Package pilferage, the Glossary
Package pilferage is the theft of part of the contents of a package.[1]
Table of Contents
26 relations: Authentication, Breaking bulk (law), Counterfeit, Intermodal container, Label, Logistics, Package theft, Package tracking, Packaging, Packaging engineering, Pressure-sensitive tape, Retail loss prevention, Security, Security bag, Security printing, Security seal, Security tape, Shipping container, Shoplifting, Stretch wrap, Surveillance, Tamper-evident technology, Tamperproofing, Theft, Track and trace, Unit load.
- Security breaches
Authentication
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of proving an assertion, such as the identity of a computer system user. Package pilferage and Authentication are packaging.
See Package pilferage and Authentication
Breaking bulk (law)
In law, breaking bulk is the act of removing something from a package or parcel, or in any way destroying its entirety. Package pilferage and breaking bulk (law) are theft.
See Package pilferage and Breaking bulk (law)
Counterfeit
To counterfeit means to imitate something authentic, with the intent to steal, destroy, or replace the original, for use in illegal transactions, or otherwise to deceive individuals into believing that the fake is of equal or greater value than the real product. Package pilferage and counterfeit are Commercial crimes.
See Package pilferage and Counterfeit
Intermodal container
An intermodal container, often called a shipping container, or cargo container, (or simply “container”) is a large metal crate designed and built for intermodal freight transport, meaning these containers can be used across different modes of transport – such as from ships to trains to trucks – without unloading and reloading their cargo.
See Package pilferage and Intermodal container
Label
A label (as distinct from signage) is a piece of paper, plastic film, cloth, metal, or other material affixed to a container or product, on which is written or printed information or symbols about the product or item.
See Package pilferage and Label
Logistics
Logistics is the part of supply chain management that deals with the efficient forward and reverse flow of goods, services, and related information from the point of origin to the point of consumption according to the needs of customers.
See Package pilferage and Logistics
Package theft
Package theft or cargo theft is the theft of a package or parcel. Package pilferage and package theft are Commercial crimes, packaging, security breaches and theft.
See Package pilferage and Package theft
Package tracking
Package tracking or package logging is the process of localizing shipping containers, mail and parcel post at different points of time during sorting, warehousing, and package delivery to verify their provenance and to predict and aid delivery. Package pilferage and package tracking are packaging.
See Package pilferage and Package tracking
Packaging
Packaging is the science, art and technology of enclosing or protecting products for distribution, storage, sale, and use.
See Package pilferage and Packaging
Packaging engineering
Packaging engineering, also package engineering, packaging technology and packaging science, is a broad topic ranging from design conceptualization to product placement. Package pilferage and packaging engineering are packaging.
See Package pilferage and Packaging engineering
Pressure-sensitive tape
Pressure-sensitive tape or pressure-sensitive adhesive tape (PSA tape) is an adhesive tape that will stick with application of pressure, without the need for a solvent (such as water) or heat for activation.
See Package pilferage and Pressure-sensitive tape
Retail loss prevention
Retail loss prevention (also known as retail asset protection) is a set of practices employed by retail companies to preserve profit. Package pilferage and retail loss prevention are theft.
See Package pilferage and Retail loss prevention
Security
Security is protection from, or resilience against, potential harm (or other unwanted coercion).
See Package pilferage and Security
Security bag
A security bag is a heavy duty bag used to contain high-value products, documents or legally sensitive items. Package pilferage and security bag are security technology and theft.
See Package pilferage and Security bag
Security printing
Security printing is the field of the printing industry that deals with the printing of items such as banknotes, cheques, passports, tamper-evident labels, security tapes, product authentication, stock certificates, postage stamps and identity cards. Package pilferage and security printing are packaging.
See Package pilferage and Security printing
Security seal
Security seals are tamper-evident mechanisms that seal valuable material in a room, cabinet, vehicle, or other storage facility. Package pilferage and Security seal are packaging.
See Package pilferage and Security seal
Security tape
Security tape (or security label) is a type of adhesive tape used to help reduce shipping losses due to pilfering and theft. Package pilferage and security tape are packaging, security technology and theft.
See Package pilferage and Security tape
Shipping container
A shipping container is a container with strength suitable to withstand shipment, storage, and handling.
See Package pilferage and Shipping container
Shoplifting
Shoplifting, shop theft, retail theft, or retail fraud is the theft of goods from a retail establishment during business hours, typically by concealing a store item on one's person, in pockets, under clothes or in a bag, and leaving the store without paying. Package pilferage and Shoplifting are theft.
See Package pilferage and Shoplifting
Stretch wrap
Stretch wrap or stretch film, sometimes known as pallet wrap, is a highly stretchable plastic film that is wrapped around items. Package pilferage and stretch wrap are packaging.
See Package pilferage and Stretch wrap
Surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing.
See Package pilferage and Surveillance
Tamper-evident technology
Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected. Package pilferage and Tamper-evident technology are packaging.
See Package pilferage and Tamper-evident technology
Tamperproofing
Tamperproofing, conceptually, is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system.
See Package pilferage and Tamperproofing
Theft
Theft is the act of taking another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it.
See Package pilferage and Theft
Track and trace
In the distribution and logistics of many types of products, track and trace or tracking and tracing concerns a process of determining the current and past locations (and other information) of a unique item or property.
See Package pilferage and Track and trace
Unit load
The term unit load refers to the size of an assemblage into which a number of individual items are combined for ease of storage and handling, for example a pallet load represents a unit load which can be moved easily with a pallet jack or forklift truck, or a container load represents a unit for shipping purposes. Package pilferage and unit load are packaging.
See Package pilferage and Unit load
See also
Security breaches
- Agent Tesla
- Botnet
- Computer virus
- Computer worm
- Cryptojacking
- Data breach
- Data breach notification laws
- Daxin (spyware)
- Digital kidnapping
- Evil maid attack
- FluBot
- Gate crashing
- Hamza Bendelladj
- Identity theft
- Industrial espionage
- Infostealer
- Insider threat
- Keystroke logging
- List of spyware programs
- Lock picking
- Malware
- Mole (espionage)
- ODIN Intelligence
- Package pilferage
- Package theft
- Poly Network exploit
- Ramsay Malware
- Ransomware
- Rogue security software
- Safe-cracking
- Security hacker
- Spyware
- Trojan horse (computing)
- United States government security breaches