Now POS machines and credit cards have become an indispensable financial tool in our daily life. In particular, the POS machine is a must-have device for merchants to use every day.

Now POS machines and credit cards have become an indispensable financial tool in our daily life. In particular, POS machines are essential equipment for merchants to use every day. However, with the period from 2015 to 2016, a large number of fake card theft and POS theft cases have emerged, which has caused many business friends to suffer economic losses. Xiaobian today reminds friends that the five most common ways of stealing POS machines are to make merchants and card-holders more vigilant, use cards safely, and use security machines from now on. Ok, let's look down together.

First, practice the operation of theft

Most electronic cash registers have training systems for cashiers to practice and allow for unrecorded operations. Therefore, each system must be carefully evaluated to determine the scope of the record.

Requirements for the cashier to use the training system:

(1) At least two places must be marked with the “obsolete” mark on the receipt.

(2) The system can be entered using the management or check button, and the total number of exercises must appear on the inspection record and must be credited to the cash register accrued as with other sales.

(3) All exercises must be recorded separately in the total log.

Precautions for cashiers to practice stealing:

(1) All log records and sales receipts must be recorded in the same manner as other records for future inspection. This is a crucial precaution.

(2) If it is a mechanical cash register, it is more difficult to prevent. Because during the practice, the cashier may copy the normal transaction, so a separate cash register must be provided and used exclusively for practice under the supervision of the manager.

(3) Must be strictly supervised to prevent use for under-receipt, fraudulent transaction receipts or other illegal uses.

The above precautionary measures can well prevent the kiln cashier to use the training system for complete transfer and destroy the log records, resulting in no commodity registration record.

Second, destroy the book

A cash register has two general ledgers. The subtotal at the time of reading, that is, the transaction, is read by the cashier and the manager within a certain period of time. The purpose is to determine the total amount of a particular cashier transaction login, so it must be held accountable.

The cashier will start from the reading of the book, and the end of the work will be closed, and the rest and lunch will be read. Starting the reading amount minus the closing reading amount is the total amount that the cashier should be responsible for.

Within one working day, the cashier has 4 or more readings: start, take two breaks for the first time, two for lunch, two for the second break, and end.

How fraud is done:
(1) When you get off work, the cashier takes a part of the reading, deletes them, and then takes the corresponding amount of money.
(2) Other persons who are responsible for the settlement of accounts, such as cashiers, managers or others.

The cashier can also take the appropriate amount of money.

(3) The cashier operates on different cashier channels. Without a channel record, it is not easy to determine which channel the cashier is falsifying.

(4) After the deletion, the only record can only be kept in the “X” reading, the cashier summary and the transaction details. Strongly, these important documents often have little security. Therefore, some people decided to implement such theft and it is easy to destroy these documents.

Although the above behavior can be found by the bookkeeper the next morning, the accounts of all cash registers cannot be equal. However, the prevention of this type of theft is not easy to do.

Identify the program where the loss occurred:

(1) Control the keyboard key. All check keys, priority reading keys or other keys that can read the total amount of receipts must be strictly managed.

(2) Allocate the cashier channel in an orderly manner. The cashier's movement must be continuous and regular, so that you can determine who is in which cashier channel.

(3) A detailed catalogue of daily collection records. A program must be created to track the transaction details of all cash registers, as it is the first record of the thief to destroy, the sooner the transaction details are lost, and the more timely the investigation begins.

(4) Supervise the general ledger details. This ledger lists the daily trading volume and the cumulative trading volume of all cash registers. Also, include all the exercises and the number of times you go offline. Keep in mind that the general ledger written by hand must be based on the actual readings produced by the cash register.

(5) Strictly check the weekly inspection report of the cash register. This report is an inventory of all cash registers. It includes: serial number, model number, cash register location and final total reading. Therefore, it is necessary to strengthen the emphasis on this catalogue. Some of the collections under repair are easily exploited illegally, their records are destroyed and money is stolen. It is important to note that the easiest way to destroy the total amount of protection is to claim that the machine should be repaired if it fails. In practice, the total amount of all cash registers must be cleared once a week and written into the inspection report. The report also includes confirmation of all cash registers that are repairing or storing problems.

Third, equal transaction

Equal-value trading This means that the money and the price of the goods are equal when the customer checks out. An example of a card group: a deal of cola or a pack of cigarettes or another commodity.

It mainly occurs in the channel of fast checkout or cash only. Usually customers are very anxious and will not wait for shopping tickets.

The amount of money in this type of transaction is the most likely to be stolen, because the small ticket is one of the most valuable records. Money may be put into the cash register as a long money, or it may be taken away by the cashier.

The cashier can use this method in any channel or when making any number of items, as simple as not entering the last item. The cashier can then say to the customer that he has forgotten to enter the last item and then manually add it to the customer's shopping receipt. In this way, although the customer will have the amount of goods added by hand, the cashier gets the same amount of long money. In this type of theft, the cashier will also have an accounting process and steal the money when it is convenient and safe. The best way to deal with this and other long types of theft is to suddenly check the cash register from time to time.

Four, zero or no transaction key

Zero or no transaction key This means that the cash register is not allowed to enter the cash register to make the recorded transaction and the cash register is operated. Such theft can be done in two ways:

(1) Knock on the “no trading button” on the cash register.

(2) Use only the department key instead of the amount key.

Of course, the implementation of these two paths must be based on the use of department keys or zero keys to drive the cash register, allowing the number to be entered without a transaction amount.

Moreover, this is used when the cashier thinks that a little sound should be made to reduce the attention. Such as: when the management is patrolling around or other customers pay special attention to the collection. In this way, the customer's money is put into the cash register as a long amount and then taken away. Of course, shopping receipts are generally not given to customers, but are thrown away by cashiers. The fast cashier channel and the cash transaction channel are the easiest to make such stealing behavior.

Five, equal refund

The equivalent refund means that the goods are returned to the customer when the goods are returned, and the goods are sold again at the original price with the return vouchers.

The premise of the absence of theft is that the goods must be entered and then refunded to cover the cash account. Of course, instead of entering the goods, cash back is used instead of legal transactions, so that the cashier creates long money and forms a theft. It is worth noting that unless it is caught, it is impossible to prevent it. The only way to do this is to replace the suspected cashier with an honest cashier, or use a refund confirmation system to confirm the return by sending a return card to the customer. At the same time, the shopping receipt must be recovered, and this is also the only way to determine that the goods are sold by the supermarket.

Summary: Although today's theme is how to prevent POS theft, Xiaobian believes that there is no thief in the world. Only a society with integrity will have a better economic cycle, and a good economic cycle represents stability and prosperity. Of course, the purpose of Xiaobian finishing this information is to give those merchant friends a security precaution process when training cashiers, to play a supervisory and warning role. I hope this information will help my friends.

Essences & Candles

AMERICA DIVISION OF TOP SHINE CO.,LTD. , https://www.uni-goods.com