Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Retail/Restaurants/Convenience

Employee Theft: It is Not the Cost of Doing Business!

May 21, 2014

Theft is due to bad economy or personal hardships. It is driven by bad people. It results in loss of profitability and reduced compensation. It is not the cost of doing business.  

That is according to Gene W. James, CPP, Director of Asset Protection for Jack in the Box.

In a webinar presentation titled Employee Theft: It is Not the Cost of Doing Business!, James focused on how employee theft impacts the profitability of business. James examined the causal factors of employee theft and how security professionals need to address and resolve theft in the workplace.

There are several types of theft, according to James:

  • Theft of Cash
  • Theft of Inventory
  • Theft of Product
  • Theft of Time
  • Credit Card Theft
  • Workers Compensation Theft
  • Theft from Customers
  • Theft from Fellow Employees
  • Theft of Supplies

“Small companies are particularly vulnerable as they have fewer resources,” James said. “Many see their companies as family environment so they may not get rid of bad employees. For security executives, many managers forbid to acknowledge it.”

The US Chamber of Commerce reports that $400 million is lost annually due to theft. And an Ernst & Young report says that 90% of all business acknowledge some sort of employee theft. In addition, 30% of all business failures are due to business theft, which results in loss of profitability. Theft kills profitability, James said.

James also noted that the indirect impact of employee theft can take a human toll. “Honest employees become discouraged. Employers lose good employees who don’t’ want to be around thieves. The cost of replacing one employee could result in lost profits.”

James also noted that throwing money at a theft problem does not solve it. “You should be the agent of change, but you cannot do it alone, it has to be a team effort,” he said. “You need to drive compliance and ethics into the culture and revamp policies and procedures. If you haven’t changed the culture, what makes you think there will be compliance? Also, don’t over rely on prosecution. Yes, thieves should be punished. However, rarely will the police conduct an investigation for you. Often, you may want to receive some sort of restitution. Not all cases are worth prosecuting.”

James asked the question: as security professionals, what is more important? Eliminating all theft in our organizations or maximizing the profits in our organization?” They do not always coexist,” he said. “My preference is second; our role is to maximum profits. To be recognized as a full fledge business partner, we need to proceed as business partners and not be company cops.”

James also discussed theft protection techniques, such as background techniques, which he said is the absolute cornerstone of any program, but is only as good as the information provided by the applicant. It is essential that management reviews every employment application, he said. He also mentioned conducting pre-employment Behavioral Testing and the establishment of an Interview Protocol.

Ethics & Security Awareness/Training are important as well, and training programs need to encompass new hires, he said. “You also need policies and procedures that lay out who investigates theft and how terminations are handled after you find a theft. “Inspect what you expect,” he says.

James stressed not being a “lone ranger” to mitigate theft in your enterprise. You have partners within your organization, he noted, such as

  • Human Resources
  • IT
  • Finance
  • Legal
  • Operational Partners

He also stressed implementing an ethics hotline so that people can call in and anonymously report theft.

One final trap, he warned of, is not making changes once a theft is found. “First, you need to understand what occurred, make management aware, and ensure that changes are made. Do not walk away and think getting rid of a bad apple resolved your problem. It did not. At the end of the day it is about leadership.”

KEYWORDS: retail security solutions by sector webinar

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber_enews

    Is Cybercrime Just a Cost of Doing Business?

    See More
  • cost-enews

    The High Cost of Not Doing Enough to Prevent Cyber Attacks

    See More
  • Employee Theft is Changing the Face of Retail Crime

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing