it developed is not only interesting, but also helpful in understanding this emerging profession and its future.

Ancient and Biblical Periods

Archaeological digs and historical evidence indicate that the most primitive of man was concerned with security and developed rudimentary security techniques. Cave drawings and other evidence clearly demonstrate that protection and enforcement of social codes were concerns of earliest man. Meeting these needs, from then until now, has resulted in the development of modern day public law enforcement and private security, and the development of those two now distinct and separate disciplines was, in the past, often interwoven and indistinguishable.

In tribal society, needs were basic; security probably did not extend beyond keeping marauding animals from devouring others in the tribe while they slept. While “laws,” as such, did not yet exist, we do know that tribal customs were followed and that some means of identifying and bringing violators of those customs before the tribal chief for punishment existed.

Because private security and public law enforcement had common origins, and their development has only really bifurcated in more recent times–and because to understand the development of both, we need first to understand the development of the concept of law (a very complex subject)–let’s define the term “law.”

According to Black’s Law Dictionary, law is “that which is laid down, ordained, or established and that which is obeyed and followed by all citizens, subject to sanctions or legal consequences.”(1)

Keep in mind that “law” is a general term and can be used in many concepts. For example, we have the law of gravity, “Murphy’s Law,” natural laws, criminal laws, civil laws, laws of nature, the law of the jungle, etc. Our use of the term “law” relates solely to those laws (codes of conduct) considered necessary for an orderly society.

We must not, however, confuse “law” in this sense (i.e., a code of conduct which carries sanctions) with “morality,” even though in many cases laws develop from moral codes, or refine or reinforce moral concepts. For example, the moral concept “thou shalt not bear false witness (lie)” is defined and refined by the law in the various penal codes enacted by the appropriate authority, which proscribes such conduct, attaches sanctions, and refines degrees of violations such as petty theft, grand theft, etc. In other areas, moral laws such as “thou shalt not lie” are limited to application only under certain circumstances, such as lying under oath (perjury) and under certain other specified situations; it is only then that lying is “illegal” or “against the law” and that sanctions apply if such behavior is proven to have been undertaken.

It has been said that the establishment of laws and a means of enforcing them is essential to a well-ordered society and is a keystone of democratic forms of government.

The earliest law was probably a combination of tribal custom and the wishes of tribal chiefs. It was passed on by word of mouth (not written or codified as it is today), and its sanctions, the implementation of which were probably overseen by the tribal chief or the entire tribe, were primarily personal, which is to say, designed to satisfy the aggrieved party.

The earliest evidence of any written law does not appear until about 2000 B.C. At that time, Hammurabi, King of Babylon, compiled a legal code which dealt with the behavior of individuals among themselves, as well as their responsibilities to the society as a whole.

The Code of Hammurabi set forth in writing the long-established customs regarding intra-group and interpersonal relationships, defined unacceptable behavior, and spelled out the penalties and punishment for violations. Penalties, for the most part, reflected the ancient “eye for an eye” philosophy; in many cases the offender suffered a penalty similar to the hurt or wrong done the victim.

The Old Testament is replete with laws relating to intra-group and inter-personal relationships. Laws relating to property, inheritance, slaves, and criminal offenses (theft, murder, and prostitution, among others) can be found throughout the Old Testament. In the New Testament, there are references to various crimes, including what we would call “highway robbery” and the placement of “watchtowers” in vineyards to prevent theft of the vines, its fruit, and the wine produced there. And “temple guards” with a “captain” were deployed in the Jewish Temple in Jerusalem way before the time of Jesus Christ.

The next significant development in the chronology of the development of law and the protection of life and property occurred about 600–500 B.C. when the early Greek city-states developed systems for guarding highways and other strategic parts of their cities, including the protection of their ruler, the earliest evidence of executive protection.

The Roman Empire (100 B.C.–500 A.D.)

Significant events relating to the development of law, security, and law enforcement took place with the development of the Roman Empire (see Figure H-2). The “Twelve Tablets,” which covered the broad spectrum of the existing body of Roman law, appeared.

image

FIGURE H-2

Augustus (63 B.C.–14 A.D.), Emperor of Rome, formed a military unit known as a “Cohort” to protect the city. Members of the Cohort were known as “Praetorians” and the now-historically famous “Praetorian Guard” is considered by many historians as the first police force, even though its members were military personnel.

Later in his reign, Augustus formed the “Vigiles of Rome”; its members were civilian freemen whose task was to control fires and assist in controlling crime and quelling riots.

Perhaps the most significant contribution by the Romans came under the Byzantine Emperor Justinian (483–565 A.D.), who summarized Roman law into the world’s first law book known as “Corpus Juris Civilis” (Body of Civil Law).

Thus, by the end of the Roman period, tribal customs and trial by ordeal evolved into written laws, standardized punishments, and the beginnings of such concepts as proof of guilt and fair trials.

Anglo-Saxon Period (500–1066 A.D.)

England, from whence came the foundation of the current U.S. law, was a country of instability and confusion from 500 A.D. until the late 800s. The failure of the Roman conquest of England produced several hundred years of turbulence, aimlessness, and general lack of direction and forceful leadership in England.

Not until King Alfred (872–901) do we see the beginnings of legal developments in England which will continue and ultimately change and influence the entire body of legal concepts in the world of that time. The influence of Alfred is significant in two respects: He established the concept of the “King’s Peace” (i.e., widespread unlimited private warfare among the various English kingdoms was inconsistent with preserving the peace within the whole of England and would no longer be tolerated), and he established a new code of law which set forth standardized forms of punishment, including specific fines for certain offenses.

The Anglo-Saxon period also saw many customs and practices in the handling of the protection of the citizenry which are recognizable as the forerunners of today’s practices. For example, crime prevention and law enforcement were community responsibilities; therefore, whenever an offense occurred, a “hue and cry” went up and all persons were expected to assist in apprehending the offender. The term “hue and cry” is still heard today, and the concepts of citizen arrest and “posse comitatus,” which were first evidenced in this period, are very much alive and still in use today.

It was also during this time that the English kingdoms began to be subdivided to meet both agricultural and societal purposes. One of the larger geographical subdivisions was called a “shire” and governed by an appointed person with the title “ealdorman.”

A smaller subdivision, the “hundred,” was governed by a person known as a “reeve.” Eventually, “ealdorman” became an “Earl” (our present-day term “alderman,” common in East Coast cities to designate a political leader, emanates from “ealdorman”).

The King soon appointed a person to assume primary control of the reeve; that person was known as a “Shirereeve,” and our present day “sheriff” derives from the “Shirereeve.” Our office of sheriff has similarities to the duties of the Shirereeve, who was responsible for tax collection, law enforcement, and who served as an agent of the king.

Also during this period, we see the first primitive form of a court system. Landowners and royal officials met from time to time to conduct the business of the “shire” or “hundred,” which included resolving lawsuits and criminal complaints. While sitting on these matters, the officials became known as “courts,” and each had its own jurisdiction depending on the composition and residency of its members.

For persons charged with a criminal offense, guilt or innocence was determined by either “ordeal” or “oath,” neither of which placed any reliance on facts, but rather relied on some outward and resultant manifestation of God’s indication of guilt.

The ordeal took many forms. An accused might, for example, be required to carry hot coals for a specified distance. If his hands healed from the burns within a specified time, this was a sign from God of his innocence; conversely, if his hands had not healed, he was guilty.

Trial by oath consisted primarily of obtaining the required number of “compurgators” to testify as to the accused’s truthfulness or innocence. As might be expected, the higher the rank or position of the “compurgators,” the greater the weight given their oath. Compurgators were essentially character witnesses; it was not required that they have any knowledge of the events in question.

While capital punishment was used occasionally, branding, mutilation, and fines were more common forms of punishment. Fines were on a graduating scale: low for petty offenses and/or persons of lower rank and increased in amount for more serious offenses or persons of higher rank or class.

The Anglo-Saxon period can, with respect to law and justice, be characterized as a period when the law of private vengeance prevailed, and where the biblical law of Moses, which regarded a crime primarily as an offense against the individual rather than society as a whole, was totally accepted. Thus, a person who suffered an injury from another could seek his own redress; if a person was slain or disabled, it became the duty (and right) of his clan or village to exact atonement in kind from the transgressor.

The Middle Ages

The Middle Ages period began with William the Conqueror’s successful (and last in history) invasion of England and his accession to the throne on Christmas Day of 1066, and ends with the beginnings of the modern era at the end of the reign of Henry VII (1485–1509), the first of the Tudors. It is during this period that we see the development of many of the concepts of law, justice, and legal principles which form the underpinnings of our own cherished Western judicial system.

Norman Period (1066–1199)

One of the principal results of the Norman conquest was the establishment of feudalism in England. Feudalism was, among many things, a reciprocal and contractual relationship between the lord (landlord of the fief or land) and the vassal or tenant. Both parties had rights and responsibilities–one of which was for the vassal to report to the lord’s court and assist the lord in the administration of justice.

It must also be pointed out that during this period, there were two distinct legal jurisdictions: the lord’s courts and the ecclesiastical (church) courts. The church had an elaborate code of laws (canon law) governing the lives of the clergy and certain aspects of laymen. Lord’s courts had jurisdiction over nonchurch matters, although there were frequent disputes as to who had jurisdiction.

The Norman conquest produced three significant developments in England, all of which impacted upon the justice system. These three events were

1. The introduction of feudalism

2. The centralization of government

3. The reorganization of the church

Some of the direct results of William the Conqueror’s leadership on the justice system were

1. The formation of the “curia regis,” or King’s court

2. The institution of itinerant justices

The King’s courts had jurisdiction over more major matters and serious offenses such as homicide and robbery. The King’s courts were generally in-session, followed their own precedents, developed uniform procedures, and tended to be more impartial than local courts.

image

FIGURE H-3

As a result of the preceding factors, these courts became quite popular among the citizenry. Because the “curia regis” traveled with the king on his constant journeys, it was difficult for prospective litigants to know the location of the currently sitting court. To solve this problem, the king often sent members of the “curia regis” to various parts of the country to hold court. These justices became known as itinerant justices.

The end of the Norman period saw Henry II (1154–1189) on the throne. Henry II’s reign saw the writing of a treatise on the law of England, and the development of the differentiation of the various levels of crime and the first use of the distinction between felonies and misdemeanors. Other significant changes under Henry II included

Widely extended jurisdiction of the King’s court

Enlarging of the criminal jurisdiction of the King’s court

Extending the writ process to assure that any freeman having business before the King’s court would be heard

Expansion of itinerant justices

The recording of court decisions and the use of previous decisions as precedent for future holdings, thus establishing a body of common law and the principle of “stare decisis” (to stand by decided cases and uphold precedent)

Finally, and most significant, was the introduction of the forerunner of our jury system as a standard part of the King’s court procedures. In fact, in cases involving land ownership, a freeman had an absolute right to trial by jury. Simultaneously, deciding cases by oath was abolished. For these reasons, Henry II is generally credited with laying the foundation of our modern system of trial by jury.

Post Norman Period (1200–1500)

The year 1215 was perhaps the apogee of the Middle Ages in the development of modern legal concepts. In this year

The Lateran Council abolished trial by ordeal.

King John issued the Magna Carta, which not only made significant changes in the relationship of the crown (state) to the people in the areas of taxation and the exercise of royal power, but more importantly in the area of the administration of justice. The Magna Carta contained language which is similar to and the foundation of the United States’ fifth amendment to the Constitution, which provides that no person shall “be deprived of life, liberty or property, without due process of law.”

Of equal or greater importance, the Magna Carta implied that the king was not above the law and provided means for redressing royal transgressions.

Edward I (1272–1307), a prolific legislator in the areas of law, is remembered in history as the “English Justinian.” Among his accomplishments were

Issuing the Statute of Winchester (also known as Westminster), which made harboring a felon illegal.

Writing the Second Statute of Westminster, which

Established the practice of having legal issues decided by the courts while questions of fact were left to juries for resolution.

Began citizen participation in crime prevention by “requiring” that the hue and cry be raised whenever crimes were committed and witnessed by citizens.

Established the principle that ignorance of the law was no excuse.

Established the concept of “hot pursuit.”

Forbid strangers from lurking about at night–a forerunner of current vagrancy and loitering laws.

Established a “watch and ward” system, which required night watchmen or bailiffs selected from the citizenry to maintain order and prevent crime.

Regulated prostitution in cities.

Provided for clear areas next to roads to prevent and discourage criminals and highwaymen from hiding there and committing crimes against travelers.

Required male citizens to arm themselves to the ability their station in life permitted.

Expanded and formalized the court system and local responsibility for administering justice.

Ordered free elections; forbid judges from permitting corrupt lawsuits from being pursued in court.

Under Edward II (1327–1377), we see the appointment of justices of the peace and the first use of coroners to inquire into unexplained deaths. Edward III also issued the Statutes of Treason, which made giving aid or comfort to enemies of the land treason; counterfeiting the land’s currency was declared treasonous.

The Middle Ages ended with the reign of Richard III (1483–1485) and the ascendancy to the throne of the first of the Tudors, Henry VII (1485–1509). From the foregoing, it is quite reasonable to conclude that the Middle Ages outshone any other era in the number of revolutionary and significant advances made in the development of legal concepts which have survived to modern day.

Modern Period (1500–Present)

The 1500s

The rule of Henry VII (1485–1509) was marked by social turbulence and the emergence of a new merchant or middle class in England which profited at the expense of both the lower (serf) and upper (nobleman) classes. Henry’s having been dubbed the “Big Policeman” resulted from his major efforts in restoring law and order to England when it was threatened by social unrest and upheaval.

Henry found that trials had become corrupt and perjury prevailed. He established the Court of Star Chamber, which sat without a jury and was thus less subject to corruption; the court did its job under Henry (although it was later subject to royal abuse under Charles I) and the end of his reign saw England peaceful again; the Crown had consolidated power; the spirit of individualism flowered, and the Renaissance was in full bloom.

The 1600s

Changes in the administration of justice and innovations to the system slowed down for the next couple of centuries. The 1600s saw the development of “private police” to protect the property of merchants. Parochial police were formed to protect parishes or districts within a city. Night patrols were popular to prevent crime and give early warnings of fire.

During the reign of Charles I (1625–1649), his constant feuding with Parliament over their refusal to provide him adequate funds led Charles to subvert the Court of Star Chamber into an instrument of royal abuse synonymous with tyranny.

The Star Chamber became famous for “third degree” methods; to be charged with an offense was tantamount to being condemned. Punishment was often corporal or considered “cruel and unusual.” Charles was finally forced by Parliament in 1628 to sign the Petition of Rights, many of the provisions of which were restatements of the Magna Carta.

In 1641, Charles was forced to totally abolish the Star Chamber. His tyrannical rule resulted ultimately in a civil war which saw Charles beheaded in 1649.

Oliver Cromwell (1653–1658) assumed leadership after Charles’s execution and was known as Lord Protector rather than King.

Cromwell maintained order by martial rule and was eventually replaced by Charles II (1660–1685). Under Charles II, Parliament, rather than the King, was given the power to make new laws. In 1679, the Habeas Corpus Act was passed, requiring law enforcement officials to bring an accused before a judge to explain why the prisoner was being held. (For a modern-day comparison, refer to Article I, Section 9, and the six amendment to the U.S. Constitution.)

The continued emergence of mercantile establishments resulted for the first time in 1663 in the formation of a force of paid constables to protect business property at night. This force became known as the “shiver and shake” watch.

The late 1600s also saw the proliferation of private police in the form of merchant police, parish police, dock police, warehouse police, etc. This period also saw the first use of “rewards” to entice the public to report known criminals and participate in the control of crime.

The 1600s saw developments in America which paralleled those in England. Sheriffs and constables were appointed as representatives of the English king. Citizen participation in law enforcement took the English form: the night watch system could be found in Boston, Philadelphia, and New York.

The 1700s

The 1700s saw an increase in the concern for individual rights; individuals were no longer “conscripted” into night watch service. Rather, tax revenues were used to pay for night watch personnel. The concept that a criminal offense was an offense against the crown or state (i.e., the whole of society) rather than a personal offense against an individual victim, which had been slowly developing since the 1600s, was by now well established.

In 1748, lawyer and novelist Henry Fielding was appointed magistrate for the second district of London, the Westminster area. In 1750, Fielding published “An Enquiry in the Causes of the Late Increase of Robberies,” which was probably the first security survey. Fielding took over the Bow Street police station as chief magistrate and proceeded to make significant improvements in the London police force, including the formation of the first plain clothes detective unit known as the “Bow Street Runners”–since its members ran to the scene of crimes hoping to apprehend the culprit.

1800s & World War II

The 1800s

The year 1829 is generally conceded as the year in which the real beginnings of a modern police system took place. It was in this year that Sir Robert Peel, Home Secretary of England, guided a bill through Parliament titled “An Act for Improving the Police in and Near the Metropolis.” This legislation authorized a new uniformed, full-time salaried 1600-member police force.

These features, coupled with other new ideas such as rigorous pre-employment screening, semi-military principles of discipline, and lifetime tenure (provided established standards were maintained) resulted in a growth of the force to over 3200 men within 3 years.

Of historical note is the fact that the headquarters of this new force was on a small London side street called Scotland Yard, and that the term “Bobbie,” which is recognized worldwide as the nickname for London police officers, derives out of respect for Sir Robert.

In the United States, such famous lawmen as Wyatt Earp, Bat Masterson, Pat Garrett, “Wild Bill” Hickok, along with the Texas Rangers, all gained fame in the “Old West” for their own methods of bringing law and order to the frontier.

In the East, cities were growing and forming their more formalized police departments. True police agencies, following Peel’s example, began to flourish in the 1800s. Police departments were established in New York (1844), Chicago (1850), Cincinnati (1852), Philadelphia (1855), and Detroit (1865).

On a national level, crime was also a problem, and we see the federal government forming investigative agencies. The Post Office Investigative Service was formed in 1828, the law enforcement arm of the Treasury Department was formed in 1864, and the U.S. Justice Department in 1902 began its law enforcement arm, which was the forerunner of the FBI. The Federal Bureau of Investigations, as we know it today, began in 1932 under J. Edgar Hoover.

We have spent a good deal of time reviewing the development of law and policing agencies, not without reason. The development of private security was, by the very nature of its function, closely related to public law enforcement and under the proscriptions of the law. As will be subsequently noted, some aspects of loss prevention have a “law enforcement” correlation and must be conducted within the parameters of established laws and statutes. For these reasons it is helpful for security personnel to understand how their work-related laws developed and essential that they keep up-to-date with changes and court decisions affecting them.

It was in the mid- to late-1890s that modern-day private security had its beginnings. This was the era of the department store’s beginnings. Macy’s in New York opened in 1858; Marshall Fields in Chicago opened in 1860; Strawbridge & Clothiers opened in Philadelphia in 1866; Wanamakers opened in New Jersey in 1876, and The Broadway in Los Angeles opened its doors in 1897. And with multistory big-city department stores came shoplifting problems, which caused the creation of the early term “floor walkers,” private citizen-employees who were responsible for the repression and/or detection of crime inside the stores. One of your authors had the occasion to review turn-of-the-century security department records of San Francisco’s Emporium Department Store, reflecting numerous shoplifting arrests made by the staff.

Records as well as oral accounts tell of how some “floor walkers” were conspicuous, wearing a bowler hat, smoking a cigar with thumbs inside suspenders, whereas others worked “undercover” and worked stealthily to observe and detain shoplifters. Books were kept bearing photographs of those caught, utilizing in those days the most current technology, photography. Clearly, the genesis of retail security and “loss prevention” was in the big department stores and their “floor walkers.”

Remember, this was during the time when police departments were new and forming to provide “security” services to their respective communities.

Alan Pinkerton, who was born in Scotland, emigrated to the United States after his police officer father died when Alan was a small boy. In 1850, after 4 years as deputy sheriff in Cane County, Illinois, Pinkerton was made a deputy in Cook County (Chicago). Later, he became a special agent of the U.S. Post Office Department, and then Chicago’s first and only police detective. He then left the police department to form a private detective agency, specializing in providing investigative and security services for railroads and industrial organizations (see Figure H-4).

image

FIGURE H-4

Pinkerton’s reputation as a “master sleuth” led to his acquiring a national reputation. During the Civil War, Pinkerton’s agency and its agents provided the Union with the organization for intelligence and counter-espionage services and also served to provide personal protection for President Lincoln.

After the Civil War, Pinkerton returned to private clients, and because of the relatively few number of public law enforcement agencies coupled with jurisdictional restrictions, he provided the only investigative agency with truly national capabilities.

In 1885 William G. Baldwin commenced his private detective career at the age of 25 with an agency named the Eureka Detective Agency in Charleston, West Virginia, and with the passage of time created one of the foremost private police agencies in America. His Baldwin-Felts Detective Agency, with strong ties in the railroad industry, often received and exercised governmental powers in handling criminal investigation assignments which public sector police agencies were unable or unwilling to undertake.(2)

In 1889, Brinks Incorporated was formed to protect property and payrolls. In 1909, William J. Burns, Inc., formed a private detective agency and became the investigative arm of the American Banking Association (see Figure H-5). The Pinkerton, Brinks, and Burns companies all continue in business today. Regrettably, there were no “Pinkertons,” “Baldwins,” or “Burnses” who led the way in the early giant department store security programs.

image

FIGURE H-5

Simultaneous with the founding and growth of these giant pioneers, the various railroads, which had great political power, got state legislatures to pass Railroad Police Acts authorizing the railroads to establish their own security forces with full police powers. By 1914, over 12,000 railroad police agents were in operation.(3)

World War II

World War II was the real source and stimulus of the modern and complex private security industry. Private security in a sense was born of the war, went through adolescence during the Cold War period, and reached maturity in the 1960s–and continues to grow and prosper, all the while developing more specialization and sophistication.

The military services in WWII trained thousands of men in law enforcement (MPs, SPs, CIDs, etc.) and in the various intelligence services (OSS, ONI, CIC, etc.). At the same time, the FBI and the Immigration and Naturalization Service (INS) and other federal agencies (and their counterparts in the other Allied nations) were expanding to countersabotage and espionage threats.

Additionally, thousands of others were trained as auxiliary police and plant guards to provide physical security at home and in defense plants. By 1945, there were literally thousands of businesses, plants, factories, etc., engaged in “classified” government or war contracts. Each of these facilities required physical security, thus producing a large pool of personnel trained–to some degree at least–in “security.” After the war, this large resource of military police, intelligence agents, auxiliary police, and plant security guards entered the civilian workforce with hopes of putting their wartime training to use in the civilian marketplace.

The Cold War produced, among its many ramifications, the continued need for classified defense contracts, thus requiring these now civilian-orientated operations to maintain some degree of security. Additionally, the many employees who worked in these facilities needed security clearances, thus creating the need for a large force of investigators to do background investigations in order to grant security “clearances.”

Congressional committees and government agencies of all sorts began investigating both aspects of the “War” and contemporaneous domestic matters requiring more hundreds of investigators. Thus, while the war itself gave birth to the multitudes of personnel trained in security and investigations, it was the post-war period which provided a means for them to use their training in the civilian world.

The trend begun during the Cold War to use investigative and security-trained personnel by both government and civilian agencies and private business in numbers never before visualized not only continued, but increased after the so-called Cold War years–albeit for somewhat different reasons.

As the Cold War thawed, and the need for private security normally would have abated, the concurrent increase in street crime and white collar business crime began escalating, more than taking up the slack in the need for private security and its many related specialties. Department store security programs continued to grow with the use of more “store detectives,” many of which were women. Some store’s programs were labeled “Protection Departments” and store detectives relied heavily on police officers who worked traffic control at the street and boulevard intersections adjacent to the stores to help apprehend fleeing shoplifters.

By the mid-1970s, the best available statistics indicated that there were over 500,000 persons engaged in private security and that this number exceeded those engaged in public law enforcement. By 1985, estimates place the number of persons in private security jobs at 700,000–exceeding those in the public sector by at least 100,000. Most observers agree that the private security growth will continue to outstrip the public sector.

One has only to peruse one of the numerous trade or professional publications devoted to private security to appreciate the growth of this industry. An examination of the organizations devoted to the private security profession (and it truly has become a profession) reveals both the widespread applications of the profession and its diversity.

Organizations range from those with a very broad membership base (e.g., the American Society for Industrial Security–International) to those with rather specialized interests (e.g., organizations devoted to credit card fraud, hospital security, banking security, multinational corporation executive protection, security consulting, and antiterrorism organizations, etc.).

Naturally, when considering the scope of private security and its economic implications, we must also consider all the supporting functions which accompany the practicing security professional, such as training schools, equipment manufacturers, expositions and seminars, consultants, and yes, even these specialized books and literature devoted to the subject, more of which are being published every year.

The Future

The future of private security is (on balance) bright. The rapid growth of our industry, over the past two or three decades, has seen the leaders of industry recognize the importance of the security (in some businesses known as “Loss Prevention”) as evidenced by the elevation of the head of security to the vice president level in many organizations over the past decade or two. The post-9/11 world has seen the dramatic increase in security in both public and private. Terrorist bombings and other threats have led to the demand for tighter and increased security at all levels of everyday life. Consider the use of large numbers of security officers at sporting events, transportation systems, and theatrical and social events, to name just a few. The increased use of CCTV, once used almost exclusively by the private sector, to monitor public streets and gatherings is unprecedented. The recent designation of Chief Security Officer (CSO) on a level with the COO, CFO, and CIO of major corporations attests to the vitality and importance of this function in the 21st century. These advances, however, also give rise to some challenges which our profession must meet and overcome if it is to enjoy both continued growth and the respect and confidence of its employers, clients, the public, and governmental and regulatory agencies.

Some of the challenges facing us are described next.

Professionalism

A profession is defined as a vocation or occupation requiring advanced training and usually involving mental rather than manual work. A professional is one engaged in a skilled profession. The caliber of persons entering private security with a long-term commitment to grow in and with the industry continues to improve. We must encourage this trend by improving pay scales (particularly for entry-level positions and uniformed security personnel) and by offering opportunities for upward mobility for qualified persons. The early 20th century image of the retail “floor walker” or manufacturing plant night watchman is, or should be, history. Those “bottom of the ladder” and generally unskilled and untrained persons have no place in today’s security profession. Many states have enacted legislation to require a minimum level of uniformed security officer competence. California began private security regulation for contract uniformed security officers in 1915; other states have followed suit.

A more recent trend in state regulation of private security (e.g., New York and California) is the requirement that not only uniformed contract security officers meet state training minimums and licensing requirements, but that proprietary security and loss prevention personnel also meet these requirements.

Note: Your authors reluctantly support state mandated training minimums for proprietary security personnel since, regrettably, some companies fail to voluntarily adequately train their loss prevention personnel. We also acknowledge that state-required training is rudimentary at best (sometimes a little knowledge is a dangerous thing), and we encourage companies utilizing loss prevention staffs to supplement state curricula with in-house training and supporting loss prevention personnel’s attendance at industry-sponsored LP seminars.

Training is the key to this challenge. No longer can we hire someone and put that person on assignment with only a new uniform and a pat on the back. The American Society for Industrial Security–International (ASIS) began its Certified Protection Professional (CPP) professional certification program in 1977, and today it is a “desired” qualification of security applicants by many companies. In 2003 ASIS added two new certifications:: Physical Security Professional (PSP) and Professional Certified Investigator (PCI). The International Information Systems Security Certification Consortium, Inc., or ISC2, a nonprofit organization, also issues a Certified Information Systems Security Professional (CISSP) certification. The International Foundation for Protection Officers’ Certified Protection Officer (CPO) program is directed primarily toward uniformed security officers. The International Association of Professional Security Consultants (IAPSC) began a certification program for security consultants (CSC) in 2006. Finally, the Loss Prevention Foundation, a not-for-profit organization, planned to launch its lpcqualified certification in early 2007 followed shortly by its higher status LPCCERTIFIED program. All these certifications require study and passing what are described as “rigorous” written examinations. These efforts, and others under study, are designed to upgrade and assure qualified and trained personnel in the various security subsets.

Legal Status and Liability

With few exceptions, private security personnel have no police powers beyond those of their fellow citizens. Their work, however, is often quasi-law enforcement in nature, and thus they interact with and confront their fellow citizens in adversarial situations very much like public police. Effort must be made to keep the distinction clear and to concentrate private security efforts on asset protection and loss prevention programs. When apprehensions and arrests must be made, it is essential that the procedures followed are both legal and ethical. The courts of many jurisdictions are just beginning to realize the full extent of the private security industry and how frequently its practitioners interact with the public.

These court reviews of arrest, privacy, malicious prosecution, assault, and search and seizure issues, to name a few, are producing both constantly changing rules and laws under which private security must operate, as well as large money judgments against both security companies and individual security officers when their behavior violates often-changing and unclear “rules of the game.”

Image

The public’s perception of private security is rapidly outgrowing the “rent-a-cop” or “floor walker” image, but there is still room for improving both the relationship between and the perception of us by police agencies.

The International Association of Chiefs of Police (IACP) has recently officially recognized our industry and formally noted our contribution to crime prevention and control, and has urged its members to work for a closer degree of cooperation between the public and private sectors.” The IACP has formally requested a private security organization to submit material relating to specific loss prevention issues for formal issuance by police departments across the country.

Proprietary Security

Corporations now expect its security personnel, particularly those in middle and upper management positions, to be more than simple “security experts.” Businesses today expect their security to come out of its traditional “isolation” from other company functions. Today, security executives are expected to be conversant with overall business operations, and to contribute in a tangible way to the overall profitability and success of the venture.

Certainly, security expertise is still essential, but in addition security executives are expected to be knowledgeable of general business concepts and the goals of their organization and to make a contribution in these areas. Top management is looking for a larger return on their investment of security dollars.

Contract Security

Those businesses which hire contract security officers are demanding more than simply a person with a uniform, badge, and (on rare occasions) a gun. Business is becoming more and more sensitive to its “image” and how it is perceived by the public. The public rarely distinguishes whether a security guard is contract or “in-house”–the guard represents and “is” the company. Therefore, a guard who is slovenly in appearance, rude, unknowledgeable, or who makes a serious legal error in accomplishing his or her duties becomes either unacceptable or a serious liability–or both.

Thus, the contract officer must be well trained not only in the technical aspects of the job, but also in the expectations of the client employer, and must be a knowledgeable and courteous representative of the client. The contract security officer must be sensitive to the unique relationship that exists between him or her and the client.

Summary

Traditionally, society’s efforts to prevent and control crime have been the province of public (government) law enforcement, although private “security” efforts have been woven into the fabric of crime control since earliest times.

Beginning in the second half of the 20th century, private security (whether proprietary or contractual) has taken an increasingly larger role in crime control and prevention, so that as of 1985 the resources of money (over $20 billion annually) and personnel (over 700,000) exceed that of public law enforcement. Indeed, the most recent trend is the “privatization” of functions such as running jails and prisons, which were previously the jobs of government exclusively.

Private security is big business and growing in all free-world countries and ranges from the single owner/operator private detective agency or security consultant through national contract security guard companies and investigative agencies, to multinational security firms and alarm companies. The thousands of proprietary security personnel, working only for a single employer and in his or her interests only, must also be included.

The industry, because of its size, has begun to attract the attention of legislatures and of the courts, and in those instances in which self-restraint and legal and ethical considerations are neglected, the legislatures and courts are establishing the standards under which we are required to operate.

In other cases, the courts are also punishing, through monetary awards to injured parties, those private security practitioners who “go too far” and offend public sensibilities.

The industry is also growing in sophistication and professionalism. It is attracting personnel and leaders who would be a credit to any profession. With both continued growth and professionalism, both of which seem assured, the future of private security and that of those in the profession seems bright.

References

(1) Black H.C. Black’s law dictionary. St. Paul, Minnesota: West Publishing Company, 1951;1028.

(2) Velke, J. (2005). The true story of the Baldwin-Felts Detective Agency. Velke. Note: John Velke is a contributing author to this work.

(3) Green, Farber. Introduction to security. Los Angeles, California: Security World Publishing Co., Inc., 1975;27.

(4) For a thorough discussion and detailed analysis of the relationship between private security and public law enforcement in America, see:Cunningham W.C., Taylor T.H. The Hallcrest Report: Private security and police in America. Chancellor Press, 1985.

The History of Retail Security/Loss Prevention

John Velke

Writing a history of retail security/loss prevention can be like trying to say which drop of water hits the ground first when it starts to rain. So many retailers started doing things around the same time that it is often difficult to determine who started something “first.” Therefore, this history does not attempt to designate “firsts” but is simply intended to give you an overview of the history of retail loss prevention from the perspective of significant developments that impacted the industry and became commonplace.

1850–1899

Until the mid-1800s retail stores in the United States were typically owner-operated businesses. Merchandise was primarily offered for sale from behind counters, and the selling staff waited on each customer. Shoplifting was primarily accomplished through sleight-of-hand tricks within close proximity of a sales clerk. Retail stores relied on the management staff and sales clerks to detect theft and therefore had no need for full-time dedicated security personnel.

This 1869 account serves as a typical example, “Storekeepers are often victimized by that class of depredators known as shoplifters, who frequently stop in a shop, and, at a glance, ascertain what can most easily be removed without detection. Grocers, especially, frequently find a whole or part of a ham, which has been left on the block for convenience, among the things taken.”

During the 1870s things began to change. Retailers in some of the major metropolitan areas began to grow rapidly, adding selling square footage faster than sales clerks. Some stores began to recognize the need for in-store dedicated security personnel. One of the first of these was Frederick Loeser’s & Company, a New York City department store, which hired David N. Corwin as a full-time store detective in 1880. Corwin had spent the previous 25 years in the detective bureau of the New York City Police Department, where his specialty was identifying and apprehending shoplifters and pickpockets. The police commissioner described Corwin this way, “There isn’t an old hand he doesn’t know, and it takes him a mighty short time to find out the new ones. He’s made some good arrests in his day, and he’s pulled in shoplifters that other officers wouldn’t have dared to touch. It’s a risky thing, sometimes, a man has to be very shrewd and very sure too, and Dave is just that man. There were a couple of women he brought in one day, and I doubt if anyone else would have risked it. Why, one of them had on a thousand dollar shawl, and the way they kicked against being arrested was a caution. They were respectable people, they said, and if they were arrested they would sue the department and have the officer imprisoned for false arrest. All this sort of talk went in one of Dave’s ears and out the other. They were searched, stuff found on them, and sent up (to prison), they proved to be old shoplifters too, a couple of professionals.”

In the early 1890s, Corwin left Loeser’s & Co. store and went to work handling the store detective duties at Abraham & Strauss, where he stayed until his death in 1901. Corwin’s 20-year career in retail security/loss prevention is worth recognizing because most retail stores did not begin hiring dedicated security personnel until after 1900. Up until that time, most stores relied on the local police to handle shoplifting, pickpockets, and other petty crimes. When significant crimes and employee theft occurred, store owners typically engaged the services of a private detective agency.

A great example is the relationship that existed for nearly 100 years between the Jeweler’s Security Alliance and the Pinkerton Detective Agency. First created in 1883 by a group of independently owned jewelry stores, the Jeweler’s Security Alliance was one of the first to recognize the value of taking a proactive stance against retail criminals by retaining the services of a well-organized and professional group of detectives. With offices located in nearly every major city in the United States, Pinkerton detectives were at the disposal of the Jeweler’s Security Alliance members anytime a need arose.

1900–1949

Two major developments at the beginning of the 20th century significantly changed patterns of criminal behavior and made a significant impact on retail security that have been felt to this day. In 1903 Henry Ford and 11 Detroit-area businessmen founded the Ford Motor Company, and 10 years later, by implementing assembly line processes, made automobile ownership affordable for many Americans. A year later, the first commercial airline began operating between St. Petersburg and Tampa, Florida. Suddenly, professional criminals (including shoplifters) had a much wider territory they could work in. No longer were they at the mercy of train schedules and horse-drawn carriages. Criminals could move quickly from one city to another and then move on before being recognized by the local police.

Many more retailers began establishing an in-house security department, drawing largely on the experience of police officers to fill the newly created role of Director of Security. The R.H. Macy Company serves as a good example. Located at Herald Square in New York City, Macy’s soon became known as a retail innovator and the “World’s Largest Store.” In 1907 Macy’s hired William H. Wall to lead the security function, then called the “protection department.” Wall was a former police officer with the New York, New Haven, and Hartford Railroad and was uniquely qualified to take on the multiple and unusual tasks associated with running the security department at Macy’s. In 1901, while still employed by the railroad, William Wall was appointed the Chief of the Special Police for the Pan-American Exposition in Buffalo, New York. In that capacity he handled the planning for the safety and well-being of an estimated eleven million exposition visitors. This experience served him well, as he later became responsible for handling security for the Macy’s Thanksgiving Day Parade.

During his 27 years as the Director of the Protection Department at Macy’s, William Wall introduced a number of innovative retail security concepts. He instituted the use of guard dogs to supplement the night watchman in the store, he had jail cells built in the store where shoplifters could be held until turned over to the police, and he played an important part in establishing the first Stores Mutual Association, then known as the Stores Mutual Protective League.

The original Stores Mutual Protective League was an organization supported by member retailers that provided store detectives to all members in New York City. Each store detective was a sworn special police officer with the authority to make arrests anywhere in the city. It was not unusual for store detectives to follow a potential shoplifter from Macy’s, to Gimbels, and then to Lord & Taylor, until they caught the person in the act of stealing or became satisfied that the person was not a thief. This freedom to work in more than one store on a given day and to follow suspects through the public streets made it much easier to recognize and apprehend professional shoplifters.

This 1918 account serves as an interesting example. On September 25 of that year, store detectives Anna Coschina and Frances Mullin noticed two 30-something women acting suspiciously in the New York City Wanamaker’s store. One of the women appeared to be acting as a lookout and shielding for the other as merchandise vanished. The detectives struggled to remain inconspicuous while trying to obtain a clear observation of the theft. The two shoplifting suspects left Wanamaker’s and went to Best & Co., then to Saks Fifth Avenue, on to Macy’s, and then to Lord & Taylor. Finally, after spending several hours following the women all over town, the detectives watched as the younger of the two women concealed two pairs of ladies gloves in her handbag. Anna and Frances waited until the two women left Lord & Taylor and then apprehended them on the sidewalk.

In addition to the two pairs of gloves, each valued at $2.00, the detectives found two handbags from Lord & Taylor valued at $6.50 each; two veils from Best & Co. valued at $2.25 each; two sets of pins from Saks Fifth Avenue valued at $1.50 each; one waist from Wanamakers valued at $2.85; and nine pairs of ladies gloves, valued at $12.41, from Macy’s. The women gave their names as Bessie Clark, age 33, and Mary Leaman, age 39. Both women acknowledged that they supported themselves by shoplifting and that they were currently living at the Hotel Marie Antoinette. They were turned over to the police and each held on $300.00 bail. They remained incarcerated until October 7, when they appeared in court and pleaded guilty. Bessie was fined $50.00 and released. Mary, who had been charged as an accomplice, was fined $25.00 and released.

As the aforementioned account illustrates, another noteworthy aspect of early retail security is that stores recognized that plainclothes store detectives needed to represent the populations they served. Women and minorities were hired in these quasi-law enforcement positions long before opportunities occurred in public law enforcement. In fact, the first recorded example of a woman given full police powers did not occur until 1905, and even then, police departments did not generally embrace the hiring of women until the 1970s. Meanwhile, women like Anna Coschina and Frances Mullin demonstrated that they had the patience, fortitude, and ability to trail criminals and make arrests.

1950–1999

Perhaps the most significant change to ever affect retail security/loss prevention occurred in 1950. That year television ownership leapt from fewer than 5 million to more than 10 million by the end of the year. This 100% plus increase marked the beginning of a decade of explosive growth. By 1960, 80% of homes in the United States had at least one television set. Combined with the post World War II “baby boomer” generation beginning to reach their teenage years, the result was a sharp increase in the number of teenagers with a desire to own things they could not all afford.

Retailers soon realized that catching every shoplifter was impossible. The concept of preventing retail crime began to take root. A renewed emphasis on customer service and the introduction of “uniformed” (red blazers) security personnel led many departments to change their name from “Security” to “Loss Prevention.”

The “prevention” mantra exploded during the 1970s as retail business organizations began sponsoring antishoplifting public service announcement campaigns; electronic article surveillance technology was introduced in many stores; state legislatures began passing civil recovery statutes so that retailers could recoup some of their losses from shoplifters; and store mutual associations shared apprehension data with member retailers in an increased effort to prevent the hiring of known criminals. The convenience store retailers were now staying open 24 hours per day and began aggressive prevention campaigns to reduce the probability of armed robberies. Their tactics included using drop safes so that a limited amount of funds would be available, installing CCTV equipment with public view monitors, increasing both interior and exterior lighting, and removing obstructions blocking the view of police officers driving by.

Some of these concepts and many others became known as Crime Prevention Through Environmental Design (CPTED) after the 1971 publication of C. Ray Jeffery’s book by that name. Jeffery, a criminologist at Florida State University, postulated that environmental design features influenced the probability of certain types of criminal behavior. His theories were refined and updated in the 1977 edition of his book and expanded further in his 1990 book, Criminology: An Interdisciplinary Approach. Retail security/loss prevention professionals followed these studies and began working more closely with their construction and planning departments to incorporate crime prevention design features in new store and remodel projects.

Recognition of retail security as a legitimate and distinct profession began to occur in the 1970s as books like Successful Retail Security: An Anthology by Mary Margaret Hughes (1974); Retail Security: A Management Function by Denis E. Byrne (1977); Effective Security Management by Charles A. Sennewald (1978); and Investigative Technique for the Retail Security Investigator by Joseph M. Di Domenico (1979) gained widespread attention. The “rent-a-cop” and “door-shaker” stereotypes were being replaced with images of educated professionals serving an important business function.

By 1980 some of the best retail security directors had come to realize they could mold and develop their replacements and provide high-caliber candidates to the retail industry by developing and promoting from within. Prior police, military, or federal law enforcement experience was no longer felt to be a prerequisite for a top-level retail loss prevention position. Succession planning and comprehensive training programs began to become commonplace.

The Commodore 64 “personal computer,” first introduced in 1982, and the Apple Macintosh released in 1984 completely revolutionized retail loss prevention. Within a decade, criminals were using home computers to counterfeit everything from fraudulent receipts to United States currency. Progressive loss prevention professionals found hundreds of ways to use computers to mine point of sale data, improve efficiency, and collect and retain information for later use. Time-keeping systems, return authorization systems, advance ship notices, electronic fund transfers, electronic gift cards, and many other computerized programs created new vulnerabilities for retailers. This ever-expanding use of computer technology in all aspects of the retail business soon made computer literacy a requirement among loss prevention personnel.

The conventional role of the vice president or director of security/loss prevention began to change dramatically during the 1980s and 1990s. Whereas previously the position often focused on shoplifting, internal theft, and shortage, by the end of the century it was not unusual to find the vice president not only overseeing security/loss prevention, but also supervising internal audit, safety, and/or risk management.

2000–Present

On September 11, 2001, terrorists flew planes into the World Trade Center, the Pentagon, and a Pennsylvania field, killing over 3,000 innocent victims. The retail loss prevention profession underwent a dramatic change that day. Suddenly, shoplifting, internal theft, and shortage seemed a whole lot less important than safety and disaster recovery. The few retail companies that already had a disaster recovery plan discovered that there were ways to improve on their plan, and those companies that did not have a plan began working to develop one immediately. Retail loss prevention personnel began learning all they could about terrorism, anthrax, hurricanes, bird flu, and many other potential business-interrupting possibilities. The safety of retail employees and the protection of the business was now of paramount importance.

In many companies the responsibilities of the senior loss prevention executive expanded to include human resources, information security, and/or ethics and compliance programs. A few companies began to recognize the talent and importance of multifaceted retail loss prevention executives and began promoting these individuals to senior vice presidents, executive vice presidents, and chief security officers.

The beginning of the 21st century also ushered in an unprecedented increase in the use of technology. Remote video monitoring and digital video recording became much more prevalent, and radio frequency identification (RFID) began to gain momentum. Online auctions became popular and created a new method for the disposal of stolen merchandise. Global positioning satellites were used to enhance tracking of company trucks and other vehicles. Cell phones and Blackberrys became standard equipment among retail executives. The speed of information exchange (both accurate and inaccurate) made it more important than ever that the security/loss prevention personnel communicate quickly, clearly, and accurately. Rumors, Internet bulletin board postings, and blogs having the potential to hurt a company’s reputation and thus cause loss became the concern of security/loss prevention.

In many respects the security/loss prevention profession has changed dramatically since David Corwin caught his first shoplifter. Shoplifting has become big business with organized retail theft gangs stealing millions of dollars’ worth of merchandise each year. Retailers are working more closely with local and federal law enforcement than ever before, and some retailers have implemented their own organized retail theft squads that actively seek out fences and the groups that keep them supplied. But two things haven’t changed. Sometime today a sales clerk will steal cash out of a register, and somebody else will try to walk out of a grocery store without paying for a ham hidden under his or her clothing.

“Holds”/ Hold Procedures

CAS, JHC

“Holds,” or holding merchandise for a prospective customer, is that procedure whereby a given item is removed from the selling floor to give that customer a limited period of time to make a decision to either purchase the item or the item will be returned to the selling floor and then available to other customers. Each company makes its own determination as to how long the “hold” will be allowed, but 3 days is the average time. The retailer recognizes each day the item is held off the floor in a given “hold area,” potential interest in and sale of that item are lost. Yet, to accommodate customers, the removal of the item is deemed good customer service. This is an old, time-tested practice, and it’s a management and merchandising decision of merit.

Procedurally, a “hold form” or “hold slip” is filled out by the sales associate with the customer’s name, the date the item is removed from the floor, and the date it’s due back on the floor. The sales associate affixes his or her signature, and the form is attached to the goods in question. The company relies on the selling staff to monitor the dates and, if the item is not claimed, to return it to the floor. Clearly, sloppy controls, including holding goods for extended periods of time, result to some degree in the goods going out of season or otherwise losing value due to periodic markdowns.

Loss prevention agents, in the normal course of inspecting stock and other noncustomer areas of the store, will check the dates on the hold slips and inform the manager of past-due holds needing to be returned to the floor. On the surface, this appears to be some task hardly in the purview of security-type employees. Yet, abuses of the hold system, if not monitored, tend to cost the company money. The abuse is in employees who take advantage of the system to place items on “hold” for themselves (sometimes using fictitious customers’ names) pending known or suspected upcoming markdowns of the item. This means if the item was on the floor available to the public at its current marked price, the company would realize the planned benefit/profit of its sale, but if sold at a markdown price, less the employee discount, the profit is lost.

Hotlines: The Modern Employee Hotline: Incident Report Management From A to Z

Eugene F. Ferraro and Lindsey M. Lee

Rocked by corporate scandal, the turn of the century brought about significant changes for the modern American workplace and the culture of corporate America, not the least of which was the passage of the Sarbanes-Oxley Act in 2002. Many years earlier, legislators and the courts recognized the need for a manner by which organizational criminals could be held legally accountable for their misconduct in a structured and standardized way. The result was the development of the Federal Sentencing Guidelines in 1991. Both mandates require organizations to implement mechanisms by which to receive reports of employee misconduct. Sarbanes-Oxley took the requirement a step further, however, requiring organizations to put in place an anonymous method by which to receive reports of financially related misconduct or concerns. (1) Perhaps the most widely chosen and cost-effective compliance option in any case is the implementation of an anonymous employee hotline.

Traditional employee hotlines presume to offer complete anonymity to the reporting employee; however, many times the hotline is directed to an individual or group of individuals within the organization’s human resources department. Under such circumstances, employees are often fearful that they cannot truly remain anonymous (should they wish to do so) due to caller identification technology and the possibility that their voice may be recognized. Hotlines of this nature are further plagued by additional restrictions inherent in the hotline’s structure. For example, reports can typically be received in only one language, usually English. Therefore, employees who speak little to no English may be discouraged from reporting misconduct of which they are aware, which is particularly problematic for U.S.-based multinational organizations. Also, internal hotlines are often not available 24 hours per day, 7 days per week. Therefore, employees making reports after regular business hours are required, at best, to leave a voicemail. Organizations are then limited in their ability to continue communications with reporting employees who leave a voicemail, especially if they do not provide their name and contact information. Such limitations make proper incident investigation particularly problematic.

Documentation of reports received through a traditional employee hotline is an extremely manual process and is highly susceptible to error and misrepresentation. There is also no guarantee that reports are stored in a centralized location, potentially compromising the organization’s ability to conduct a good faith investigation. Such difficulties often preclude the communication loop from remaining intact, and individuals responsible for responding, investigating, and/or making disciplinary decisions may not be fully informed. In short, traditional internal employee hotlines are inadequate at best and potentially increase an organization’s liability exposure.

As a result of the serious pitfalls described here, many third-party vendors have developed sophisticated solutions to the challenges the traditional employee hotline poses. The most comprehensive vendors will provide not just a hotline by which employees can submit reports, but will also provide an Internet-based reporting portal as well. A third-party vendor will also typically house all incident data in a secure, centralized Internet location to which only the designated organizational users have access. The technology that vendors can provide should also include a means by which organizations can maintain ongoing communication with reporting employees, even those who choose to remain completely anonymous. Such technology ensures organizations the ability to conduct thorough investigations into reported matters. Vendors also typically provide 24/7/365 hotline staffing in multiple languages to ensure all employees have equal opportunity and ability to report their knowledge of workplace misconduct. The experienced vendor will also have the ability to provide the organization with instantaneous notification of and access to all reported matters, allowing the organization to respond in a timely and efficient manner, as the law requires.

The implementation of a third-party anonymous incident reporting system provides many additional benefits to the savvy employer. Organizations with an anonymous system in place find that employees are much more likely to report concerns, given that the fear of retaliation or reprisal is often diminished when the possibility of identification decreases. (2) In this way, such systems serve as early detection mechanisms for employers; they are often notified of fraudulent activity and other costly employee misconduct as it is “brewing” rather than after it has escalated beyond a reasonably manageable point. (3) The establishment of a sophisticated hotline solution further communicates to employees that the organization cares about them and their safety, furthering loyalty and decreasing costs associated with employee turnover. Employers who invest in their most valuable asset—their employees—reap the benefits associated with doing so: increased productivity, decreased turnover, and a more stable and profitable organization overall. The cost of a third-party anonymous incident reporting system is minimal in comparison to other annual business expenses (such as toilet paper in many cases!), and the rewards gained often pay for the system itself after only a short time of use.

Next Steps

The employee hotline, functioning as the report receipt mechanism, however, is only part of the overall solution. The legal mandates described previously also require organizations to effectively investigate, document, and retain all records related to the initial employee report. Effective incident report management should not be viewed from a “one size fits all” perspective but rather requires the commitment of multiple organizational decision makers and the development and implementation of a structured management process. Furthermore, the implementation of any employee reporting mechanism must fit into the overall objectives and mission of the organization and be appropriately communicated to employees as part of a comprehensive ethics and compliance program.

Prior to implementation of any hotline solution, the appropriate organizational representatives should conduct an analysis of their present situation. How do employees bring concerns forward? Is there a way to do it anonymously yet maintain ongoing communication for the purpose of proper investigation? Who is responsible for investigating reports of employee misconduct? How is incident report management documented, and where is it stored? Is the existing documentation process efficient, and are records readily located by the appropriate individuals? What are the company policies governing standards of conduct? Are the policies up-to-date? How does an employee hotline solution fit into the organization’s overall objectives and corporate governance program? Answering questions like these will help identify the strengths and opportunities in the organization’s program and highlight the areas needing improvement. Communications to employees can then be targeted to those specific areas of opportunity.

Perhaps most importantly, all relevant organizational parties must be well informed of the implementation plan and take responsibility for whatever aspects directly impact them or their department. Without whole-organization commitment to the solution and the corporate processes and procedures put in place, a hotline solution, in any form, is destined to fail. At best, the system will fail to live up to its potential in terms of making the workplace safer and more productive—typically one of the foremost objectives in the implementation of such a reporting mechanism. Designating and enlisting the cooperation of all those responsible for reviewing, investigating, and responding to the incidents reported are critical to the organization’s ability to limit its liability exposure should employee misconduct, fraudulent activity, or unsafe work conditions be uncovered.

Another critical activity impacting the success of an employee hotline solution relies on the effectiveness of its communication to those on whom it has the greatest impact—the employees. It probably goes without saying that the hotline will only rarely, if ever, be utilized if employees are not made aware that it exists and how to use it. Further, failure to communicate the purpose of the hotline to the employee base will often lead to the organization being inundated with frivolous or routine complaints that are more appropriately resolved through other reporting channels, such as directly through human resources. The poorly communicated hotline will find itself used for purposes of resolving payroll problems, scheduling complaints, and office temperature control—all of which impact employee morale but also are more efficiently handled directly by the responsible department. Anonymous hotlines, typically, should be reserved for more serious and potentially costly and safety-compromising issues such as substance abuse problems, embezzlement schemes, and theft activities.

Communication of the employee hotline is typically most successful when it is rolled out in conjunction with company policy reminders as well as reminders regarding existing communication and reporting channels, such as “open door” policies. An anonymous hotline should never serve to replace existing reporting avenues; rather, it should serve to augment a culture of openness, response, and resolution in which employees have multiple ways to bring workplace concerns forward. Communication, further, should come in multiple forms to ensure the entire employee base is reached. Such methods can include a companywide email announcement, an article in the company newsletter, a company-issued memo or letter, posters placed in high-traffic areas, updates to the employee handbook or policy manual, or an announcement posted to the company intranet.

It will then be the responsibility of those designated within the organization to review each employee incident report generated through the hotline. If the communication campaign was successful, the organization is likely to see an overall increase in incident reports (in comparison to those received prior to the implementation of the hotline), but a good percentage of those reports will be of a relatively serious nature, necessitating the appropriate organizational response. The astute and prudent organization will recognize the benefits of this increase in employee incident reports, namely, that they have an opportunity to uncover potentially costly employee misconduct and avoid the liability exposure resulting when such behavior (e.g., sexual harassment, substance abuse) is allowed to continue. Sophisticated employee hotlines, in conjunction with a robust and targeted employee communication campaign, serve to provide employers with a keyhole view of their organization that may, perhaps, be otherwise unavailable.

Organizations should respond to reported incidents in a manner consistent with their existing company policies and past practices. A complete and thorough investigation is often warranted and requires commitment of the necessary resources to that end. Again, in the interests of minimizing the organization’s potential exposure, such an investigation should proceed according to existing protocols. Also, recognizing circumstances and incidents which may be beyond the expertise of those charged with the investigation of particular matters is a critical step in the process of reviewing incidents. Requesting consultative and/or investigative assistance, both internally and externally, may be the best approach if it appears a problem may be widespread or particularly egregious.

If the organization has chosen to contract its employee hotline services with a third-party vendor, the organization will often find that documenting all investigatory measures will be much more streamlined, and all relevant organizational parties can easily be kept up-to-date regarding all developments. Many vendors offer a robust case management system within the software or web-based database they provide. Such a system often has the capability to house all activities related to a particular incident report in a secure, centralized Internet-based location, which all appropriate organizational managers can access when necessary. Furthermore, this type of tool drastically reduces the amount of paperwork associated with any given investigation. As organizations expand both nationally and internationally, having the ability to make records available to all appropriate individuals, no matter their location, is critical to the successful companywide resolution of identified problems.

Final Thoughts

The implementation of an anonymous employee hotline makes good business sense for a variety of reasons, not the least of which is compliance with federal mandates. However, an employee hotline can further provide organizations with insight into the organization which may be otherwise unavailable to those charged with ensuring a safe and productive workplace is provided for all employees. Such insight can prove invaluable to the savvy employer with a desire for and commitment to principled corporate governance. Outsourcing employee hotline services can provide the organization an added layer of benefit, potentially increasing the likelihood that employees will feel a greater sense of comfort and confidence in bringing their concerns forward. The organization can go a long way in engendering employee confidence by responding to reported matters in a timely and efficient manner according to existing company protocols. Premier hotline solutions greatly assist organizations in doing so.

If the hotline is properly communicated to employees, organizations have an opportunity to reinforce existing reporting channels as well as remind employees of key company policies governing workplace conduct and employee responsibilities. Providing employees another method of communication to the organization helps them recognize that the organization does care about them and their well-being in the workplace. The organization committed to resolving problems, especially those posing a safety risk to employees, will reap the benefits of a healthy workplace: increased job satisfaction among employees, increased physical and psychological health of employees, lower levels of stress in the workplace, decreased rates of on-the-job accidents, decreased tardiness and absenteeism, etc. (4) The lists of benefits goes on and on with the end result being the same: increased productivity and profitability for the organization, securing the organization for the long term.

Reference

(1) Sarbanes-Oxley Act of 2002. Available: http://fl1.findlaw.com/news.findlaw.com/cnn/docs/gwbush/sarbanesoxley072302.pdf.

(2) Near J.P., Miceli M.P. Whistle-blowing: Myth and reality. Journal of Management. 1996;22:507–527.

(3) The American Institute of Certified Public Accountants. Fraud hotlines: Early warning systems. The Practicing CPA. Retrieved December 9, 2005, from www.aicpa.org/pubs/tpcpa/nov2003/fraud.htm, 2003, November.

(4) Kelloway E.K., Day A.L. Building healthy workplaces: What we know so far. Canadian Journal of Behavioural Science. 2005;37:223–235.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.224.38.99