Publisher's Synopsis
In addition of white collar labor crime, non white-collar or blue labor crime also include armed robberies offer a great opportunity for injury or death, current and former employees and their friends are often involved, the most of common times for an armed robbery are during opening and closing periods. So, cash in the restaurant should be kept to a mini8mum and anyone either hourly employee or manager, none of employees will be allowed to be alone in the restaurant and employees should enter and leave utilizing the safe security system to reduce any lose in restaurant any environment. For hospitality industry, it also often occurs stolen matters, credit card stolen behavior is popular in hotels. Because some hotel accept clients to choose to use credit card to pay hotel rent commonly. Another concerning trend, not only attentions to the hospitality industry, when once used to be primarily a guest services issue has now grow into a big financial problem. With the adoption of the new payment card industry security standards, hotel will not being compliance with these security standards risk processing fee surcharges that can amount to thousands of dollars in additional expenses. In order to reduce the occurrence of theft of credit card data, I shall recommend methods, such as precious guest folios with credit card information should be placed in secure offsite storage, 30 days after an event. Never put guest credit card information on internal documents; swiping the credit card will transfer the required data to the property management system, displaying the last four digits of the credit card number is adequate for all routine transactions. One of the main reasons for a chargeback is fraud, it is important to monitor chargebacks and the reason codes, and implement procedures to reduce the number of chargebacks occurring, store all guest credit card data in one secure location. This site be monitored be closed circuit television system and have an electronic lack to provide an audit trail, use fax programs that can only be assessed via secure password protected computer; restrict access to guest data to a limited number of trusted employers will help to reduce employee theft of this information.So, I feel how to create a positive work environment which is needed. This encourages employees to follow the best interests of the business. Fair employment practice, written job description, clear organizational structure, comprehensive policies and procedures, span lines of communication between management and employees and positive employee recognition will help to reduce the likelihood of internal fraud and theft. For pharmaceutical industry, it also has insider theft occurrence. I recommend to use video surveillance to implement an expanded two-person rule, recording attention to security, and establishing incident databases and experience to supervise staffs behaviors. All situations involving protection against potential insider threats involve some combination of managing the potential insiders and managing the items to be protected which might to thing, that might be stolen, areas of a facility that might be targeted, people who might be stolen, damaged or misused. Most high security organizations perform some form of background check before giving people access to items, areas or information to be protected or information about how these are secured. The thoroughness of such checks varies widely, ranging from a simple criminal background check ( or less) to a full investigation, in which the person's career, health to detect notable changes in behavior or circumstances that may bear on their inappropriate behaviors noticed by environments. For example, insiders must undergo new background every few years to maintain their clearance and staff are encouraged to report any changes in their own circumstances.