Clothing Security-4 WC blog 15
Clothing Security Tags-4
Checkpoint tags -5
Clothing Security Tags Can Fit Delicates And Denims
Clothing security can be a tough proposition at times. Some fabrics are too delicate for pin style hard tags. Some pieces of clothing need protection but the item is too difficult to try on if the right clothing security tags are not chosen. I am always interested to see what different retailers are doing to protect merchandise, it’s just the loss prevention geek I am. My poor wife gets stuck having to answer some of my questions about women’s clothing and security. Recently my wife and I were in a store shopping and I noticed that a lot of Checkpoint tags were being used on merchandise. As we passed the women’s clothing department, a fixture of pricey brassieres was on the aisle. I noticed that despite the price point there was no security device anywhere to be found. I stopped my wife and pointed this out to her. After a not so subtle sigh (her way of telling me to stop playing security) she told me that tags tend to make it hard for women to fit brassieres on properly. “Oh, I guess that makes sense”, I thought to myself. I think my wife’s thought was, “That’s a man for you”.
When we finished our shopping trip I began investigating some more, because it doesn’t make sense that with all the technology that exists for clothing security something doesn’t exist for any item that would be difficult to try on. Let’s face it, we guys tend to try it on, if it reasonably fits, that’s good enough for us. And to be fair, we don’t have the same concerns as women when it comes to fitting clothes. So I began thinking about other items that might cause the same consternation for women, bathing suit tops, and work-out clothes such as sports bras. What I found is there are Checkpoint tags that can meet the requirements. Clothing security for delicate items, such as silk materials and hard to fit items including swim tops and brassieres is possible. Checkpoint’s Apparel clip HT@S device is a perfect solution for retailers because it is a pin-free tag that is applied at the source. There are no pins involved so no holes puncture the garment. As the name implies, merchandise is tagged at the source so there are no store hours spent tagging. These hard tags, though small, work with the store’s existing EAS alarm antennas.
For more durable clothing items, such as jeans and expensive jackets Checkpoint also has a Gen 3 Hard Tag that does include a pin. These clothing security tags will also work with an EAS system and will provide a visual deterrent to thieves. These tags can be placed on merchandise at the store, or can also be applied at the source, saving store payroll dollars. Checkpoint tags are easy to take off so customers aren’t delayed in line while the cashier removes the devices.
If a store uses the source tagging option, merchandise tagging is consistent. One of the problems I see in store tagging programs often involves inconsistency, either tag placement or some items not tagged at all. Source tagging will ensure clothing security tags are placed in the same location on merchandise, making it a more visible deterrent to thieves and it also makes it easier for cashiers to not have to hunt for security devices. I have watched cashiers spend time hunting for security tags, causing delays in the checkout line. I have also watched the distraction caused to customers when Checkpoint tags are missed and the alarm is set off as the customer attempts to leave the store.
Clothing security tags are available for almost all clothing items on the market today. From delicate silk materials such as men’s ties to expensive leather motorcycle jackets, Checkpoint tags are available for all clothing lines. Implementing a source tagging program, stores can save payroll dollars and ensure consistency and accuracy at the point of sale. Check out what clothing security can do to enhance your profits and prevent theft.
For more information about Clothing Security contact us or call 1.770.426.0547
Clothing security can be a tough proposition at times. Some fabrics are too delicate for pin style hard tags. Some pieces of clothing need protection but the item is too difficult to try on if the right clothing security tags are not chosen. I am always interested to see what different retailers are doing to protect merchandise, it’s just the loss prevention geek I am. My poor wife gets stuck having to answer some of my questions about women’s clothing and security. Recently my wife and I were in a store shopping and I noticed that a lot of Checkpoint tags were being used on merchandise. As we passed the women’s clothing department, a fixture of pricey brassieres was on the aisle. I noticed that despite the price point there was no security device anywhere to be found. I stopped my wife and pointed this out to her. After a not so subtle sigh (her way of telling me to stop playing security) she told me that tags tend to make it hard for women to fit brassieres on properly. “Oh, I guess that makes sense”, I thought to myself. I think my wife’s thought was, “That’s a man for you”.
When we finished our shopping trip I began investigating some more, because it doesn’t make sense that with all the technology that exists for clothing security something doesn’t exist for any item that would be difficult to try on. Let’s face it, we guys tend to try it on, if it reasonably fits, that’s good enough for us. And to be fair, we don’t have the same concerns as women when it comes to fitting clothes. So I began thinking about other items that might cause the same concern for women, bathing suit tops, and work-out clothes such as sports bras. What I found is there are Checkpoint tags that can meet the requirements. Clothing security for delicate items, such as silk materials and hard to fit items including swim tops and brassieres is possible. Checkpoint’s Apparel clip HT@S device is a perfect solution for retailers because it is a pin-free tag that is applied at the source. There are no pins involved so no holes puncture the garment. As the name implies, merchandise is tagged at the source so there are no store hours spent tagging. These hard tags, though small, work with the store’s existing EAS alarm antennas.
For more durable clothing items, such as jeans and expensive jackets Checkpoint also has a Gen 3 Hard Tag that does include a pin. These clothing security tags will also work with an EAS system and will provide a visual deterrent to thieves. These tags can be placed on merchandise at the store, or can also be applied at the source, saving store payroll dollars. Checkpoint tags are easy to take off so customers aren’t delayed in line while the cashier removes the devices.
If a store uses the source tagging option, merchandise tagging is consistent. One of the problems I see in store tagging programs often involves inconsistency, either tag placement or some items not tagged at all. Source tagging will ensure clothing security tags are placed in the same location on merchandise, making it a more visible deterrent to thieves and it also makes it easier for cashiers to not have to hunt for security devices. I have watched cashiers spend time hunting for security tags, causing delays in the checkout line. I have also watched the distraction caused to customers when Checkpoint tags are missed and the alarm is set off as the customer attempts to leave the store.
Clothing security tags are available for almost all clothing items on the market today. From delicate silk materials such as men’s ties to expensive leather motorcycle jackets, Checkpoint tags are available for all clothing lines. Implementing a source tagging program, stores can save payroll dollars and ensure consistency and accuracy at the point of sale. Check out what clothing security can do to enhance your profits and prevent theft.
For more information about Clothing Security contact us or call 1.770.426.0547
Alpha Shark Tags-3 , Wardrobing-3 , Return Fraud-2
Is Return Fraud Just Cost Of Doing Business?
When your company realizes that profits are down, they generally add two things to their plan: raise prices and lower expenses. What if the profits are being lost to refunds and return fraud? If those returns include giving back full price for used and now damaged merchandise, then the answer could be simple. Your company may need to lower some expenses, but let me tell you why investing in Alpha Shark Tags should be considered.
There is a growing number of dishonest people that are engaging in the practice of wardrobing and they are killing the profit line for clothing retailers. That means they buy an item they cannot actually afford, wear it to whatever event they had planned, and then return the item for a full refund. Many times these garments are rendered unsellable when they are returned. Since there is such great competition in the clothing store business, lenient return policies are rampant. Companies believe it is simply the cost of doing business in order to keep their honest clientele loyal. Managers do not want to have that extremely awkward conversation with someone trying to return a dress that has obvious sweat stains around the armpits. If someone brings back scuffed up leather shoes, or an expensive handbag that has lipstick stains inside it, many stores will just look the other way and give that person back their entire purchase price! The customer says it has a defect, or is uncomfortable, and the manager doesn’t want them to make a scene.
The truth is there needs to be a balance between loss prevention and excellent customer service. When someone buys something with the intention of bringing it back, it should be considered a form of shoplifting. Your company could try to add a restocking fee, but that practice is widely criticized. Another great solution to the problem of wardrobing is to attach Alpha Shark Tags to clothing that is primarily targeted by these problem shoppers. These bright red clips are designed to attach right to the garment, in a highly visible area, such as the front hemline or front pocket. They are meant to be removed by the customer at home. They do not interfere with the customer’s freedom to try on the item, so they can be attached at the time or purchase or can be put on before displaying on the sales floor. They can also be used to secure a copy of the store’s return policy to the actual item. The idea is that once a customer uses a pair of household scissors to cut off the Alpha Shark Tag, that item is no longer eligible to be returned for a full refund.
Many store managers and owners will continue to balk at adding this policy, calling it retailer mistrust. They say that there are simple cases of buyer’s remorse. To that I say the customer should have changed their mind before they spilled red wine on the party dress, before they got makeup all over the neckline of the fancy blouse, and long before they got crumbs and grease spots in the pricey handbag. When they bring back used merchandise, the retailer loses the garment or accessory plus the profit. That is no way to do business and stay afloat. The cost of doing business will include the occasional return of a truly defective item, but is should not include dealing with wardrobing. Business can take a bite out of return fraud with Alpha Shark Tags.
For more information on Alpha Shark Tags, contact us or call 1.770.426.0547
When your company realizes that profits are down, they generally add two things to their plan: raise prices and lower expenses. What if the profits are being lost to refunds and return fraud? If those returns include giving back full price for used and now damaged merchandise, then the answer could be simple. Your company may need to lower some expenses, but let me tell you why investing in Alpha Shark Tags should be considered.
There are a growing number of dishonest people that are engaging in the practice of wardrobing and they are killing the profit line for clothing retailers. That means they buy an item they cannot actually afford, wear it to whatever event they had planned, and then return the item for a full refund. Many times these garments are rendered unsellable when they are returned. Since there is such great competition in the clothing store business, lenient return policies are rampant. Companies believe it is simply the cost of doing business in order to keep their honest clientele loyal. Managers do not want to have that extremely awkward conversation with someone trying to return a dress that has obvious sweat stains around the armpits. If someone brings back scuffed up leather shoes, or an expensive handbag that has lipstick stains inside it, many stores will just look the other way and give that person back their entire purchase price! The customer says it has a defect, or is uncomfortable, and the manager doesn’t want them to make a scene.
The truth is there needs to be a balance between loss prevention and excellent customer service. When someone buys something with the intention of bringing it back, it should be considered a form of shoplifting. Your company could try to add a restocking fee, but that practice is widely criticized. Another great solution to the problem of wardrobing is to attach Alpha Shark Tags to clothing that is primarily targeted by these problem shoppers. These bright red clips are designed to attach right to the garment, in a highly visible area, such as the front hemline or front pocket. They are meant to be removed by the customer at home. They do not interfere with the customer’s freedom to try on the item, so they can be attached at the time or purchase or can be put on before displaying on the sales floor. They can also be used to secure a copy of the store’s return policy to the actual item. The idea is that once a customer uses a pair of household scissors to cut off the Alpha Shark Tag, that item is no longer eligible to be returned for a full refund.
Many store managers and owners will continue to balk at adding this policy, calling it retailer mistrust. They say that there are simple cases of buyer’s remorse. To that I say the customer should have changed their mind before they spilled red wine on the party dress, before they got makeup all over the neckline of the fancy blouse, and long before they got crumbs and grease spots in the pricey handbag. When they bring back used merchandise, the retailer loses the garment or accessory plus the profit. That is no way to do business and stay afloat. The cost of doing business will include the occasional return of a truly defective item, but is should not include dealing with wardrobing. Business can take a bite out of return fraud with Alpha Shark Tags.
For more information on Alpha Shark Tags, contact us or call 1.770.426.0547
CP N10-3, Alpha Thunder Tag-2, Medical Field-2 , CP Systems-2, Alpha Technology-1
Protect Your Assets With Checkpoint
As technology continues to advance for personal use at home, we have found ways to protect our property with different tools and applications. The same should go for the electronics we use at work as well. At my store, we have had hand-held scanner units since I started with them almost fifteen years ago. There was a short period over that stint that we had to watch those hand-held units like hawks because they had a demand on the black market. If they were left unattended on the counter or in a cart, they were as good as gone. Then they would show up on some online auction site within hours. We have Checkpoint Systems installed in our stores and we had to start protecting them with Checkpoint labels, so if anyone attempted to conceal and steal them, the alarm would sound. Now we have all been issued new digital tablets at store level. It is now my biggest fear to have to call my boss and tell him mine has been liberated from the front checkout.
Many clinics and offices in the medical field have begun to change their check-in system for their patients, and they’re including these digital tablets as part of that new process. When the patient arrives, they receive a tablet at the front desk and they use it to sign in instead of the old pen and clipboard system. This allows the patient to have more control over their input and makes changing billing and address information a lot quicker and easier. It removes the issue of having to decipher the patient’s bad handwriting as well and helps eliminate mistakes. It also puts more of a security burden on the office staff, but there are a couple of simple solutions the medical field can implement to make that transition easier.
There is a pair of tools offered by Checkpoint Systems and Alpha Technology that, when working together, are an effective way to stop any theft of these expensive devices.
First, there is the Checkpoint N10. This is the detection system, and here are some of its specifics:
The pedestals are only 30.5” tall, and the system mounts directly to the wall or door frame. That compact design is what makes it perfect for a small lobby filled with patients. Despite the smaller size, it still offers the same excellent performance. It is compatible with all Checkpoint and Alpha products.
The second tool you need to work with the Checkpoint N10 is the Alpha Thunder Tag. The is what allows the patient to move freely around the lobby and anywhere they are permitted, without having to lock the tablet down to a table with some form of locking cable like banks do with their ink pens. If there is any attempt to remove or disable the Alpha Thunder Tag, it will go into self alarm mode with a 95 decibel sound. And of course, if a patient was to try to steal the digital tablet from the office, that’s when the Checkpoint N10 will come alive and sound its own alarm.
If your medical office is looking into offering this new check-in system just remember you are going to need to have a plan on how to keep them secure. Many of your employees will never let their cell phones leave their sight, but they don’t always monitor and take care of the office equipment with the same diligence. With an investment into these two devices working together for your office, you won’t have to worry about your investment into digital tablets.
For more information on Checkpoint Systems, contact us or call 1.770.426.0547
As technology continues to advance for personal use at home, we have found ways to protect our property with different tools and applications. The same should go for the electronics we use at work as well. At my store, we have had hand-held scanner units since I started with them almost fifteen years ago. There was a short period over that stint that we had to watch those hand-held units like hawks because they had a demand on the black market. If they were left unattended on the counter or in a cart, they were as good as gone. Then they would show up on some online auction site within hours. We have Checkpoint Systems installed in our stores and we had to start protecting them with Checkpoint labels, so if anyone attempted to conceal and steal them, the alarm would sound. Now we have all been issued new digital tablets at store level. It is now my biggest fear to have to call my boss and tell him mine has been liberated from the front checkout.
Many clinics and offices in the medical field have begun to change their check-in system for their patients, and they’re including these digital tablets as part of that new process. When the patient arrives, they receive a tablet at the front desk and they use it to sign in instead of the old pen and clipboard system. This allows the patient to have more control over their input and makes changing billing and address information a lot quicker and easier. It removes the issue of having to decipher the patient’s bad handwriting as well and helps eliminate mistakes. It also puts more of a security burden on the office staff, but there are a couple of simple solutions the medical field can implement to make that transition easier.
There is a pair of tools offered by Checkpoint Systems and Alpha Technology that, when working together, are an effective way to stop any theft of these expensive devices. First, there is the Checkpoint N10. This is the detection system, and here are some of its specifics: The pedestals are only 30.5” tall, and the system mounts directly to the wall or door frame. That compact design is what makes it perfect for a small lobby filled with patients. Despite the smaller size, it still offers the same excellent performance. It is compatible with all Checkpoint and Alpha products.The second tool you need to work with the Checkpoint N10 is the Alpha Thunder Tag. The is what allows the patient to move freely around the lobby and anywhere they are permitted, without having to lock the tablet down to a table with some form of locking cable like banks do with their ink pens. If there is any attempt to remove or disable the Alpha Thunder Tag, it will go into self alarm mode with a 95 decibel sound. And of course, if a patient was to try to steal the digital tablet from the office, that’s when the Checkpoint N10 will come alive and sound its own alarm.
If your medical office is looking into offering this new check-in system just remember you are going to need to have a plan on how to keep them secure. Many of your employees will never let their cell phones leave their sight, but they don’t always monitor and take care of the office equipment with the same diligence. With an investment into these two devices working together for your office, you won’t have to worry about your investment into digital tablets.
For more information on Checkpoint Systems, contact us or call 1.770.426.0547