SlideShare uma empresa Scribd logo
1 de 102
Baixar para ler offline
HOTEL SECURITY 2
Problem(Trip Advisor) 
 “Worst trip ever, felt unsafe, unauthorized people entering the 
rooms, very little was done when we told the person in charge 
add” 
 Reviewed 3 February 2013 via mobile 
 17 people found this review helpful 
 The person in charge would not take ownership for what happened 
implied it was our fault for not locking the door properly and also 
seemed to imply we were lying. We did not feel safe or respected. I 
would not recommend this resort. 
 Stayed January 2013 
 Value- 1 
 Location- 4 
 Rooms- 3 
 Cleanliness-2 
 Service-1
Response 
 Customer Servic... B, Director de Relaciones con Clientes at Grand Bahia Principe Jamaica, responded to 
this review 
 9 February 2013 
 Dear guest, 
First of all, we regret that we were not able to fulfill your expectations and we would like to offer our most sincere 
apologies for the inconveniences caused. 
We would like to acknowledge that we have very strict control of all issues reported and regarding this particular 
case, we are not able to find any issue regarding the situation mentioned. We can ensure that all the security 
protocols established by the chain are strictly followed. In addition, please kindly note that we allocate all our 
effort and measures at our guests disposal to take extra security measures and avoid such situations. 
Of course, we would like to add that we are at our guest’s disposal any time to provide them the necessary 
assistance to denounce situations or cases as you mention to the relevant authorities of this country. 
We deeply sorry if you had the impression that our resort is unsuitable and unsafe, we are working every day to 
provide our guest a very pleasant and safe place where you can enjoy your holidays and we further regret that 
you felt that we were not able to fulfill your expectations 
Yours faithfully, 
Helena Gomez 
Customer Service Manager 
 Report response as inappropriate
 “Once Again A Week In Paradise” 
 Reviewed 3 February 2013 
 1 person found this review helpful 
 My wife and I made a return visit to Gran Bahia Principe Jamaica Jan 26 - Feb 2, 2013. As was 
our trip last year to this resort, everything was perfect. The only downfall was due to huuricane 
sandy destroying the banana crops, we were unable to indulge in our favourite drink the "dirty 
banana." 
I had requested that our room be in roughly the same location as last year and they accomodated 
with a room four doors down...thank you Helena! The rooms are absolutely beautiful and 
spacious. Our housekeeper was fabulous and worked very hard to clean our room. 
The resort is very large so you do a lot of walking but everything is so beautiful that the walks are 
nice. The grounds are perfectly manicured and the beaches are raked daily. The staff all work 
extremely hard and should be congratulated on a job well done. 
The beach to the left of the resort is awesome. If you walk all the way to the far end, near the 
nude beach fence, the snorkeling is great. Beautiful colourful fish will eat weiners right out of your 
hand. We seen a really cool stingray on our second day but unfortunately we couldn't get a 
picture of him. 
Once again my wife and I did not use our a-la-cart meals because the buffet always had lots of 
variety. Again the staff were great, always greeting you and attending to your needs. 
Everything about this resort is 5 star. Pay no attention to bad reviews. People who rate the Gran 
Bahia Jamaica badly probably will never be satisfied with any kind of resort. I highly recomend it 
to anyone who wants a carefree get away to paradise.
The Presence of Unauthorized 
Person 
 It is not always easy to challenge someone’s 
right to be at your property. Many times, the 
manager will handle problem visitors. 
 Being the staff of the hotel you have the right 
as well the responsibility to tactfully approach 
a visitor who appears to be lost or out of place.
The Presence of Unauthorized 
Person 
 A person whom hotel suspects to be undesirable or a 
person of ill-repute may be disallowed access into any 
part of the hotel premise whether public or private. 
 The appropriate authority in the hotel(Security 
Director/ Manager or Resident Manager/ General 
Manager shall issue the person with a notice of 
prohibition of entry after taking a record of the 
person’s full particulars, including a photograph. 
where possible, and detailed description. 
 Every security personnel should be informed of such 
person and if the person persists in entering the 
premises, legal action can be taken to such persons 
for civil trespassing.
The Presence of Unauthorized 
Person 
 If a guest brings a companion whom the hotel 
suspects to be a person of ill repute, the hotel 
should insist that this person be properly 
registered as a guest. 
 Since crimes committed by prostitutes usually 
occurs between 2300 and 600 hours.
Steps to deal with Unauthorized 
persons 
 Ask if the person is the guest of the hotel. If 
you have reasons to believe that someone is 
not a guest, ask his/her business on the 
property. 
 Ask to see a room key. If you think someone 
may be an intruder, ask to see his or her room 
key. 
 Explain policy. Tell the visitor your property 
policies regarding the use of guest facilities.
 Remain calm. Be polite, but firm, when 
speaking with a visitor. Even if the person is 
not a guest, you need to treat him or her with 
respect. 
 Notify the proper authority, or escort the 
unwelcome visitor off the property, be sure to 
follow your property’s procedure. 
 If you feel threatened or intimidated by a 
stranger, leave the area immediately and 
inform your supervisor or security. Your safety 
is important too..
Safety Deposit Box 
 A safe deposit box, also called a safety deposit box is 
an individually secured container, usually held within a 
larger safe or bank vault. 
 Safe deposit boxes are generally located 
in banks, post offices or other institutions. 
 Safe deposit boxes are used to store valuable 
possessions, such as gemstones, precious 
metals, currency, marketable securities, important 
documents such as wills, property deeds, and birth 
certificates, or computer data storage that need 
protection from theft, fire, flood, tampering or other 
reasons.
The typical considerations and steps to 
consider for safety deposit boxes in the 
hotel: 
 Below are the typical considerations and steps to 
consider for safety deposit boxes in the hotel: 
 In the typical arrangement, a renter pays the hotel 
fee for the use of the box, which can be opened 
only with production of an assigned key, the 
bank's own guard key, the proper signature, and 
perhaps a code of some sort. 
 It is the responsibility of management to develop 
and monitor safe deposit procedure for its 
property. 
 All employees with safe deposit responsibilities 
should be thoroughly trained in proper safe 
deposit procedures and are aware of the reasons 
for the various rules.
 Supervisors should impress upon safe deposit attendants the 
importance and seriousness of this responsibility, ask for an 
immediate report of any unusual incident, and require 
accurate, up to date records and complete compliance with 
procedure. 
 Safe deposit boxes should be located in an area to which 
there is limited access and where it can be visually 
monitored at all times. 
 If CCTV is used one camera should be turned on the safe 
deposit box area. 
 Unauthorized persons, whether guests or employees, 
should not be permitted in the area. Such a location may 
be in the vicinity of the front desk, where the box may be 
secured while still visible to the guest. 
 In the case of guest valuables with a declared value of 
Millions of rupees, hotel may exercise it discretion to accept 
the safe custody of the valuables but special security 
arrangement (e.g. having 24 hours security guard) or such 
similar arrangements may be deemed necessary.
Measures to safe guard guest’s 
property 
 The following measures should be effectively 
implemented to safe guard guest’s property: 
 Guest should be provided with a safe deposit box 
facility to store valuable items, jewelry, etc. 
 The availability of safe deposit boxes should be 
verbally conveyed to each guest on checking in or 
well placed notice be put up to advertise the 
service. 
 The guest should be provided with a signature 
card and requested to complete it correctly. 
 The safe deposit attendant shall then obtain a 
vacant box and accompanying key.
 A dual-control locking system should be used for all 
lobby safe deposit boxes whereby it can only be 
opened with two keys- master key to that box and an 
individual key is handed out to the guest. 
 The guest then should then deposit the items in 
the safe deposit box themselves. (Most properties 
do not allow employees to have physical contact with 
items placed in the boxes by guests). 
 The attendant will secure the box and hand the 
individual key to the guest. The guest should also be 
cautioned to safeguard the key, failing which a 
charge may be levied. 
 The guest must be asked to sign his/her signature 
on each and every occasion that he asks for and 
returns key to the box.
 The staff attending to him ensures his 
signature tallies with the specimen 
signature on the card before allowing him 
access to the box. 
 The hotel should then retain the signature card 
for a specified period of time as required. 
 Where safe deposit boxes are not available, 
deposit envelopes are often provided with 
a claim tag attached. The envelops may be 
stored together in one safe with each depositor 
holding his claim ticket.
Lost and Found 
 Lost items in the hotel can be a great issue to 
the guest as well as the hotel reputation. 
 There needs to be a clearly defined rules and 
procedures regarding the lost and found item. 
 In the case of any miss-placed items from the 
guest room or safes, it will be the hotel’s 
responsibility to repay the guest.
Procedures for Lost and Found 
In a hotel lost and found functions rests with the housekeeping, security or 
the concierge, the following procedures should be adopted: 
 All articles found by hotel personnel, guests or customers should be 
immediately forwarded to the lost and found section. 
 A standard note should accompany the article indicating the date, time, 
location, and description of the article as well as the name of the finder. 
 All found items, which have been logged, bagged and tagged, should be 
stored in a secure place. 
 Some properties place wallets, jewelry, money, credit cards and other 
valuables in a safe deposit box or in the Assistant Manager’s Safe. 
 Some hotels write to the guests who have left behind articles found in 
guestrooms requesting them to contact the hotel for proper identification 
and return of items.
 However, some hotels feel that this is inappropriate, 
arguing that the guest may wish to keep his/her stay at the 
hotel confidential. 
 Telephone operators or any other hotel personnel should 
be instructed to direct all inquires about lost and found 
articles to the department concerned. 
 A note can also be included in the room tent-card to this 
effect. 
 When checking a claim, the person in charge should verify 
(by ask the claimant to describe the article lost) that it is 
not a fraudulent claim.
 Articles, which are not claimed by the rightful owner, may 
then be disposed off in accordance with the regulation with 
regard to “found property”. This regulation could be 
presenting it to the police department, or distributing it to 
the employee who found it. 
 All employees should be warned that misappropriation or the 
keeping of articles not belonging to them is an offense 
punishable by law. 
 It is not a case of “finder being keeper”. An incentive to 
cultivate employee honesty in such matters can be insulated 
as for example, a regular honest employee award.
Departmental Responsibilities in 
Guest and Asset Protection 
 A property’s security concern does not only include risks and 
dangers to its guests, the staff and its premises. The property’s 
assets must also be protected . The assets of the hotel are 
vulnerable to loss and damage, which can add up to a lot of money. 
 Staffs, guests and outsiders can cause loss and damage to hotel 
assets. Assets protection procedures can range from dealing with 
theft by employees and guests to avoiding losses through unwise 
extension of credit. 
 Statistics have shown that majority of lefts of hotel assets are 
committed by staff. 
 The nature of their work provides staff with many opportunities for 
misappropriation hotel assets with good resale value and personal 
use value. Popular items lost include linens, silverware, and food 
and beverage items 
 Every department has a role to play in asset protection. Each 
department should think of effective ways to secure its operations 
against theft.
Human Resource Department 
 Pre-employment screening and employee 
background checks are more common these days 
than ever before. 
 Employers need to know who they are hiring and 
they have a duty to their shareholders, 
stakeholders and co-workers to keep everyone as 
safe as possible. 
 Finding out the truth about someone using a 
background check is quick, inexpensive and 
allows an employer or H.R. Department to take 
the guess work out of hiring.
Criminal Conviction Check 
 Although a conviction(s) may be listed or disclosed 
during the recruitment process, it is important that the 
conviction(s) only be considered based on job 
relatedness. Convictions related to drugs, violence, or 
sexual behaviors are generally considered job related 
due to the nature of the environment. 
 The following are additional factors to consider: 
 •Timeframe of the conviction; 
 • Age of the person when the offense/conviction 
occurred; 
 • Severity of the crime; 
 • Position type and location; and 
 • Subsequent work history.
Check by Professional 
Investigator 
 These are checks that are performed usually for very special job 
positions or top level job positions within the organization. 
 They involve in private investigator or private investigating agencies 
specializing in detailed investigation which the internet cannot 
provide. 
 Applicants from all walks of life now know and expect that a 
background check will be performed on them when they seek new 
employment so they try to remove all the unwanted information from 
the internet as that the main source of information for the 
employers. 
 There are a growing number of websites that cheat people and 
most of these companies are run by computer “experts” who are 
looking to sell information gathered from computer databases rather 
than investigating an applicant’s background at the source. 
 These same pre-employment screening firms are big on disclaimers 
and short on results. 
 The private investigators or their agencies deploy employee 
screening processes which are completely legal, confidential and 
conducted by an independent agency specializing in pre 
employment background check and criminal record searches. The
Medical Screening 
 Pre-employment medical screenings can contribute to reducing 
instances of injuries on the job, which occur as a result of physical 
unpreparedness and can lead to costly workers' compensation 
claims. 
 They can also help companies to send the message to candidates 
that they are serious about their employees' health. 
 Hotel can have many challenging jobs requiring large amount of 
physical endurance and sound health is the key to success of 
employees as well as the organization. 
 The procedure will include the following process: 
 Physical screening by an external medical examiner. 
 Submission of Medical History Report 
 Required vaccination as per the hotel rule. In case not fulfilled, the 
applicant will have to be vaccinated- Hepatitis, Measles, Malaria 
etc. 
 Required medical tests as per the hotel law- AIDS, Hepatitis, TB or 
other communicable diseases.
Credit Check 
 Companies are running credit checks on job applicants more 
often and are using that credit information as part of the 
process when making hiring decisions. 
 A Society of Human Resources Management (SHRM) survey 
reported that 60% of employers check the credit of at least 
some job applicants. 
 A job applicant credit report will show details about you and 
your finances, including your name, address, previous 
addresses, and social security number. 
 It also shows the debt you have incurred including credit card 
debt, mortgage, car payment, student loans, and other loans 
and your payment history, including late payments and 
defaulted loans. 
 Such checks are specially performed for the cash handling 
employees but a written consent from the applicants is 
required to run such credit checks as they could be very 
embarrassing or provocative or invasion to privacy to the 
applicants and could be a sue able case.
Bonding 
 Companies bond employees to protect against 
employee theft and dishonesty. 
 
 Bonding provides the company with compensation in 
cases of property loss due to the acts of an employee. 
 
 When employees have access to money or valuable 
property, bonding protects the organization. 
Companies also bond employees to protect 
customers in the event of property damage. 

Bonding during Hiring 
 Employers can begin bonding during the hiring 
process. The company conducts preliminary 
background investigations to determine if a job 
candidate is bondable. Employers can choose not to 
hire candidates that cannot meet the requirements of 
bonding. 
 Self-employed workers can also obtain a bond to 
cover damage they cause while working for a 
customer. For example, a self-employed house 
cleaner can obtain coverage to protect against 
damage to the customer's home. 
 Businesses and self-employed workers use bonding 
in advertising when listing the attributes of the 
company. 
 These bonds can be for single person or for all the
Background Investigation for 
Bonding 
 The employer must submit information to the 
bonding company, which is necessary to 
conduct a background investigation 
 The bonding organization will search the 
applicant's background for prior criminal 
records and verify references to determine the 
honesty of the employee. 
 Applicants who meet the bonding company's 
requirements are covered while working for 
the employer.
Warning on application form 
 Application should include a clear warning 
stating that fraud data, fraud certificates or any 
attempt to defraud the fraud claims and 
applying will be an act of deceive and could be 
punishable by crime on identification and the 
employee will be terminated even if he/ she is 
employed by the organization. 
 This will help filter the fraud or deceiving 
candidates to some extent and back ground 
check will help further filter it.
Check significant gaps in 
employment record 
 Many candidates could be hiding a number of problems in 
their past. Job seekers routinely lie on their applications and 
resumes, concealing details that would make them a bad 
hire. 
 On the other hand, employers may be confronted with gaps 
in employment on a resume or application. 
 While the reasons behind the gaps may be completely 
innocent, verifying what the candidate was doing during the 
lapse is essential. 
 If neglected, employers may expose themselves to 
potentially disastrous consequences. 
 Although gaps could be for a better cause such as education 
or training or due to family obligations, there could be a dark 
past that the candidates may be hiding. 
 There could be two reasons why gaps in employment should 
raise a massive red flag.
Reasons for Gaps 
Possible Criminal History 
 A potential hire may have spent a 2-year lapse by traveling 
through Europe and exploring the world. But, what if he 
didn’t? It’s entirely possible that he actually spent that time in 
prison. If an employer fails to check the gap in history, they 
might never uncover the details. Hiring that person could lead 
to employee theft, harm to the staff and a number of other 
outcomes. 
 Ineffective Background Checks 
 There’s no way for an employer to conduct an effective 
background check when a job candidate has an unexplained 
gap in history. The reason why is because criminal records 
are typically kept at the county level. If the employer doesn’t 
know where the candidate was during the lapse, it’s 
impossible to know which county, or counties, to search for a 
criminal history
Other Personal functions 
pertaining to security 
 Apart from the careful considerations while 
hiring the right employee for the company, HR 
is also responsible for training on security 
matters, continuous rapport between the 
employees as well as conducting interviews 
during exit.
Training Employees on Security 
Matters 
 The HR department is responsible to plan and 
help execute training regarding the hotel in 
cooperation with the security department. 
 HR is responsible not only for training security 
related training to all the staffs but also train the 
security personnel for motivation and other ethical 
basics such as handling a situation in a hospitable 
manner and using brains than effort as most 
security guards come from an army or police 
background and they are not courteous or polite.
Trainings 
 Motivational Training 
 Groups Dynamics 
 Fire Drills 
 Fire Safety equipments use and procedures 
 Natural Calamities emergency procedure. 
 Terrorist Situation Procedures 
 Hospitality Culture Trainings 
 Interdepartmental Training 
 Public Speaking 
 Guest Safety 
 Unusual Events Procedures
Record of Issued items and their 
collection on Departure 
 HR also has the function of issuing and keeping a record of 
all the items issued to the employees on their selections. 
Items such as Name Tags, identity Card, Room Keys, Floor 
or Room Keys, Uniforms etc. 
 These may be misused by unauthorized person so a clear 
issue and record of such items in necessary. 
 The lost of such items should be reported and sometimes 
may be compensated from the employee as it happens due 
to their negligence. 
 
 Such its are to be submitted at the time of exit or resignation 
from the company as they are the private property of the 
hotel and can be an issue to the security as anyone could 
disguise themselves as the hotel employee and could access 
to rooms without authorization.
Conducting Exit Interviews 
 An exit interview is a meeting with a terminating employee that is generally 
conducted by Human Resources staff. The exit interview provides your 
organization with the opportunity to obtain frank, honest feedback from the 
employee who is leaving your employment. 
 Sometimes in an organization, it is necessary to know why the staffs are 
willing to move to another organization. 
 Many times it is because of the basic facts- money, facilities or sometimes 
personal reasons but what if there is a dark reason which he/she is not able 
to cope with and is leaving the hotel. In such case, exit interview helps a lot. 
 May be there is a manger who molests lady or even men. This could be a 
great threat to the hotel as the manager may also molest hotel guests. A 
manager or supervisor has serious anger management issues and may 
harm the employee or even the hotel guest and due to the fear of getting 
into unnecessary trouble the employee may simply want to quit. 
During the exit interviews, most of the time, departing staffs will tell the truth 
about the things they didn’t like and what was the reason for their departure 
which would they not have expressed during their working tenure. 
 This helps the HR to point out the areas that they or the organization has 
to develop as turnover is said that hiring new staffs is 60% more expensive 
than retaining the staff.
The Engineering Department 
 The Engineering Department plays an 
important role in the security of a property. The 
department maintains the security devices and 
systems on the property.
High priority to security/ life-safety 
system/device 
 The engineering department has the responsibility of 
maintaining the equipments within the hotel and 
rooms. 
 The rooms and the hotel will have many security 
related equipments such as surveillance equipments, 
physical barrier equipments, communication systems, 
guest room security equipments which are utmost 
priority to all engineering department as they are life 
saving equipments and can save the hotel from a lot 
of damage and loss of innocent lives. 
 It is the priority of the engineering department to look 
after the work orders (maintenance request) of such 
equipments than other functional equipments.
Key Role During Emergency 
 Emergency situations can come when you are least 
prepared. The engineering department with its 
coordination with the security department helps to 
plan and get ready for emergency situations. 
 Although during an emergency situation, security 
personnel help the victims, the engineering 
department will be working towards reducing the 
cause or communicating the emergency situation. 
Informing the local emergency authority- fire 
department, bomb squad, police authority, SWAT, etc 
 Other functions would be helping people vacate the 
emergency premise, help with power break downs, 
operation of generators, helping people out of stuck 
lifts, etc.
Key Control procedures 
 
 Nowadays all hotels have electrical door systems. Although 
they are expensive to install, they are the most effective 
system in guest room security proving to be most efficient in 
the long run. 
 
 Engineering department is responsible for maintaining the 
efficiency of these locking systems periodically changing the 
codes and some times changing the keys as well. A key can 
be changed only for 5 times then the whole lock configuration 
has to be changed. 
 
 The police authority will ask to change the lock configuration 
every 2 years even if the key has not been changed for 5 
times.
Optimization and control of 
equipment Usage 
 The engineering department helps not only maintain the 
equipments, tools and materials but also helps to control their use in 
order to minimize the cost as well as ensure their proper use only at 
the right time. 
 Tools, Material or Equipments may be elementary , personal 
protection or defense equipment with all the equipments used for 
functioning the operation falling under the elementary and arms and 
hazard relieving or preventing equipment under the personal 
protection or defense equipments. 
 The Engineering department ensures that these equipments are 
readily available but control its unnecessary usage by putting it in 
safety covering which could be accessed only during emergency 
situations and procedures with regulations. For e.g fire blanket 
inside proper covering but readily available, fire extinguishers with 
safety pins, fire hose in breakable glass boxes with fire axe ready to 
break it, etc. But access to these without an emergency situation 
will be a breach in the code of conducts and will be punishable. 

The Rooms Division 
 Rooms Division is the name of the department 
within a hotel that includes housekeeping, 
concierge, porters and front office as well. It has 
been shown that the majority of hotel revenues 
are generated from Rooms Division Department 
under the form of room sales. 
 Hotel and other accommodation facilities are the 
most vulnerable establishments and an easy 
target to terrorists and other dangers as it is a 
public friendly establishments with no trespassing 
restriction apart from the few restricted areas and 
guest rooms.
Front Office 
 Front office personnel are important allies of 
the security staff. 
 The door attendants, bellhops, car valets and 
front desk staff continuously observe whoever 
arrives at or departs from the premises. 
 Any suspicious activities or circumstances 
involving the guests or any member of the 
public entering the premises can be reported 
to security.
Key Control 
 Guestroom Security locks can be a critical aspect of guest 
protection. The guestroom doors and windows must be 
fortified to prevent forced entry. Installation of burglar proof 
door locking system and effective Key and key control 
procedure is to be followed by the hotel to ensure guestroom 
safety against theft. 
 Effective Key control in hotel is essential to the security of a 
lodging property. All keys whether metal or electronic should 
be adequately controlled. 
 The Front office staff or personnel should have detailed 
information regarding the issuance of the key and the receipt 
of the key. Apart from that any changed keys, discarded keys 
or keys that have their code changed should be properly 
recorded in log books and informed to the engineering and 
security departments.
Things to keep in mind while 
handling keys 
 Keys should be stored separately and 
securely. 
 No unauthorised person should be allowed 
access to any key, either to examine or handle 
it, since a photograph or impression can be 
taken in few seconds and duplicate 
subsequently made. 
 Keep a log book of all keys signed out. 
 Establish protocol for distribution of keys. 
 Use keys that do not identify the property’s 
name, address, logo, or room number.
 When keys are lost or stolen, the locks should 
be changed or rotated to another part of the 
property. 
 Authorised employees should remind guests 
to return keys at check-out. 
 The loss or suspected compromise of a key 
should be reported immediately and, after due 
investigation, a decision be made as to 
whether or not the lock should be changed. 
 Place well-secured key return boxes in the 
lobby, at exit points of the property, and in
Information Handling 
 The front office department, specially the reception and the 
telephone operator, receives a lot of information regarding the 
guest and it is very crucial to respect the guest’s privacy and 
confidentiality. The front office checks in alot of guest and keeps 
record of personal data regarding the guest in their information 
system. 
 Hotels are obvious targets for identity and financial theft for 
many reasons. Hotels transact business through credit cards, and 
those credit cards are kept on file and can be accessed multiple 
times during a guest’s stay. The possibility that a credit card charge 
will be recorded occurs with each night’s room charge, room 
service, bar or restaurant bill, spa charge, and so on. 
 Every charge is another opportunity for an identity thief to access 
the information using sophisticated computer hacks and other 
malicious software, generally without the hotel’s knowledge.
Following procedures are to be 
followed for securing information: 
 Hotels operators should inventory potentially 
sensitive information and document on which 
computers, servers and laptops it’s stored. 
 Operators and owners should keep sensitive 
information on the fewest number of computers or 
servers, and be sure to segregate it — the fewer 
copies of data you have, the easier it is to protect. 
 Utilize encryption for storing, and secure connections 
for receiving or transmitting, credit card information 
and other sensitive data. 
 Firms should design, institute and follow an effective 
privacy policy, including policies for using social 
media, and should be careful not to overstate the 
effectiveness of their measures. Remember – no 
system is completely safe.
 When implementing a wireless system, use a 
good firewall and a secure wireless connection. 
 For internal communications and information, 
protect sensitive data with strong passwords and 
change passwords on a regular basis. 
 Since much, if not most, of computer systems and 
services are handled by vendors, check their 
security practices. 
 Apart from computer information, telephone 
conversation should be recorded only for the 
guest purpose and discussion of guest cases 
should not be practiced within the staffs and 
proper training for handling guest information will 
help achieve this target.
Control Centre for elevator and 
entrance 
 The Front office department will have lift or elevator operators who will 
monitor the lifts. 
 Keeping a vigilant eye and suspecting any unusual behavior in customers 
are the keys to its safety. 
 Lifts and elevators are situated in such a way that it is easily visible to the 
front desk and normally at the side of the bell desk which helps the staffs to 
monitor the use of elevator and identify unauthorized guest using the 
elevator to guest rooms as they are the ones who check in the guests. 
 The Door man also a part of the front office is the first contact to the guest 
and will immediately notice any unusual event with the guest. Scanty 
baggage guests, or unusually large baggage are suspicious guest and 
proper security checks on them is a must. Equipments such as metal 
detectors, scanners could be used in vulnerable public areas to ensure 
safety in entrances. 
 Elevators have a emergency calling equipment build inside which is 
attached to the engineering and the telephone operator department which 
will handle panic calls received by guest stuck in the elevator helping front 
office and the engineering department to identify the lift as well as carryout 
quick action simultaneously with comforting the guest through the 
emergency telephone line.
 Assets Protection 
 
 Front Office is also responsible towards protecting valuable 
guest assets of the hotel guests. Assets protection is a great 
facility provided by the hotel which not only increases the 
level of satisfaction and safety of the in-house guest but also 
business of the hotel itself as the guest prefer hotels 
providing these kinds of services to others not providing it. 
 
 It gives the hotel that extra income with the competitive edge. 
 
 
 The Front Office provides the following protections:
Valet Parking 
 Vehicle parking is an issue to any guest while visiting or staying at a hotel. The front 
office department has a separate division called the Valet parking working for this 
issue. 
 Valet parking is a parking service offered by some restaurants, stores, and hotels. 
In contrast to "self-parking", where customers find a parking space on their own, 
customers' vehicles are parked for them by a person called a valet. 
 
 This service either requires a fee to be paid by the customer or is offered free of 
charge by the establishment. 
 
 Car jacks or car theft are seen every where as well as the problem of car blocking 
the way of another resulting to damage like scratch, dent, broken windows and 
mirrors of the car blocking the way are common. 
 
 Sometimes, a guest will have to walk a long distance where he has parked with a 
hand full of personal belongings making it very difficult for him. 
 
 All these issues are addressed by the valet parking as the key is with the valet and 
he will safely park and on request will safely deliver the car to the hotel or restaurant 
door step saving the car as well as the car driver from unwanted hassle, loss or 
inconvenience. 

 Guest Luggage Security 
 
 The Doorman or the bell boys will attend to the guests 
luggage and are responsible for their safety and proper 
delivery to the guest rooms. 
 
 In case of scanty baggage, the information will be passed on 
to the reception and all point of sale for extra precaution of 
skippers. 
 
 The hotel also has a service called the Left Luggage where 
the departure guest leaves his/ her belongings for a certain 
time before leaving for the airport.
 Safety Information and Instructions In Guest 
Room 
 
 The duty of the bell boy or bell person is not only to 
safely transport the luggage to the guest rooms but 
also to provide valuable information regarding the 
access devices- keys and key card, use of the 
security devices in the room such as the safe deposit 
box and emergency hotlines; other policies regarding 
laundry, AC, TV, Room Service, Mini Bar etc which are 
also mentioned in the information cards along with 
hotel policies and safety procedures. 
 

 Prevent Losses and Bad Debts 
 
 Front Office has the responsibility to protect the hotel from 
skippers who run away without paying their dues and fraud 
by the guests. 
 
 Scanty Baggage guests should be billed clearly and advance 
payment should be taken which could range from 150% to 
250% depending upon the hotel. 
 
 Procedures should be established which ensures that all 
charges made by guests are promptly posted and proper 
procedures for the handling of cash, cheques and credit 
requests to prevent loss from bad debts. 

Housekeeping 
 The Housekeeping Department also has a 
special responsibility for security since its 
employees have direct access to the 
guestrooms and the guests' property. 
Consequently, careful screening of 
housekeeping personnel should be conducted 
during the hiring process:
Housekeeping personnel should be 
trained in: 
 How to react to suspicious persons or reactions? 
 Housekeeping attendants encounter many guests and their 
rooms. While cleaning the rooms, the room attendant may 
come across many suspicious room guests with suspicious 
items found in the guest rooms. 
 They may also encounter guests in the room which they have 
not seen before or guest in guest room corridors whom they 
have not seen before. 
 In this case they must know how to tackle the situations, ask 
questions to suspicious persons and immediately report to 
their supervisors and security department if they find anything 
suspicious about the guest, their room or any visitor in the 
unauthorized areas.
Key Control 
 The housekeeping department has access to all 
rooms of a section or floor. So the room 
attendants should give special care to their keys 
so that they do not misplace or pass it to any 
unauthorized person. 
 
 The house keeping supervisors should keep a 
record of the daily duty allocation to the room 
attendants and the floor or section they are 
suppose to work and the keys should be coded in 
such a way that only the designated floor should 
open the doors.
Responding to Requests to 
enter guestroom 
 People may come up to the room attendants requesting to 
enter the room. 
 
 Unauthorized persons cannot enter the room without a proper 
authorization- key or employee pass (maintenance or 
engineering). 
 
 When an unauthorized person asks to enter a room then the 
attendant will have to ask the person to show the room key or 
any form of identification leading them to the room or else 
politely withdraw and decline and inform that they do not 
have the authority to do so and tell them to kindly get the 
authorization. 
 
 In case of suspicious guest, inform the supervisor and the 
security department.
Checking the security 
equipments 
 House keeping staff are continuously cleaning and 
are continuously in contact to the hotel equipments, 
guest room equipments and other equipments. 
 Checking the room equipments, lights, AC is a regular 
job but the housekeeping staffs should also look out 
for security equipments in the room such as the locks, 
door snatch, telephones, safety deposit lockers, 
emergency indications as well as other security 
equipments outside the guest rooms such as CCTVs. 
 In case of any damages or any malfunctioning should 
be reported as they are there for security and they are 
life saving equipments and should be the first priority 
everybody.
Checking Security Notices 
 There are security notices on how to use the 
equipments, the emergency dial numbers etc 
in the room. 
 The housekeeping should check if all the 
notices in the room are available.
Securing locks in different 
areas 
 The housekeeping departments has many 
areas such as the linen room, storerooms, 
equipments room and the maids pantry have 
to be locked. 
 Hotel normally don’t put CCTV’s or other 
security equipments and could be an easy 
target for terrorist for installing bombs as these 
section go without being checked. It could be a 
place to hide as well.
 Help reduce losses 
 
 The housekeeping department can help clearing room 
service tray and equipments from the room. It could 
be very difficult for the guest to move around and may 
be injured when they collide against these tables or 
equipments as well as damage the equipments. 
 Inventory Control 
 
 Inventory helps to maintain the record of the guest 
room supplies as well as help maintain a steady 
supply of materials. It also protect the hotel from guest 
room thefts by guests by keeping a record of these 
items and immediately know if these items are 
missing.
Laundry and Dry Cleaning 
 . Written policies should make it clear that 
cleaning and laundry services are provided 
only for uniforms required for the job 
assignment. 
 Any violation of this policy may be considered 
theft of the property's services.
Hotel procedures should 
include: 
 Unofficial Use of laundry and dry cleaning services and protection of 
guest laundry 
 
 Unofficial use of laundry such as using office laundry for home use should 
not be allowed. This will not only mix the laundry with the guest but also 
misplace guest’s laundry with personal laundry. 
 
 Guest laundry are very valuable to the guest as they have invested a lot of 
time and effort in buying them and in case of lost or theft, it will be the 
hotel’s liability to pay them back. Hence proper laundry receiving and 
delivery system should be developed. 
 
 Proper code of clothes with laundry forms filled by the guests indicating the 
material, quantity, color and style of clothing should be attached in the 
laundry bags while receiving and proper cleaning and checking of the 
cloths before delivering them to the guest rooms. 

Purchasing and Receiving 
 Since hotels must purchase a wide variety of 
products, supplies, and services in the course 
of daily operations it is necessary to closely 
monitor the activities within the department 
and be on a lookout for potential problems.
Common problems include: 
 Kickbacks in receiving 
 There are several common type of kickbacks, each involve 
purchaser working in collusion with someone from the 
suppliers company. 
 In one kickback scheme F & B products are purchased at a 
higher than the necessary prices and thieves split the 
difference between the real and the inflated price, the 
payment can be in money or gifts, either way the owner is the 
loser. 
 This type is best controlled by the routine examination of the 
invoices and by soliciting price quotations on a random basis 
to ensure that the best price is paid for the product required. 
 Another kickback procedure involves ‘padding’ the invoice 
(adding items that were not received and or adding 
unreasonable handling or other charges). This scheme works 
well when the employee who purchases also does the 
receiving. This should prompt the manager to design a
Identifying and tackling 
Kickbacks 
 Hotels and restaurant must have a ‘right to 
check accounts’ clause in their contract with 
the suppliers so that they can check their 
delivery items, quantity and product’s details 
when they feel any fraudulent activity has 
taken place. 
 Proper audit techniques and data base 
analysis can help detect kickbacks. 
 Another way could be personal interviews of 
key witnesses or suspects to find out if they 
have been involved or viewed any suspicious 
negotiations.
Use of Fictitious Companies 
 When fraudulent activities such as payment to suppliers 
whose existence is fake can be quiet an easy task for fraud 
employees to get away with payment for goods that haven’t 
been received. 
 
 Many times goods which are perishable in nature with a high 
turnover can easily can be tempered with a small liaison 
between the receiver and the storekeeper. Meat, Dairy 
products etc could be some examples. 
 
 In order to tackle this problem the hotel should arrange a 
proper receiving technique and a list of permit able vendors 
or suppliers through whom only, the goods can be bought 
eradicating the chance of any fictitious company selling their 
products and a continuous check in the inventory system is a 
must to detect such frauds.
 Processing Threats: 
 Supplier may send an invoice through a second time if the 
operation does not have an internal system to verify that invoices 
have not been paid. 
 All the paid invoices should be marked paid with the accountant 
sign to verify that these items have been paid so as to avoid double 
paying for the same amount. 
 Credit Memo Problems: 
 Theft can occur when products are not delivered short, and when 
no credit memo is used to reduce the original delivery invoices for 
the value of the items not delivered. 
 Managers or receiving personnel should never accept an oral 
assurance from the truck driver. A credit memo should be made 
immediately and attached to the delivery invoice. 
 The manager should also call the supplier to ensure that proper 
processing of the credit to the operation account has been under 
taken.
CONTROL DURING CENTRAL 
STORAGE 
 Security concerns at time of storage involve. 
1) Knowing how much product should be 
available at all times. 
2) Knowing how much product is available (to 
determine if any product is missing) 
3) Preventing physical access by persons who 
do not need to be present in storage area.
There are a few steps that are to 
be applied in stores. They are: 
 Restricted entry into stores 
 
 There should be limited access. Only authorized 
personnel should enter storage areas. This policy 
is best met by locking all storage areas except 
during times of issue. 
 
 In all hotel stores there is an issuing time, 
generally during the start of shifts in the morning 
and in the afternoon will help reduce unnecessary 
issues, theft as well as adhere to a strict issuing 
policy restricting unauthorized entry in the store at 
all times.
Secured locking systems 
 Storage area should be securely lockable; it 
should be possible to lock the freezer [whether 
walk in or reach-in] as well as the dry storage and 
liquor storerooms. 
 In addition a locking shelving unit in a walk in 
refrigerator can protect wines and other expensive 
items. 
 
 One or more compartments of reach in 
refrigerator should be lockable, expensive fresh 
meat; seafood and other valuable products should 
be kept in these units.
Effective Inventory Systems 
 
 Inventory control practices must be adhered 
to items judged expensive and theft prone 
should be controlled through use of a 
perpetual inventory system. 
 Items kept in the workstations, broken cases 
or other storage areas in small operations that 
are not under perpetual inventory may well be 
prime targets for theft.
Proper Requisition Procedure 
 
 The hotel relies on proper requisitions procedure to 
run the store efficiently. 
 Proper requisition forms for different sections or 
departments of the hotel should be made. 
 A strictly regulated time for the issuing of stores 
should be adhered. 
 
 All the requisition should be duly signed by the 
department head or the acting supervisor. 
 Continuous issue will set a normal level of issue which 
helps in controlling the over issues.
Food and Beverage 
 This department is particularly vulnerable to 
internal theft because food and beverage 
items are very easily resold or used after they 
are brought out of the property.
It is important to have proper 
procedure to control: 
 Purchase 
 
 Food and beverage items have a very large varieties and types 
available and purchasing the items can be a little confusing. 
 
 Food purchase could be charged more than they are actually so 
before purchase at least three quotations should be considered and 
the best should be purchased but quality should be also considered. 
 
 While buying meats and fish, freshness and right quantity should be 
kept in mind as over purchase could be waste or misused by the 
kitchen staffs. 
 
 During cash purchase, purchaser could tamper with the price and 
charge higher. This should be checked with the invoice presented 
and cross checked whenever possible.
Receipt 
 Hotel receives a lot of supplies and material which is sometimes 
monotonous for the receiving and are neglected sometimes which is 
when suppliers may cheat the hotel. 
 
 Following things should be considered while receiving different 
materials: 
 
 Receiving the wrong items [such as inexpensive foreign wines 
instead higher quality wines or 70% instead of 80% fat content 
ground beef] and paying higher prices for them. 
 Short weight of count by which the food & beverage operation pays 
for more products than received. 
 Receiving thawed product, which is represented as fresh & for 
which a higher price is charged. 
 Grounding ice into ground meat product adding fillers in applicable 
products or selling meat with excess trim. 
 Including weight of ice and / or packaging in amount of product for 
which price is charges.
 Combining expensive steaks and inexpensive 
meat items into one container, weighing the 
entire container and billing the operation for 
the same. 
 Including one empty bottle in a case of, for 
example 12 liters. 
 Checking every pack and every receipt with 
appropriate supporting invoice and weighing 
for the right weight is crucial in reducing frauds 
or carelessness.
Storage 
 It is critical to ensure that storage areas are kept physically secure. The following 
measures should be adopted for this purpose. 
 
 There should be limited access. Only authorized personnel should enter storage 
areas. This policy is best met by locking all storage areas except during times of 
issue. 
 
 Storage area should be securely lockable; IT should be possible to lock the freezer 
[whether walk in or reach-in] as well as the dry storage and liquor storerooms. In 
addition a locking shelving unit in a walk in refrigerator can protect wines and other 
expensive items. One or more compartments of reach in refrigerator should be 
lockable, expensive fresh meat; seafoods and other valuable products should be 
kept in these units. 
 
 Inventory control practices must be adhered to items judged expensive and theft 
prone should be controlled through use of a perpetual inventory system. Item kept in 
the workstations, broken cases or other storage areas in small operations that are 
not under perpetual inventory may well be prime targets for theft. 
 
 If items kept in locked storage are needed during the shift a management official with 
access to storage area keys should retrieve the products.
 Requisition for use 
 Every department will have their own requisition form 
designed in such a way that it will be very easy for 
them to use and don’t have to write for a long time. 
 
 The requisition will have two copies with one going to 
the store and one with the requisitioning department. 
 
 Without proper requisition and proper authorization or 
signature from the head of department, no item will be 
issued. 

Preparation 
 
 Several basic principles of food production relate directly to security and theft prevention. 
 
 These include the following. 
 
 The manager must have an idea of the quantity of food to be produced. This estimation is made 
from sales forecasts based on the amount of past sales under similar conditions. 
 
 Over production, which leads to waste and leftovers, must be, minimized often foods in process 
are inadequately controlled and can be more easily stolen. 
 
 One type of employee pilferage occurs when employees eat on the job. A policy regarding 
employee eating should be established and consistently enforced. 
 
 Only the amount of ingredients actually needed for food production should be withdrawn from 
storage. 
 
 Close employee supervision is needed to assure that security control systems are not violated. 

 Garbage cans, employee packages, and similar places where stolen property can be 
hidden should be routinely checked. 
 
 Utensils, service ware etc. which are disposed of by careless employee can also be 
discovered by checking waste containers. 
 
 Items withdrawn from storage and not used should be returned to the security of the 
storage area as soon as possible. 
 
 No item should be discarded, either because of alleged spoilage of improper 
preparation without prior approval of management. 
 
 Employees should not be allowed to take home leftovers or scrapes for pets, since 
this promotes over production and encourage wastefulness. 
 
 Personnel such as cooks & stewards should not be permitted easy access to storage 
areas, and should not be allowed to wander around the property. They should be 
questioned. 
 
 No food should be produced on the line for presentation to a food server without 
submittal of a duplicate copy of the guest check (or use of a similar procedure to 
ensure that food sales are entered in the operation’s sales income control system)
 Burns returns and other food problems should 
not be discarded without management 
approval. 
 
 Supervisors should be alert to the possibility of 
cooks giving food to their employees for 
personal consumption. This practice should 
not be permitted. 
 

Service 
 
 Service of food and beverage can determine whether the 
guest will have a great time or not. 
 
 Served food and beverage should be prepared in a very 
hygienic conditions and any case of food poising can have 
serious consequences. 
 
 Proper food handling, food holding and food serving 
temperature ensures quality hygienic food. 
 While opening wine bottles or Champagne a special care 
should be taken so that the mouth of the bottle doesn’t break 
and mixes with the wine. Champagne has a lot of pressure 
within it, so proper care while opening should be taken care.
Guest Payment 
 
 Proper care while making bills should be taken 
care so that the outlet doesn’t over charge or 
undercharge the bill. 
 
 If credit facilities are provided, proper identification 
with letter of credit should be presented to the 
accounts section before hand and failure to do so 
will result in payment by the server. 
 A regular check on the table is necessary to 
ensure there are no skippers. 

Marketing, Sales and public 
Relation Function 
 . There is a growing recognition of the need for consideration between the marketing, 
sales and public relations functions of a property and its security function. 
 Security implications for the following should be considered: 
 Politically important persons/ Events 
 
 Politically important person(PIP) relates to a powerful government position where the 
person will have political influence in the country. Often the head of a political party, 
member of the parliament, political dignitaries, ministers, head of states or the head 
of country fall under this category. 
 
 Generally there are people from the secret service, army or police to safe guard 
these important people but special care should be taken as their arrival is not 
discrete but more announced. Hence, the hotel should provide special arrangements 
for these important people as their impact will be directly on the whole hotel 
establishment. 
 
 Hotels normally host meetings and seminars in a country level with chief guests and 
participants belonging to different parties. The hotel should increase the number of 
security guards, restrict the meeting area to public, scan every person entering the 
meetings and work in coordination with body guards or special force team for high 
level of security.
Guest/ Events with high public 
profiles 
 
 Hotel generally have a very good public relations with high profile 
guests who have a certain charm or impact on public. Movie Stars, 
Sportsmen, Businessmen, Entrepreneurs, Public Speakers, 
Comedians etc fall under this category. 
 
 While catering to these guests and their events, hotel should not 
only provide great service but also extra security service including 
valet parking, verifying invitations and special care to security as 
provided for PIP guests. 
 
 Although most of the time it is announced, these guest sometimes 
want to get out of the daily hassle and have a peaceful time for 
themselves or with their family to which hotel must make it sure that 
no one knows about their stay and hotel staffs should be trained to 
maintain a secrecy to their stay at the hotel and respect their right to 
privacy.
Controversial Guests/ Events 
 
 The guests who are surrounded by controversies or rumors 
regarding their personal life or their work or any crimes committed 
by them are called Controversial Guests. They could be from an 
entertainment background, political, business or professional 
background with very unusual event that not only changed their life 
but the life of others around them. Examples could be celebrity 
breakups, politicians caught in crime or suspected, release of a 
highly criticized movie etc. 
 
 Although convicted of the crimes or the allegations, such guest are 
valuable to the hotel as they bring in more crowd and free marketing 
it also pull unnecessary headache and lots of media attention which 
could be a great question in the privacy and rights of the guest. 
Hence, hotel should think carefully and act tactfully while dealing 
with such guests. 

Losses Affecting All 
Departments 
 
 In a hotel, as in all organizations, all of the department 
function as one. They are all interrelated and one department 
will significantly affect the performance of other department. 
 
 If only a single person will create any loss in the organization, 
the whole organization may suffer the consequences, hence 
such events should be monitored and prevented for 
organizational efficiency and affectivity. At times, employees 
cheat their organization and even steal form the organization 
which is a serious offence to the ethics and codes of the 
organization. 
 
 Such losses that affects all the departments are as follows: 

Stealing Company time 
 Going longer breaks, arriving late to work, leaving early from 
work, unnecessary leaves, taking too long to complete a 
small job can all be stealing or cheating time. 
 
 There are targets and time limits within which a task has to 
be completed and negligence or intentional delay will hamper 
a lot of hotel’s efficiency. 
 
 For example, if the housekeeping staff delays to make even 
one room, the Front Office will receive complaint from the 
arrival guest as their room is not ready, as compensation the 
Front Office may offer free beverage which will be a loss to 
the Food and Beverage Department and consequently a 
trouble for the account to maintain a complimentary bill and 
there will still be a chance that due to bad service, the guest 
may not come back which is a loss to the hotel.
Personal Services on Company 
Time 
 It is often seen that the employee will be using 
the company’s resources and time to their own 
personal benefits. 
 
 This is specially seen in administrative staffs who 
are in front of the computer and are searching for 
personal needs such as online chatting, Skype 
calls to family, research or assignment of college, 
Face book etc. They are more indulged in their 
personal works and perform less on their office 
works resulting in delay in payroll, mistakes in 
service charge, errors in posting and stock etc.
Personal ‘Calls on Company’s 
Expense 
 This has become very famous trend, 
especially among youngsters. 
 They utilize their company’s valuable resource 
talking to their friends, family and sometimes 
making international calls which could have 
saved a lot of money for the hotel which in turn 
reduces its chances of expansion, 
development as well as its profit margin 
leading to loss of both parties- employees and 
employers.
Stealing Company’s Assets 
 
 Small undetectable items, shawls, decorative items, cutleries, 
stationery items etc are things that are regularly missing from the 
hotel as they are stolen by the employees. They are hard to detect 
and easy to carry out making them an easy lifts. 
 
 Repair and Maintenance may steal shampoos or guest valuables 
which will be targeted to room attendants, Front office will receive 
the complain and HR as well as the PR department will have a 
tough time dealing with such cases. 
 
 Hence, hotels have to be very particular during their hiring process 
and regular checking and personal belonging like bags outside the 
hotel premises and security check on all employees and their bags 
is a must to control such events.
1 Responding to employee 
theft 
 Different responses are available to management in dealing with 
assets lost through employee theft. The property may want to: 
 Cash Control 
 
 Provide a receipt for every transaction. Encourage customers to 
expect a receipt by posting signs at each register. 
 
 Put one employee in charge of setting up cash drawers. Have 
another double-check the cash count. 
 
 Make each employee responsible for his/her own cash drawer. 
 Issue one cash drawer per on-duty employee. No other employee 
should at any time (during lunch, breaks, etc.) be allowed to open or 
use another's cash drawer. 
 
 At the end of each shift each cash drawer should be balanced by 
the employee and double-checked by another.
 Get your employees involved 
 
 Offer rewards to employees who report theft. Ask 
your staff for their suggestions on how to eliminate 
theft. 
 
 Employee background Checks – 
 
 Contact previous employers to find out if this 
person has a theft problem before you hire. 
 When employees are not screened properly, you 
spend more time and money training new 
employees to replace dishonest ones.
 Secret Shoppers: 
 
 Secret shoppers or mystery shoppers pose as customers and 
watch employee behavior and situations that owners can't 
always observe. Secret shoppers are trained to look at how 
customers are treated, the type of service provided, 
efficiency, honesty, sales techniques as well as misbehavior. 
 
 Survey Cards: 
 Give your customers a short survey card to complete or place 
one on your web site for customers to fill out. 
 Offer recognition and rewards to employees who consistently 
provide exceptional customer service. 

 Video Surveillance: 
 Often just installing cameras will cause employees to think 
twice before stealing. 
 But in order for them to be effective, you need to let your 
employees know you check these by offering them feedback 
(Positive or Negative) based on their job performance by 
viewing these videos with them. 
 Responding to employee theft 
 
 Do a product inventory 
 Conduct inventories often and at irregular intervals. Also 
make routine spot checks. Inspect records of purchases and 
sales at the beginning and end of each shift. 
 Define individual employee responsibilities for inventory 
control. This establishes a climate of accountability
 Post Signs and Install Locks 
 
 Post signs to indicate areas that are open to the public and those that are for 
employees only. 
 Install locks on all doors to interior work areas to control public and employee 
access. Doors to storage and supply rooms, and individual offices should be locked 
to limit access 
 
 Trash Control 
 
 Keep trash dumpsters inside during business hours. Check bins at random times for 
pilfered goods that might have been placed in them for pick-up after the trash is 
taken out. 
 Use clear plastic trash bags. Inspect contents for pilfered goods. Keep lids of 
outside trash dumpsters locked during non-business hours. If practical, keep the lids 
locked whenever the dumpsters are not being filled or emptied. 
 
 Have employees work in pairs in emptying trash. Or have different employees empty 
the trash from day to day.
 If You Suspect Theft 
 Despite your best efforts, dishonest employees 
can find ways to steal. If you suspect theft, call 
your local police department. 
 Don't play detective and try to solve the crime. 
 And do not jump to unwarranted conclusions. 
 A false accusation could result in serious civil 
liability.

Mais conteúdo relacionado

Mais procurados

Chapter 1.2 hotel departments
Chapter 1.2  hotel departmentsChapter 1.2  hotel departments
Chapter 1.2 hotel departmentsSumit Manwal
 
Housekeeping Guest complain handling
Housekeeping Guest complain handling Housekeeping Guest complain handling
Housekeeping Guest complain handling Rahul Lohar
 
Front Office Training Manual
Front Office Training ManualFront Office Training Manual
Front Office Training ManualShaheed Premji
 
Duties and Responsibilities of Front Office.pptx
Duties and Responsibilities of Front Office.pptxDuties and Responsibilities of Front Office.pptx
Duties and Responsibilities of Front Office.pptxPragyaSingh270798
 
Unit 1 the role of housekeeping in hospitality operations
Unit 1   the role of housekeeping in hospitality operationsUnit 1   the role of housekeeping in hospitality operations
Unit 1 the role of housekeeping in hospitality operationsNicole Hay-Walters
 
14100484 Hotel Front Office Department
14100484 Hotel Front Office Department14100484 Hotel Front Office Department
14100484 Hotel Front Office DepartmentRasel Mainul
 
Presentation of Housekeeping and Accommodation operation Hospitality service
Presentation of Housekeeping and Accommodation operation Hospitality servicePresentation of Housekeeping and Accommodation operation Hospitality service
Presentation of Housekeeping and Accommodation operation Hospitality serviceNabin Khadayat
 

Mais procurados (20)

Chapter 1.2 hotel departments
Chapter 1.2  hotel departmentsChapter 1.2  hotel departments
Chapter 1.2 hotel departments
 
Housekeeping Guest complain handling
Housekeeping Guest complain handling Housekeeping Guest complain handling
Housekeeping Guest complain handling
 
Front office department
Front office departmentFront office department
Front office department
 
Front Office Training Manual
Front Office Training ManualFront Office Training Manual
Front Office Training Manual
 
Reception
ReceptionReception
Reception
 
Duties and Responsibilities of Front Office.pptx
Duties and Responsibilities of Front Office.pptxDuties and Responsibilities of Front Office.pptx
Duties and Responsibilities of Front Office.pptx
 
Guest services
Guest servicesGuest services
Guest services
 
Unit 1 the role of housekeeping in hospitality operations
Unit 1   the role of housekeeping in hospitality operationsUnit 1   the role of housekeeping in hospitality operations
Unit 1 the role of housekeeping in hospitality operations
 
Hotel bell desk
Hotel bell deskHotel bell desk
Hotel bell desk
 
Arrival Procedure in Hotels, registration, check in
Arrival Procedure in Hotels, registration, check inArrival Procedure in Hotels, registration, check in
Arrival Procedure in Hotels, registration, check in
 
Concierge
ConciergeConcierge
Concierge
 
14100484 Hotel Front Office Department
14100484 Hotel Front Office Department14100484 Hotel Front Office Department
14100484 Hotel Front Office Department
 
Concierge functions
Concierge functionsConcierge functions
Concierge functions
 
front office basic
front office basicfront office basic
front office basic
 
Role of housekeeping
Role of housekeepingRole of housekeeping
Role of housekeeping
 
Front Office Department
Front Office DepartmentFront Office Department
Front Office Department
 
Front Office
Front OfficeFront Office
Front Office
 
Check-out & settlement procedure in hotel front office
Check-out &  settlement procedure in hotel front officeCheck-out &  settlement procedure in hotel front office
Check-out & settlement procedure in hotel front office
 
Presentation of Housekeeping and Accommodation operation Hospitality service
Presentation of Housekeeping and Accommodation operation Hospitality servicePresentation of Housekeeping and Accommodation operation Hospitality service
Presentation of Housekeeping and Accommodation operation Hospitality service
 
Guest cycle in a hotel
Guest cycle in a hotelGuest cycle in a hotel
Guest cycle in a hotel
 

Semelhante a Hotel Security Tips to Prevent Unauthorized Access

Best Hotel Safes Protecting Your Guests’ Valuables.pdf
Best Hotel Safes Protecting Your Guests’ Valuables.pdfBest Hotel Safes Protecting Your Guests’ Valuables.pdf
Best Hotel Safes Protecting Your Guests’ Valuables.pdfZEKE TROLLEYS
 
Hotel codes, rules and regulations
Hotel codes, rules and regulationsHotel codes, rules and regulations
Hotel codes, rules and regulationsJhulayy21
 
16150187 Guest Relation Officer
16150187 Guest Relation Officer16150187 Guest Relation Officer
16150187 Guest Relation OfficerRasel Mainul
 
7. Hotel’s Liability towards the Guest_Unit Six.pptx
7. Hotel’s Liability towards the Guest_Unit Six.pptx7. Hotel’s Liability towards the Guest_Unit Six.pptx
7. Hotel’s Liability towards the Guest_Unit Six.pptxBishow Raj Joshi
 
10 hotel safety tips|Larica Group of Hotels
10 hotel safety tips|Larica Group of Hotels10 hotel safety tips|Larica Group of Hotels
10 hotel safety tips|Larica Group of HotelsSamuelTamang3
 
PPT Sesi 9 guest relation + handling complaint
PPT Sesi 9 guest relation + handling complaintPPT Sesi 9 guest relation + handling complaint
PPT Sesi 9 guest relation + handling complaintBinus Online Learning
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in HotelsPurvi tiwari
 
Front office sem3 handling problems related to guest
Front office sem3  handling problems related to guestFront office sem3  handling problems related to guest
Front office sem3 handling problems related to guestRADHIKA GUPTA
 
Guest relations executive ppt
Guest relations executive pptGuest relations executive ppt
Guest relations executive pptVikesh Thakur
 
Advanced front office management
Advanced front office managementAdvanced front office management
Advanced front office managementPriya Roy
 
Front office SOP
Front office SOPFront office SOP
Front office SOPHarry Singh
 
hotel reservation management information
hotel reservation management informationhotel reservation management information
hotel reservation management informationMrJUNEduChannel
 
INTRODUCTION TO HOSPITALITY INDUSTRY.pdf
INTRODUCTION TO HOSPITALITY INDUSTRY.pdfINTRODUCTION TO HOSPITALITY INDUSTRY.pdf
INTRODUCTION TO HOSPITALITY INDUSTRY.pdfAryadeepChakraborty3
 
Detecting Skipper and Sleeper
Detecting Skipper and SleeperDetecting Skipper and Sleeper
Detecting Skipper and SleeperJenelyn Madriaga
 
Reservation&room selling procedures
Reservation&room selling proceduresReservation&room selling procedures
Reservation&room selling proceduresDr. Sunil Kumar
 
Hospitality & Reservations
Hospitality & ReservationsHospitality & Reservations
Hospitality & ReservationsANIL_LONAPPAN
 

Semelhante a Hotel Security Tips to Prevent Unauthorized Access (20)

Best Hotel Safes Protecting Your Guests’ Valuables.pdf
Best Hotel Safes Protecting Your Guests’ Valuables.pdfBest Hotel Safes Protecting Your Guests’ Valuables.pdf
Best Hotel Safes Protecting Your Guests’ Valuables.pdf
 
Hotel codes, rules and regulations
Hotel codes, rules and regulationsHotel codes, rules and regulations
Hotel codes, rules and regulations
 
16150187 Guest Relation Officer
16150187 Guest Relation Officer16150187 Guest Relation Officer
16150187 Guest Relation Officer
 
Role of Front Office
Role of Front OfficeRole of Front Office
Role of Front Office
 
7. Hotel’s Liability towards the Guest_Unit Six.pptx
7. Hotel’s Liability towards the Guest_Unit Six.pptx7. Hotel’s Liability towards the Guest_Unit Six.pptx
7. Hotel’s Liability towards the Guest_Unit Six.pptx
 
10 hotel safety tips|Larica Group of Hotels
10 hotel safety tips|Larica Group of Hotels10 hotel safety tips|Larica Group of Hotels
10 hotel safety tips|Larica Group of Hotels
 
G9 TLE lesson.pptx
G9 TLE lesson.pptxG9 TLE lesson.pptx
G9 TLE lesson.pptx
 
PPT Sesi 9 guest relation + handling complaint
PPT Sesi 9 guest relation + handling complaintPPT Sesi 9 guest relation + handling complaint
PPT Sesi 9 guest relation + handling complaint
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in Hotels
 
Front office sem3 handling problems related to guest
Front office sem3  handling problems related to guestFront office sem3  handling problems related to guest
Front office sem3 handling problems related to guest
 
Guest relations executive ppt
Guest relations executive pptGuest relations executive ppt
Guest relations executive ppt
 
Advanced front office management
Advanced front office managementAdvanced front office management
Advanced front office management
 
Front office SOP
Front office SOPFront office SOP
Front office SOP
 
hotel reservation management information
hotel reservation management informationhotel reservation management information
hotel reservation management information
 
INTRODUCTION TO HOSPITALITY INDUSTRY.pdf
INTRODUCTION TO HOSPITALITY INDUSTRY.pdfINTRODUCTION TO HOSPITALITY INDUSTRY.pdf
INTRODUCTION TO HOSPITALITY INDUSTRY.pdf
 
Fo sop
Fo sopFo sop
Fo sop
 
Fo sop
Fo sopFo sop
Fo sop
 
Detecting Skipper and Sleeper
Detecting Skipper and SleeperDetecting Skipper and Sleeper
Detecting Skipper and Sleeper
 
Reservation&room selling procedures
Reservation&room selling proceduresReservation&room selling procedures
Reservation&room selling procedures
 
Hospitality & Reservations
Hospitality & ReservationsHospitality & Reservations
Hospitality & Reservations
 

Último

Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfASGITConsulting
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 

Último (20)

Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 

Hotel Security Tips to Prevent Unauthorized Access

  • 2. Problem(Trip Advisor)  “Worst trip ever, felt unsafe, unauthorized people entering the rooms, very little was done when we told the person in charge add”  Reviewed 3 February 2013 via mobile  17 people found this review helpful  The person in charge would not take ownership for what happened implied it was our fault for not locking the door properly and also seemed to imply we were lying. We did not feel safe or respected. I would not recommend this resort.  Stayed January 2013  Value- 1  Location- 4  Rooms- 3  Cleanliness-2  Service-1
  • 3. Response  Customer Servic... B, Director de Relaciones con Clientes at Grand Bahia Principe Jamaica, responded to this review  9 February 2013  Dear guest, First of all, we regret that we were not able to fulfill your expectations and we would like to offer our most sincere apologies for the inconveniences caused. We would like to acknowledge that we have very strict control of all issues reported and regarding this particular case, we are not able to find any issue regarding the situation mentioned. We can ensure that all the security protocols established by the chain are strictly followed. In addition, please kindly note that we allocate all our effort and measures at our guests disposal to take extra security measures and avoid such situations. Of course, we would like to add that we are at our guest’s disposal any time to provide them the necessary assistance to denounce situations or cases as you mention to the relevant authorities of this country. We deeply sorry if you had the impression that our resort is unsuitable and unsafe, we are working every day to provide our guest a very pleasant and safe place where you can enjoy your holidays and we further regret that you felt that we were not able to fulfill your expectations Yours faithfully, Helena Gomez Customer Service Manager  Report response as inappropriate
  • 4.  “Once Again A Week In Paradise”  Reviewed 3 February 2013  1 person found this review helpful  My wife and I made a return visit to Gran Bahia Principe Jamaica Jan 26 - Feb 2, 2013. As was our trip last year to this resort, everything was perfect. The only downfall was due to huuricane sandy destroying the banana crops, we were unable to indulge in our favourite drink the "dirty banana." I had requested that our room be in roughly the same location as last year and they accomodated with a room four doors down...thank you Helena! The rooms are absolutely beautiful and spacious. Our housekeeper was fabulous and worked very hard to clean our room. The resort is very large so you do a lot of walking but everything is so beautiful that the walks are nice. The grounds are perfectly manicured and the beaches are raked daily. The staff all work extremely hard and should be congratulated on a job well done. The beach to the left of the resort is awesome. If you walk all the way to the far end, near the nude beach fence, the snorkeling is great. Beautiful colourful fish will eat weiners right out of your hand. We seen a really cool stingray on our second day but unfortunately we couldn't get a picture of him. Once again my wife and I did not use our a-la-cart meals because the buffet always had lots of variety. Again the staff were great, always greeting you and attending to your needs. Everything about this resort is 5 star. Pay no attention to bad reviews. People who rate the Gran Bahia Jamaica badly probably will never be satisfied with any kind of resort. I highly recomend it to anyone who wants a carefree get away to paradise.
  • 5. The Presence of Unauthorized Person  It is not always easy to challenge someone’s right to be at your property. Many times, the manager will handle problem visitors.  Being the staff of the hotel you have the right as well the responsibility to tactfully approach a visitor who appears to be lost or out of place.
  • 6. The Presence of Unauthorized Person  A person whom hotel suspects to be undesirable or a person of ill-repute may be disallowed access into any part of the hotel premise whether public or private.  The appropriate authority in the hotel(Security Director/ Manager or Resident Manager/ General Manager shall issue the person with a notice of prohibition of entry after taking a record of the person’s full particulars, including a photograph. where possible, and detailed description.  Every security personnel should be informed of such person and if the person persists in entering the premises, legal action can be taken to such persons for civil trespassing.
  • 7. The Presence of Unauthorized Person  If a guest brings a companion whom the hotel suspects to be a person of ill repute, the hotel should insist that this person be properly registered as a guest.  Since crimes committed by prostitutes usually occurs between 2300 and 600 hours.
  • 8. Steps to deal with Unauthorized persons  Ask if the person is the guest of the hotel. If you have reasons to believe that someone is not a guest, ask his/her business on the property.  Ask to see a room key. If you think someone may be an intruder, ask to see his or her room key.  Explain policy. Tell the visitor your property policies regarding the use of guest facilities.
  • 9.  Remain calm. Be polite, but firm, when speaking with a visitor. Even if the person is not a guest, you need to treat him or her with respect.  Notify the proper authority, or escort the unwelcome visitor off the property, be sure to follow your property’s procedure.  If you feel threatened or intimidated by a stranger, leave the area immediately and inform your supervisor or security. Your safety is important too..
  • 10. Safety Deposit Box  A safe deposit box, also called a safety deposit box is an individually secured container, usually held within a larger safe or bank vault.  Safe deposit boxes are generally located in banks, post offices or other institutions.  Safe deposit boxes are used to store valuable possessions, such as gemstones, precious metals, currency, marketable securities, important documents such as wills, property deeds, and birth certificates, or computer data storage that need protection from theft, fire, flood, tampering or other reasons.
  • 11. The typical considerations and steps to consider for safety deposit boxes in the hotel:  Below are the typical considerations and steps to consider for safety deposit boxes in the hotel:  In the typical arrangement, a renter pays the hotel fee for the use of the box, which can be opened only with production of an assigned key, the bank's own guard key, the proper signature, and perhaps a code of some sort.  It is the responsibility of management to develop and monitor safe deposit procedure for its property.  All employees with safe deposit responsibilities should be thoroughly trained in proper safe deposit procedures and are aware of the reasons for the various rules.
  • 12.  Supervisors should impress upon safe deposit attendants the importance and seriousness of this responsibility, ask for an immediate report of any unusual incident, and require accurate, up to date records and complete compliance with procedure.  Safe deposit boxes should be located in an area to which there is limited access and where it can be visually monitored at all times.  If CCTV is used one camera should be turned on the safe deposit box area.  Unauthorized persons, whether guests or employees, should not be permitted in the area. Such a location may be in the vicinity of the front desk, where the box may be secured while still visible to the guest.  In the case of guest valuables with a declared value of Millions of rupees, hotel may exercise it discretion to accept the safe custody of the valuables but special security arrangement (e.g. having 24 hours security guard) or such similar arrangements may be deemed necessary.
  • 13. Measures to safe guard guest’s property  The following measures should be effectively implemented to safe guard guest’s property:  Guest should be provided with a safe deposit box facility to store valuable items, jewelry, etc.  The availability of safe deposit boxes should be verbally conveyed to each guest on checking in or well placed notice be put up to advertise the service.  The guest should be provided with a signature card and requested to complete it correctly.  The safe deposit attendant shall then obtain a vacant box and accompanying key.
  • 14.  A dual-control locking system should be used for all lobby safe deposit boxes whereby it can only be opened with two keys- master key to that box and an individual key is handed out to the guest.  The guest then should then deposit the items in the safe deposit box themselves. (Most properties do not allow employees to have physical contact with items placed in the boxes by guests).  The attendant will secure the box and hand the individual key to the guest. The guest should also be cautioned to safeguard the key, failing which a charge may be levied.  The guest must be asked to sign his/her signature on each and every occasion that he asks for and returns key to the box.
  • 15.  The staff attending to him ensures his signature tallies with the specimen signature on the card before allowing him access to the box.  The hotel should then retain the signature card for a specified period of time as required.  Where safe deposit boxes are not available, deposit envelopes are often provided with a claim tag attached. The envelops may be stored together in one safe with each depositor holding his claim ticket.
  • 16. Lost and Found  Lost items in the hotel can be a great issue to the guest as well as the hotel reputation.  There needs to be a clearly defined rules and procedures regarding the lost and found item.  In the case of any miss-placed items from the guest room or safes, it will be the hotel’s responsibility to repay the guest.
  • 17. Procedures for Lost and Found In a hotel lost and found functions rests with the housekeeping, security or the concierge, the following procedures should be adopted:  All articles found by hotel personnel, guests or customers should be immediately forwarded to the lost and found section.  A standard note should accompany the article indicating the date, time, location, and description of the article as well as the name of the finder.  All found items, which have been logged, bagged and tagged, should be stored in a secure place.  Some properties place wallets, jewelry, money, credit cards and other valuables in a safe deposit box or in the Assistant Manager’s Safe.  Some hotels write to the guests who have left behind articles found in guestrooms requesting them to contact the hotel for proper identification and return of items.
  • 18.  However, some hotels feel that this is inappropriate, arguing that the guest may wish to keep his/her stay at the hotel confidential.  Telephone operators or any other hotel personnel should be instructed to direct all inquires about lost and found articles to the department concerned.  A note can also be included in the room tent-card to this effect.  When checking a claim, the person in charge should verify (by ask the claimant to describe the article lost) that it is not a fraudulent claim.
  • 19.  Articles, which are not claimed by the rightful owner, may then be disposed off in accordance with the regulation with regard to “found property”. This regulation could be presenting it to the police department, or distributing it to the employee who found it.  All employees should be warned that misappropriation or the keeping of articles not belonging to them is an offense punishable by law.  It is not a case of “finder being keeper”. An incentive to cultivate employee honesty in such matters can be insulated as for example, a regular honest employee award.
  • 20. Departmental Responsibilities in Guest and Asset Protection  A property’s security concern does not only include risks and dangers to its guests, the staff and its premises. The property’s assets must also be protected . The assets of the hotel are vulnerable to loss and damage, which can add up to a lot of money.  Staffs, guests and outsiders can cause loss and damage to hotel assets. Assets protection procedures can range from dealing with theft by employees and guests to avoiding losses through unwise extension of credit.  Statistics have shown that majority of lefts of hotel assets are committed by staff.  The nature of their work provides staff with many opportunities for misappropriation hotel assets with good resale value and personal use value. Popular items lost include linens, silverware, and food and beverage items  Every department has a role to play in asset protection. Each department should think of effective ways to secure its operations against theft.
  • 21. Human Resource Department  Pre-employment screening and employee background checks are more common these days than ever before.  Employers need to know who they are hiring and they have a duty to their shareholders, stakeholders and co-workers to keep everyone as safe as possible.  Finding out the truth about someone using a background check is quick, inexpensive and allows an employer or H.R. Department to take the guess work out of hiring.
  • 22. Criminal Conviction Check  Although a conviction(s) may be listed or disclosed during the recruitment process, it is important that the conviction(s) only be considered based on job relatedness. Convictions related to drugs, violence, or sexual behaviors are generally considered job related due to the nature of the environment.  The following are additional factors to consider:  •Timeframe of the conviction;  • Age of the person when the offense/conviction occurred;  • Severity of the crime;  • Position type and location; and  • Subsequent work history.
  • 23. Check by Professional Investigator  These are checks that are performed usually for very special job positions or top level job positions within the organization.  They involve in private investigator or private investigating agencies specializing in detailed investigation which the internet cannot provide.  Applicants from all walks of life now know and expect that a background check will be performed on them when they seek new employment so they try to remove all the unwanted information from the internet as that the main source of information for the employers.  There are a growing number of websites that cheat people and most of these companies are run by computer “experts” who are looking to sell information gathered from computer databases rather than investigating an applicant’s background at the source.  These same pre-employment screening firms are big on disclaimers and short on results.  The private investigators or their agencies deploy employee screening processes which are completely legal, confidential and conducted by an independent agency specializing in pre employment background check and criminal record searches. The
  • 24. Medical Screening  Pre-employment medical screenings can contribute to reducing instances of injuries on the job, which occur as a result of physical unpreparedness and can lead to costly workers' compensation claims.  They can also help companies to send the message to candidates that they are serious about their employees' health.  Hotel can have many challenging jobs requiring large amount of physical endurance and sound health is the key to success of employees as well as the organization.  The procedure will include the following process:  Physical screening by an external medical examiner.  Submission of Medical History Report  Required vaccination as per the hotel rule. In case not fulfilled, the applicant will have to be vaccinated- Hepatitis, Measles, Malaria etc.  Required medical tests as per the hotel law- AIDS, Hepatitis, TB or other communicable diseases.
  • 25. Credit Check  Companies are running credit checks on job applicants more often and are using that credit information as part of the process when making hiring decisions.  A Society of Human Resources Management (SHRM) survey reported that 60% of employers check the credit of at least some job applicants.  A job applicant credit report will show details about you and your finances, including your name, address, previous addresses, and social security number.  It also shows the debt you have incurred including credit card debt, mortgage, car payment, student loans, and other loans and your payment history, including late payments and defaulted loans.  Such checks are specially performed for the cash handling employees but a written consent from the applicants is required to run such credit checks as they could be very embarrassing or provocative or invasion to privacy to the applicants and could be a sue able case.
  • 26. Bonding  Companies bond employees to protect against employee theft and dishonesty.   Bonding provides the company with compensation in cases of property loss due to the acts of an employee.   When employees have access to money or valuable property, bonding protects the organization. Companies also bond employees to protect customers in the event of property damage. 
  • 27. Bonding during Hiring  Employers can begin bonding during the hiring process. The company conducts preliminary background investigations to determine if a job candidate is bondable. Employers can choose not to hire candidates that cannot meet the requirements of bonding.  Self-employed workers can also obtain a bond to cover damage they cause while working for a customer. For example, a self-employed house cleaner can obtain coverage to protect against damage to the customer's home.  Businesses and self-employed workers use bonding in advertising when listing the attributes of the company.  These bonds can be for single person or for all the
  • 28. Background Investigation for Bonding  The employer must submit information to the bonding company, which is necessary to conduct a background investigation  The bonding organization will search the applicant's background for prior criminal records and verify references to determine the honesty of the employee.  Applicants who meet the bonding company's requirements are covered while working for the employer.
  • 29. Warning on application form  Application should include a clear warning stating that fraud data, fraud certificates or any attempt to defraud the fraud claims and applying will be an act of deceive and could be punishable by crime on identification and the employee will be terminated even if he/ she is employed by the organization.  This will help filter the fraud or deceiving candidates to some extent and back ground check will help further filter it.
  • 30. Check significant gaps in employment record  Many candidates could be hiding a number of problems in their past. Job seekers routinely lie on their applications and resumes, concealing details that would make them a bad hire.  On the other hand, employers may be confronted with gaps in employment on a resume or application.  While the reasons behind the gaps may be completely innocent, verifying what the candidate was doing during the lapse is essential.  If neglected, employers may expose themselves to potentially disastrous consequences.  Although gaps could be for a better cause such as education or training or due to family obligations, there could be a dark past that the candidates may be hiding.  There could be two reasons why gaps in employment should raise a massive red flag.
  • 31. Reasons for Gaps Possible Criminal History  A potential hire may have spent a 2-year lapse by traveling through Europe and exploring the world. But, what if he didn’t? It’s entirely possible that he actually spent that time in prison. If an employer fails to check the gap in history, they might never uncover the details. Hiring that person could lead to employee theft, harm to the staff and a number of other outcomes.  Ineffective Background Checks  There’s no way for an employer to conduct an effective background check when a job candidate has an unexplained gap in history. The reason why is because criminal records are typically kept at the county level. If the employer doesn’t know where the candidate was during the lapse, it’s impossible to know which county, or counties, to search for a criminal history
  • 32. Other Personal functions pertaining to security  Apart from the careful considerations while hiring the right employee for the company, HR is also responsible for training on security matters, continuous rapport between the employees as well as conducting interviews during exit.
  • 33. Training Employees on Security Matters  The HR department is responsible to plan and help execute training regarding the hotel in cooperation with the security department.  HR is responsible not only for training security related training to all the staffs but also train the security personnel for motivation and other ethical basics such as handling a situation in a hospitable manner and using brains than effort as most security guards come from an army or police background and they are not courteous or polite.
  • 34. Trainings  Motivational Training  Groups Dynamics  Fire Drills  Fire Safety equipments use and procedures  Natural Calamities emergency procedure.  Terrorist Situation Procedures  Hospitality Culture Trainings  Interdepartmental Training  Public Speaking  Guest Safety  Unusual Events Procedures
  • 35. Record of Issued items and their collection on Departure  HR also has the function of issuing and keeping a record of all the items issued to the employees on their selections. Items such as Name Tags, identity Card, Room Keys, Floor or Room Keys, Uniforms etc.  These may be misused by unauthorized person so a clear issue and record of such items in necessary.  The lost of such items should be reported and sometimes may be compensated from the employee as it happens due to their negligence.   Such its are to be submitted at the time of exit or resignation from the company as they are the private property of the hotel and can be an issue to the security as anyone could disguise themselves as the hotel employee and could access to rooms without authorization.
  • 36. Conducting Exit Interviews  An exit interview is a meeting with a terminating employee that is generally conducted by Human Resources staff. The exit interview provides your organization with the opportunity to obtain frank, honest feedback from the employee who is leaving your employment.  Sometimes in an organization, it is necessary to know why the staffs are willing to move to another organization.  Many times it is because of the basic facts- money, facilities or sometimes personal reasons but what if there is a dark reason which he/she is not able to cope with and is leaving the hotel. In such case, exit interview helps a lot.  May be there is a manger who molests lady or even men. This could be a great threat to the hotel as the manager may also molest hotel guests. A manager or supervisor has serious anger management issues and may harm the employee or even the hotel guest and due to the fear of getting into unnecessary trouble the employee may simply want to quit. During the exit interviews, most of the time, departing staffs will tell the truth about the things they didn’t like and what was the reason for their departure which would they not have expressed during their working tenure.  This helps the HR to point out the areas that they or the organization has to develop as turnover is said that hiring new staffs is 60% more expensive than retaining the staff.
  • 37. The Engineering Department  The Engineering Department plays an important role in the security of a property. The department maintains the security devices and systems on the property.
  • 38. High priority to security/ life-safety system/device  The engineering department has the responsibility of maintaining the equipments within the hotel and rooms.  The rooms and the hotel will have many security related equipments such as surveillance equipments, physical barrier equipments, communication systems, guest room security equipments which are utmost priority to all engineering department as they are life saving equipments and can save the hotel from a lot of damage and loss of innocent lives.  It is the priority of the engineering department to look after the work orders (maintenance request) of such equipments than other functional equipments.
  • 39. Key Role During Emergency  Emergency situations can come when you are least prepared. The engineering department with its coordination with the security department helps to plan and get ready for emergency situations.  Although during an emergency situation, security personnel help the victims, the engineering department will be working towards reducing the cause or communicating the emergency situation. Informing the local emergency authority- fire department, bomb squad, police authority, SWAT, etc  Other functions would be helping people vacate the emergency premise, help with power break downs, operation of generators, helping people out of stuck lifts, etc.
  • 40. Key Control procedures   Nowadays all hotels have electrical door systems. Although they are expensive to install, they are the most effective system in guest room security proving to be most efficient in the long run.   Engineering department is responsible for maintaining the efficiency of these locking systems periodically changing the codes and some times changing the keys as well. A key can be changed only for 5 times then the whole lock configuration has to be changed.   The police authority will ask to change the lock configuration every 2 years even if the key has not been changed for 5 times.
  • 41. Optimization and control of equipment Usage  The engineering department helps not only maintain the equipments, tools and materials but also helps to control their use in order to minimize the cost as well as ensure their proper use only at the right time.  Tools, Material or Equipments may be elementary , personal protection or defense equipment with all the equipments used for functioning the operation falling under the elementary and arms and hazard relieving or preventing equipment under the personal protection or defense equipments.  The Engineering department ensures that these equipments are readily available but control its unnecessary usage by putting it in safety covering which could be accessed only during emergency situations and procedures with regulations. For e.g fire blanket inside proper covering but readily available, fire extinguishers with safety pins, fire hose in breakable glass boxes with fire axe ready to break it, etc. But access to these without an emergency situation will be a breach in the code of conducts and will be punishable. 
  • 42. The Rooms Division  Rooms Division is the name of the department within a hotel that includes housekeeping, concierge, porters and front office as well. It has been shown that the majority of hotel revenues are generated from Rooms Division Department under the form of room sales.  Hotel and other accommodation facilities are the most vulnerable establishments and an easy target to terrorists and other dangers as it is a public friendly establishments with no trespassing restriction apart from the few restricted areas and guest rooms.
  • 43. Front Office  Front office personnel are important allies of the security staff.  The door attendants, bellhops, car valets and front desk staff continuously observe whoever arrives at or departs from the premises.  Any suspicious activities or circumstances involving the guests or any member of the public entering the premises can be reported to security.
  • 44. Key Control  Guestroom Security locks can be a critical aspect of guest protection. The guestroom doors and windows must be fortified to prevent forced entry. Installation of burglar proof door locking system and effective Key and key control procedure is to be followed by the hotel to ensure guestroom safety against theft.  Effective Key control in hotel is essential to the security of a lodging property. All keys whether metal or electronic should be adequately controlled.  The Front office staff or personnel should have detailed information regarding the issuance of the key and the receipt of the key. Apart from that any changed keys, discarded keys or keys that have their code changed should be properly recorded in log books and informed to the engineering and security departments.
  • 45. Things to keep in mind while handling keys  Keys should be stored separately and securely.  No unauthorised person should be allowed access to any key, either to examine or handle it, since a photograph or impression can be taken in few seconds and duplicate subsequently made.  Keep a log book of all keys signed out.  Establish protocol for distribution of keys.  Use keys that do not identify the property’s name, address, logo, or room number.
  • 46.  When keys are lost or stolen, the locks should be changed or rotated to another part of the property.  Authorised employees should remind guests to return keys at check-out.  The loss or suspected compromise of a key should be reported immediately and, after due investigation, a decision be made as to whether or not the lock should be changed.  Place well-secured key return boxes in the lobby, at exit points of the property, and in
  • 47. Information Handling  The front office department, specially the reception and the telephone operator, receives a lot of information regarding the guest and it is very crucial to respect the guest’s privacy and confidentiality. The front office checks in alot of guest and keeps record of personal data regarding the guest in their information system.  Hotels are obvious targets for identity and financial theft for many reasons. Hotels transact business through credit cards, and those credit cards are kept on file and can be accessed multiple times during a guest’s stay. The possibility that a credit card charge will be recorded occurs with each night’s room charge, room service, bar or restaurant bill, spa charge, and so on.  Every charge is another opportunity for an identity thief to access the information using sophisticated computer hacks and other malicious software, generally without the hotel’s knowledge.
  • 48. Following procedures are to be followed for securing information:  Hotels operators should inventory potentially sensitive information and document on which computers, servers and laptops it’s stored.  Operators and owners should keep sensitive information on the fewest number of computers or servers, and be sure to segregate it — the fewer copies of data you have, the easier it is to protect.  Utilize encryption for storing, and secure connections for receiving or transmitting, credit card information and other sensitive data.  Firms should design, institute and follow an effective privacy policy, including policies for using social media, and should be careful not to overstate the effectiveness of their measures. Remember – no system is completely safe.
  • 49.  When implementing a wireless system, use a good firewall and a secure wireless connection.  For internal communications and information, protect sensitive data with strong passwords and change passwords on a regular basis.  Since much, if not most, of computer systems and services are handled by vendors, check their security practices.  Apart from computer information, telephone conversation should be recorded only for the guest purpose and discussion of guest cases should not be practiced within the staffs and proper training for handling guest information will help achieve this target.
  • 50. Control Centre for elevator and entrance  The Front office department will have lift or elevator operators who will monitor the lifts.  Keeping a vigilant eye and suspecting any unusual behavior in customers are the keys to its safety.  Lifts and elevators are situated in such a way that it is easily visible to the front desk and normally at the side of the bell desk which helps the staffs to monitor the use of elevator and identify unauthorized guest using the elevator to guest rooms as they are the ones who check in the guests.  The Door man also a part of the front office is the first contact to the guest and will immediately notice any unusual event with the guest. Scanty baggage guests, or unusually large baggage are suspicious guest and proper security checks on them is a must. Equipments such as metal detectors, scanners could be used in vulnerable public areas to ensure safety in entrances.  Elevators have a emergency calling equipment build inside which is attached to the engineering and the telephone operator department which will handle panic calls received by guest stuck in the elevator helping front office and the engineering department to identify the lift as well as carryout quick action simultaneously with comforting the guest through the emergency telephone line.
  • 51.  Assets Protection   Front Office is also responsible towards protecting valuable guest assets of the hotel guests. Assets protection is a great facility provided by the hotel which not only increases the level of satisfaction and safety of the in-house guest but also business of the hotel itself as the guest prefer hotels providing these kinds of services to others not providing it.   It gives the hotel that extra income with the competitive edge.    The Front Office provides the following protections:
  • 52. Valet Parking  Vehicle parking is an issue to any guest while visiting or staying at a hotel. The front office department has a separate division called the Valet parking working for this issue.  Valet parking is a parking service offered by some restaurants, stores, and hotels. In contrast to "self-parking", where customers find a parking space on their own, customers' vehicles are parked for them by a person called a valet.   This service either requires a fee to be paid by the customer or is offered free of charge by the establishment.   Car jacks or car theft are seen every where as well as the problem of car blocking the way of another resulting to damage like scratch, dent, broken windows and mirrors of the car blocking the way are common.   Sometimes, a guest will have to walk a long distance where he has parked with a hand full of personal belongings making it very difficult for him.   All these issues are addressed by the valet parking as the key is with the valet and he will safely park and on request will safely deliver the car to the hotel or restaurant door step saving the car as well as the car driver from unwanted hassle, loss or inconvenience. 
  • 53.  Guest Luggage Security   The Doorman or the bell boys will attend to the guests luggage and are responsible for their safety and proper delivery to the guest rooms.   In case of scanty baggage, the information will be passed on to the reception and all point of sale for extra precaution of skippers.   The hotel also has a service called the Left Luggage where the departure guest leaves his/ her belongings for a certain time before leaving for the airport.
  • 54.  Safety Information and Instructions In Guest Room   The duty of the bell boy or bell person is not only to safely transport the luggage to the guest rooms but also to provide valuable information regarding the access devices- keys and key card, use of the security devices in the room such as the safe deposit box and emergency hotlines; other policies regarding laundry, AC, TV, Room Service, Mini Bar etc which are also mentioned in the information cards along with hotel policies and safety procedures.  
  • 55.  Prevent Losses and Bad Debts   Front Office has the responsibility to protect the hotel from skippers who run away without paying their dues and fraud by the guests.   Scanty Baggage guests should be billed clearly and advance payment should be taken which could range from 150% to 250% depending upon the hotel.   Procedures should be established which ensures that all charges made by guests are promptly posted and proper procedures for the handling of cash, cheques and credit requests to prevent loss from bad debts. 
  • 56. Housekeeping  The Housekeeping Department also has a special responsibility for security since its employees have direct access to the guestrooms and the guests' property. Consequently, careful screening of housekeeping personnel should be conducted during the hiring process:
  • 57. Housekeeping personnel should be trained in:  How to react to suspicious persons or reactions?  Housekeeping attendants encounter many guests and their rooms. While cleaning the rooms, the room attendant may come across many suspicious room guests with suspicious items found in the guest rooms.  They may also encounter guests in the room which they have not seen before or guest in guest room corridors whom they have not seen before.  In this case they must know how to tackle the situations, ask questions to suspicious persons and immediately report to their supervisors and security department if they find anything suspicious about the guest, their room or any visitor in the unauthorized areas.
  • 58. Key Control  The housekeeping department has access to all rooms of a section or floor. So the room attendants should give special care to their keys so that they do not misplace or pass it to any unauthorized person.   The house keeping supervisors should keep a record of the daily duty allocation to the room attendants and the floor or section they are suppose to work and the keys should be coded in such a way that only the designated floor should open the doors.
  • 59. Responding to Requests to enter guestroom  People may come up to the room attendants requesting to enter the room.   Unauthorized persons cannot enter the room without a proper authorization- key or employee pass (maintenance or engineering).   When an unauthorized person asks to enter a room then the attendant will have to ask the person to show the room key or any form of identification leading them to the room or else politely withdraw and decline and inform that they do not have the authority to do so and tell them to kindly get the authorization.   In case of suspicious guest, inform the supervisor and the security department.
  • 60. Checking the security equipments  House keeping staff are continuously cleaning and are continuously in contact to the hotel equipments, guest room equipments and other equipments.  Checking the room equipments, lights, AC is a regular job but the housekeeping staffs should also look out for security equipments in the room such as the locks, door snatch, telephones, safety deposit lockers, emergency indications as well as other security equipments outside the guest rooms such as CCTVs.  In case of any damages or any malfunctioning should be reported as they are there for security and they are life saving equipments and should be the first priority everybody.
  • 61.
  • 62.
  • 63. Checking Security Notices  There are security notices on how to use the equipments, the emergency dial numbers etc in the room.  The housekeeping should check if all the notices in the room are available.
  • 64. Securing locks in different areas  The housekeeping departments has many areas such as the linen room, storerooms, equipments room and the maids pantry have to be locked.  Hotel normally don’t put CCTV’s or other security equipments and could be an easy target for terrorist for installing bombs as these section go without being checked. It could be a place to hide as well.
  • 65.  Help reduce losses   The housekeeping department can help clearing room service tray and equipments from the room. It could be very difficult for the guest to move around and may be injured when they collide against these tables or equipments as well as damage the equipments.  Inventory Control   Inventory helps to maintain the record of the guest room supplies as well as help maintain a steady supply of materials. It also protect the hotel from guest room thefts by guests by keeping a record of these items and immediately know if these items are missing.
  • 66. Laundry and Dry Cleaning  . Written policies should make it clear that cleaning and laundry services are provided only for uniforms required for the job assignment.  Any violation of this policy may be considered theft of the property's services.
  • 67. Hotel procedures should include:  Unofficial Use of laundry and dry cleaning services and protection of guest laundry   Unofficial use of laundry such as using office laundry for home use should not be allowed. This will not only mix the laundry with the guest but also misplace guest’s laundry with personal laundry.   Guest laundry are very valuable to the guest as they have invested a lot of time and effort in buying them and in case of lost or theft, it will be the hotel’s liability to pay them back. Hence proper laundry receiving and delivery system should be developed.   Proper code of clothes with laundry forms filled by the guests indicating the material, quantity, color and style of clothing should be attached in the laundry bags while receiving and proper cleaning and checking of the cloths before delivering them to the guest rooms. 
  • 68. Purchasing and Receiving  Since hotels must purchase a wide variety of products, supplies, and services in the course of daily operations it is necessary to closely monitor the activities within the department and be on a lookout for potential problems.
  • 69. Common problems include:  Kickbacks in receiving  There are several common type of kickbacks, each involve purchaser working in collusion with someone from the suppliers company.  In one kickback scheme F & B products are purchased at a higher than the necessary prices and thieves split the difference between the real and the inflated price, the payment can be in money or gifts, either way the owner is the loser.  This type is best controlled by the routine examination of the invoices and by soliciting price quotations on a random basis to ensure that the best price is paid for the product required.  Another kickback procedure involves ‘padding’ the invoice (adding items that were not received and or adding unreasonable handling or other charges). This scheme works well when the employee who purchases also does the receiving. This should prompt the manager to design a
  • 70. Identifying and tackling Kickbacks  Hotels and restaurant must have a ‘right to check accounts’ clause in their contract with the suppliers so that they can check their delivery items, quantity and product’s details when they feel any fraudulent activity has taken place.  Proper audit techniques and data base analysis can help detect kickbacks.  Another way could be personal interviews of key witnesses or suspects to find out if they have been involved or viewed any suspicious negotiations.
  • 71. Use of Fictitious Companies  When fraudulent activities such as payment to suppliers whose existence is fake can be quiet an easy task for fraud employees to get away with payment for goods that haven’t been received.   Many times goods which are perishable in nature with a high turnover can easily can be tempered with a small liaison between the receiver and the storekeeper. Meat, Dairy products etc could be some examples.   In order to tackle this problem the hotel should arrange a proper receiving technique and a list of permit able vendors or suppliers through whom only, the goods can be bought eradicating the chance of any fictitious company selling their products and a continuous check in the inventory system is a must to detect such frauds.
  • 72.  Processing Threats:  Supplier may send an invoice through a second time if the operation does not have an internal system to verify that invoices have not been paid.  All the paid invoices should be marked paid with the accountant sign to verify that these items have been paid so as to avoid double paying for the same amount.  Credit Memo Problems:  Theft can occur when products are not delivered short, and when no credit memo is used to reduce the original delivery invoices for the value of the items not delivered.  Managers or receiving personnel should never accept an oral assurance from the truck driver. A credit memo should be made immediately and attached to the delivery invoice.  The manager should also call the supplier to ensure that proper processing of the credit to the operation account has been under taken.
  • 73. CONTROL DURING CENTRAL STORAGE  Security concerns at time of storage involve. 1) Knowing how much product should be available at all times. 2) Knowing how much product is available (to determine if any product is missing) 3) Preventing physical access by persons who do not need to be present in storage area.
  • 74. There are a few steps that are to be applied in stores. They are:  Restricted entry into stores   There should be limited access. Only authorized personnel should enter storage areas. This policy is best met by locking all storage areas except during times of issue.   In all hotel stores there is an issuing time, generally during the start of shifts in the morning and in the afternoon will help reduce unnecessary issues, theft as well as adhere to a strict issuing policy restricting unauthorized entry in the store at all times.
  • 75. Secured locking systems  Storage area should be securely lockable; it should be possible to lock the freezer [whether walk in or reach-in] as well as the dry storage and liquor storerooms.  In addition a locking shelving unit in a walk in refrigerator can protect wines and other expensive items.   One or more compartments of reach in refrigerator should be lockable, expensive fresh meat; seafood and other valuable products should be kept in these units.
  • 76. Effective Inventory Systems   Inventory control practices must be adhered to items judged expensive and theft prone should be controlled through use of a perpetual inventory system.  Items kept in the workstations, broken cases or other storage areas in small operations that are not under perpetual inventory may well be prime targets for theft.
  • 77. Proper Requisition Procedure   The hotel relies on proper requisitions procedure to run the store efficiently.  Proper requisition forms for different sections or departments of the hotel should be made.  A strictly regulated time for the issuing of stores should be adhered.   All the requisition should be duly signed by the department head or the acting supervisor.  Continuous issue will set a normal level of issue which helps in controlling the over issues.
  • 78. Food and Beverage  This department is particularly vulnerable to internal theft because food and beverage items are very easily resold or used after they are brought out of the property.
  • 79. It is important to have proper procedure to control:  Purchase   Food and beverage items have a very large varieties and types available and purchasing the items can be a little confusing.   Food purchase could be charged more than they are actually so before purchase at least three quotations should be considered and the best should be purchased but quality should be also considered.   While buying meats and fish, freshness and right quantity should be kept in mind as over purchase could be waste or misused by the kitchen staffs.   During cash purchase, purchaser could tamper with the price and charge higher. This should be checked with the invoice presented and cross checked whenever possible.
  • 80. Receipt  Hotel receives a lot of supplies and material which is sometimes monotonous for the receiving and are neglected sometimes which is when suppliers may cheat the hotel.   Following things should be considered while receiving different materials:   Receiving the wrong items [such as inexpensive foreign wines instead higher quality wines or 70% instead of 80% fat content ground beef] and paying higher prices for them.  Short weight of count by which the food & beverage operation pays for more products than received.  Receiving thawed product, which is represented as fresh & for which a higher price is charged.  Grounding ice into ground meat product adding fillers in applicable products or selling meat with excess trim.  Including weight of ice and / or packaging in amount of product for which price is charges.
  • 81.  Combining expensive steaks and inexpensive meat items into one container, weighing the entire container and billing the operation for the same.  Including one empty bottle in a case of, for example 12 liters.  Checking every pack and every receipt with appropriate supporting invoice and weighing for the right weight is crucial in reducing frauds or carelessness.
  • 82. Storage  It is critical to ensure that storage areas are kept physically secure. The following measures should be adopted for this purpose.   There should be limited access. Only authorized personnel should enter storage areas. This policy is best met by locking all storage areas except during times of issue.   Storage area should be securely lockable; IT should be possible to lock the freezer [whether walk in or reach-in] as well as the dry storage and liquor storerooms. In addition a locking shelving unit in a walk in refrigerator can protect wines and other expensive items. One or more compartments of reach in refrigerator should be lockable, expensive fresh meat; seafoods and other valuable products should be kept in these units.   Inventory control practices must be adhered to items judged expensive and theft prone should be controlled through use of a perpetual inventory system. Item kept in the workstations, broken cases or other storage areas in small operations that are not under perpetual inventory may well be prime targets for theft.   If items kept in locked storage are needed during the shift a management official with access to storage area keys should retrieve the products.
  • 83.  Requisition for use  Every department will have their own requisition form designed in such a way that it will be very easy for them to use and don’t have to write for a long time.   The requisition will have two copies with one going to the store and one with the requisitioning department.   Without proper requisition and proper authorization or signature from the head of department, no item will be issued. 
  • 84. Preparation   Several basic principles of food production relate directly to security and theft prevention.   These include the following.   The manager must have an idea of the quantity of food to be produced. This estimation is made from sales forecasts based on the amount of past sales under similar conditions.   Over production, which leads to waste and leftovers, must be, minimized often foods in process are inadequately controlled and can be more easily stolen.   One type of employee pilferage occurs when employees eat on the job. A policy regarding employee eating should be established and consistently enforced.   Only the amount of ingredients actually needed for food production should be withdrawn from storage.   Close employee supervision is needed to assure that security control systems are not violated. 
  • 85.  Garbage cans, employee packages, and similar places where stolen property can be hidden should be routinely checked.   Utensils, service ware etc. which are disposed of by careless employee can also be discovered by checking waste containers.   Items withdrawn from storage and not used should be returned to the security of the storage area as soon as possible.   No item should be discarded, either because of alleged spoilage of improper preparation without prior approval of management.   Employees should not be allowed to take home leftovers or scrapes for pets, since this promotes over production and encourage wastefulness.   Personnel such as cooks & stewards should not be permitted easy access to storage areas, and should not be allowed to wander around the property. They should be questioned.   No food should be produced on the line for presentation to a food server without submittal of a duplicate copy of the guest check (or use of a similar procedure to ensure that food sales are entered in the operation’s sales income control system)
  • 86.  Burns returns and other food problems should not be discarded without management approval.   Supervisors should be alert to the possibility of cooks giving food to their employees for personal consumption. This practice should not be permitted.  
  • 87. Service   Service of food and beverage can determine whether the guest will have a great time or not.   Served food and beverage should be prepared in a very hygienic conditions and any case of food poising can have serious consequences.   Proper food handling, food holding and food serving temperature ensures quality hygienic food.  While opening wine bottles or Champagne a special care should be taken so that the mouth of the bottle doesn’t break and mixes with the wine. Champagne has a lot of pressure within it, so proper care while opening should be taken care.
  • 88. Guest Payment   Proper care while making bills should be taken care so that the outlet doesn’t over charge or undercharge the bill.   If credit facilities are provided, proper identification with letter of credit should be presented to the accounts section before hand and failure to do so will result in payment by the server.  A regular check on the table is necessary to ensure there are no skippers. 
  • 89. Marketing, Sales and public Relation Function  . There is a growing recognition of the need for consideration between the marketing, sales and public relations functions of a property and its security function.  Security implications for the following should be considered:  Politically important persons/ Events   Politically important person(PIP) relates to a powerful government position where the person will have political influence in the country. Often the head of a political party, member of the parliament, political dignitaries, ministers, head of states or the head of country fall under this category.   Generally there are people from the secret service, army or police to safe guard these important people but special care should be taken as their arrival is not discrete but more announced. Hence, the hotel should provide special arrangements for these important people as their impact will be directly on the whole hotel establishment.   Hotels normally host meetings and seminars in a country level with chief guests and participants belonging to different parties. The hotel should increase the number of security guards, restrict the meeting area to public, scan every person entering the meetings and work in coordination with body guards or special force team for high level of security.
  • 90. Guest/ Events with high public profiles   Hotel generally have a very good public relations with high profile guests who have a certain charm or impact on public. Movie Stars, Sportsmen, Businessmen, Entrepreneurs, Public Speakers, Comedians etc fall under this category.   While catering to these guests and their events, hotel should not only provide great service but also extra security service including valet parking, verifying invitations and special care to security as provided for PIP guests.   Although most of the time it is announced, these guest sometimes want to get out of the daily hassle and have a peaceful time for themselves or with their family to which hotel must make it sure that no one knows about their stay and hotel staffs should be trained to maintain a secrecy to their stay at the hotel and respect their right to privacy.
  • 91. Controversial Guests/ Events   The guests who are surrounded by controversies or rumors regarding their personal life or their work or any crimes committed by them are called Controversial Guests. They could be from an entertainment background, political, business or professional background with very unusual event that not only changed their life but the life of others around them. Examples could be celebrity breakups, politicians caught in crime or suspected, release of a highly criticized movie etc.   Although convicted of the crimes or the allegations, such guest are valuable to the hotel as they bring in more crowd and free marketing it also pull unnecessary headache and lots of media attention which could be a great question in the privacy and rights of the guest. Hence, hotel should think carefully and act tactfully while dealing with such guests. 
  • 92. Losses Affecting All Departments   In a hotel, as in all organizations, all of the department function as one. They are all interrelated and one department will significantly affect the performance of other department.   If only a single person will create any loss in the organization, the whole organization may suffer the consequences, hence such events should be monitored and prevented for organizational efficiency and affectivity. At times, employees cheat their organization and even steal form the organization which is a serious offence to the ethics and codes of the organization.   Such losses that affects all the departments are as follows: 
  • 93. Stealing Company time  Going longer breaks, arriving late to work, leaving early from work, unnecessary leaves, taking too long to complete a small job can all be stealing or cheating time.   There are targets and time limits within which a task has to be completed and negligence or intentional delay will hamper a lot of hotel’s efficiency.   For example, if the housekeeping staff delays to make even one room, the Front Office will receive complaint from the arrival guest as their room is not ready, as compensation the Front Office may offer free beverage which will be a loss to the Food and Beverage Department and consequently a trouble for the account to maintain a complimentary bill and there will still be a chance that due to bad service, the guest may not come back which is a loss to the hotel.
  • 94. Personal Services on Company Time  It is often seen that the employee will be using the company’s resources and time to their own personal benefits.   This is specially seen in administrative staffs who are in front of the computer and are searching for personal needs such as online chatting, Skype calls to family, research or assignment of college, Face book etc. They are more indulged in their personal works and perform less on their office works resulting in delay in payroll, mistakes in service charge, errors in posting and stock etc.
  • 95. Personal ‘Calls on Company’s Expense  This has become very famous trend, especially among youngsters.  They utilize their company’s valuable resource talking to their friends, family and sometimes making international calls which could have saved a lot of money for the hotel which in turn reduces its chances of expansion, development as well as its profit margin leading to loss of both parties- employees and employers.
  • 96. Stealing Company’s Assets   Small undetectable items, shawls, decorative items, cutleries, stationery items etc are things that are regularly missing from the hotel as they are stolen by the employees. They are hard to detect and easy to carry out making them an easy lifts.   Repair and Maintenance may steal shampoos or guest valuables which will be targeted to room attendants, Front office will receive the complain and HR as well as the PR department will have a tough time dealing with such cases.   Hence, hotels have to be very particular during their hiring process and regular checking and personal belonging like bags outside the hotel premises and security check on all employees and their bags is a must to control such events.
  • 97. 1 Responding to employee theft  Different responses are available to management in dealing with assets lost through employee theft. The property may want to:  Cash Control   Provide a receipt for every transaction. Encourage customers to expect a receipt by posting signs at each register.   Put one employee in charge of setting up cash drawers. Have another double-check the cash count.   Make each employee responsible for his/her own cash drawer.  Issue one cash drawer per on-duty employee. No other employee should at any time (during lunch, breaks, etc.) be allowed to open or use another's cash drawer.   At the end of each shift each cash drawer should be balanced by the employee and double-checked by another.
  • 98.  Get your employees involved   Offer rewards to employees who report theft. Ask your staff for their suggestions on how to eliminate theft.   Employee background Checks –   Contact previous employers to find out if this person has a theft problem before you hire.  When employees are not screened properly, you spend more time and money training new employees to replace dishonest ones.
  • 99.  Secret Shoppers:   Secret shoppers or mystery shoppers pose as customers and watch employee behavior and situations that owners can't always observe. Secret shoppers are trained to look at how customers are treated, the type of service provided, efficiency, honesty, sales techniques as well as misbehavior.   Survey Cards:  Give your customers a short survey card to complete or place one on your web site for customers to fill out.  Offer recognition and rewards to employees who consistently provide exceptional customer service. 
  • 100.  Video Surveillance:  Often just installing cameras will cause employees to think twice before stealing.  But in order for them to be effective, you need to let your employees know you check these by offering them feedback (Positive or Negative) based on their job performance by viewing these videos with them.  Responding to employee theft   Do a product inventory  Conduct inventories often and at irregular intervals. Also make routine spot checks. Inspect records of purchases and sales at the beginning and end of each shift.  Define individual employee responsibilities for inventory control. This establishes a climate of accountability
  • 101.  Post Signs and Install Locks   Post signs to indicate areas that are open to the public and those that are for employees only.  Install locks on all doors to interior work areas to control public and employee access. Doors to storage and supply rooms, and individual offices should be locked to limit access   Trash Control   Keep trash dumpsters inside during business hours. Check bins at random times for pilfered goods that might have been placed in them for pick-up after the trash is taken out.  Use clear plastic trash bags. Inspect contents for pilfered goods. Keep lids of outside trash dumpsters locked during non-business hours. If practical, keep the lids locked whenever the dumpsters are not being filled or emptied.   Have employees work in pairs in emptying trash. Or have different employees empty the trash from day to day.
  • 102.  If You Suspect Theft  Despite your best efforts, dishonest employees can find ways to steal. If you suspect theft, call your local police department.  Don't play detective and try to solve the crime.  And do not jump to unwarranted conclusions.  A false accusation could result in serious civil liability.