Checkpoint Systems EVOLVE ELECTRONIC ARTICLE SURVEILLANCE DETECTION SYSTEM User Manual CheckpointUsersGuide
Checkpoint Systems Inc ELECTRONIC ARTICLE SURVEILLANCE DETECTION SYSTEM CheckpointUsersGuide
USERS GUIDE
Checkpoint Systems, Inc. 101 Wolf Drive, P.O. Box 188 Thorofare, New Jersey 08086 800 257 5540 Toll Free 856 848 1800 Phone 856 848 0937 Fax www.checkpointsystems.com RF-EAS System User’s Guide INSIDE FRONT INSIDE BACK Important Information To Our Users in North America FCC Regulatory Compliance Statement Checkpoint Systems, Inc. offers certain Electronic Article Surveillance (EAS) products that have been FCC certified or verified to 47 CFR Part 15, Subparts B/C and/or 47 CFR Part 18. Appropriately, one of the following labels will apply to the approval: NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense. - OR This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. - OR NOTE: This equipment has been tested and found to comply with the limits for a miscellaneous type ISM device, pursuant to part 18 of the FCC Rules. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio communications reception, which can be determined by turning the equipment off and on, please contact Checkpoint Systems, Inc. at (800) 257-5540 for further assistance. Equipment Safety Compliance Statement Checkpoint’s Electronic Article Surveillance (EAS) products have been designed for safeness during normal use and, where applicable, certain components of the system or accessory sub-assemblies have been certified, listed, or recognized in accordance with one or more of the following safety standards; UL 1012, UL 1037, UL 1310, UL 1950, CSA C22.2 No. 205, CSA C22.2 No. 220, CSA C22.2 No. 223, CSA C22.2 No. 950. Additional approvals may be pending. WARNING: Changes or modifications to Checkpoint’s EAS equipment not expressly approved by the party responsible for assuring compliance could void the user’s authority to operate the equipment in a safe or otherwise regulatory compliant manner. 101 Wolf Drive, P.O. Box 188, Thorofare, New Jersey 08086 Telephone: (800) 257-5540 • (856) 848-1800 Important Information To Our Users in Europe CE Compliance Statement Where applicable, Checkpoint Systems, Inc. offers certain Electronic Article Surveillance (EAS) products that have CE Declarations of Conformity to Council Directive(s) EMC 89/336/EEC and LVD 73/23/EEC, as amended by 92/31/EEC and 93/68/EEC. System Electromagnetic Compatibility (EMC), has been tested and, in most cases, EC type examination certified through a Notified Body using Competent Body laboratories in Europe, whereby, conformity is declared to voluntary accepted European Telecommunications Standards Institute (ETSI) standards prETS 300 683 and I-ETS 300 330. In other cases, conformity is declared to the generic emission and immunity standards EN 50081-1 / EN 55022 and EN 50082-1. In some countries, national type approval licensing may be required in addition to CE compliance; hence certain countries have voluntarily accepted the I-ETS 300 330 as the test method standard until further regulatory harmonization develops within Europe. Additional type approvals may be pending. NOTE: Certain Checkpoint EAS equipment has been tested and found to conform with the CE emission and immunity requirements in Europe. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Under unusual circumstances, interference from external sources may temporarily degrade the system performance. However, there is no guarantee that interference will not occur in a particular installation. If this equipment experiences frequent interference from external sources or does cause harmful interference to radio communications reception, which can be determined by turning the equipment off and on, please contact a Checkpoint representative for further assistance. Equipment Safety Compliance Statement Checkpoint’s Electronic Article Surveillance (EAS) products have been designed for safeness during normal use and, where applicable, certain components of the system or accessory sub-assemblies have been declared safe according to the European Low Voltage Directive (LVD) by being certified, listed, or recognized in accordance with one or more of the following European safety standards; EN 60950 (Amendments 1 & 2), EN60742. Additional approvals may be pending. WARNING: Changes or modifications to Checkpoint’s EAS equipment not expressly approved by the party responsible for assuring compliance could void the user’s authority to operate the equipment in a safe or otherwise regulatory compliant manner. RF-EAS SYSTEM USER’S GUIDE TABLE OF CONTENTS Introduction to Radio Frequency Electronic Article Surveillance ........................................................1 System Components..................................................................................................................................2-4 Tagging ......................................................................................................................................................5-11 Checkout Procedures ...........................................................................................................................12-13 Testing Procedures.....................................................................................................................................14 Troubleshooting .....................................................................................................................................15-16 Equipment Care ...........................................................................................................................................17 Customer Service Procedures ............................................................................................................18-19 Alarm Log......................................................................................................................................................20 Points to Remember....................................................................................................................................21 Ordering Tags/Customer Returns .............................................................................................................22 INTRODUCTION INTRODUCTION TO RADIO FREQUENCY ELECTRONIC ARTICLE SURVEILLANCE (RF-EAS) The Checkpoint system is composed of sensing pedestals, some that transmit a frequency signal and others that receive the signal. When a Checkpoint tag passes between the transmitter and receiver, an alarm sounds. This alerts store personnel that store items are leaving the premises with a live Checkpoint tag. Often, the very presence of the pedestals will be enough to deter a potential shoplifter. Merchandise in the store is tagged with Checkpoint tags or labels. During a normal transaction, the cashier will pass the merchandise over a deactivation field, usually a Counterpoint® Pad or scanner integrated with deactivation electronics. This deactivation field turns off the signal contained in the tag. Customers may now exit the store without causing the system to alarm. For those stores using hard tags to protect clothing or other soft goods, the tag is removed at the point of sale so that the customer may exit the store without alarming the system. Checkpoint minimizes the opportunity for shoplifters to successfully steal merchandise. In addition to the physical deterrence the sensing pedestals provide, Checkpoint tags and labels offer hidden protection. Because Checkpoint offers such a wide variety of tags, shoppers are often unaware that merchandise is protected against shoplifting. This way, shoplifters cannot leave the store premises with merchandise that has not been properly paid for. In conclusion, the Checkpoint systems provide: • Deterrence - the pedestals’ presence discourages shoplifting attempts by customers, vendors, and employees • Protection - provided by the Checkpoint system, tags, and program • Detection - reinforces the risk of shoplifting while searching for non-deactivated/ non-detuned “live” disposable tags or non-removed hard tags SYSTEM COMPONENTS SENSING PEDESTALS | DEACTIVATION | TAGS & LABELS | ACCESSORIES SENSING PEDESTALS The EAS Pedestal sends a radio signal into the intended detection area. If that signal detects a Checkpoint tag, an alarm will sound. QS4000XTTM ABS plastic frames QS2000® Chrome with thermoplastic base and crossovers Signature® Wood frames Liberty PXTM Fiber-enforced plastic frame Liberty QXTM Plastic frame with stainless steel endcaps Liberty GXTM Clear acrylic with textured gray inlay Strata EX® Wood frames Strata SX® Clear acrylic with textured gray inlay Strata WX® Weatherized design for garden and home centers SYSTEM COMPONENTS DEACTIVATION Deactivation of the Checkpoint tag may be completed in two ways. One way is by using a Counterpoint Pad, another is by installing deactivation electronics into the scanner at the point of sale. Checkpoint tags are deactivated without interrupting the normal transaction flow. Checkpoint’s deactivation will not de-magnetize credit cards or affect magnetic media. Checkpoint equipment operates at radio frequencies and levels authorized by the Federal Communications Commission. To the company’s knowledge, the system has not caused any adverse health effects. Even heart pacemakers, hearing aids, and other health-related accessories, when tested with the Checkpoint system, were not adversely affected. Counter Mounted Scanner Counterpoint Pad Hand-Held Scanner Counterpoint Chassis TAGS & LABELS Checkpoint offers a variety of tags and labels which are compatible with Checkpoint systems. Check with your sales representative to make sure the tag you use is compatible with your system. REUSABLE TAGS Hard Tags offer protection for high ticket items such as furs, leathers, or luggage. Clothing, shoes, and select hard goods such as headphones, tennis racquets, or baseball gloves may also be tagged. Designer Tags, which offer protection for the same types of merchandise, are available with custom printing and color. Flex Tags may be used in conjunction with standard price tags to protect soft goods. ChekInk IITM Tags protect a variety of soft goods. Durable vials, contained in the plastic housing, will break open and release ink when subjected to excessive force. These tags may be used alone or with a hard tag to provide maximum protection against shoplifting. DISPOSABLE TAGS Available in pressure sensitive or hang tag styles, these tags are deactivated or detuned at the point of sale. A variety of styles are offered to address specific market applications. ChekInk tags may be used in conjunction with several popular label printers. Please check with your sales representative for tag styles and printer compatibility. SYSTEM COMPONENTS ACCESSORIES Checkpoint’s universal detacher releases Hard Tags, Designer Tags, and ChekInk II Tags from merchandise at the point of sale. The hand held OMNI tool combines the functionality of the Personal Tag Verifier, the Deactivation Verifier and the Portable Deactivator into an easy-to-use RF-EAS tool. The self-contained unit automatically recharges when placed in its docking cradle. The Communications Package includes numerous leaflets and posters which may be posted throughout the store. This signage increases the deterrent effect of the Checkpoint system. WHAT TO TAG | USING DISPOSABLE TAGS | TAGS & LABELS | APPLYING DISPOSABLE TAGS APPLYING REUSABLE TAGS | WHERE TO PLACE REUSABLE TAGS TA G G I N G WHAT TO TAG To maximize the effectiveness of the Checkpoint system, it is important to follow tagging and placement procedures. What you tag depends not only on the merchandise you carry, but your store’s size, location, layout, and customers. Listed below are a few guidelines: • Protect frequently stolen items. Your sales and shrink patterns will tell you which merchandise shoplifters take most often. • Protect popular merchandise. “Trendy” and seasonal merchandise that sells well particularly attracts shoplifters. Change tagging patterns as trends change. • Protect expensive inventory. Your company may decide to tag all items above a certain price point. • Protect “brand-name” goods. Protecting national brands and designer clothing works well, particularly for specialty stores. USING DISPOSABLE TAGS Handling and placement of the tag is very important. Keep the following items in mind when tagging merchandise: • Make the tags look natural and inconspicuous on products. Place labels on the back or side of products. • Do not cover up important instructions, contents, or date/lot information. • Apply the tag to a flat surface of the product. Try not to bend the tag. If you must, bend the tag 1/4” on one side only and no more than 90 degrees. Note that bending the tag may hinder detection. TA G G I N G TAGS & LABELS • Roll tags off backing paper. Do not handle the adhesive side. • On merchandise that is placed in stacks, such as videotapes, DVDs and CDs, stagger tags so that no two are back to back. • In supermarket applications, use only the 2010 series meat labels with the warning “Remove Label Before Microwaving” or “Remove Prior to Microwave” when tagging meat, fish, poultry or other foods. This warning is important for consumers to avoid any possibility of certain microwaves (mostly older models) from arcing or even potentially posing a fire hazard. While tagging meats, place the tag in the corner of the meat boat, trying to cover as little of the meat as possible. • Do not place tags directly on leather or vinyl merchandise. The adhesive may damage the product. • Store tags at normal room temperature and humidity. • Do not use “Inspected By” tags on over-the-counter drugs or food. • Do not place the tag over the existing UPC code. However, when recreating actual, live UPC bar codes, the tag may be placed over the existing bar code. • Apply tags neatly, lining up corners/sides with those of the product. • Do not tag directly against metal or foil lined products such as cigarettes, cigarette cartons, certain brands of film, etc. If you are in doubt, test the tagged product by walking through the system. TA G G I N G APPLYING DISPOSABLE TAGS A pressure-sensitive tag is meant to blend with existing packaging and price stickers as much as possible. The following guidelines should assist you when tagging merchandise: Merchandise Recommended “Tag Spots” Film On the back of paper hanging flap For 35 mm film, on the back of the carton Batteries On the back of the package, away from metal contents Books Inside back cover Toys, Software On box or package Hardware Blister pack or box Wooden handles Health and Beauty Care Items Any flat non-metallic surface Either end of box containing tubed items, such as toothpaste. Plastic caps, as on aerosol cans Underside of carton or box Appliances On carton or box Phones Any non-metallic surface Shoes Sole, near ball of foot CDs, DVDs, Tapes On shrinkwrap Plastic or cardboard packaging Billfolds, Wallets Card insert (remove at POS) Clothing Back of pricing hang tag Videos Place “Be Kind Please Rewind” on right hand side window of cassette For specific market applications, contact your sales representative or Training Support Specialist to determine how and where the tag should be placed. TA G G I N G APPLYING DISPOSABLE TAGS continued 1. Tear a workable amount of tags from the roll. 2. Remove the backing paper with thumb and forefinger as shown. 3. Place the sticky edge of the tag against a flat, smooth surface on the item. Guide the tag onto the item with your thumb. 4. Smooth the edges of the tag with your finger to ensure that the tag is applied firmly. Each tag on every roll is subjected to Checkpoint’s quality control measures. Sometimes, Checkpoint tags are produced which do not meet these standards. These tags, which are distributed throughout the entire roll, are marked with a red ink spot. Customers should keep in mind that these tags may not alarm the system. Simply discard the tags if you choose not to use them. Please note that each tray contains 2000 quality tags. TA G G I N G APPLYING REUSABLE TAGS FLEX TAGS 1. Attach the Flex Tag or hang tag with a Tagger, Mini Tach-It, Swiftach, Dennison Loop, or similar device, just as you do with pricing hang tags. Lay the Flex Tag flat against the item, with the hole where you want to attach the tag. 2. Line up the fastener gun needle with the hole. Push the needle through the fabric and the hole. Squeeze the trigger. 3. Tug gently on the tag to be sure it is secure. TA G G I N G APPLYING REUSABLE TAGS continued HARD TAGS 1. Holding the pin at its base, push it through the item until the stem of the pin may be seen on the outside of the garment. 2. Line up the pin with the hole in the hard tag or fastener. Push the pin straight in, as far as it will go. The pin should slide in easily. If not, try a new tag or pin. DO NOT FORCE IT. 3. To be sure the pin is locked, gently tug upward on it. 10 TA G G I N G APPLYING REUSABLE TAGS continued CHEKINK II TAGS 1. Holding the tag, push the pin through the item until it can be seen through the other side. 2. Line up the pin with the hole in the fastener. Push the tag straight in, as far as it will go. The pin should slide in easily. If not, try using another fastener. DO NOT FORCE IT. 3. To be sure the pin is locked into the fastener, gently tug upward on the tag. 4. If using ChekInk II tags in conjunction with hard tags, follow the same procedure as described above, substituting the hole in the hard tag for the hole in the fastener. 5. Be sure to tag merchandise in a visible area where ink stains would render the garment useless. WHERE TO PLACE REUSABLE TAGS Merchandise Recommended “Tag Spots” Shirts, Blouses, Blazers Back of collar or lapel Use side seams only if material is leather, suede, nylon or silk Pants, Jeans Through material below the waistband on back of pants or above back pockets Skirts Through waistband Material below waistband on the back of the skirt Furs Collar Inside pocket Lining (if fur is too bulky) Leather Through stitch hole Collar or lapel Through sleeve Never tag through leather – pin holes cannot be removed Down Jackets Seam stitching at collar or lapel Seam stitching at sleeve Fabric webbing on sleeves (if any) Shoes, Boots Through eyelets Seam HINT: Never tag the hem or seams, unless the material is leather, suede, nylon, silk or any other fabric that may be damaged with pin holes. It is easy for shoplifters to shorten garments or repair damage from ripped seams or torn hems. 11 CHECKOUT PROCEDURES REMOVING HARD TAGS, DESIGNER TAGS & CHEKINK II TAGS REMOVING FLEX TAGS | DEACTIVATION OF PRESSURE SENSITIVE TAGS AND HANG TAGS REMOVING HARD TAGS, DESIGNER TAGS & CHEKINK II TAGS 1. Place the plastic dome of the hard tag in the detacher well and push down on the pin, then gently lift the pin away from the detacher. For Designer and ChekInk II tags, place the fastener in the detacher well. 2. Store reusable tags in a box at the checkout counter and store pins in another. Keeping these items separate will make it easier to use them in the future. 3. Store tags at least three feet away from system pedestals, power supplies, and deactivation units. 4. Store the detacher at least three feet away from electronic cash registers that use a computer diskette or digital tape. REMOVING FLEX TAGS 1. Snip the plastic thread or loop used to attach the tag to the item. Be careful not to cut the tag. If using a pin and fastener to secure the tag to merchandise, follow the procedure for hard tag removal. 2. Store Flex Tags in a box at the checkout counter until they are needed to tag additional merchandise. Store pins and fasteners in separate boxes. 3. Keep Flex Tags at least three feet away from the system pedestals, power supplies, and deactivation units. 12 CHECKOUT PROCEDURES DEACTIVATION OF PRESSURE SENSITIVE TAGS AND HANG TAGS Pressure sensitive tags and hang tags may be deactivated at the point at the sale by using a Counterpoint Pad or integrated scanner. Please refer to the directions below to determine the optimum procedure for deactivating Checkpoint tags. COUNTERPOINT DEACTIVATION 1. While ringing up purchases, cashiers should pass each product across the full width of the Counterpoint Pad. Items should be held low and horizontally to make sure that the target is within the deactivation field. 2. As a final check, place purchased merchandise on top of the deactivation pad. SCANNER DEACTIVATION 1. Tagged areas/bar codes should be held as low as possible above the scanner (without disrupting throughput) to ensure tag deactivation. Every item must be scanned; cashiers should avoid using the ”quantity” key on the cash register. 2. At the point of sale, items should be scanned for bar code information as usual. Checkpoint tags placed on merchandise are deactivated at the same time. 13 TESTING PROCEDURES To maximize the system’s performance, it is important to test it at the start of each business day. For best results, use the same test procedure each day. To test the system properly, walk completely through the pedestals while holding a test tag at waist level. (The test tag is included inside your Checkpoint Welcome Package). Waving the test tag alone between the pedestals will not provide a true reading. If you are experiencing detection problems when using the test tag with the sensing system, please check the following before placing a service call: 1. Is the power supply (the silver box mounted near or below the cash register) plugged in and turned to the “on” position? 2. Is the power supply light on? 3. Did you check the circuit breaker? This is located on the back of the power supply opposite the black power cord. If the small button is sticking out, hold it in for three to five seconds, then check the system again with the test tag. If problems persist, contact Checkpoint’s Service Department at (800) 253-7580 to place a service call. When placing a service call, please give store name and customer number (if available), along with a brief description of the problem you are experiencing. 14 For testing your deactivation unit, please refer to your store management or Checkpoint sales representative for proper procedures. PHANTOM ALARMS | DEACTIVATION UNITS | POS AREA | OMNI TOOL TROUBLESHOOTING PHANTOM ALARMS If you are experiencing phantom alarms (if the alarm sounds when no one is walking through the system), check the following: 1. Is someone carrying tagged merchandise near the system? Are there tags or tagged merchandise within three feet of the system? Check behind checkout counters, inside boxes, etc. 2. Look for coiled wire or cords near the system (carpet shampooers, extension cords, etc.). 3. Check all handrails and display racks in the vicinity to ensure that they are not loose, or touching the pedestals. Replace or tighten as necessary. Door handles and cart guards should be insulated from the door frame by inserting rubber gaskets. If there is an excessively loose or rickety display nearby, move it away from the system. 4. If phantoms continue, turn the system off for up to one hour and then turn it on again. This should allow any interference to clear. 5. Look to see if another appliance is plugged into the same outlet as the sensing system. If so, unplug the appliance. DEACTIVATION UNITS If you are experiencing problems when testing deactivation units, check the following before calling for service: 1. Make sure the deactivation unit is plugged in. 2. Look to see if any items are placed on top of the chassis (box that supplies power for the deactivation unit). This unit requires a minimum of three inches of clearance to maintain air flow for ventilation. 3. Check for tags or tagged merchandise that may be placed within three feet of the deactivation unit. 4. Scan the area between the Counterpoint Pad or scanner and counter top for metal items such as paper clips or coins. 15 TROUBLESHOOTING POS AREA If you experience system failure or have new equipment installed near or around the point of sale or sensing system, contact Checkpoint’s Service Department. The detacher unit should be kept at least three feet away from any electric register that uses a computer diskette or digital tape. If you have difficulty removing a hard tag from a garment, lightly rap the dome of the tag on the counter and try to remove the tag again. OMNI TOOL If you are experiencing problems when using the OMNI tool, check the following: 1. If the portable verifier gives off an erratic alarm, move at least three feet from the sensing pedestals and try again. Replace the battery if the erratic alarm continues. 2. If the unit does not give off any alarm, recharge the battery by returning the OMNI to its charging cradle. If problems persist, contact Checkpoint’s Customer Service Department at (800) 253-7580. 16 EQUIPMENT CARE • Do not decorate sensing pedestals with foil or lights (e.g. Christmas lights). These will interfere with the system. • Do not spray the sensing pedestals with cleaning solution. Instead, spray the cleaner on a towel and wipe down the antennas. • Do not place anything on the deactivation unit’s electronic housing that would interfere with air circulation. • Do not place liquids in an area where they would spill and short-circuit deactivation units. • Call Checkpoint’s Service Department before installing new carpeting to avoid cutting the system cable. • Turn the system off if there is remodeling or electrical work being done in your store. Otherwise, the system may alarm for no apparent reason. 17 CUSTOMER SERVICE PROCEDURES POSSIBLE ALARM CAUSES WHAT TO DO WHEN THE ALARM SOUNDS POSSIBLE ALARM CAUSES The Checkpoint program is designed to deter shoplifters. Occasionally, the determined amateur or impulse thief will try to challenge the system. When this happens, you can rely on the sensing pedestals to alert you to a potential shoplifter. The success of the program depends on the way you react to the alarm once it has sounded. When the alarm sounds, one of the following has probably happened: • An employee has forgotten to remove, detune, or deactivate a tag • An automatic door opening card (carried by a customer) or a Checkpoint tag that has not been detuned or deactivated from another store has triggered the alarm unintentionally • Someone has tried to remove merchandise from the store without paying for it WHAT TO DO WHEN THE ALARM SOUNDS Store management should develop a procedure for handling alarm situations. Always follow established store procedures during these situations. When the alarm is set off, the person designated to handle alarms should approach the customer courteously and confidently, and follow store guidelines. Never threaten or accuse the customer. Instead, try to get his cooperation by asking the types of questions listed below: Excuse me, Sir/Ma’am. I’m sorry. We must not have checked out your purchases properly. May I correct this for you? If necessary and possible, guide the customer away from the busy exit area. After the customer hands you his/her package, check the contents against the store receipt. If the contents and the sales slip match, deactivate any tags that may have been overlooked and thank the customer for his/her cooperation. A Portable Verifier is often helpful in locating hidden tags. By passing the unit close to a customer or his/her purchases, a sound will confirm a tag’s presence. Store personnel may now determine if the merchandise has not been paid for, or if a tag was not deactivated or removed. 18 CUSTOMER SERVICE PROCEDURES WHAT TO DO WHEN THE ALARM SOUNDS continued If you are unable to find a tag that the cashier has forgotten to remove, detune, or deactivate, try asking the customer the following: Are you carrying an electronic door opening card for entrance to your office or apartment building? Some electronic door openers operate on the same frequency as the Checkpoint system. These access cards often resemble thick credit cards and are used in place of keys to gain access to office buildings or apartment complexes. Credit cards or bank machine cards will not set off the system alarm. If the customer is carrying an access card, walk it through the system to determine if it is causing an alarm. If the customer is not carrying a card, or if the card does not appear to be causing the alarm, ask the following: Have you purchased something in another store with a system like this? If a retailer in your area by-passes the detuning/deactivation process, tags that have not been disabled could enter your store. If the alarm is set off at your “In” door, place a detuner over the Checkpoint tag. If the alarm sounds as the customer leaves, and your store does not carry the merchandise in question, remove the tag. If the item is something your store carries, and it looks new and unused, you may want to ask for a sales receipt. If you have ruled out the possibility of an automatic door opening card and checked out the customer’s purchase properly, you may want to ask: Are you returning merchandise to this store for an exchange or refund? It is possible that a tag was not detuned, deactivated, or removed from an item that the customer may be returning for credit, exchange, or refund. If this is not the case, you may want to ask: Is there something we may have forgotten to ring up at the register? At this point, follow your store’s policy regarding shoplifters and alert the appropriate personnel. It is important to remember that these questions are to be used as a guideline on how to handle alarm situations. When approaching customers, be courteous at all times, and never make accusations or threaten the customer in any way. Always defer to store policies and procedures for responding to system alarms. It is also important to be consistent in the manner in which alarm situations are handled. If there is no response to alarms, shoplifters will observe this and return to the store with the hopes of challenging both the system and store personnel. 19 ALARM LOG RECORDING ALARMS | USING THE ALARM LOG | WHAT TO RECORD RECORDING ALARMS Users should keep a written record of every alarm, regardless of its cause. Alarms may be caused by interference within the system (phantoms), tags that have not been detuned, deactivated, or removed, or when a shoplifter is attempting to remove merchandise. The Alarm Log Sheets demonstrate how well the system is working, in addition to providing alarm patterns that help management design the most beneficial inventory control program for your store. Store management will decide whether to keep the log, and what information is to be listed. USING THE ALARM LOG • Choose a log sheet format that serves your needs. Alarm log sample master sheets are provided in the Checkpoint welcome package. You may use these to make copies of the preferred alarm log format. These formats may be adapted to suit the needs of your store. • Record every alarm, completing all information WHAT TO RECORD Store management will probably decide what to record. Listed below are a few suggestions: • Results of test • Date of alarm • Time of alarm • Type of alarm (R/U/P): R: Real alarm (shoplifting attempt) U: Unintentional alarm (electronic door opening card, failure of cashier to remove, detune, or deactivate tag) P: Phantom alarm for no apparent reason. If so, record if system was turned off afterward 20 • Merchandise recovered, if applicable • Value of merchandise recovered, if applicable • Name of store employee who handled alarm situation • Description of alarm response, additional comments • Date and reason Checkpoint Service Department was called POINTS TO REMEMBER • Test all components of the Checkpoint System each morning and record results in the Alarm Log • If using bar code scanners, scan each item for price • Record all alarms in the log • Review alarm response guidelines periodically with employees responsible for handling alarms • Familiarize all new employees with the system, and make sure they review User’s Guide • Make sure that employees do not give customers any information about the system or tags • Verify that all merchandise scheduled for tagging has been tagged • Watch tagging procedures to make sure merchandise is tagged correctly • Store reusable tags near cash desk for future use • Call your Checkpoint representative if you have any questions regarding the use of the system, tags, or accessories • If you need service for your equipment, call (800) 253-7580 21 O R D E R I N G TA G S / C U S T O M E R R E T U R N S Be sure to keep a close watch on your tag inventory so that you do not run out of tags. When you need to order tags, contact Checkpoint’s Customer Service Department at (800) 548-8344. If you need to return merchandise, call (800) 257-5540, extension 3228. To speed up your transaction, have your customer account number readily available. A Customer Service Representative will be happy to assist you. 22
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Page Count : 31 XMP Toolkit : XMP toolkit 2.9.1-13, framework 1.6 About : uuid:aecff228-d0e8-4dd4-b19b-62334fdd974f Producer : Acrobat Distiller 6.0.1 for Macintosh Create Date : 2004:07:22 13:53:15-04:00 Modify Date : 2004:07:22 14:24:56-04:00 Creator Tool : QuarkXPress: pictwpstops filter 1.0 Metadata Date : 2004:07:22 14:24:56-04:00 Document ID : uuid:0a8d4efe-dc08-11d8-9364-000a95991f12 Format : application/pdf Creator : Amy Title : CheckpointUsersGuide Author : AmyEXIF Metadata provided by EXIF.tools