proudly supported by - queensland police service · proudly supported by. 2 part a: ... a recurring...

44
Course Manual and Business Security Checklist Proudly supported by

Upload: lethuan

Post on 26-Aug-2018

229 views

Category:

Documents


0 download

TRANSCRIPT

Course Manual and Business Security Checklist

Proudly supported by

1

Welcome to BizSafeBizSafe is a crime prevention initiative of the Queensland Police Service (QPS), and is proudly supported by NRMA Business Insurance and the Department of Communities.

Crime against businesses impacts on the entire community. The costs are often not just financial: crime also has emotional and psychological effects.

The good news is that everyone can play a part in reducing and preventing crime. BizSafe aims to give you information about the sorts of crime that commonly affect businesses in your community. You’ll leave with some ideas about how you can reduce the risks of your business becoming a victim of crime. You will also learn about strategies that prevent and reduce crime, and that can improve safety for you, your staff and your customers.

This booklet is organised into two main sections: Part A, an overview of the types of business crime, it’s causes and how you can reduce the risks of these crimes occurring, and Part B, a comprehensive Business Security Assessment Checklist, which you can apply to your own business.

Queensland Police has a District Crime Prevention Coordinator (DCPC) in every police district around the State. Your local DCPC can help you assess the security of your business and can assist you with information about preventing crime. Contact your local DCPC if you have any questions about the information presented in the BizSafe program.

Acknowledgments

The program is based on the Western Australia Business Police Academy Program and implemented by New South Wales (NSW) Police. This program is a close adaptation of the NSW Police version. We would like to thank NSW Police for their assistance and permission to adapt their program for use in Queensland.

The QPS project team of Constable Megan Williams, the QPS Bizsafe State Project Manager, Ms Emily Coutts, the QPS Bizsafe Research Analyst and Senior Sergeant Cameron Hall QPS Bizsafe Project Director of the Crime Prevention Unit, Policing Advancement Branch, Queensland Police prepared the information and resources provided in the Bizsafe workshops in 2004 wish to acknowledge the expertise and assistance of the following contributors:

• Inspector Graham McIntosh• Acting Inspector Garry Henkel• Senior Sergeant Cameron Hall• Sergeant Greg Gray• Constable Megan Williams• Constable Geoff Robins• Ms Emily Coutts• Acting Senior Sergeant Andrew Ross• Acting Senior Sergeant Tanya Graham• Peta–Ann Wood• Sergeant Steve Keeling• Ms Peta Mackay• Mr Paul Friedman• Mr Dan Robertson• Ms Sue Convey• Mr Richard Dunkerley• Mr Corey Yeung

The Queensland Police Service also thanks NRMA Business Insurance and the Department of Communities for their support of BizSafe.

Proudly supported by

2

Part A: Business Crime types, causes and treatmentsUnderstanding business crimeThis BizSafe workshop will provide you with an understanding of the nature of crime, the conditions that make crime possible and the extent of crime against businesses in your local area.

You will also learn some basic skills in assessing the risks to your business and in determining suitable treatment options to reduce those risks.

BizSafe will encourage you to critically review the security measures in your business and to identify opportunities to improve your security.

Please remember that the information you receive is intended to raise your awareness of crime, not your fear of crime.

What causes business crime?

For crime to occur, three conditions must be in place:• Someone who wants to commit a crime• A victim (business, person or home) that does not present too many challenges• No-one to intervene and prevent the crime from occurring.

To combat crime our options are: (1) Reduce the number of motivated offenders (2) Make crime more difficult to commit (3) Anticipate new types of crime and find ways to stop them occurring

The business community can help reduce the risks of crime being committed against their businesses by making crime more difficult to commit.

• Find out what the real problems are in your area• Identify and assess risks to your business• Identify the actions you can take to reduce these risks

What sorts of crime affect business?

In a survey conducted by the Australian Institute of Criminology, 49% of all businesses surveyed reported that they had experienced crime in the previous year. The average financial cost of crime against a business was nearly $5,000 (from Financial and Psychological Costs of Crime for Small Retail Businesses, Australian Institute of Criminology, 2002).

Crimes against businesses include:• Fraud• Burglary• Shoplifting and stealing• Robbery• Arson• Malicious damage (including graffiti, smashed windows etc)

In your business community

The District Crime Prevention Coordinator can provide information about which crimes against business are most prevalent in your area. These crimes are those that occur most frequently against businesses in your area, or businesses in the same industry as you.

Sometimes, the perception does not match reality. It is important to have a good awareness of what crime is really occurring in your area.

3

Identifying and assessing your business’s risksStep 1: Identify your risks.

In your business, what can go wrong:• Assault of staff (self or employees)• Theft of property from the business• Vandalism to premises or equipment• Fraud• Arson• Embezzlement of cash• Abuse of privilege by staff.

Step 2: Analyse your risks.

For each risk you have identified, ask yourself three questions:

How can it happen?

External sources of risk

• Criminals• Competitors• Customers• Suppliers/providers.

Internal sources of risk

• Employees.

How likely is it to occur?

• Cheque fraud, credit card fraud • Employee theft or embezzlement accounts for $1.5 billion per annum• 70% of all fraud related losses perpetrated by current or former employees.

You can determine how likely something is to occur by applying the following table to your business’s risks.

Determining likelihood

Level Descriptor Description

A Recurring The incident will, or has, occurred more than once

B Certain The incident will, or has occurred

C Probable The incident is likely to, or likely to have occurred

D Possible The incident is unlikely to, or unlikely to have occurred

E Rare The incident may occur only under exceptional circumstances

Table 1: Measure of Likelihood (adapted from AS/NZS 4360)

Example: You have identified that shoplifting is a risk you face. You have had several incidents of shoplifting in your business. According to the table, this is a RECURRING incident (it will, or has occurred more than once). Shoplifting is therefore assigned a Level A rating.

You have also identified that ram raids are a risk to your business. Your business has never been targeted for a ram raid before, but other “like” businesses in your area have. Using the table above, you might rate the risk of a ram raid as PROBABLE. Ram raid is therefore assigned a Level C rating.

4

What are the likely consequences?

This is what will be the result if the event happens. Your list might include the value of:• Stolen, embezzled or discounted stock• Loss of cash or securities• Need for equipment replacement• Loss of company funds or critical information • Increased down time due to business disruption• Loss or damaged business reputation and custom• Increased insurance premiums.

Once you have a list of consequences that could occur, you can determine how significant that consequence is for your business using the following table.

Determining consequences

1. Insignificant 2. Minor 3. Moderate 4. Major 5. Catastrophic

No Injuries Injuries – first Injuries – medical Injuries – extensive Death aid required treatment required medical treatment required

Financial Financial loss Financial loss Financial loss Financial loss losses of less between $1,000 between $10,000 between $100,000 of more than than $1,000 and $10,000 and $100,000 and $1,000,000 $1,000,000

No Minor Moderate Major Catastrophic embarrassment embarrassment embarrassment embarrassment embarrassment or to reputation to reputation to reputation to reputation harm to reputation

Table 2: Measure of Consequence (adapted from AS/NZS 4360)

The above table is a general guide only. Your business may find a loss of $10,000 to be major. You may need to think about the dollar costs that would prove catastrophic, major, moderate, minor or insignificant to your business and adjust the table above appropriately.

Example: You are determining the possible consequences of a ram raid against your business. If it were to occur, thieves could obtain significant amounts of stock. You would also have to close down the business for up to two weeks. There would be costs associated with replacing the stock, repairing the damage caused and payroll – to name a few. You may assign a consequence rating of MAJOR to this risk. While there may not be any injuries to people, the financial consequences are major for your business.

5

Step 3: Risk analysis and ratings

Once you have determined the likelihood and the consequence, you can come up with an overall risk rating for the incident using the following table.

Risk analysis

Likelihood level Determining consequences

1. Insignificant 2. Minor 3. Moderate 4. Major 5. Catastrophic

A Recurring Low Medium High Critical Critical

B Certain Very Low Low Medium High Critical

C Probable Very Low Low Medium Medium High

D Possible Very Low Very Low Low Low Medium

E Rare Very Low Very Low Very Low Very Low Low

Table 3: Risk Analysis Matrix – Level of Risk (adapted from AS/NZS 4360)

Example: You are now ready to determine a risk rating for ram raids against your business. You know that a ram raid occurrence is PROBABLE (likelihood) and you know that the consequence is MAJOR (consequence). Using the above table, you will come up with an overall risk rating of MEDIUM for this sort of incident.

Step 4: Risk management

When you know the risks faced by your business you can begin to develop risk management strategies. Your strategies may include changes to your policies and procedures, or introducing some protective measures for your goods/stock (such as dye tags).

There are also a number of strategies that can reduce the opportunities for crime to be committed against your business. Situational crime prevention strategies aim to make it harder for criminals to commit their crimes against your business. If you make it harder, or reduce the rewards criminals can obtain, you reduce the risk of crime.

Step 5: Rank risks and assign priorities

When developing a plan for reducing the risks to your business, you will need to consider:• Your most urgent needs: those risks that scored CRITICAL or HIGH should be addressed first• What is most feasible: some of your options may not be feasible because they are costly or because they are not

permitted by local councils etc.• Your timeframes: if there is an immediate risk to your business you should seek to address it as soon as possible.

6

Reducing the risks – situational crime preventionThe goal is to make it harder for criminals to commit crime against your business, and make it less rewarding for them to do so.

(1) Know your business’ security strengths and weaknesses – physical and procedural. (2) Conduct a Business Security Assessment. (3) Identify your “treatment options” – these are the things you can do to make it harder for an offender to commit

a crime against your business. (4) Implement changes to improve your business’s security.

Be realistic about what you do well, what you could do better and your ability/capacity to make changes. Have these things in mind when you undertake the Business Security Assessment.

The Business Security Assessment form walks you through the process of conducting a security assessment for your business.

If you need assistance, your local District Crime Prevention Coordinator can help you conduct the assessment free of charge.

If you answer ‘No’ to any question in the Business Security Assessment, consider implementing some of the treatment options provided in the booklet. Remember:• The options and advice offered are general. The District Crime Prevention Coordinator can provide specific advice

if you ask them to visit your business• It’s important that you take steps to reduce risks: merely knowing about the risks does not reduce them• Not all treatment options are expensive. Some are low cost or free• Identify those changes you can make immediately and those that are longer term changes.

Report all crime against your business. If there is danger to life, or a crime is in progress, call 000.

If you know of someone who is committing crime in your area, report it to Crime Stoppers on 1800 333 000 (you can remain anonymous if you like).

7

Shoplifting and stealingShoplifting – which is stealing – accounts for up to 40% of reported shop losses annually. Shoplifters come from all walks of life and from all socio-economic backgrounds, but generally they fall into one of two groups – amateurs or professionals

Amateur shoplifters usually steal on impulse. Juveniles (usually teenagers) who steal to impress friends form a big part of this group.

Professional shoplifters are more likely to work in pairs or groups, although they will work alone. They often steal to obtain a false refund for the items and have often “cased out” a store before stealing. Some are highly skilled thieves.

Preventing shoplifting

You can prevent shoplifting by taking some simple steps in the following areas:• Store layout and design• Staff education and training• Business policy and procedure

Store layout and design

• Make the layout of your store as open as possible, with good visibility between aisles or areas• Keep shelves tidy and goods neatly stacked• Consider using surveillance mirrors so that staff can monitor awkward or hidden areas• Consider CCTV and have it connected to a VCR• If appropriate, consider having in-store security guards• Where possible, lock expensive and easily portable goods in cabinets• Stack goods tightly on your shelves, so that removal takes longer• Limit the entry and exit points to your store• Clearly display signs that state that police will be called if anyone is caught stealing regardless of the excuse• Clearly display signs explaining your bag-checking policy• Limit access to keys for locked cabinets

Staff education and training

Ensure your staff members understand:• The store policy on both bag-checks and stealing• What you – or store management – expect of them under these policies• The procedures you want them to follow if they suspect someone has stolen an item• That the value of goods stolen can never outweigh the value of the health and wellbeing of employees

Encourage staff to:• Greet customers as they enter the store• Ask “Can I help you?”• Regularly tidy shelves• Pay attention to nervous or jumpy customers, people looking around in surveillance mirrors, groups, and customers

who try to distract staff

10

Business policy and procedure

It may be your store’s policy to conduct bag inspections. However, you do not have a legal right to search a person’s bag or property. The person DOES NOT commit an offence by refusing to have their bag searched.

Clearly display signs that explain your store’s policy, e.g. “All bags must be presented for inspection before leaving the store.”

As mentioned above, ensure that your staff members are clear about your store’s policies and procedures for dealing with suspected shoplifting incidents.

Dealing with shopliftersAbout Arrests

While it may be lawful to arrest a person in certain situations it is recommended good practice to have that person assist voluntarily.

Cooperation is a better strategy than the legal ramifications associated with an arrest. It is suggested that independent legal advice be sought about making arrests in this regard.

If the situation causes danger to you, your staff or customers, do not approach the offender. The value of goods can never exceed the value of your life.

If you decide to detain a suspected shoplifter:• Explain who you are (e.g. the manager, store security guard) and show identification.• Tell the person why they are being spoken to and ask them to accompany you back into the store.• You do not have a legal right to use force unless the person has been arrested (force in this sense means a degree

of force that any reasonable person would use if faced with the same situation).• It is recommended that you do not physically touch the suspected shop lifter• Advise the person that the police will be called.• Ask the person to surrender any property which does not rightfully belong to them.• You are not entitled to conduct searches of the person.

11

Reporting incidents to the police

Report all incidents to the police. The police cannot help you counter shoplifting problems if they don’t know you are experiencing them.

If a crime is in progress, or there is risk to life or well-being, call 000. If it is not an emergency, report the incident to your local police.

Provide accurate information to the police about the circumstances surrounding the offence.

You will need to give police as many of the following details as you can including:• Your name• Your location and the nearest cross street• Your contact telephone number• Type of incident (e.g. shoplifter)• The full name and D.O.B of the offender (if you have it)• The offender’s current behaviour

Police will determine whether there is sufficient evidence to support charges. They may ask you to give a statement, which describes what you saw, heard, said, did, or touched.

The legal process

If police decide there is sufficient evidence, Police may charge the person. Once charged, the person is referred to as the defendant.

The defendant can plead guilty to the offence or not guilty. If they plead not guilty, you may be required to give evidence at a hearing in the local court.

If the defendant is a juvenile (aged 10 to 17 years) the Juvenile Justice Act specifies how they can be dealt with. Options open to police for dealing with juveniles are:• Warning• Caution• Youth Conference• Charge.

10

FraudThe term fraud encompasses a wide variety of corrupt, deceptive, dishonest or unethical behaviours. Fraud can be internal (by staff) or external (by customers or suppliers).

Internal Fraud – Fraud by staffInternal fraud can include employees and staff:• Stealing cash or stock• Stealing from other employees• Not charging friends, family or accomplices• Allowing accomplices to use bad credit• Supplying receipts for refunds• Allowing friends to steal• Participating in delivery scams.

Sometimes, employees will rationalise the fraud by:• Trivialising the offence:

– They can afford it– No harm done– Everyone does it

• Claiming unfair treatment as a justification:– Missing out on promotion– Feeling remuneration is inadequate– Unfair treatment compared to colleagues– Disciplinary action– Resentment at lack of appreciation.

Internal fraud: The risks

• Stolen, embezzled or “discounted” stock• Loss of cash or securities• Loss of company funds or critical information • Loss or damaged business reputation and custom

Internal fraud: How it can happen

Employees who:• Work long hours• Return to work after hours• Are unusually or overly inquisitive about the company’s payment system• Resist taking annual or sick leave• Spend excessive time in toilets, outside etc• Avoid having others assist or relieve them• Resign or leave suddenly• Have a large number of voids• Have a low number of transactions

Also, look out for registers that are consistently over or under, undelivered goods, and two or more transactions for single credit card in a row.

11

Internal fraud: Reducing the risksStep 1: Develop clear policies that cover:

• Serving or processing transactions for family and friends• Personal purchases/transactions• Personal use of equipment such as telephones, lap-top computers, video cameras etc• Training and education for staff• Authorised delegations.

Step 2: Have clear transaction procedures, including:

• A pre-determined float• Petty cash limits• Daily banking – by two people if possible• Dual signatures on cheques• Provision of receipts and acknowledgment of transactions• Limited access to safe by staff• Keeping registers closed unless in use• Segregating purchasing, receipting and paying.

Step 3: Provide strong, consistent supervision of staff:

• Have supervisors monitor delegations• Supervise employee compliance with procedures• Regularly review cash shortages and report instances where an explanation is unsatisfactory• Supervisors should check receipts and documentation• Challenge suspicious transactions.

Step 4: Regularly review and monitor your registers of assets and your transactions:

• Record all transactions• Conduct regular stock takes• Keep a register of your tools, equipment and assets• Wherever possible, engrave your business property with an identifying number.

Step 5: Establish strong audit procedures:

• Reconcile bank deposits with register totals regularly• Acquit all claims and allowances to avoid duplicate or multiple payments• Audit IT systems regularly• Conduct regular and random audits of all processes• Randomly check wages and allowances for overpayments.

Step 6: Maintain security of information:

• Limit access to confidential information• Enforce the use of employee ID• Regularly change passwords for computers, alarms etc• Review and investigate security violations• Cancel access promptly when people transfer or leave.

12

Step 7: Establish strong human resource management procedures:

• Undertake pre-employment screening• Implement equitable remuneration system• Provide job descriptions that segregate duties• Provide adequate training and education• Communicate policies, expectation of compliance, audit regime and consequences of non-compliance

External Fraud – Fraud by customersCredit cards and EFTPOS fraud: The risks

• Fraudulent monetary transaction on credit and debit cards• Used at bank branches to obtain cash advances• Used at merchant establishments in payment for goods and/or services• At automatic teller machines to obtain cash advances• Theft from the authorised holder• Fraudulent manipulation of EFTPOS terminal by offenders

Credit cards and EFTPOS fraud: How it can happen

• Use of counterfeit credit cards• Use of stolen/lost credit cards. Cards are often stolen from

– The glove boxes of motor vehicles– Unattended clothing and handbags in business premises– Within the postal system– Cardholders letter boxes

• Lack of compliance with checking procedures by staff• Insufficient security of EFTPOS terminal at point of sale

Credit cards and EFTPOS fraud: Reducing the risks

You and your staff should always check:• The card’s hologram is authentic (look for quality, correctness, three dimensional features, change of colour)• The commencement and expiry dates are current• The card is signed and that the signature has not been written over• The printing and embossing is clean and even (check for changes to the panel white tape, erasures, smudges)• The cardholder name and EFTPOS machine receipt details match• There is no visible damage to the card• The signature on the sales strip matches that on the actual card• The signature panel features reversed italic type

Other points:• Don’t return the card to the purchaser before the sale has been processed and the signature confirmed• Contact the bankcard authorisation centre to obtain authorisation for credit card transactions• Ask for additional photo identification• Check that the refund limit for each EFTPOS terminal is set at an appropriate limit• Ensure sufficient physical security of EFTPOS terminal

13

Cheque fraud: The risks

• Drawing of uncleared funds from banks, ATMs, EFTPOS• Fraudulent representation of stolen cheques• Fraudulent cashing of cheques• Cheques not met on presentation

Cheque fraud: How it can happen

• Inadequate cheque clearance procedures• Counterfeit bank cheques• Cheques obtained from companies by persons posing as repairmen, contractors, etc. and new cheque books

ordered from the bank• Insufficient funds in account for presentation of cheque

Cheque fraud: Reducing the risks

Make sure that:• Cheques payable to a third party are properly endorsed by the payee• Cheque endorsement is in order• There are no changes on the cheque• The cheque has the correct date• Figures match the amount in writing• You watch the customer write the cheque• You ask for additional ID and check the signature• You contact bank for special clearance of cheque

External Fraud – Fraud by suppliersFraud by suppliers: The risks

• Wasteful expenditure• Short supply of goods• Supply of inferior goods• Payment for services and goods not supplied• Purchase of goods for private use• Kickbacks for biased selection of suppliers• Payments to ‘bogus’ vendors for false claims• Cheques written for cash only• Cheques not properly authorised• Cost of tyres, repairs, fuel received and paid for by company funds

14

Fraud by suppliers: How it can happen

• Poor supervisory review• Systems controls either inadequate or bypassed• Exercise of delegation not monitored• Inadequate review of claims for payment• Inadequate segregation of duties• Close relationship between employees and suppliers resulting in bias• Inducements from suppliers (e.g. gifts)• Improper delegation of authority to commit, incur and approve expenditure• No supervisory/independent check over processing receipting and payment for expenditure• Lack of documentation/information supporting expenditure• Payments made on photocopies or facsimiles of original invoice

Fraud by suppliers: Reducing the risks

• This can be achieved by: Promptly forward acknowledgment for receipt of goods and services• Conduct quarterly and random audits of petty cash purchases• Checking at least 10% of daily direct payments against appropriate documentation• Regular follow-up must be undertaken of all non-receipted items• Appropriate training of employees performing accounts payable and stores functions

to ensure compliance with policies• Segregating purchasing, receipting and paying functions (i.e. so no one person does all three duties)• Closely checking all invoices• Ensuring account has not been previously paid• Providing guidelines for staff relationships with contractors, suppliers and consultants

15

Personal safety for the business communityUnder Workplace Health and Safety legislation, everyone has the right to work in a safe environment, where the risk to their health and safety is minimised. As an employer, you have obligations to your staff to provide them with a safe working environment. It is not always possible to be completely protected from all harm. However we can take reasonable steps to reducing the risks to:• Physical health• Emotional well-being• Psychological health• Financial situation

In your business

Some of the simple steps you can undertake to assist in providing a safe working environment include: • Fit good quality security deadlocks or other security locks to your main exit doors• Keep doors and windows locked if you are working late• If you are in your premises ‘after hours’, make sure you leave the key in the inside of the deadlock• Advise someone when you are leaving• If it is dark, or there are few people around, have someone watch you leave or escort you to your car• Pre-program important numbers (such as the local police) into your telephone• If you use key tags, do not write the name and address of your business on the tags• Ensure you have a working smoke alarm in your business• Ensure you have a first-aid kit that is properly stocked• Make sure staff are familiar with emergency procedures and what they can do if they feel unsafe in the workplace• Have clear policies on critical issues such as dealing with shoplifters, handling aggressive customers and cash handling

Visitors and customers

Some simple steps you could take to make your business a safer place when dealing with visitors and customers include: • Maintenance and repair people will carry identification. Ask to see their ID before admitting them to your business.

If you are in any doubt, ring their company to check their authenticity• Be wary of giving money to charity collectors. Check ID. If in doubt, but you want to donate, offer to send a cheque

to the charity• Train your staff on how to deal with aggressive customers• Try and have more than one employee deal with aggressive customers• If possible, identify consistently aggressive customers and identify them to all staff• Restrict access to employee areas• Serve customers in order• Promote customer flow and encourage orderly queuing• Install seating for customers if delays are expected• If you receive telephone calls from strangers asking unusual questions about your business, do not provide details• If you receive nuisance calls, hang up. If the calls persist, contact your telephone company

16

Out and about

When you leave your place of business to run errands such as the banking or dropping off the mail remember:• Do not leave notes on doors or windows advising people that you are absent for a short period. Secure the

business and display a ‘closed’ sign• When you leave your business, advise someone of your planned movements and estimated return time• Carry a mobile telephone with pre-programmed numbers for emergency calls• If you carry a purse or a bag, keep it close to your body• Do not leave your mobile telephone, purse or bag unattended, even for a moment• If someone does try to take your bag or purse, DO NOT RESIST THEM. Remember, your personal safety is more

important than money or property• If possible, have a licensed security firm transport your cash to the bank• If you must do the banking yourself, do not wear uniform or company ID when you go• Do not carry cash in a bank bag• When going to the bank, vary your route. Try not to go at the same time each day• Do not display cash in public

Threats

In case your business is threatened: • Keep a copy of a Bomb Threat Checklist under your phone. If your business does not already have one, there is a

sample in the back of this booklet. You may photocopy this sample for use in your business• If possible, fill it out while you are on the phone to the caller making the threat• Ensure that staff understand the form’s purpose and how to fill it out• Report threats to the police immediately

Suspicious items

What to look out for:• Excessive or stained wrapping• No return address• Incorrect titles• Misspelt common words• Excessive postage• Excessive weight• Unexpected or unsolicited mail• Markings such as ‘Confidential, Private’

Do not touch, tilt or tamper with the item. Contact police immediately on 000. Explain what it is that makes the package suspicious. Follow the instructions given to you by police.

17

Preventing armed robberyBanks and other financial institutions were traditionally the most vulnerable to armed robbery. However, as they have increased their security they have reduced their risks. Armed robbers are increasingly targeting smaller businesses such as:• Service stations• Chemists• Liquor stores• Fast food outlets• Video rental shops• Newsagents• Hotels• Licensed clubs• TAB outlets• Real estate agents• Corner stores• Supermarkets

The prospect of being the victim of an armed robbery can be frightening. However, there are many steps you can take to reduce the risk of becoming a victim of armed robbery. There are also some key things to remember if you ever should face this situation.

Reducing the risk

It is possible to reduce the risk of armed robbery by:• Being alert for strangers outside your business who might be observing the business and your activities• Being alert for individuals you do not know asking questions about how you run your business• Being alert for customers whose actions are out of character (e.g. people spending time in a retail outlet without

buying anything)• Being aware of people in your business whose dress is out of character (e.g. winter clothes on a hot day or

sunglasses at night)?• Not providing information about your business to anyone you have concerns about• Maintaining clear visibility of your business from outside and clear lines of sight inside your business• Locating the cashier or console operator in the most visible location• Using counters that are wide and high enough to restrict physical contact between staff and offenders• Designating safe areas and escape routes for you and your staff• Installing security devices such as mirrors or CCTV (Close Circuit Television) to monitor entry to your business and

movement within it• Using mirrors positioned so people cannot use them to monitor activities in your business• Using CCTV, connected to a VCR• Installing a time delay operated safe with a drop chute, and regularly empty your cash drawer into the safe• Installing an alarm system, particularly one with a duress system• Ensuring that back and side doors and windows are kept secure• Locating the point of sale as far as possible from entrance and exits• If possible, have a secure area for handling and counting cash. ALWAYS keep this area secure and out of sight of

the general public and access ways• Providing good lighting in potential concealment spots outside and inside your business• Installing height markers on the inside of your doors, as this will help you judge the height of offenders• Making extensive use of signage and stickers, both inside and outside your business to promote pro-active

security measures such as:– Minimal cash kept on premises– Staff cannot open safe. Time delay locks in use– Premises under constant video surveillance

18

• Avoiding opening and closing your business alone if you are not operating 24 hours a day• Encouraging electronic methods of payment, such as credit cards, rather than cash• Minimising cash levels. Handle, count and move cash around your business as little and as discreetly as possible.• Avoiding using bank bags• Ideally, use professional security companies to collect cash and move it to banks. If you do need to transfer money

to the bank yourself:– Do so at irregular times and vary the route– Try to use more than one person– Don’t wear company uniform when going to the bank

• Closely control the custody, issue and duplication of keys• Never publicly discussing your security arrangements, even with friends, and instruct your staff to do the same• Ensuring that your staff members (especially new starters) are aware of security procedures and know what to do

in the event of a robbery

If the business is being robbed

In the event of a robbery, it is vital that you try to stay calm. Most importantly, do EXACTLY as the offender says and nothing more. Your personal safety and that of your employees and customers is far more important than any money or stock you might lose.Remember to:• Speak only when spoken to. Talking to the offender will only prolong the incident• Remember that the offender will be nervous and tense• Explain in advance any sudden movements you are going to make (e.g. ‘I am going to open the cash register now”)• Do not activate alarm systems unless it is safe to do so• Avoid eye contact with the offender• Try and remember as much as you can about the offender and how he/she behaves

After the robbery

As soon as it is safe to do so:• Call 000 and ask for the Police

– Provide your name, telephone number and exact location of the robbery– Describe the offenders, any motor vehicles used and their direction of travel– Describe the weapons used

• If necessary, provide first aid and call for medical assistance. Call 000 if you require an ambulance• Activate the alarm system• If practical, close the business and try and preserve the crime scene. If possible rope off the area where the

offenders have walked. Do not touch anything• DO NOT clean up the scene. Forensic evidence such as fingerprints may not be visible to the naked eye• If necessary, relieve affected staff of their duties and separate staff so that they can maintain an independent

recollection of events• Ask any non-employee witnesses to remain until police arrive. If they insist on leaving, try to obtain their name and

contact details. Police may want to interview them• The media may turn up at your business. You have a right to privacy and you are not compelled to talk to the

media. If your company has a media division, contact them for help• Some time later, think about the layout of your business and the procedures you follow. How could you have made

it more difficult for the offender?

19

Preventing burglaryTarget hardening aims to make it more difficult or less appealing for an offender to break into your premises.

You can make it more difficult or less attractive through:• Surveillance – natural or technical• Access control – restricting access and making it more difficult• Territorial reinforcement – establishing and maintaining your ownership of the space around your business

Business ID

To assist emergency services and visitors locating your business:

• The street/shop number must be displayed at the front of your business• The street number should be a minimum of 120 mm high. Local government laws may specify further considerations

in this respect

Warnings

• Warning signs should be strategically posted around the perimeter of your property, particularly near entry/exit points to warn intruders of security measures:

Warning: these premises are under constant surveillance

Warning: trespassers will be prosecuted

Warning: no large amounts of money kept on premises

Warning: monitored alarm in operation

Landscaping

Landscaping should be maintained regularly with trees and shrubs trimmed away from doors and windows. This limits concealment and increases natural surveillance from your property. Other obstacles and rubbish should be removed from property boundaries, footpaths, driveways, car parks and buildings.

Fences and gates

The boundary of the property should be clearly defined by boundary fences preferably of open style construction. This allows greater visibility to and from the street, restricts unauthorised access, and clearly defines your territorial space. Gates should be secured with quality hardened or alloy chains and padlocks.

Lighting

External night lighting will enable police, security guards or passing people to monitor activities within the premises. A limited amount of internal lighting should also be left on at night. Also consider installing sensor lighting which is cost effective as it only activates when movement is detected within the zone.

Building construction

The building floor, walls and ceiling should be of solid construction where possible, with clear lines of sight between the street, neighbouring properties and your business maintained. Limit the number of entry and exit points to restrict unauthorised entry to your premises.

Power and switchboards

Restrict unauthorised access and tampering with the power supply by housing the switch board within a metal cabinet. It should then be secured with a lock approved by the local electricity authority.

20

Doors, windows and glass

Doors to the premises should be of solid construction, fitted with quality deadlocks (Australian Standards Lock Sets). External windows and frames should be of solid construction, with key operated locks fitted to windows. Glass within doors and windows can be re-enforced by:

– Reinforcing the existing glass with a shatter resistant film– Replacing the existing glass with laminated glass– Installing quality metal security grilles or shutters

Property marking

Record descriptions, models and serial numbers of your business’s property and keep this record in a safe place. Property should be marked (engraved) and property which can not be marked should be photographed.

Safes

Safes provide additional security for money, documents and other valuables and must comply with the Australian Standards Anchor the safe to the floor to prevent easy removal. Also consider a time delay style safe incorporating a drop-chute to enable staff to deposit money without having to access the safe.

Alarm systems

To enhance the physical security of your premises a monitored intruder alarm system can be installed. This system should be designed and installed to comply with Australian Standards. Also consider only using companies licensed under the Queensland Security Providers Act. To further enhance the security provided by an alarm system, the controls should be concealed to restrict tampering and remote on/off switches and movement detection devices should be strategically located around the premises.

Surveillance equipment

When installing surveillance equipment: • Cameras should be strategically installed inside or outside the premises to monitor these areas• Cameras should monitor the cashier area and high cost merchandise or areas with poor supervision• Television monitors should enable staff to monitor activities on the camera• Recording equipment should also be used• VCR equipment should be secured in a locked metal cabinet away from the main console area to restrict tampering

or theft of equipment• At least 10 video tapes should be used to cycle through a seven day period (three tapes being used to replace

damaged tapes or those used for evidence purposes)• These video tapes also need to be replaced every three months with new tapes to ensure maximum

quality reproduction

21

If you are a victim of crimeWhile BizSafe focuses on taking positive steps to reduce the risk of crime, it is unfortunately not always possible to prevent crime from occurring.

If you are a victim of crime, the police who attend the scene will provide you with immediate support and assistance. They may then refer you on to specialist support services that can help you deal with your experience.

You may have a range of reactions to becoming a victim of crime and not all of them will make sense. You may feel tense or nervous, have difficulty sleeping, lose your appetite, feel sad or angry, have difficulty making decisions or feel a need to keep busy all the time. All of these reactions – and any others you experience – are normal.

If you are a victim of crime these Queensland agencies may be able to help you:• Criminal Compensation Unit (Legal Aid) 1300 651 188• Dept of Communities Victim Support Line 1300 139 703• Women’s Infolink 1800 177 577• Bravehearts 5591 1244• Women’s Sexual Assault Crisis Line 1800 010 120• Lifeline 13 11 14• Queensland Homicide Victims Support Group 1800 774 744

22

How to report crimeYou can report crime or get police assistance in three ways.

1. For all emergencies – 24 hours – call 000

000 can connect you to Police, Fire or Ambulance, depending on your situation. Only dial this number if you need to report a crime in progress or it is a life-threatening situation. When you hear the 000 operator:• Ask for Police• Give your name, address and telephone number• Tell the operator what is happening• Give the exact location of the incident including city, suburb and the nearest cross street• Give descriptions of any people, motor vehicles or weapons involved• Do not hang up until the operator is finished with you

2. Your local police station

You can call or visit your local police station at any time to report a crime. If you telephone them, you will be asked to provide:• Your name, address, telephone number• Details of what is happening• The exact location of the incident• Descriptions of any people, motor vehicles or weapons involved

3. Crime Stoppers – 1800 333 000

If you have information about a crime or criminal behaviour, then call Crime Stoppers on this toll free number. Crime Stoppers uses information that members of the public provide to solve crimes and catch offenders.

You are guaranteed anonymity and confidentiality. We do not need your name, but we do need your information. If your information leads to an arrest, you could receive a reward.

23

Bomb/Extortion threat checklist

Place this card under your telephone. Use delaying tactics don’t hang up.

When is the bomb going to explode?

Where did you put the bomb?

When did you put it there?

What does the bomb look like?

What kind of bomb is it?

What will make the bomb explode?

Did you place the bomb?

Why did you place the bomb?

What is your name?

Where are you?

What is your address?

Report Call immediately Name of Person to report to

Exact Wording of threat

Remember to keep calm–Don’t hang up

Analysis of caller’s voice Accent (specify) Any impediment? (specify) Speech (loud, soft, etc) Diction (clear, muffled, etc) Was the caller familiar with the area? Did you recognise the voice? If so, who do you think it was? Manner (calm, emotional, etc)

Threatening language Well spoken Incoherent Abusive Did you tape the threat? (insert details) Spontaneous, read from script or a tape recording?

Background noises Street noises House noise Aircraft Voices Local call Music Long distance Machinery STD Other

Other Sex of caller M F Estimated age Caller’s number

Call Date Time Duration of call Received by (print name) Position/Section Call taker’s number

24

Welcome to the BizSafe Business Security AssessmentThis Business Security Assessment is designed to help business owners, operators and staff to assess the security of their business. It covers potential areas of vulnerability, and provides suggestions for adapting your security to reduce the risk of crime against your business.

You can complete the Business Security Assessment yourself, or you can ask your current Insurance provider or an NRMA representative or local QLD District Crime Prevention Coordinator (DCPC) to undertake a Business Security Assessment of your business.

Complete each question in the Business Security Assessment. If you answer ‘No’ to any of the questions, review the suggested treatment options in the back of this booklet.

When you have completed the assessment, we suggest you photocopy the booklet and send a copy of the Assessment to your local DCPC. The DCPC will then contact you to discuss the outcomes of the Assessment and answer any questions you may have about improving security in your business.

QLD Police Service has a vital interest in ensuring the safety of members of the community and their property. By using recommendations contained within this document, any person who does so acknowledges that:

• It is not possible to make areas evaluated by QLD Police Service officers absolutely safe for the community and their property

• Recommendations are based upon information provided to, and observations made by QLD Police Service Officers at the time the document was prepared

• The evaluation/report is a confidential document and is for use by the person/organisation referred to on page four of this document

• The contents of this evaluation/report are not to be copied or circulated otherwise than for the purposes of the person/organisation referred to at the start of the Assessment.

QLD Police Service hopes that by using the recommendations contained within this document, criminal activity will be reduced and the safety of members of the community and their property will be increased. However, it does not guarantee that all risks have been identified, or that the area evaluated will be free from criminal activity if its recommendations are followed.

25

No. Question Yes No N/A Comments Yes No

Business identification

1 Is the street number clearly visible to the street?

2 Is the business name clearly displayed?

3 Is the business identifiable from the rear?

Warning signs

4 Are there appropriate warning signs posted around the perimeter of the property?

5 Are there appropriate internal signs to guide visitors?

6 Are the signs clearly visible?

Landscaping

7 Is landscaping around the business free from potential hiding places?

8 Is landscaping regularly maintained?

9 Is the business free from landscaping that would provide offenders access to areas of the business?

Fences and gates

10 Are there boundary fences erected around the business?

11 Are gates fitted?

12 Are boundary fences and gates around the property able to restrict access?

13 Are the boundary fences in good condition?

Bizsafe Security Assessment FormPolice Use

26

No. Question Yes No N/A Comments Yes No

Fences and gates continued

14 Are the gates in good condition?

15 Are the fences and gates of appropriate material?

Security lighting

16 Is there security lighting installed around the business?

17 Is the security lighting operating?

18 Is the business well lit?

19 Are entry and exits well lit?

20 Do you leave limited lighting inside the business on at night?

21 Is lighting positioned in a way to reduce opportunities for vandalism?

Building design

22 Is the building of solid enough construction to restrict unauthorised access?

23 Is the building secured to reduce the risk of vehicle ram raid?

24 Is there adequate protection against entry via the roof?

25 Are manholes secured?

26 Is it possible for Bio agents to beintroduced into Storage Tanks?

27 Are air conditioning vents secured?

28 Are customers prevented fromaccessing the area from which the air conditioning is operated?

29 Is the height of the counter appropriate for the business?

30 Can the counter be seen from outside the business?

27

No. Question Yes No N/A Comments Yes No

31 Are customers preventedfrom accessing the area behind the counters?

32 Are customers preventedfrom accessing restricted areas?

33 Is shelving arranged to provide goodsightlines within the store?

Powerboard and letterbox

34 Is the powerboard enclosed in a cabinet or room?

35 Is the cabinet or room fitted with a lock set approved by the local authority?

36 Is this cabinet or room kept locked?

37 Is the letterbox fitted with an appropriate lock set?

Doors

38 Are the business’s external doors of solid construction?

39 Are these doors fitted with quality lock sets to restrict access?

40 Are entry/exit points clearly identified?

41 Are all fire exit doors self-closing?

42 Are at-risk doors locked at all times?

43 Are external door hinges mounted so they cannot be removed?

44 Can visitors be seen before access is allowed?

Windows

45 Are external windows to the business of good construction?

46 Are these windows fitted with quality lock sets?

28

No. Question Yes No N/A Comments Yes No

Windows continued

47 Are windows free of promotional materials?

48 Are skylights secured?

Property identification

49 Have you recorded make, model and serial numbers of your business items (such as mobile phones, computers etc)?

50 Is all valuable property permanently marked with a corporate identifier?

51 Is your property photographed for identification?

52 Do you have insurance?

53 Are your property list and photographs kept somewhere safe?

Telephones

54 Are your telephones pre-programmed with emergency contact numbers?

55 Can the telephone line be unlawfully tampered with?

Safes

56 Do you have a safe installed?

57 Is the safe securely anchored?

58 Is the safe in an appropriate position?

59 Does the safe have a drop-chute facility?

60 Is the safe kept locked?

29

No. Question Yes No N/A Comments Yes No

Key and valuables control

61 Do you maintain a key register?

62 Are all spare keys secured?

63 Are keys to the safe adequately secured?

64 Have you supplied police with a current emergency contact list for their keyholders index?

65 Do staff have a location to secure their personal items?

66 Does this location have restricted access?

Cash and mail handling

67 Do you have established cash-handling procedures?

68 Do you have a lockable cash drawer?

69 Do you have irregular banking procedures?

70 Is a company used to transport cash?

71 Is money counted out of public view?

72 Do you have establishedmail–handling procedures?

73 Have you staff been trained incorrect mailing procedures?

74 Does your business havea mail register?

Alarm systems

75 Is an intruder alarm system installed?

76 Is the intruder alarm monitored?

30

No. Question Yes No N/A Comments Yes No

Alarm systems

77 Does the alarm have a duress facility?

78 Does the system work?

79 Do you check the system on a regular basis?

80 Does the alarm system need upgrading?

81 Are staff provided with their ownindividual access code?

82 Are access codes changed whenemployees cease employment?

Surveillance equipment

83 Do you have surveillance equipment installed?

84 Is footage recorded on video?

85 Are cameras monitored?

86 Does the business have a customer TV monitor?

87 Does the camera system need upgrading?

88 Are cameras positioned so theysurveil all aspects of the business?

89 Are tapes changed regularly?

90 Are tapes kept for a minimum of seven days?

91 Does your camera plan coverall necessary places that you need monitored?

Workplace health and safety

92 Is management aware of its obligations under the QLD Workplace Health and Safety laws?

31

No. Question Yes No N/A Comments Yes No

Workplace health and safety continued

83 Are staff members aware of their obligations and rights under the QLD WH&S laws?

94 Have staff been provided with information and training about WH&S?

95 If you have been a victim of a robbery, have you submitted the relevant paperwork to WorkCover?

96 Have you contacted QFRSin relation to the storage of your hazardous materials?

97 Are HAZCHEM signsproperly displayed?

98 Do you have evacuationprocedures in place?

99 Have your staff been trainedin evacuation procedures?

Victim support

100 Do you have a Victim Support Policy established?

101 Have victims of crime been referred to support services?

Carparks

102 Is there a secure carpark?

103 Is the carpark covered bysecurity serveillance?

104 Is there restricted accessto the carpark?

105 Is there adequate lightingin the carpark?

3332

No. Question Yes No N/A Comments Yes No

General

106 Do you have security services on-site?

107 Do security services patrol your site?

108 Do your staff know the contact details for the nearest: hospital/ police station/ fire station/ doctor?

109 Are sensitive documents appropriately destroyed?

110 Are computer passwords changed regularly?

111 Have your telephonists/receptionstaff been your trained in bomb awareness?

112 Are garbage bins suitably located?

Staff

113 Have background and referee checks been completed on all staff members?

114 Do you have a record of all past and present employees?

115 Have you staff been provided withsecurity awareness training?

116 Have your staff been providedwith regular training?

33

Suggested treatmentsIf you answered ‘No’ to any of the questions in the Business Security Assessment, we suggest you consider making some changes. These changes will help reduce the risk to you, your business and your staff.

If you need advice or assistance, please contact your District Crime Prevention Coordinator (DCPC).

Business identification

• The business name and street number should be displayed at the front and rear of your business.

Warning signs

• Effective signage and directions will provide guidance to visitors in locating reception areas and keep visitors away from restricted areas

• Signs can also assist in controlling activities and movements throughout the premises and grounds• Warning signs should be strategically posted around the perimeter of your property, particularly near entry/exit

points to warn intruders of security measures. Examples of such signage:

Warning: these premises are under constant surveillance

Warning: trespassers will be prosecuted

Warning: no large amounts of money kept on premises

Warning: monitored alarm in operation

Landscaping

• Landscaping should be maintained regularly with trees and shrubs trimmed away from doors and windows• Keeping trees and shrubs trimmed can reduce concealment opportunities and increase visibility when travelling to

and from the business• Remove obstacles and rubbish from property boundaries, footpaths, driveways, car parks and buildings to restrict

concealment and prevent offenders scaling your building

Fences and gates

• The boundary of the property should be clearly defined by boundary fences preferably of an open-style construction. This allows greater visibility to and from the street, restricts unauthorised access, and clearly defines your territorial space

• Gates should be secured with quality chains or padlocks• All gates should be kept shut when not in use• Fences and gates should be regularly maintained to assist with the protection of your property• Information regarding the different types of locks available can be obtained by contacting Australian Standards

Security lighting

• Install security lighting in and around your business, particularly over entry/exit points to create an even distribution of light with no glare e.g. sensor lighting, floodlighting

• Consider installing sensor lighting which is cost effective as it only activates when movement is detected within the zone

• Leave a limited amount of internal lighting on at night to enable patrolling police, security guards or passing people to monitor activities within the business

Building design

• The floors, walls and ceilings should be of solid construction• The roof should be reinforced with mesh below the roofing to restrict unauthorised entry• Maintain clear lines of sight between the street, neighbouring properties and buildings• Bollards or barriers can be installed to reduce the opportunity for ram-raid attacks• Limit the number of entry/exit points to restrict unauthorised access• Counters should be designed to reduce the opportunity for assault of staff and unauthorised access to behind-

counter areas. Consider adjustments to the width, height and location of the counter• Shelving within the business should be limited in height, or transparent, to increase natural visibility within the

business and to the outside of the business• Shelves should be positioned so that staff behind the counter have good lines of sight

Power board and letterbox

• The power board should be housed within a cupboard or metal cabinet and secured with an approved electricity authority lock to restrict unauthorised tampering with the power supply

• The letterbox should be secured with quality lock sets to restrict unlawful access to your mail

Doors

• External doors and frames should be of solid construction and comply with the Building Code of Australia (Fire Regulations)

• A single cylinder lock set is key-operated on the external side with either a turn snib or handle on the inside to enable occupants to escape in an emergency

Windows

• Windows and frames should be of solid construction• Windows should be fitted with key-operated window lock sets to restrict unauthorised access• Glass can also be reinforced to restrict unauthorised access by:

– Applying shatter-resistant film– Replacing the existing glass with laminated glass– Installing metal security grilles or shutters

• Windows should not be covered with promotional materials so that surveillance opportunities to and from the business are not hindered.

Property identification

• Record descriptions, model information and serial numbers of all business property for easy identification• Back up your property lists from your computer in case the computer is lost or stolen• Engrave your property with a traceable number for identification.• When you sell your property, place a neat line through your engraving to show that it is no longer valid. It is also a

good idea to give the person a receipt to prove the sale of the item• Photograph and record the details of unique items to aid in their recovery if stolen• Ensure that you have adequate insurance for the replacement of property• Your property list, photographs and other documentation should be adequately secured e.g. in a safe or safety

deposit box.

Telephones

• Telephones should be pre-programmed with the emergency number ‘000’ and your local police number for quick reference by occupants

• Telephone lines or boxes should be secured to avoid unlawful tampering

34

35

Safes

• A safe designed and installed to the Australian Standards can provide additional security for money and other valuables

• Anchor the safe to the floor to prevent easy removal• The safe should have a drop-chute facility so that staff can deposit money without having to open it• Consider a time delay lock, which means that the safe can only be opened at a particular time (or times) each day• The safe should be locked at all times when not in use to restrict access• The safe should be installed in an area where access is limited and away from public view

Key and valuables control

• The control of keys and valuables is very important and should be closely monitored by management• A key register should be used to list those staff members who have been issued with keys, the type of keys

issued and the areas each staff member has access to• The control of valuables is just as important and a register should also be used to record which staff members

have been issued with valuable items such as laptop computers, mobile phones, etc• Registers should be detailed and regularly maintained and audited• In addition, all valuables should be clearly marked with the business details where possible and the serial

numbers and other details should be recorded and stored in a safe place• To reduce the likelihood of theft and or damage, try to limit the number of keys and valuables left unsecured or in

plain sight of potential intruders

Cash and mail-handling procedures

• Establish clear cash-handling procedures within your business to reduce opportunities for crime• Try to reduce the amount of cash your business deals with• Limit the amount of money carried in the cash drawer at any time. Use as small a float as is practical for your business• Lock cash drawers when not in use, and clear money from the cash drawer on a regular basis e.g. to a safe• Avoid counting cash in view of the public• Use a minimum of two staff, or security services, when personally transferring money to or from a bank• Consider using a reputable security company to do your banking especially when transferring large amounts of money• Where possible, limit cash amounts by installing electronic payment systems such as EFTPOS• Don’t use conspicuous bank-bags when transferring money• Avoid wearing uniform or identification when moving money to or from the bank• Establish consistent mail handling procedures• Establish a mail register and ensure your staff are trained in how to use it correctly.

Alarm Systems

• To enhance the security of your business, you can install a monitored intruder alarm system• If you have a system installed within your business, make sure you use it• Ensure the system has been designed and installed to the Australian Standard (Domestic and Commercial Alarm Systems)• Thieves have been known to cut telephone lines to prevent alarms being reported to the security monitoring

company. We suggest you consider a supplementary system such as Global Satellite Mobile (GSM) or Radio Frequency (RF) systems to transmit an alarm signal

• Consider incorporating a duress facility into the system to enable staff to activate the system manually in the event of an emergency, such as a robbery; note:

• Duress devices should only be used when it is safe to do so• The system should be tested on a regular basis to ensure that it is operating effectively• Staff should be trained in the correct use of the system• Consider only using companies licensed under the QLD Security Providers Act• Alarm system controls should be concealed to restrict tampering• Remote on/off switches should be strategically located• Movement detection devices should be strategically located around the premises

Surveillance equipment

• Surveillance equipment can enhance the physical security of your business and assist in the identification of people involved in anti-social or criminal behaviour

• Cameras should be installed both within and around the business to maximise surveillance opportunities• Digital or video technology should be used to record images from the cameras• Cameras should monitor the cashier’s area, high cost merchandise or areas with poor natural supervision• TV monitors should enable staff to monitor activities on the camera• Recording equipment should be installed away from the counter area to avoid tampering• Videotapes need to be replaced quarterly to maintain quality images• Installed surveillance equipment should be maintained in working order and regularly tested• If a surveillance system is installed, use it• Staff should be trained in the correct use of the system• Any surveillance system should be manufactured and installed by a qualified and reputable company and regularly

function tested• Ensure that staff are provided with their own access code• Ensure that access codes are changed when employers leave the business.

Workplace health and safety• An employer must ensure the health, safety and welfare at work of all the employees of the employer• That duty extends (without limitation) to the following: (a) ensuring that any premises controlled by the employer where the employees work (and the means of access to

or exit from the premises) are safe and without risk to health (b) ensuring that any plant or substance provided for use by the employees at work is safe and without risks to

health when properly used (c) ensuring that systems of work and the working environment of the employees are safe and without risks to health (d) providing such information, instruction, training and supervision as may be necessary to ensure the employee’s

health and safety at work (e) providing adequate facilities for the welfare of the employees at work

• An employer m ust also ensure that people (other than the employees of the employer) are not exposed to risks to their health or safety arising from the conduct of the employer’s undertaking while they are at the employer’s place of work

• Ensure you have contacted QFRS and discussed the storage of hazardous materials in your business

• Ensure that you have evaluation procedures in place

• Ensure that all staff have been trained in evacuation procedures.

Victim support

If you or your staff have:• Experienced a situation where violence or the threat of violence has occurred• Received an injury as a result of a violent situation;• Suffered a loss or adverse effects as a result of experiencing violence;Contact your local police for assistance or referral to additional support agencies for the provision of services you may require such as:

• Counselling (telephone or face to face)• Information about other support services• Information about legal processes• Information about eligibility for, and applying for, victims compensation• Resolving complaints about government services

36

37

General

• Some businesses or locations may require on-site security to enhance physical security• Security services may be used to randomly patrol your business, particularly in an isolated location• Sensitive materials, including confidential records, should be appropriately destroyed or secured, e.g.

confidential records should be shredded or disposed of through security destruction services• Computer passwords should be changed regularly to restrict access and avoid misuse by past and present staff• Emergency evacuation plans should be implemented and maintained by your business to assist staff and

emergency services in the event of an emergency. This plan should be prominently displayed• Staff should be suitably trained in evacuation procedures

Conclusion

The Queensland Police Service hopes that by using the recommendations contained within this document, criminal activity will be reduced and the safety of members of the community and their property will be increased.

The Queensland Police Service would like to thank you for your interest in improving the security of your business and in preventing crime in our community.

Should you need any further information on the subjects covered by the Business Security Assessment, we encourage you to contact your local Police District Crime Prevention Coordinator.

38

Notes

39

Notes

40

Notes

GOO9813 05/04