{"id":27752,"date":"2025-12-15T14:09:15","date_gmt":"2025-12-15T19:09:15","guid":{"rendered":"https:\/\/partech.com\/?p=27752"},"modified":"2025-12-16T11:48:15","modified_gmt":"2025-12-16T16:48:15","slug":"theft-or-teachable-moment","status":"publish","type":"post","link":"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/","title":{"rendered":"Theft or Teachable Moment?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27752\" class=\"elementor elementor-27752\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b6f249 e-flex e-con-boxed e-con e-parent\" data-id=\"4b6f249\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0114be elementor-widget elementor-widget-text-editor\" data-id=\"d0114be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Theft and fraud are unfortunate realities for restaurants. According to the Food Industry Association, <a href=\"https:\/\/www.producemarketguide.com\/news\/study-reveals-theft-and-fraud-remain-top-challenges-food-retailers\">85% of U.S. food retailers<\/a> named theft or fraud (aka shrinkage) as the number-one threat to their businesses last year.<\/p>\n<p>QSRs are among the hardest hit of all, with losses from theft reaching 7% of sales in the segment. In an industry where typical net profit margins range from 3% to 5% on average, such losses can effectively erase an entire quarter\u2019s profitability. This reality makes restaurant loss prevention a key priority for brands of all types and sizes.<\/p>\n<p>Shrinkage is primarily the result of theft \u2014\u00a0about <a href=\"https:\/\/www.restaurantowner.com\/public\/75-Percent-of-All-Inventory-Shrinkage-Happens-as-a-Result-of-Theft.cfm\">75% according to the National Restaurant Association<\/a> \u2014 and most of it is done by team members. This puts regional, district, and store managers in the uncomfortable position of constantly policing employees to protect profits.<\/p>\n<p>The methods employees use to steal are extremely varied, from fake refunds, discounts, or voids to giving away free food to friends. All these tactics accomplish the same objective: obscuring what really happened at the register to keep the cash or food.<\/p>\n<p style=\"font-weight: 400;\">Ironically, employee theft and fraud can be relatively easy to detect. The real challenge for QSRs is time management. Combing through every transaction for discrepancies is incredibly time-consuming \u2014 so much so that it is basically impossible to do manually, especially when overseeing multiple stores.<\/p>\n<p>That\u2019s where technology comes in.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2aee5d7 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"2aee5d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"_1-gradient-lg\" data-name=\"1-gradient-lg\" width=\"78.295\" height=\"78.295\" viewBox=\"0 0 78.295 78.295\"><defs><linearGradient id=\"linear-gradient\" x1=\"0.157\" y1=\"0.162\" x2=\"0.807\" y2=\"0.825\" gradientUnits=\"objectBoundingBox\"><stop offset=\"0\" stop-color=\"#8ca1ff\"><\/stop><stop offset=\"1\" stop-color=\"#6962d1\"><\/stop><\/linearGradient><\/defs><g id=\"Group_192410\" data-name=\"Group 192410\"><path id=\"Path_1285\" data-name=\"Path 1285\" d=\"M39.147,0A39.147,39.147,0,1,1,0,39.147,39.147,39.147,0,0,1,39.147,0Z\" transform=\"translate(0 0)\" fill=\"url(#linear-gradient)\"><\/path><\/g><path id=\"Path_3258\" data-name=\"Path 3258\" d=\"M-1.312,0V-23.452l-5.535,3.4V-26.2l5.535-3.321h5.7V0Z\" transform=\"translate(38.422 55)\" fill=\"#fff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Focus on What Matters<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-825e8dc elementor-widget elementor-widget-text-editor\" data-id=\"825e8dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Identifying suspect transactions manually is not a realistic approach for QSRs with several, dozens, or hundreds of stores, each of which logs hundreds of transactions every day. The investment in time and resources would not only negate any potential gains, but it would also detract from a long list of daily activities that provide genuine strategic and operational value.<\/p>\n<p>To solve this problem, many QSRs are turning to the automation provided by restaurant loss prevention software. These platforms quickly target questionable transactions for follow-up, enabling managers to focus only on those stores, transactions, or employees that deserve attention. These efforts can be incorporated within a daily routine. They also provide insights that can be replicated across multiple stores.<\/p>\n<p>One of the most important benefits of automated fraud detection is the ability to differentiate between employee theft and human error. For example, the platform might surface a series of big-ticket returns during a late-night shift at a store when the manager is likely not there. The timing is an obvious red flag. But is an actual crime occurring, or is it something more innocent?<\/p>\n<p>In many cases, managers discover employees are not following proper procedures for disposing of food, accounting for inventory, handling returns, or other common activities. This creates an opportunity to retrain specific employees in an efficient and focused way, while sharing these learnings with other stores to reduce risk similar errors from happening elsewhere.<\/p>\n<p>By prioritizing transactions for special attention, automated restaurant loss prevention software gives management enough time to understand the situation and follow up effectively. It also helps brands avoid the default approach of firing the employees involved, which leads to unnecessary turnover, compromised customer service, and a cascade of staffing issues.<\/p>\n<p>Essentially, automated fraud detection empowers district managers, area coaches, and others to keep closer tabs on each store without the need to visit all of them daily. On top of saving money, this frees up valuable time that can be spent on coaching team members and improving the guest experience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab3438e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"ab3438e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"_2-gradient-lg\" data-name=\"2-gradient-lg\" width=\"78.295\" height=\"78.295\" viewBox=\"0 0 78.295 78.295\"><defs><linearGradient id=\"linear-gradient\" x1=\"0.157\" y1=\"0.162\" x2=\"0.807\" y2=\"0.825\" gradientUnits=\"objectBoundingBox\"><stop offset=\"0\" stop-color=\"#8ca1ff\"><\/stop><stop offset=\"1\" stop-color=\"#6962d1\"><\/stop><\/linearGradient><\/defs><g id=\"Group_190360\" data-name=\"Group 190360\"><path id=\"Path_1285\" data-name=\"Path 1285\" d=\"M39.147,0A39.147,39.147,0,1,1,0,39.147,39.147,39.147,0,0,1,39.147,0Z\" transform=\"translate(0 0)\" fill=\"url(#linear-gradient)\"><\/path><\/g><path id=\"Path_3257\" data-name=\"Path 3257\" d=\"M-10.332-.041V-4.879L2.05-15.867a8.655,8.655,0,0,0,1.968-2.317,4.377,4.377,0,0,0,.574-2.029,5.11,5.11,0,0,0-.554-2.409,4.146,4.146,0,0,0-1.558-1.66,4.483,4.483,0,0,0-2.358-.6,4.747,4.747,0,0,0-2.491.646,4.584,4.584,0,0,0-1.671,1.7,4.281,4.281,0,0,0-.554,2.286h-5.74A9.985,9.985,0,0,1-9-25.5a8.986,8.986,0,0,1,3.711-3.424A12.053,12.053,0,0,1,.246-30.135a10.537,10.537,0,0,1,5.176,1.261,9.265,9.265,0,0,1,3.6,3.516,10.205,10.205,0,0,1,1.312,5.227,9.338,9.338,0,0,1-.615,3.639,8.513,8.513,0,0,1-1.824,2.665Q6.683-12.607,4.92-11.07L-3.075-4.059l-.451-1.23H10.332V-.041Z\" transform=\"translate(38 55)\" fill=\"#fff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Neutralize Phone Scammers<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e14c66 elementor-widget elementor-widget-text-editor\" data-id=\"3e14c66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Automation is also useful for uncovering stores that have been victimized by phone or email scams. These scams are much like consumer scams, initiated by a caller or sender supposedly \u201cfrom corporate\u201d telling an unsuspecting worker that an audit has uncovered a serious problem \u2014 one that can be resolved by issuing a gift card or refund.<\/p><p>Like anyone who has been scammed, employees are often embarrassed to admit what happened and are afraid they will be fired if they report the fraud. But with automated detection, managers can identify the problem, quickly investigate, and build trainings that prevent other stores from repeating the same mistake. Turning a common threat into a stronger overall defense can save substantial time and money.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-345fe2c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"345fe2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"_3-gradient-lg\" data-name=\"3-gradient-lg\" width=\"78.295\" height=\"78.295\" viewBox=\"0 0 78.295 78.295\"><defs><linearGradient id=\"linear-gradient\" x1=\"0.157\" y1=\"0.162\" x2=\"0.807\" y2=\"0.825\" gradientUnits=\"objectBoundingBox\"><stop offset=\"0\" stop-color=\"#8ca1ff\"><\/stop><stop offset=\"1\" stop-color=\"#6962d1\"><\/stop><\/linearGradient><\/defs><g id=\"Group_190364\" data-name=\"Group 190364\"><path id=\"Path_1285\" data-name=\"Path 1285\" d=\"M39.147,0A39.147,39.147,0,1,1,0,39.147,39.147,39.147,0,0,1,39.147,0Z\" transform=\"translate(0 0)\" fill=\"url(#linear-gradient)\"><\/path><\/g><path id=\"Path_3259\" data-name=\"Path 3259\" d=\"M-.635.533A10.3,10.3,0,0,1-4.859-.359a10.448,10.448,0,0,1-3.5-2.511,9.438,9.438,0,0,1-2.122-3.813l5.412-1.435A4.32,4.32,0,0,0-3.372-5.607a4.643,4.643,0,0,0,2.737.892A4.539,4.539,0,0,0,1.691-5.33,4.661,4.661,0,0,0,3.372-6.99,4.428,4.428,0,0,0,4-9.307a4.567,4.567,0,0,0-1.3-3.27A4.4,4.4,0,0,0-.635-13.94a4.071,4.071,0,0,0-1.189.174,5.277,5.277,0,0,0-1.107.482l-2.5-4.387,9.389-7.79.41,1.189H-9.328V-29.52H9.123v5.248l-7.3,7.052-.041-1.558A8.987,8.987,0,0,1,6.078-17a9,9,0,0,1,2.665,3.4,10.311,10.311,0,0,1,.912,4.295A9.142,9.142,0,0,1,8.241-4.295,10.326,10.326,0,0,1,4.489-.769,10.355,10.355,0,0,1-.635.533Z\" transform=\"translate(37.644 55)\" fill=\"#fff\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Improving Restaurant Loss Prevention<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cfe44a7 elementor-widget elementor-widget-text-editor\" data-id=\"cfe44a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As we all know, there will be times when what\u2019s really going on at the register is employee theft or fraud. Automated loss prevention restaurant software delivers several advantages in these instances. Most critically, it makes it far faster and easier for managers to identify when theft happens and take appropriate action \u2014 without the need to devote hours on tedious manual review.<\/p><p>Even better, many of these tools can be integrated with popular video surveillance platforms that allow managers to review flagged transactions in parallel with video footage, yielding a clearer situational understanding of what went on compared to data alone. In just a few minutes, managers can gather the evidence needed to determine whether theft occurred and confidently take next steps.<\/p><p>Managers can also bring these same assets along with them when reviewing any questionable transaction face-to-face with the employee involved. If theft has occurred, the manager can proceed accordingly. If the employee just made a mistake, then it\u2019s a simple matter of training.<\/p><p>Either way, these conversations serve as a long-term theft deterrent, helping to establish a culture where employees understand that all suspicious activities will be identified and investigated \u2014 rather than simply getting lost in the shuffle like so many are today.<\/p><p>PAR Technology helps QSRs strengthen fraud and theft detection through industry-leading restaurant loss prevention software that uncovers losses, inefficiencies, and blind spots long before they become problems. Request a demo today.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b85290a e-con-full e-flex e-con e-child\" data-id=\"b85290a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-24388b8 elementor-widget elementor-widget-text-editor\" data-id=\"24388b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>Victoria Tran<\/strong> is a Senior Product Marketing Manager at PAR Technology, leading go-to-market strategy for PAR OPS, an enterprise restaurant operations management platform. She oversaw the post-acquisition portfolio unification \u2014 bringing together PAR Data Central and Delaget under the PAR OPS brand \u2014 and manages all marketing efforts for PAR OPS product launches, including PAR Technology\u2019s first AI data analytics assistant, Coach AI. Previously, she held product marketing roles at Spectrum Brands and Bradshaw Home, delivering e-commerce growth, new product commercialization, and high-impact campaigns. She holds a B.A. in Economics and Government from the University of Virginia.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Theft and fraud are unfortunate realities for restaurants. According to the Food Industry Association, 85% of U.S. food retailers named theft or fraud (aka shrinkage) as the number-one threat to their businesses last year. QSRs are among the hardest hit of all, with losses from theft reaching 7% of sales in the segment. In an&#8230;<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","footnotes":""},"categories":[1],"tags":[],"class_list":["post-27752","post","type-post","status-publish","format-standard","hentry","category-general"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Theft or Teachable Moment? - PAR Technology Blog<\/title>\n<meta name=\"description\" content=\"Theft or Teachable Moment? by PAR Technology . . Click to learn more now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Theft or Teachable Moment?\" \/>\n<meta property=\"og:description\" content=\"Theft or Teachable Moment? by PAR Technology . . Click to learn more now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/\" \/>\n<meta property=\"og:site_name\" content=\"PAR Technology\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-15T19:09:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-16T16:48:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/partech.com\/wp-content\/uploads\/2023\/09\/PAR-Featured-Image-1200x628-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PAR Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PAR Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/\"},\"author\":{\"name\":\"PAR Team\",\"@id\":\"https:\/\/partech.com\/#\/schema\/person\/7b56efbb2296004e08991fb0df34d913\"},\"headline\":\"Theft or Teachable Moment?\",\"datePublished\":\"2025-12-15T19:09:15+00:00\",\"dateModified\":\"2025-12-16T16:48:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/\"},\"wordCount\":1030,\"publisher\":{\"@id\":\"https:\/\/partech.com\/#organization\"},\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/\",\"url\":\"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/\",\"name\":\"Theft or Teachable Moment? - PAR Technology Blog\",\"isPartOf\":{\"@id\":\"https:\/\/partech.com\/#website\"},\"datePublished\":\"2025-12-15T19:09:15+00:00\",\"dateModified\":\"2025-12-16T16:48:15+00:00\",\"description\":\"Theft or Teachable Moment? by PAR Technology . . Click to learn more now.\",\"breadcrumb\":{\"@id\":\"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/partech.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Theft or Teachable Moment?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/partech.com\/#website\",\"url\":\"https:\/\/partech.com\/\",\"name\":\"PAR\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/partech.com\/#organization\"},\"alternateName\":\"PAR\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/partech.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/partech.com\/#organization\",\"name\":\"PAR Technologies\",\"url\":\"https:\/\/partech.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/partech.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/partech.com\/wp-content\/uploads\/2023\/09\/PAR-Logo-NB-blue.svg\",\"contentUrl\":\"https:\/\/partech.com\/wp-content\/uploads\/2023\/09\/PAR-Logo-NB-blue.svg\",\"width\":340,\"height\":160,\"caption\":\"PAR Technologies\"},\"image\":{\"@id\":\"https:\/\/partech.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/partech.com\/#\/schema\/person\/7b56efbb2296004e08991fb0df34d913\",\"name\":\"PAR Team\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Theft or Teachable Moment? - PAR Technology Blog","description":"Theft or Teachable Moment? by PAR Technology . . Click to learn more now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/","og_locale":"en_US","og_type":"article","og_title":"Theft or Teachable Moment?","og_description":"Theft or Teachable Moment? by PAR Technology . . Click to learn more now.","og_url":"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/","og_site_name":"PAR Technology","article_published_time":"2025-12-15T19:09:15+00:00","article_modified_time":"2025-12-16T16:48:15+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/partech.com\/wp-content\/uploads\/2023\/09\/PAR-Featured-Image-1200x628-1.jpg","type":"image\/jpeg"}],"author":"PAR Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"PAR Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/#article","isPartOf":{"@id":"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/"},"author":{"name":"PAR Team","@id":"https:\/\/partech.com\/#\/schema\/person\/7b56efbb2296004e08991fb0df34d913"},"headline":"Theft or Teachable Moment?","datePublished":"2025-12-15T19:09:15+00:00","dateModified":"2025-12-16T16:48:15+00:00","mainEntityOfPage":{"@id":"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/"},"wordCount":1030,"publisher":{"@id":"https:\/\/partech.com\/#organization"},"articleSection":["General"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/","url":"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/","name":"Theft or Teachable Moment? - PAR Technology Blog","isPartOf":{"@id":"https:\/\/partech.com\/#website"},"datePublished":"2025-12-15T19:09:15+00:00","dateModified":"2025-12-16T16:48:15+00:00","description":"Theft or Teachable Moment? by PAR Technology . . Click to learn more now.","breadcrumb":{"@id":"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/partech.com\/2025\/12\/15\/theft-or-teachable-moment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/partech.com\/"},{"@type":"ListItem","position":2,"name":"Theft or Teachable Moment?"}]},{"@type":"WebSite","@id":"https:\/\/partech.com\/#website","url":"https:\/\/partech.com\/","name":"PAR","description":"","publisher":{"@id":"https:\/\/partech.com\/#organization"},"alternateName":"PAR","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/partech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/partech.com\/#organization","name":"PAR Technologies","url":"https:\/\/partech.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/partech.com\/#\/schema\/logo\/image\/","url":"https:\/\/partech.com\/wp-content\/uploads\/2023\/09\/PAR-Logo-NB-blue.svg","contentUrl":"https:\/\/partech.com\/wp-content\/uploads\/2023\/09\/PAR-Logo-NB-blue.svg","width":340,"height":160,"caption":"PAR Technologies"},"image":{"@id":"https:\/\/partech.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/partech.com\/#\/schema\/person\/7b56efbb2296004e08991fb0df34d913","name":"PAR Team"}]}},"_links":{"self":[{"href":"https:\/\/partech.com\/wp-json\/wp\/v2\/posts\/27752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partech.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partech.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partech.com\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/partech.com\/wp-json\/wp\/v2\/comments?post=27752"}],"version-history":[{"count":0,"href":"https:\/\/partech.com\/wp-json\/wp\/v2\/posts\/27752\/revisions"}],"wp:attachment":[{"href":"https:\/\/partech.com\/wp-json\/wp\/v2\/media?parent=27752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partech.com\/wp-json\/wp\/v2\/categories?post=27752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partech.com\/wp-json\/wp\/v2\/tags?post=27752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}