I. Introduction Loss Prevention Surveys



Yüklə 2,18 Mb.
səhifə8/31
tarix17.08.2018
ölçüsü2,18 Mb.
#71497
1   ...   4   5   6   7   8   9   10   11   ...   31

Asset Marking

All hotel property should be identified by the hotel name and or a number. A thief will

often hesitate to steal something that can be easily identified. The identification makes it

possible for a police agency to locate the owner in the event that stolen property is

recovered. In addition, the marking allows the property to be positively identified in a court

of law. Serial numbers of assets should be recorded and maintained on file.



Alarms

Alarms may be useful for expanding coverage and detecting breaches in security. There are

several types that can be put to use throughout the hotel.

Egress panic hardware equipped with an alarm can be used on doors that should be

available for emergency use only. Some devices may also be used to delay egress through

the door for up to 15 seconds. The main purpose for these devices is to deter unauthorized

access by drawing attention with an audible alarm. These alarms can annunciate both

locally and at a centralized location.

Burglar alarms can be used to control access to certain areas of the building after normal

working hours. These alarms can be made up of door and window contacts, motion

sensors, glass break sensors, pressure pads, and beam detectors. They are often used

where valuable hotel assets are stored, including liquor storage and the general cashier's

office.

Audio/Visual Equipment

Due to its high cost and ease of resale, audio visual equipment is often a target for theft. All

AV equipment should be marked with a permanent label identifying the equipment as

property of the hotel. The serial numbers of the equipment should be recorded and

maintained on file.

When equipment is to be used, it should be secured to a cart, bench or table with security

cables or similar devices to prevent its unauthorized removal.

AV equipment should be stored in a secure limited access storeroom. The door to the

storerooms should be equipped with a uniquely keyed one-inch deadbolt or electronic lock.

When large quantities of equipment are present, a CCTV camera may be used to document

access to and removal of AV equipment. AV equipment should be inventoried on a regular

basis.


Asset Protection

IV-14


Computer Security

Illegal entry into the hotel's computer could greatly damage the hotel's financial stability.

Hotel management should prepare for and take action to prevent potential computer

problems. Hotel management should consider:



  • Restricting access to the computer room, the system documentation, and any data

  • storage. Access should be limited to authorized employees.

  • Hotels that have computers connected to telephone lines should prevent access from

  • unauthorized persons outside the hotel.

  • Passwords should be used for access to the computer. Each employee should have

  • their own unique password, which should be a minimum of 4 characters in length.

  • Passwords should never be written down. If an employee leaves the hotel, is

  • terminated, or their job function changes, then their password should be removed.

  • Access to master lists of passwords should be restricted to the system administrator.

  • Any employee who is terminated should not be allowed to enter the computer room

  • unless accompanied by security personnel.

  • The computer room should be equipped with a solid core door and a uniquely

  • keyed 1" deadbolt or electronic lock.

  • The computer room should be maintained and protected from hazards. The

  • computer room should be constructed of fireproof or fire resistant materials

  • (minimum of two hour fire rating). When appropriate, the room should be equipped

  • with a "clean agent" fire suppression system.

  • A written emergency fire plan should be prepared and posted in the computer room.

  • The plan should assign specific responsibilities for computer personnel.

  • The computer should be protected from power failure either by battery backup or

  • connected to an emergency generator to provide an uninterrupted power supply. In

  • addition, electric surge suppression should also be provided.

  • Software piracy is a significant problem in business today. To help prevent pirated

  • software from being introduced to hotel and guest amenity computers, a list of

  • authorized applications should be maintained. License agreements for these

  • applications should be kept on file. Any unauthorized or unlicensed applications

  • should be removed. Additionally, the hotel may consider removing or locking out

  • computer floppy and CD-ROM drives. This will prevent the introduction of

  • unauthorized, unlicensed programs and viruses.

  • To prevent theft of sensitive data, the floppy disk drive for end-user terminals

  • should be locked out or removed when it is not required for their job function.

Protection of Computer Records

All vital records should be protected and backed up. Records should be stored in an off-site

facility designed for the storage of computer records, or in an appropriate fire-rated safe.

Records stored in the computer room should be kept to the absolute minimum required for

efficient operation.

Asset Protection

IV-15


Hundreds of computer viruses are created each month. To help protect computer

equipment from damage, computers should be equipped with a commercially available

anti-virus program. The software should be programmed to scan the computer on a regular

basis and monitor all incoming e-mail. The virus definition files should be updated at least

quarterly.

Computer’s for Guest Use

Computers which are provided as an amenity for guests should be protected with the

current version of an anti-virus software. Internet connections should be configured so as

to restrict access to pornographic material. On a regular basis, the hard drive should be

inspected and purged of documents which may have been left by guests. This hardware is

often subject to vandalism or theft and should be secured with a security cable and

inspected on a regular basis.

V. Guest Security



Written Security Policy.....................................................................................................2

Guest Information & Privacy...........................................................................................2

Visual Access......................................................................................................................3

Phone Procedures ..............................................................................................................3

Key Control & Procedures ...............................................................................................4

Safe Deposit Boxes & Keys ...............................................................................................9

In-Room Safes..................................................................................................................10

Lost & Found ...................................................................................................................11

Conventions, Meetings, Exhibits & Shows....................................................................13

Baggage & Bell Staff .......................................................................................................15

Cleaning of Guest Rooms................................................................................................17

Guest Room Security.......................................................................................................20

Automobiles & Contents.................................................................................................22

VIP Security.....................................................................................................................23

Guest Security

V-2


Written Security Policy

Security and safety in the hospitality industry cannot be standardized because the

elements that define reasonable care are site and time specific. Each hotel should

develop its own property specific set of security guidelines and policies. These written

policies should identify and address the hotel’s efforts in training its staff, educating its

guests and documenting the efforts and level of care taken by the hotel to help meet its

duty of care.

There is no universal “off-the-shelf” set of written security policies and procedures that

would appropriately address the unique security needs of each property. Rather this

document is offered as a guide to assist hotels in developing their own unique plan. The

adoption of a written security plan will help quantify the hotel's efforts in providing

reasonable care and provide a road map for the hotel’s security program.



Guest Information & Privacy

Audit Packs

Guest information such as guest name, address and credit card numbers can often be

found in audit packs. To help prevent an employee or third party from using this

information, audit packs should be stored in secure areas. Access should be limited to

accounting staff.

Express Checkout Folios

To protect the identity of guests and to ensure their privacy, express checkout folios

should be slid completely under the door so that they cannot be retrieved from the hall.

Guest address and credit card information should not be printed on the folio.



Advance Room Assignments and Priority Club Check-In

Advanced room assignment and Priority Club check-in folders which contain room keys

and guest information should be positioned so they cannot be retrieved or have their

contents viewed from the lobby side of the front desk.



Breakfast Menus

Breakfast menus which are hung on guestroom doors should not contain the guest's

name.

Room Assignment Sheets

Room assignment sheets should not contain the guest's name or payment information. In

the rare occasion that guest name information is required for customer service purposes,

room assignment sheets should remain in the possession of the housekeeper at all times.



Registration Information

Registration information should not be released to any unauthorized individuals,

including friends and family members. Employees should be required to forward all

inquiries for guest records to the General Manager or their designee.



Guest Security

V-3


Individuals requesting to make changes to their registration information, including

registering additional parties or changing payment method, should be required to provide

positive identification in the form of photo ID or verification of registration information,

including signature.

When dealing with law enforcement officials, the hotel should ensure that proper

procedures are followed when releasing guest information. The hotel may verify if a

guest is currently registered at the hotel, but should not provide any additional

information without a court-approved, signed subpoena.



Visual Access

Each hotel should be inspected to ensure there is no unauthorized visual access into any

guestroom, public restroom, or any other area where an individual would expect privacy.

Any area found to have unauthorized visual access should be immediately placed out of

order until repairs can be made.

If the hotel has chase-ways or service areas behind the guestrooms, a uniquely keyed

dead bolt lock should be installed on the door to the chase-way. The keys should be kept

in a lock box and the key to the lock box should be placed on the MOD key ring and

signed out when necessary. Any claims of unauthorized visual access should be taken

seriously and investigated.



Phone Procedures

Proper telephone procedures are necessary to ensure guest privacy. To ensure the

legitimacy of a call, calls ringing to a guestroom from an outside line or house telephone

should first ring to the hotel operator. To help ensure this, all house telephones should be

programmed to ring directly to the hotel operator.

When a caller asks to be connected to a room, the operator should ask the caller for the

name of the guest they are calling. The name should be verified against the guest’s

registration information. If the caller cannot provide this information, the call should not

be forwarded. Room numbers or names of guests should not be released over the phone.
Guest Security

V-4


Key Control & Procedures

It is essential for each hotel to establish sound key control procedures. These procedures

should include regular inventories, secure storage, and re-keying of locks.

Electronic Locks

Hotels utilize electronic locking systems for the hotel guestroom door locks. These locks

are distinguished from conventional key-accessed door locks by the presence of a credit

card-sized slot or an opening designed for a computer or isolinear chip. Keys for these

locks are reusable, reprogrammed at check-in and are used to gain access to guestrooms.

Major benefits of these systems include:



  • Ability to interrogate locks

  • Ease of re-keying locks

  • Conduct audit trails

  • Improved security

  • Automatic expiration of cardkeys

When an appropriately programmed key is inserted into the lock, the interior mechanism

reads the computer code. When a valid key is removed, the lock is unlatched allowing the

lever to turn and the door to be opened.

As with hard key controls, electronic locking systems in hotels allow for many levels of

controlled entry. These include:


  • Guest - access to assigned guest room(s). The card code is changed for each

  • registering guest.

  • Suite - access to the main entrance door to the suite plus one of the sleeping areas; a

  • second key allows access to the main suite entrance door plus another sleeping area

  • of the suite.

  • Section/Floor Master - access to a predetermined number of guestrooms in a section

  • or floor.

  • Supervisor - access to several designated sections or floors.

  • Grand Master - access to all doors in the hotel.

  • Emergency ("E" key) – Grand Master which overrides the deadbolt of a guest room

  • lock.

  • In addition to these controls, electronic locking systems offer additional features as follows:

  • Blocking - prevents access to the guestroom by the last issued guest card. It is

  • cleared by the next guest level key card issued for that room.

  • One-Time - opens a specific lock only one time and then is cancelled.

  • Display - allows a member of hotel management to lock a door to a specific room

  • preventing entry to that room by use of any hotel key except the current guest key

  • and the "E" key. Reuse of the display key will clear this lock back into the system

  • (can be used for vendors with wares displayed in their room).

Guest Security

V-5


  • Back Up - prepared guest key cards for issuance when there is a power failure

  • and the computer cannot function. Allows access to designated guestrooms that

  • have a battery powered electronic door lock.

  • Programmer - programs locks, sets date and time.

  • Inter rogator - a piece of equipment which downloads the details of recent lock

  • openings. In some systems, a single piece of equipment functions as both the

  • programmer and the interrogator.


Key Security

Duplicates of keys should not be made. If an additional key is required, uniquely coded

keys for that lock or section should be made. Lock interrogations will reveal the exact key

that was used. This will help ensure accountability.

To maintain accountability, each key should be uniquely coded and identified. Keys

should be secured in a locked cabinet, signed out and signed in on a daily basis. In

addition, keys may be programmed to work during designated shifts and will not work

during any other time. Keys should not be removed from the property. If an employee

takes a key home, they should be required to return the key to the property immediately.

Blank key cards for guestrooms are to be stored in a secure manner, in a locked cabinet

under the control of the Guest Service Manager with restricted access as designated by the

General Manager. Backup keys and blank key cards for all other levels should be stored in

the General Manager's safe. The issuance of each department level card and all error/voids

should be automatically recorded through the use of a printer. The record of levels and

number of keys made, and by whom, should be reviewed to ensure key controls are

maintained.

Security of the key cards is critical. If a master level key is lost, stolen or compromised,

immediate action should be taken. The security code for that level should be changed and

new keys for the affected sections should be made. The old keys will continue to function

in the affected locks until the new key is inserted.

Employees should be trained that their key is for their use only. They are not permitted

to admit other employees or guests to a guestroom. An employee who is authorized to be

in the guestroom should have their own key. Guests should be informed “To help ensure

guest safety, I am not authorized to open doors for guests” and referred to the front desk

to obtain access.

In addition to security of the keys, key security also encompasses the ability to make keys.

The electronic key system will allow anyone with knowledge of a password to make a key.

With the correct password, master level keys can also be made. Therefore, each hotel

should consider the following policies when allowing access to key making equipment.


  • Passwords – Each person who is authorized to make keys should have their own,

  • unique password consisting of at least 4 characters. When an electronic lock is

  • interrogated, it will tell what key opened the lock, when the lock was opened, and who

Guest Security

V-6


made the key that opened the lock. Therefore passwords should never be shared.

  • Timed Log Off – Some key making systems allow the automatic log off time to be

  • changed. Each hotel should ensure that the automatic log off time of their key system

  • is set for less than one minute. Therefore, one minute of inactivity will cause the

  • system to automatically log off and subsequently require the use of a password for

  • further keys to be made. This will help prevent someone from making a key and

  • walking away, allowing additional keys to be made without the employee’s knowledge.

  • Key Making Access – Each person who is authorized to make keys should be granted

  • an access level that is appropriate for their job description. Front desk employees

  • should only be granted guestroom key making ability. If the person whose job

  • description entails the making of master keys also checks in guests, then they should

  • have two separate access levels (one with and one without master level access) with

  • separate passwords. This will help prevent someone from making a guestroom key,

  • leaving and having another person come up and make a master key before the system

  • has logged off.

In addition to limiting the access to the key making equipment, the hotel should also keep

the local time current for all guestroom locks and the central key making computer. This

will help reconcile lock interrogations and give accurate reading of when keys were made

and when guests or employees entered a room. This should take a priority whenever a

time change occurs (such as the beginning or end of daylight savings time).

Also, each hotel should change the master codes for all of the master keys a minimum of

once a year. This helps ensure guest and employee safety by restricting the length of

time master key codes are active. This task may be accomplished at the same time as a

time change.

Guest Keys – If a guest requests a replacement room key, care must be taken to ensure

that the individual is registered to the room. The guest should be required to produce

positive identification in the form of photo ID or verification of registration information

and comparing signatures on the registration card. If the guest cannot produce positive

identification, additional keys should not be issued. Additionally, the hotel may choose

to escort the guest to the room and allow admittance only after photo identification has

been produced.

Victims of domestic abuse and other crimes often seek refuge in hotels. To help ensure

guest safety, guestroom keys can only be provided to registered guests. Unregistered

guests and family members should not be granted access to guestrooms. At check-in, if a

guest requests more than one room key, the guest should be asked if they would like any

additional parties registered to the room.

In the event that an unregistered guest requests access to a guestroom, they should be

directed to a house telephone to make contact with the guest. If the guest is not in their

room, the unregistered guest should be informed “To help ensure guest safety, we do not

provide keys or guest information to unregistered individuals.”

The hotel should offer to leave a message for the guest and may offer hotel amenities at

the hotel’s discretion.

The guest room number should not appear on the room key.

Emergency Keys - The emergency key, or "E" key, should be used for emergency

situations only, and should not be used in the normal course of business. The hotel should

maintain two “E” keys. Additional keys should be maintained where required by the local

governing authority. One “E” key should be placed in a sealed envelope with the

manager’s signature and date written across the seal. This envelope should be secured in

the General Manager’s safe or the MOD’s safety deposit box. A second "E" key should be

secured in a break-glass box convenient to the front desk for use in emergencies. The key

box should not be visible from the lobby side of the front desk. Usage of either key should

be recorded in an “E” key log.


Yüklə 2,18 Mb.

Dostları ilə paylaş:
1   ...   4   5   6   7   8   9   10   11   ...   31




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin