Help! My Employees Are Stealing From Me!
From my experience of working in corporate Kenya, I consider employee theft as one of the biggest risks facing businesses. In fact, according to a recent report by the Kenya National Bureau of Statistics the number of Kenyan workers convicted for employment related offences rose by 60% last year. Similarly, a recent Microsoft Security Intelligence Report noted that in 2018, the incidences of cybercrime in Kenya rose by 167%.
Employee theft leads to revenue leakages and financial losses. Therefore, businesses must step up their business risk management strategies in order to curb this vice.
In this Article, we consider common types of employee theft and some of the effective strategies that businesses can implement to prevent such theft.
Types of Employee Theft
1. Skimming: also known as “off the books theft”, it arises whenever an employee steals monies or assets prior to book entry posting.
2. Larceny and Embezzlement: Larceny occurs where there is outright theft of a firm’s assets by a person who is not in authority for such assets. For example, a store clerk or cleaner may steal cash from the cash register while the cashier is away. In contrast, embezzlement arises in situations where an employee is entrusted with authority over assets and decides to misuse such authority. Thus, in the preceding example, embezzlement would arise if the cashier were to steal the cash as opposed to the cleaner.
3. Theft of Time: Employees can also steal their employer’s time through failing to put in requisite hours of work. As a result, the productivity and output of the organisation becomes seriously hampered.
4. Cybercrime: Cyber crimes or computer related crimes can be broadly categorised into two areas. The first relates to crimes that target networks and computer devices. The listing below provides some examples of crimes under this category.
- Distributed Denial of Service (DDOS) attacks – these are malicious attacks on user networks. They arise when hackers incessantly drive lots of unauthorised traffic through the user’s site to the point where the network becomes overwhelmed. Eventually the hacker gains unauthorised access to user systems.
- Malware – malicious software that tries to attack a computer system. It includes viruses, worms, Trojan horses etc
- Ransomware – occurs when malware attacks or threatens attack on a computer system until specified ransom is paid to the attackers.
Cybercrimes may also be perpetrated through computer devices as shown in the examples below:-
- Phishing – this crime involves hackers sending malicious email attachments or URL’s to users to gain access to their computing devices.
- Identity Theft: arises where unauthorised users gain illegal access to users’ personal information and use such information to steal or commit fraudulent activities . The stolen information may include computer credentials, national identification numbers, phone numbers, etc.
- Fraudulent Disbursements – here, employees embezzle funds by working around a firm’s financial system. For instance, they may authorize wire transfers to fake customer of vendor accounts or forge signatures to process payments.
Strategies for Minimising Incidences of Employee Theft
|1. Screen job candidates before hiring|
At the hiring stage, firms should use candidate screening tools such as background/reference checks and police clearances. Such tools can highlight red flag detail on an employee’s work and behavioral background.
|2. Look out for strange employee behaviours|
Employers should take time to know their employees. Often, when employees steal, they begin to exhibit strange behaviours. For example they may have lifestyle changes that are way above their salaries. Further, these employees may develop fears of getting caught and as a result become reluctant to take up their annual leave entitlement. They may also start spending unnecessarily long hours in the office. Alternatively, the employees in question may become very resistant to proposals to change policies or processes that affect their areas of work.
Where an employee is involved in theft, employers should take swift and decisive action to dismiss the employee in accordance with the law and internal HR policies/processes.
|3. Develop attractive Employee Value Propositions|
Employee value propositions represent the total compensation and benefits package offered to an employees. An attractive proposition will usually offer staff salaries and benefits that are either in line with or above market trends. They may also include enhanced non-monetary incentives such as long paid leave periods, flexible work schedules, employee meals etc . These kinds of perks encourage employees to focus on achieving the company goals. They also reduce the temptation to steal.
|4. Have Robust Policies and Processes|
It is advisable for every employer to develop policies that demonstrate to employees zero-tolerance stance to employee theft. As a starting point, all employees should sign an Employee Code of Conduct and Business Ethics. The Code of Conduct and Ethics outlines an employer’s general statement of the kind of behaviours employees are expected to demonstrate during their employment.
Further, all departments within an organisation should endeavour to develop policies and processes that close potential loopholes for theft. For example, to tackle cybercrime, employers should put in place an effective IT policy coupled with cybercrime detection mechanisms. The typical areas that such policies cover include: password management, data management, network and internet security, software and hardware management, etc.
Similarly, the finance department should develop financial controls and processes to avoid leakages. Some examples include: segregation of responsibilities among employees, regular review financial statements and appointment of independent auditors to audit books of account.
|5. Put Your Workplace Under Surveillance|
Video surveillance and biometric systems serve as useful theft deterrents. Video cameras should be placed in hot spot areas such as the cashier/cash collection department or company warehouse. Regular reviews can be conducted to rule out suspicious activity. Biometric systems give indications of employee reporting and log-out times. They can be useful in tracking the movement of staff.
Theft by employees can be costly to your company. Before you fall victim to theft, take steps to understand your employee profile. Additionally, establish proper systems in all areas of operations.
Disclaimer: The information on this blog is available for informational purposes only and is not considered legal advice on any subject matter. By viewing blog posts, the reader understands there is no advocate-client relationship between the reader and the blog publisher. The blog should not be used as a substitute for legal advice from a licensed professional advocate, and readers are urged to consult their own legal counsel on any specific legal questions concerning a specific situation. The information on the blog may be changed without notice and is not guaranteed to be complete, correct or up-to-date. While the blog is revised on a regular basis, it may not reflect the most current legal developments.