SlideShare a Scribd company logo
1 of 155
Download to read offline
HOTEL SECURITY
Security
 Security as a condition is the degree of
resistance to, or protection from, harm.
 It applies to any vulnerable and valuable
asset, such as a person, dwelling, community,
nation, or organization.
 Establishing or maintaining a sufficient degree
of security is the aim of the work, structures,
and processes called "security."
Concept in Hotel
 It is the moral and legal
responsibility of a hotel to
protect its guests and their
property against threats
posed by human beings with
a conscious intent to harm
them.
 The security department of
the hotel is responsible for
the overall security of the
building, in-house guests,
visitors, day users, and
employees of the hotel.
Security in Hotel
Security? Why?
 Hotel guests want to feel safe and secure in their
temporary home. Hotels have a duty to protect them.
After all, the business depends upon them.
 Apart from the possibility of death or injury and
destruction, the adverse publicity from an incident,
can result in ruined reputations, failing business and
knock-on effects to tourism in the country or region.
 The risk to hotels can also increase because of the
identity of an individual guest or his or her family.
VIP’s, celebrities or the infamous can present special
difficulties.
 Hotel staff may not even become aware of risks that
some guests may bring with them. Consequently a
hotel must be vigilant at all times.
What are the risks?
Examples of Risk
 • Terrorism
 • Kidnapping
 • Robbery by organized crime
 • Opportunist robbery
 • Burglary from rooms
 • Baggage theft
 • Fraud • Invasion of guest privacy, by locals,
press, interest groups
 • Blackmail of staff
 Many more…
Risks
Poor Hotel Security
Consequences
 The use of technology, has greatly impacted
how criminals can target hotels.
 For instance, instead of visiting a hotel to
collect many pieces of information, a criminal
can now scan the Internet pulling up specifics
about room numbers, location to other areas
of interest, the leadership team and photos of
critical areas in the property.
 Using applications like Google Earth, a
criminal can diagram the structure and their
escape routes.
Consequences
 Possibility of death
 Injury
 Destruction
 The adverse publicity from an incident
 Result in ruined reputations
 Failing business and knock-on
 Effects to tourism in the country or region.
 The risk to hotels can also increase because of
the identity of an individual guest or his or her
family.
 VIP’s, celebrities or the infamous can present
special difficulties.
 Easy terrorist attacks
Effective Hotel Security
 Now since we know what could be the
consequences, it is always better to prevent it
than curing it.
 Sometimes some things may be irreplaceable
and it is always preferable to avoid such
circumstances.
 In order to avoid such circumstances, an
effective hotel security program is formulated
in the hotel organization.
Effective Hotel Security
Programs
 An effective hotel security programs enables
the hotel to avoid preventable incidents and
react to a quick, appropriate manner.
 Three basic elements should be included in
the program.
1. People
2. Procedure
3. Equipments
Effective Hotel Security
Programs
People
 No matter which department or post everyone can
contribute in making the hotel a safe place for all.
 This is not only the concern of the security
department.
Procedure
 Every property needs to have procedures for the staff
to follow. The staffs should be well informed about the
emergency procedures as well as any unusual events.
Equipments
 Simple safety equipments to state-of-the-art security
surveillance system all help make today's hotels a
safer and better place to be.
Group Work
How can an effective
security system work?
What are the equipments
that could be used for
security?
Based on the three aspects we have discussed just earlier.
Organizational Structure
 The organization of the security department
includes the chain of command or hierarchy from
executive down to the front line.
 The purpose of this section is to make clear who
reports to whom and who has which
responsibilities.
 This gives a clear understanding of the duties and
responsibilities along with all the answers
regarding what are the limitations within the
position and the line of authority, responsibilities
and accountability.
 The organizational structure depends upon the
following criteria:
1. Division of work
Span of Control
Criteria
Division of Labor:
2.
 The division of labor refers to narrow
specialization of tasks within a process so that
each employee can become a specialist in doing
one thing.
 The degree of division of labor depends on the
degree to which performance of particular tasks
is measureable, the degree to which wages
affect task performance, and the implementation
of technology.
Span of Control
 Span of Control in an organization is defined
as the number of employees reporting directly
to one supervisor.
 Traditionally, the span of control has been
defined as four to seven subordinates under
one manager.
 The average size of the span of control,
together with the total number of employees,
determine the number of levels in an
organization structure.
Span of Control
 In a large organization there is one head and a sub
head. It is ideal to have a manager at the senior
middle level so that one manager can take care of
personnel/ operational side and the director can take
the administrative or Investigative side. The director is
still the highest authority but it saves a position.
 the above mentioned positions can be skipped
entirely if the organization is small to medium. in such
case supervisors or shift managers can be allocated
depending upon the number of frontline staffs.
 The ideal proportion of supervisor to officer is 1:5, if
there are 10 officers in a shift or team , there should
be 2 supervisors.
Span of Control
 V.A Graicunas developed the term Span of Control in
1933 when he researched the effectiveness of varying
management ratios. he determined that there were
several factors, such as the physical location of the
employees( whether they worked together or
separately), personalities, types of work performed,
and the capabilities of the employees.
 The ratio was found to be acceptable at 4 employees
to 1 supervisor all the way to 22:1 depending on those
factors. Police departments operate at about 4:1 and
the fire departments operate at about 3:1.
Span of Control
 Later after the introduction of the new technology
,"Computer and other automation system took away
some of the duties of supervisors and managers.
Organizational Hierarchy of Security
Department
Security Guards
General Manager
Director of
Security
Security Manager
Security
Supervisors
Security Officer
Doorman
Group Work
 Draw an organizational chart for a large hotel keeping
in mind all the vulnerable areas, the no. of guards
according to the 24 hour shift patterns in different
departments of the hotel, public areas, entrances on
the basis of the physical location of the employees(
whether they worked together or separately),
personalities, types of work performed, and the
capabilities of the employees.
 Please explain why you have chose the no. guards or
supervisors in that particular area.
 Assume that there is also a casino and 3 outlets
including a bar, recreational area( gym, spa,
swimming pool), 150 rooms & staff parking area.
Types of Security Providers
Depending upon the various factors such as the company
profile, structure, capacity, location, safety requirements as
well as feasibility and economy of the hotel, a hotel chooses
one of the following types of security service providers:
1. Proprietary/ In- House Security
2. Contract Security
 Proprietary security and contract security companies are
responsible for protecting companies and businesses and
ensuring the safety of employees and consumers.
 A proprietary security company is controlled entirely by a
particular company(hotel itself in this case) and is
responsible for the hiring, firing and management of
personnel.
 A contract security company is operated by a professional
security company and contracts its services to different
companies.
Cost
 Proprietary security is more expensive
because your company is in charge of paying
for benefits and higher wages for experienced
personnel.
 Because the status of proprietary security is
considered higher, it usually attracts a higher
quality of guard.
 The wages tend to be lower with a contract
security company because uniforms, sick
leave and training benefits are all covered by
the service.
Control
 Proprietary security employees often feel
more loyal to a particular company, because
they feel a camaraderie with fellow employees
and have an opportunity for growth and
promotions.
 There may be periods of time when a
company may have to add or lay off workers,
which can create a security problem within a
company.
 By using a contract security service,
companies have the opportunity to deal with
staffing problems easily and quickly.
Consistency
 If your company requires daily security
organization that needs to be micromanaged,
having day-to-day proprietary security may be
the way to go.
 An important consideration when deciding
which type of company to use is that
regardless of which type of security company
you select, employee turnover is a possibility.
 Depending on the site, this could be problem
that affects the safety of the individuals in the
area.
Effectiveness
 Proprietary security personnel are trained to the
specific needs of the company, which helps them
become more familiar with the layout of a building
and recognize individuals coming in and out of
offices.
 Because of a high turnover rate, contract security
guards aren't given the opportunity to become as
friendly with employees.
 This can affect their loyalty and commitment and
adversely, to your detriment, affect their
performance.
Liability
 When a company decides to go with
proprietary security, it is responsible for taking
the proper measures regarding background
checks and ensuring that an applicant has the
proper training and skills to handle a job of this
magnitude.
 When working with a contract security
company, you don't have to worry about
training, recruitment or background checks; it
is all handled by that firm.
Turnover
 Blake & Associates Inc.(American Company) notes
that turnover in contract security is high -- between
130 and more than 400 percent annually.
 In-house security has the advantage of less turnover,
as there is the perception of the job being a more
permanent position.
 A business wouldn't have to regularly retrain new
contract staff about the company and building. In
addition to having a stable work environment, inhouse
employees view their employer as offering a higher-
quality job and being more loyal to staff, according to
Blake & Associates Inc.
 Staffing-There might be periods where you would
have to lay off or add more staff. The contract
company can deal with this easily and quickly, In
house does not tend to have this flexibility.
Relationships
 Company employees may feel more comfortable with
in-house security, knowing that all parties are
employed by the same group.
 Having staff in a company can create an "us versus
them" environment.
 Employees may not report incidents or may hesitate
to report because the contracted security is not "one
of them" and may not understand the business or the
people well enough to deal with the situation
appropriately.
 Whereas( Impartiality)-Guards aren't directly tied to
your company so they can perform duties, & enforce
regulations more effectively. They aren't going to get
friendly enough with your business to get too
Group Work
 In your view which is a better option for a non
chain 5 star hotel, non- star hotel and an
internationally recognized chain hotel.
 Why?
 Presentation on the next day.
Job Description
Why do we need to
understand the job
responsibilities of different
post.?
Job Description of Security
Manager
 Responsible for: Security Department
Main Scope and General Purpose of Job:
To direct and co-ordinate the overall activities of
the Security Department. To guarantee the safety
of all the guests, employees and hotel property.
 Give direction and control all activities relating to
the Security department, ensure the hotel meets
Job Description of Security
its financial and guest satisfaction objectives.
Responsible to create and coordinate trainings or
anything related to employee development
programs.
Manager
 Direct Responsibilities:
 Performs duties common to all supervisors and other duties as may be assigned.
 Establishes standard policies and procedures for recruitment.
Be aware of the Fire and Emergency procedures, and your Departments
responsibility in an emergency.
 Be aware of the Security policies and procedures of the Hotel, and ensure that at all
times in all areas of the Hotel that they are being strictly adhered to.
 Be responsible for formulating the departmental plan and supervise it to be followed
up.
Job Description of Security
 Briefs Supervisors on function, VIP arrivals and other events, which will necessitate
additional or special preparations.
 Cables relationship with all guest of the hotel.
 Conduct regular operational meetings to review, monitor, adjust and upgrade the
performance of the Department as a whole, explaining new directions and policies
and procedures at the same time.
 Conducts frequent front and back of house checks ensuring the procedures,
standards of employee grooming and manning levels are in order and takes
appropriate action where necessary.
 Conforms to and enface policies & procedures and rules & regulations as laid down
by the brand(hotel chain) and the hotel in order to achieve the highest levels of
uniformity and guest service.
Manager
 Delegates to and supervise all staff within the department and assist them
in preparing work schedules.
Job Description of Security
 Directs and controls all subordinate to ensure that all day to day operational
matters are handled on time.
 Establish control procedures in all operation aspects in accordance with
hotel’s policy.
 Implement and enforces safety regulations and house rules.
 Investigate cases happened in the hotel. Should criminal cases are
occurred in the hotel, Assist Police to do investigation work.
 Maintain a Hotel logbook on incidents, complaints etc. and refer them, if
required to the appropriate department for follow up action.
 Performs special duties as required or designated by the General Manager.
 Prepare job responsibilities of the security department. Adjust and update it
according to the working situation.
 Prepare the plan (especially during the densely populated or vehicle
period) for external traffic, so as to keep the hotel area in good order.
Manager
Job Description of Security
 Prepare various monthly reports as required by the General
Manager.
 Responsible for implementing the policies and procedures in
operation of the Security.
 Responsible for the entire operations, staffing and equipment
of the Security Department.
 Through close supervision recommend improvements and
changes to the operation of the Security Department
especially creating service standard of the hotel.
 To handle and resolve all guest queries and complaints in an
efficient manner and to establish an amicable relationship
with all clients, customers and guests of the Hotel.
 Trains personnel according to established procedures and
security training conducts training meetings to discuss
problems and future plans, gives information and assignment.
Training
The security manager is responsible for training the whole
department about:
1. All hotel regulations and factors affecting the operations of
the hotel.
2. Unarmed defense tactics
3. Fire prevention and safety techniques
4. Basic fire fighting
5. First Aid
6. Preservation of crime scene and evidence
7. Action, duties and power where crime is detected
8. Action in crisis situation
9. Report writing
Security Guard
Main Scope and General Purpose of Job:
 The primary responsibility of a hotel security
guard is to protect the hotel and the guests,
employees and property within it.
 Hotel security guards spend the majority of
their time patrolling the grounds and premises
of the hotel, or monitoring the hotel via security
cameras. They report to either the head of
security or the hotel manager.
Main Duties of Security Guard
 To make regular rounds of all hotel corridors and
areas.
 To observe any suspicious or abnormal activities on
the part of staff or guests.
 To be alert to undesirable persons such as pimps,
prostitutes, drunks, etc. and to evict them from the
premises.
 To assist the Duty Manager in inspecting the rooms of
doubtful clients and assisting with suspected
“skippers”.
 To investigate any offence reported whilst on patrol
and to ensure full details are made available to the
police when necessary.
 To ensure that staff particularly maids, conform to
rules when cleaning guests’ rooms.
Main Duties of Security Guard
 To look out for keys left in doors and to ensure
their safekeeping.
 To seize and deal with property found on patrol.
 To maintain a close watch for any fire or safety
hazards.
 To provide escort where required for cashiers, etc.
 To assist guests in decoding in-room safes.
 To monitor security equipment e.g. CCTV, smoke
detector.
 To sign out pass/master key to employees.
 Handle lost and found items(usually only
valuables).
Why read this?
 Think?
 Come up with answers……
Ans
 Enhance better team coordination as well as higher efficiency in task
performance.
 Proper division and allocation of staffs.
 To calculate manpower or labor.
 It properly defines the organization structure ensuring and facilitating
effective communication, authority, limitations and responsibilities
eradicating any confusions.
 Better prepare the personnel for emergency or contingency situations
where staffs need to take quick decisions.
 To ensure specialization and no over or double work is done.
 To know the limitation within the person and assign duties accordingly
which he/she would be able to complete which eliminates the problem of
inadequacy or incompetence.
 It sets the standard for any establishment:
 When things go wrong we know whom to catch.
 When things surpass expectation, we know whom to appraise.
 This act as the most powerful tool while dealing with problem regarding
labor unions, managements decisions, financial planning, expansions, etc.
 Overall guides all the employees towards attainment of the same objective-
Security Equipments
 What do you understand by Security
Equipments?
 Security Equipment are Firearms, ammunition,
batons, chemical agents, security restraints
and similar devices.
 Can they work on their own?
 They are aid to the security personnel and
help them become more effective and efficient.
 But how?
While Choosing Security
Equipments
 Property management department should understand the
uses and limitations of any given type of security equipment
before authorizing its installation.
 So before purchasing any security hardware or equipment,
the hotel must evaluate the following:
1. Will the equipment to be purchased solve a particular
security problem?
2. Is the equipment the most cost effective –in other words
are there less expensive (in terms of both capital and
operating cost) alternatives? This will include rental of
equipment rather then purchase.
3. Will the equipment have counter-productive effects on the
operations(not immediately noticeable)?
4. Who will be responsible for this equipment and whether he
is capable of maintaining and using the equipment. Is the
training required and if so at what?
Why all of that?
 Thorough cost benefits analysis must be
carried out before making any purchase.
 Hotel should not fall into the misconception
that what works well in one hotel must work in
others as well.
 Every hotel will have its own set of threats,
safety requirements.
 So the hotel needs to be aware of all the
requirements and the equipments required.
Categories of Security
Equipments
They can be broadly divided into 5 categories:
1. Equipment for Physical Security and
perimeter control.
2. Equipment for Surveillance
3. Communication System
4. Alarm System
5. Equipments for Guest Room Security
Physical Security and Perimeter
Control
 Physical security involves the protection of the
hotel buildings, its ground and the assets
within the building.
 Perimeter control is concerned with restricting
access to a property.
 What are the equipments used in physical
security and perimeter control?
Physical Security and Perimeter
Control
 Access control systems allow authorized personnel
and material to move through normal access routes
while detecting and delaying movement of
unauthorized personnel and material.
 Access control adds little, if any, enhancement to a
structure’s physical barriers. The use of electrically
operated locks and strikes with access control
systems may actually reduce penetration delay times
for doors.
 Thus, access control systems must be integrated
with other components of the overall physical security
system to be effective. This will ensure that personnel
seeking entry to the protected area are queued at the
control point(s).
 There are many different types of access control
systems and they vary extensively in their complexity
Equipments for Physical Security
and Perimeter Control
 Computer security equipment
 Locks
 Safes
 Safety deposit centers
 Security doors
 Security fencing
 X-ray machines, free standing metal detectors, halnd held
metal detector
 Shutters and grilles
 Explosive detectors
 Steel office storage and furniture
 Vacant property protection: concrete, temporary fencing, barb
wire
Physical Security and Perimeter
Control
 There are certain areas or aspects that are
needed to be considered before buying the
equipments for physical security and perimeter
control.
 Layout and design
 Lighting
 Parking Area
 Glass Protection
 Landscaping Why?
Layout and Design
 Every hotel should incorporate necessary security and
safety equipments during the designing of the
building, pubic areas, hotel rooms, inter-departmental
offices, recreation centers, parking and all other
access points within the hotel premise.
 Criminals operate best when undetected, this usually
means under the cover of darkness or concealed
behind obstacles.
 Designs in hotel should be given great priority so that
security measures are appointed at the most strategic
locations which provides security as well as economy
of movement, operation and, surveillance.
 The security department should be aware of the
layout and design of all the hotel and its related
premise and assess all the areas for the level of risk
and plan accordingly all the necessary risk limiting,
Objective of Physical Security and
Perimeter Control:
 deter potential intruders (e.g. warning signs
and perimeter markings);
 distinguish authorized from unauthorized
people (e.g. using keycards/access badges)
 delay, frustrate and ideally prevent intrusion
attempts (e.g. strong walls, door locks and
safes);
 detect intrusions and monitor/record intruders
( e.g. intruder alarms and CCTV systems); and
 trigger appropriate incident responses (e.g. by
security guards and police)
Layout and Design
Consideration
Depending on
 the type of establishments,
 its client base,
 business volume(rooms, seasons)
 location,
 theme,
 no. of employees,
 operational requirements( operating hours & services
provided),
 Compliance with the SOP of security procedures
 risk levels or operational hazard and
 Operating expenses,
the hotel should choose effective and efficient security access
limiting equipments but guest privacy and comfort should not
be compromised which is the main objective of the hotel.
Layout and Design
Consideration
 It is up to security designers, architects and
analysts to balance security controls against
risks, taking into account the costs of specifying,
developing, testing, implementing, using,
managing, monitoring and maintaining the
controls, along with broader issues such as
aesthetics, human rights, health and safety, and
societal norms or conventions.
 Physical access security measures that are
appropriate for a high security prison or a
military site may be inappropriate in an office, a
home or a vehicle, although the principles are
similar.
Lighting
 The elements of private security are to detect, deter,
delay and respond to unwanted activity in a
protected facility, lighting provides deterrence to
criminal activity.
 In the field of physical security, security lighting is
often used as a preventive and corrective measure
against intrusions or other criminal activity on a
physical piece of property. Security lighting may be
provided to aid in the detection of intruders, to deter
intruders, or in some cases simply to increase the
feeling of safety. Lighting is integral to crime
prevention through environmental design
 In most hotels, the interior lighting plan is generally
more than adequate for most safety considerations
however; the areas around the property, especially
Case Study
 Security lighting can be counter-productive.
 Work as group and come up with the reason to
why this happened.
 Turning off lights halved the number of thefts
and burglary in Övertorneå Sweden.
 A test in West Sussex UK showed that adding
all-night lighting in some areas made people
there feel safer, although crime rates
increased 55% in those areas compared to
control areas and to the county as a whole.
Lighting Consideration
 Bright, unshielded floodlights often prevent people from
noticing criminal activity, and help criminals see what they are
doing.
 While adequate lighting around a physical structure is deployed to
reduce the risk of an intrusion, it is critical that the lighting be
designed carefully as poorly arranged lighting can create glare
which actually obstructs vision.
 Studies have shown that many criminals are aware of this effect
and actively exploit it. The optimal design will also depend on
whether the area will be watched directly by humans or by
closedcircuit television, and on the location of the observers or
cameras.
 Security lighting may be subject to vandalism, possibly to reduce its
effectiveness for a subsequent intrusion attempt. Thus security
lights should either be mounted very high, or else protected by wire
mesh or tough polycarbonate shields. Other lamps may be
completely recessed from view and access, with the light directed
out through a light pipe or reflected from a polished aluminum or
stainless steel mirror. For similar reasons high security installations
may provide a stand-by power supply for their security lighting.
Some typical considerations
include:
Reduce and prevent glare and situations mentioned above
 Shielded or full cut-off (FCO) lamp housings which conceal the
bulb could be used, which should direct light onto the ground or
target and away from observers.
 These lights should send no light above 80 degrees from the
lowest point.(Nadir)
 Lighting should be bright enough, and not "as bright as possible".
In many cases a good rule of thumb is 0.5 watts per square
metre (0.05 watts per square foot).
 This might need to be increased in very confused environments,
but conversely can be reduced in very open environments.
Multiple lamps of moderate power instead of a few powerful
lamps will reduce glare, provide more even illumination with
reduced pools of shadow, and provide some redundancy if one
lamp's bulb blows out or develops a bad counter balance.
Glare
Some typical considerations
include:
Prevent malicious tampering or interference. This means that
besides the lamp itself, the entire circuit from the source (Electric
company or generator), through the wires, to the lamp and back
should be protected.
 Luminaries should be accessible so that the maintainer can
replace blown bulbs as quickly as possible and clean the
luminaries periodically. However they should be protected or
somehow made inaccessible to tampering.
 Ensure the electric meter box is locked or inaccessible, or else
power the lights from a different line.
 Control and power lines, where outside or vulnerable, should be
either buried well underground (in conduits preferably) or at a
height of at least 8 metres ( about 24 feet ).
 Ideally multiple circuits should be used to prevent an accidental
or malicious short or cut causing all illumination to fail.
Parking
 If you look at the statistics, roughly 80% of the criminal acts at
shopping centers, strip malls and business offices occur in
the parking lot.
 Lawyers make a good living off liability cases based on a lack
of sufficient security measures or not taking "reasonable care"
in the protection of employees and customers against
criminal threats.
 The lawsuits often revolve around lack of sufficient lighting,
surveillance and response. Once crime takes a foothold in an
area it is difficult to break the trend, but there are some things
you can do that can improve security, deter crime, reduce
potential liability and make your customers feel safer.
 It's interesting to note that where parking lot security has
been implemented, customer use has actually increased
because they feel safer. Increased customer use means
increased profit which can be used to justify the increased
cost related to any security improvements.
Types of Parking
Parking areas can be generally categorized as
 street parking,
 surface parking lots,
 freestanding structure,
 and structures that are physically connected to the
facilities.
 Street parking are the parking that are on the side
of the streets. Surface parking are the open areas
that are allocated for parking. Structures built for
the purpose of parking are the freestanding
structure and parking facilities that are attached to
compliment or ease people coming to a particular
place like mall. Theatres,etc.
Types of Parking
Parking Security Equipments or
Aids
 Lights- Various type and
use
 CCTV
 Guards
 Mechanical or motorized
Tire Spikes
 Traffic Barrier post
 Mirror
 Under Chassis Vehicle /
Car Inspection Mirror
Consideration for parking Areas
The following consideration should be taken
before installing security equipments at the
parking lots:
1. The type of parking
2. Capacity
3. Design
4. Operating hours
5. Use (public, private, for employees only, only for
guest)
6. Terrain/ Landscape
7. Atmospheric conditions
8. Availability of natural lighting and natural
Glass
 Glass is an amorphous (non-crystalline) solid
material. Glasses are typically brittle(fragile) and
optically transparent
 Selecting the right glass is important to the
hotel as it not only add to the charm of the hotel
but also provides a medium of safety and if
proper considerations aren’t taken, the same
could be a tool for hazards and accidents.
 There are glass protecting products but it is wiser
to select the proper glass then laying a protective
layer over it, unless it is mandatory.
Glass protecting Products/
Equipments
 Bar or Grill
 Aluminum or metal Protection Borders
 Window Protection Films
 Apart from this stronger glass are advised to
be used.
Types of Glasses
 Normal (Annealed) Glass
 Normal glass is synonymous with flat glass irrespective of the
process of manufacture.
 Float glass has a perfectly flat, brilliant surface, whereas
sheet glass has slight distortions.
 Both are referred as normal (annealed) glass and can be
processed to obtain many different varieties of glass for use
in buildings.

Applications
 Normal glass is used in residences, shopping malls, hotels,
restaurants, etc. for windows, shelves, doors and partitions,
Solar Applications, Display cases, Shop fronts, Solariums,
Greenhouse, Atriums & Railings etc.
Types of Normal (Annealed)
Glass
 Clear Glass
 It is normal annealed glass, though clear &
transparent, it does posses some color tint
usually greenish. It is due to presence of some
impurities such as iron.
 Clear glass has very high-energy transmission
when exposed to sunlight.
 It provides a clear view of the objects across it.
 Applications: Used in doors, windows, solar
applications, shelves etc.
 It is also used for further processing to other
glass types.
Tinted glass
 It is normal glass that is coloured by the addition of metal
oxides into molten glass.
 Tinted glass possesses filtering properties that help reduce
eyestrain due to dazzle.
 Its absorption properties help diminish energy transmissions
when exposed to sunlight.
 Tints like green allows more visible light and cut out infrared
radiation.
 Variations in the thickness of the glass would yield different
performance in terms of light and solar radiation
transmission.
 Although darker shades reduce the amount of heat being
transmitted to the interiors, they also reduce the amount of
transmitted daylight.
 Applications:
 Used in doors, windows and partitions etc
Tinted Glass
Patterned, figured or rolled
glass
 It is a decorative and translucent glass with
figures or patterns on one face.
 In addition to diffusing light and obstructing
visibility from the outside, the figures soften the
interior lighting.
 This type of glass is usually more fragile and less
convenient to clean.
Applications:
 Interiors of the buildings, opaque glazing like
bathrooms etc
Patterned, figured or rolled
glass
Wired glass
 It has wire mesh incorporated during its
production. Wired glass is recommended for its
fire protection property.
 In case of fire, the glass cracks but broken pieces
tend to remain in position restricting the spread of
flame and smoke for some time.
Applications:
 Used where nominal fire protection is required in
windows doors & partitions etc.
Wired Glass
Extra clear glass
 Extra clear glass is a high value glass, free from
impurities such as iron.
 It has high light transmission of more than 92
percent and is free from interference with the true
colour & sparkling of objects across it.
Applications:
 It is used for a sparkling display of expensive
materials like jewellery, watches, crystal ware, fine
fabrics, art wares, solar applications etc
Ceramic printed glass
 Also known as silk-screened glass for its appearance like a silk
screen.
 Certain areas of application make it important to mask a part or
whole of glass for privacy or hiding the background or enhancing
the look of a product or for purely aesthetical
reasons.
 The size, density and colour would determine
the opacity and shading whereas the variety
of dots, squares, checks and patterns will
give many design combinations to achieve
the desired effect.
 It is not affected by moisture, oil, soaps,
chemicals or detergents and retains its
original appearance though out the life of the
glass.
 Applications:
 Curtain walls, shower installations, glass
Ceramic Printed Glass
Laminated glass
 High security places, for example, banks, teller, and drive-
through windows, ticket windows, gas stations, currency
exchanges, armored vehicles, jewellery shops and burglar
resistant showcases.

 Other areas where laminated glass is used are:
 • Curtain wall glazing
 • Sloped glazing
 • Skylights
 • Glass roofs & floors
 • Aquariums
 • Animal observatory windows
 • Safety glazing for partitions
 • Security glazing for banks against bullets/ hand propelled objects.
 • Earthquakes, high velocity winds & fire resistance applications.
 • Museums
 • Acoustic glazing
Tempered Glass
 Tempered glass is an extremely strong glass which is heat
treated to a uniform temperature of approximately 650ºC and
rapidly cooled to induce compressive stresses of 770 kg/cm2
to 1462 kg/cm2 on the surfaces and edge compression of the
order of 680 kg/cm2.
 Tempered glass is not manufactured on float line. It is a
separate process.
 Tempered or toughened glass gains its added strength from
the compressed surfaces. However, if a deep scratch or an
impact penetrates the surface, the glass will break into a
number of small particles.
 The heat treatment process for tempered glass requires that
all fabrication be completed prior to toughening.
 Any attempt to cut, drill, grind or sand blast the glass after
toughening may result in glass breakage. The heat treatment
process does not change the light transmission and solar
radiant heat properties of the glass.
Applications
 It is used in commercial applications where wind, snow or thermal
loads exceed the strength capabilities of normal (annealed) glass
such as safety glazing for entranceway, railings, partitions or fire
knock-out windows.
 Tempered glass can be used in balustrades, escalator side panels,
handrails, shower screens, bathtub enclosures, sliding/swing doors,
squash, racquetball wall, showcases, partitions etc.
Other areas where tempered glass should be used are:
 • Mainly used for safety and strength
 • Curtain walls of high-rise buildings
 • Exterior and interior of buildings where strength is important
 • Spandrels for walls and decorative paneling
 • Door openings, showroom and lobby facades, escalator side
plates, and
 staircase handrails
 • Viewing partitions of sports complexes, resorts and airports.
Curtain Walls
Heat Strengthened Glass
 Heat strengthened glass is a type of tempered glass
which has been strengthened thermally by inducing a
surface compression of 422 to 658 kg/cm2 as
compared to a range of 770 to 1462 kg/cm2 in case of
fully tempered glass.
 It is valued for its mechanical strength, which is twice
that of normal annealed glass though half of fully
tempered glass.
 With the exception of strength and breakage
haracteristics, heat - strengthened glass retains the
normal properties of annealed glass.
 Heat-strengthened glass provides necessary
resistance to thermal stress associated with high
performance glazing materials such as tinted glass
Applications
 Reflective glass is used in office buildings,
high-rise buildings,
 • Entrance
 • Privacy windows
 • Decorative walls
 • Spandrel glazing
 • Vertical and sloped glazing Building
facades
Insulated Glass
 The insulating glass is a prefabricated unit
made of two or more glass panes, separated
by a cavity and edges-hermetically(A hermetic seal
has the quality of being airtight. In common usage, the term often
implies being impervious to air or gas) sealed together.
 This edge seal not only binds the individual
sheets of glass together to maintain the
mechanical strength of the joint but also
protects the cavity between the glasses from
outside influences.
Insulated Glass
Applications
 • Office buildings, hospitals, hotels, houses
and buildings with exceptionally high heating
or cooling requirements.
 • Buildings that need the temperature and
humidity strictly controlled such as telephone
exchanges, laboratories, etc.
 • Airport control towers, windows of coaches of
trains, and other environments that need
regulated atmosphere and prevention of
condensation.
 • Buildings near highways, railways and
airports that need sound insulation property of
Consideration of selecting glass in
hotel
Depending on
 The location
 Use – roofs, window, door, partition, etc
 Safety measure
 Practicality
 Functionality- molding, design,
Equipments for Surveillance
 Surveillance is the monitoring of the behavior,
activities, or other changing information,
usually of people for the purpose of
influencing, managing, directing, or protecting.
 The word surveillance is the French word for
"watching over"; "sur" means "from above" and
"veiller" means "to watch“
 In simple terms it can be defined as the
“careful watching of someone or something.
Equipments of Surveillance
 Apart from other sophisticated surveillance
equipments such as Biometric Reader- retina
recognition, voice recognition, finger print
recognition or the surveillance from the
satellite, hotel surveillance is done either
personally or by the help of Closed Circuit
Television Cameras which not only helps us to
see what is going on but also record it at the
same time on your PC, Laptops or smart
phones as well.
HOW HOTEL VIDEO
SURVEILLANCE CAN BE
BENEFICIAL
 Security – Hotel video surveillance can help keep your guests safe from theft
and other criminals by helping you track your visitors and prevent break-ins on
your property.
 Prevent theft – Hotel security cameras can help keep intruders out of exclusive
hotel areas like swimming pools and gyms, where theft is common. A
surveillance system in your store room and other maintenance areas can
uncover potential employee theft.
 Remain competitive – Along with providing security, a professional video
surveillance system gives your guests peace of mind while staying at your hotel,
and can help you increase your return business and remain competitive in an
aggressive market.
 Flexible – Modern security cameras are easy to install and can be adjusted at
anytime to fit your needs. Unlike analog CCTV cameras, wireless IP cameras
don't require technicians, power tools, or miles of wiring. All you do is mount the
cameras and start recording.
 Remote monitoring – Adding an NVR (Network Video Recorder) to your
security camera system gives you the ability to broadcast your surveillance
footage over the internet. This breakthrough in surveillance technology allows
you to monitor any of your cameras at any time from any internet connection,
POTENTIAL RISKS OF
HOTEL/MOTEL SECURITY
CAMERAS
 Privacy – Protect the privacy of your guests and
employees by keeping your surveillance cameras
in public places like lobbies, restaurants, pool and
spa areas, and meeting areas, and out of guest
rooms and break rooms.
 Damage – Cameras, especially when they are
outdoors, can be damaged by storms or falling
objects. While this kind of damage is rare, it's
important to keep a secondary security system in
place to protect your guests and property should
they occur.
 Outages – Power disruptions or surges can
cause interruptions in recording or damage to
your system
Types of CCTV Cameras
Indoor Camera: Indoor camera as the name suggests are used for indoor security
mechanism. Depending upon your security needs, you can mount it at any suitable
location inside the building. These are suitable for security in homes, schools,
offices, hotels, etc.
Outdoor Camera: Outdoor CCTV Camera is used for outdoor places. They are
mostly used for entry and exit points with limited night lighting. Outdoor cameras
typically have hard shell vandal-proof casings and a variety of lens options.
IR Day/Night Camera: IR Day/ Night Camera are used for high alert security areas
where surveillance needs to happen throughout day and night. In the daytime the
camera functions like a normal camera with standard colors and at night it switches
to low-lux black and white mode. When visibility decreases due to no-light at night,
Infrared LEDs are automatically illuminated providing full security. These
cameras are used by military personals, in parking lots, and high security
zones.
Dome Camera: Dome cameras are installed inside a dark dome and are designed in
a way that they go unnoticed by visitors. They come in compact design for a discreet
appearance. The thief does not know if the camera is recording. These cameras can
also be rotated and tilted manually. Dome type cameras are used in public places
Types of CCTV Cameras
Bullet Camera: Bullet cameras are placed inside a bullet shaped housing, and they
are used in residential places as well as commercial places. They are small in size,
have an integrated design, and are really effective. They offer illuminate viewing
even in darkness and are weatherproof as well.
Vandal Proof Camera: Vandal proof cameras are used as outdoor security
cameras. These cameras are sheltered within solid material and are covered by a
"hub" of break-proof glass which doesn't hinder the quality of the video camera
streams. It is difficult to break these cameras and this makes them perfect for high
security. They are suitable for wall or ceiling mounting and are rain and fog resistant.
Hidden Camera: Hidden cameras are compact in size and are used for secret
monitoring. They are usually installed in public places like department stores,
theatres, clubs, etc. Hidden cameras have a built-in recorder that records and
broadcasts simultaneously. By using a large number of security cameras and
networking them various strategic views of the place can be obtained.
Pan Tilt Zoom Camera: Pan-tilt-zoom camera offers the ability to view and zoom in
all directions. You can even set the camera to automatically rotate to different fields
of vision
Consideration before buying CCTV
System
 Your hotel or resort's specific security needs depend on many
factors. Consider each of the following when you are purchasing
and configuring your hotel video surveillance system:
 Where do you experience the most thefts?
 How do you currently manage security at your hotel?
 Do you feel like your surrounding area contributes to your overall
security?
 How would you describe your average guest?
 Business travelers
 Leisure travelers Families
 How is your hotel or resort laid out?
 Single building housing guest rooms, amenities
like pool and spa, and facilities.
 Several buildings spread out over a large
property Have you ever had issues with
employee theft?
Communication System
 Communication is the most basic and the most
important aspect or tool of efficient service and
effective security.
 Today hotel have adopted numerous
communication devices which have eased the
process of communication.
 To respond quickly to a security need, a
communication system is required to quickly notify
staff responsible for the security function.
 Our main aim is prevention is better than cure and
this exactly fits in this definition.
Types of Communication
Equipments
 Paging
System(Pager)
Alarm, Message or
Call me
 Walkie- Talkie(Two
way radio
communication)
Uses radio
frequency to
communicate
 Telephone- the
easiest and most
efficient medium –
intercom, PABX, etc.
Considerations while buying
 The following things are needed to be considered
before buying the communication equipments:
 Size of the organization- Big, small, medium
 Operational areas- Garden, Beach, Indoors,
Basement
 Distance- within the hotel premises, long distances,
etc
 Purpose- emergency awareness, message delivery,
security check etc.
 Durability
 Functionality- specified to only one task or multi task,
night visibility, internet connectivity
 Design- easy to carry, small
 Portability- hands free, wireless.
Alarm System
A burglar alarm is a system designed to
detect intrusion – unauthorized entry – into a
building or area. They are also called security
alarms,security systems, alarm systems,
intrusion detection
systems, perimeter detection systems, and
similar terms.
Burglar alarms are used in residential,
commercial, industrial, and military properties for
protection against burglary (theft) or property
damage, as well as personal protection against
intruders. Car alarms likewise protect vehicles
and their contents. Prisons also use security
systems for control of inmates.
Types of Sensors on alarm
 In hotel alarm systems are often used for monitor the many
entrances and emergency exits found throughout a hotel.
 There are various type of sensors used in the alarm
according to its different functions – fire, burglary, heat,
smoke etc.
 Some of them are:
 Infrared
 Ultrasonic
 Smoke, heat, Carbon monoxide
 Microwave
 Vibration
 Magnetic Field
 Glass Break etc
Parts of an Alarm
 The most basic alarm consists of one or more sensors to detect intruders,
and an alerting device to indicate the intrusion. However, a typical premises
security alarm employs the following components:
 Premises control unit (PCU), or panel: The "brain" of the system, it reads
sensor inputs, tracks arm/disarm status, and signals intrusions. In modern
systems, this is typically one or more computer circuit boards inside a metal
enclosure, along with a power supply.
 Sensors: Devices which detect intrusions. Sensors may placed at the
perimeter of the protected area, within it, or both. Sensors can detect
intruders by a variety of methods, such as monitoring doors and windows for
opening, or by monitoring unoccupied interiors for motions, sound, vibration,
or other disturbances.
 Alerting devices: These indicate an alarm condition. Most commonly,
these are bells, sirens, and/or flashing lights. Alerting devices serve the dual
purposes of warning occupants of intrusion, and potentially scaring off
burglars.
 Keypads: Small devices, typically wall-mounted, which function as the
human-machine interface to the system. In addition to buttons, keypads
typically feature indicator lights, a small mulch-character display, or both.
 Interconnections between components. This may consist of direct wiring to
the control unit, or wireless links with local power supplies.
 Security devices: Devices to detect thieves such as spotlights, cameras &
Types of Alarm
 Local Alarms:-
 Local alarms are those not hard-wired to a central monitoring location and
may serve as deterrents(A thing that discourages or is intended to
discourage someone from some act.)
 Examples is the local alarm that is integrated with the panic hardware on a
fire exit. When the exit door is opened, the circuit is broken and the alarm
sounds.
 Contact Alarms:-
 Contact alarms systems are hard-wired to a central point. so the same can
be monitored and appropriate action may be taken when the alarm goes
off. Silent alarms are always hard-wired to a central point and may be
considered for cashier areas, storerooms, and other areas. From such a
point, the alarm can be silently transmitted to the telephone room, police
department, or private security company; both the police and the
onpremises security personnel can be alerted.
 Example of a contact alarm sometimes used in cashier areas that is helpful
during robberies involves using a money clip that cannot be removed from
 Remote Alarms:-
Types of Alarm
 Remote alarm systems typically relying some sort of transmission
for example, the more elaborate microwaves, radio waves and
photoelectric light.
 Microwave detectors are active units which transmit and receive
electromagnetic energy are designed to detect motion. Perimeter
protection with microwaves is used in some properties due to its
long range capabilities; its potential for stability, once adjusted; and
its virtually tamper-proof characteristics.
 This is best used in locations where unwanted movement should
be detected.
 Radio frequency (R F) fields trip an alarm when any intruder
breaks the radio wave by moving into an R F field. As with the use
of the microwave detector noted above, these systems are of
greatest value in locations where there should be no motion.
This system is best used as an intruder alarm.
Types of Alarm
 Photoelectric light beam is a filtered light beam passes
between a sending and receiving unit; as is the case in R F
field systems,any break in the beam sets off an alarm.
 This system is generally used for outside perimeter control,
especially in resort properties.
 And Finally Fire Safety Alarms:-
 While the use of some alarm systems is usually optional, fire
alarm systems are generally required by local fire and safety
Laws.
 Fire alarms is required to alert employees of fires or other
emergency conditions. Because of this reason all hotels,
motels and apartments must have a fire alarm system in
proper operating condition which is tested at least every two
months.
Considerations while buying an
alarm system
 Initial cost
 Maintenance cost
 Durability
 Visibility- easy detectable or not
 Area of installation
 Purpose / Need
 Functionality- wireless, hard wired, size, shape,
the sensors it uses.
 Feasibility- whether the requirements of the
system are easily available or not.
Equipments for Guest Room
Security
 When we travel to different places, the main reason that we
choose a good hotel is the assurance of a safe, clean and
comfortable room.
 Different security equipments installed in the room makes the
guest feel safe and comfortable even when they are travelling
away from their own safe dwellings.
 Hotel guest room security may be enhanced by the use of
security equipment such as hotel/motel function locks, safety
chains, and similar devices.
 Secondary access limiting devices on sliding glass, balcony,
and connecting room doors, access limiting devices for
operational windows, a guestroom telephone or other
communication device available for use 24 hours a day, a
peephole in or window next to the guestroom door etc.
 The Following are the areas and equipments in the guest
room security:
Hotel Guest Room Locks:
 Hotel Guest room Security locks can be a critical
aspect of guest protection. Locks and locking
systems are needed which lend themselves to the
smooth and efficient operation of the property, but
which are not easily compromised.
 If a property uses a master keying system in
which one key opens all or many of the property's
doors, it should face the possibility that a master
key may be lost or stolen. If this happens, every
lock's code or combination ( that is, the
arrangement of tumblers in the core of the lock)
may need to be changed.
 Depending on the type of locks used, this
rekeying can be a relatively quick and inexpensive
process or a long and costly one. [ One of the
Biometrics
 A new and highly technical access control system involves
biometrics. Such a system utilizes human characteristics
which are unique to a specific individual. No two Fingerprints
are same anywhere in the world , the retina or iris of an eye,
and the size, shape, and even the print of a hand.
 In Future biometric applications there
would be the possibility to include a
person's voice being recorded at
check-in and immediately being
transmitted to the door accessing a
restricted guestroom corridor,
Secondary Access-Limiting
Devices
 Sliding glass doors another consideration in establishing the security of a
guestroom. A number of secondary access-restricting devices are currently
available and should be examined as possible additions to the single latch
provided with each sliding glass door.
 Hinged bars and metal and wood sections that can be placed in the sliding
channel or additional lock units are sometimes used to add to the security of
sliding glass doors.
guestroom, health club, point-of-sales
 A metal peg may be inserted in a hole drilled through both the sliding door and
the frame to prevent the sliding door unit from being lifted out of the channel
and removed from the frame.
 Windows which open may need secondary latching
devices. If local fire codes permit, devices which limit
how far windows can be opened may be installed to
help prevent intruders from entering through ground
floor or balcony windows and to reduce or eliminate the
possibility of children or even adults falling out of
View ports
 Consider the need for the guest to be able to
identify a caller before opening the door. A
view port [door viewer or peephole] is one
device that can serve this purpose.
 A wide-angle view port
maximizes the view of the
corridor adjacent to the
guestroom door.
Room
Communications
 Management should consider placing a telephone
device in each guestroom. This telephone can be used
by the guest to notify the property of emergencies or
suspicious activities and by the property to notify the
guest of emergencies like Fire, Bomb threat etc.
 Nowadays hotels are exploring the feasibility of using
two-way interactive cable television to provide security
for emergency communication with the guest.
 This facility usually delivers entertainment and
programming to the guestroom, but it also has the
capability to return communication via the same device.
This permits monitoring of guest medical alerts, burglar
alarms, and fire alarms etc.
In-Room Security Information
 There has been a great effort on the part of the hospitality industry to
effectively involve the guest as a member of the security team for a
property.
 Hotels are required to have a floor plan or an information card be provided
which indicates the location of the guestroom in relation to fire stairwells.
This information card also lists the steps to be taken by the guest in the
event of afire emergency.
 In addition to fire protection data, consider including security data on the
guestroom door. Decals or notices may be posted that:
 How to double lock the guestroom door.
 Notification for the guest to indicate that not to open the door without first
identifying the person seeking entrance.
 Instructions on a tent card for all guestroom security devices.
 Mention the availability of safe deposit boxes at the front desk on the Guest
registration card.
 Any additional information about the locality of the property.
Other Necessary Equipments
 Smoke Detectors:-
 Smoke or heat detection units
are required by an increasing
number of local jurisdictions.
Regulations vary from those
only requiring smoke and/or
heat detectors in corridors,
storerooms, and under
stairways to those requiring full
systems that provide protection
in every guestroom, guest
bathroom, public area, and
back-of-the-house location.
Smoke Detectors and Heat
Detectors
 Smoke and heat detection units also vary in their
characteristics; some have the ability to report a heat buildup
prior to evidence of smoke or flame, while others respond
only to smoke and other products of combustion.
 Single-station hard-wired smoke detectors require that the
unit be on electric wiring as opposed to battery power. In
some cases where the sounding of a unit can put the
building into general alarm, a public address system can
advise guests and staff within the property accordingly.
 Automated systems, which integrate all smoke detectors in
each location with a master panel, permit staff to immediately
determine where a smoke detector has activated and to
respond accordingly.
 There are also battery back-up systems for use during power
failures (which frequently occur in a fire scenario) that may
be installed as a third level back-up when auxiliary power
generation activates at the time of a primary electric source
interruption.
 Many local jurisdictions enacted regulations requiring fully
automated smoke detector systems in all new construction
and the retrofitting of smoke detectors for all lodging
Fire Extinguishers:-
 There are four classes of fires that a
lodging property should be prepared for
 1) Class A fires involve ordinary
combustibles,
 2) Class B fires involve flammable liquids,
 3) Class C fires involve electrical
equipment, and
 4) Class K fires involve cooking oils and
fats.
 Tips: Although some jurisdictions will
permit the elimination of fire extinguishers
in a facility with a full sprinkler system,
consideration should still be given to the
use of extinguishers as they would permit
the fighting of incipient fires rather than
waiting for a fire to generate enough heat
to activate
Carbon Monoxide Detectors:-
 Carbon monoxide is a dangerous
by-product of a malfunctioning
water heater, kerosene heater,
coal boiler, or any other wood,
coal, or petroleum product unit.
(It is also the most critical toxic
gas generated in any structural
fire).
 There have been tragic incidents
in which carbon monoxide from
such units has resulted in the
death of a guest or staff. Since
carbon monoxide is invisible and
has no smell, it cannot be
detected by natural means.
Sprinkler Systems:-
 Sprinkler systems are now mandated in
an establishment four stories or higher,
adhering to the Hotel and Fire Safety
laws on each countries.
 This requires a system covering back-of-
the-house, public, and all guestroom
locations.
 Most jurisdictions now require full
sprinkler systems in the new construction
of any commercial occupancy regardless
of the
Accident Prevention Signs:-
 OSHA(Occupational Safety and
Health Administration) classifies
accident prevention signs into three
categories:
 1) Danger signs.
 2) Caution signs and, 3) Safety
instruction signs.
 Danger signs: which indicate
immediate danger, should be posted
to warn of specific dangers and to
warn that special precautions may be
necessary.
 Red should be the basic color for
identification of all danger signs, which
include restricted area, in case
Accident Prevention Signs:-
 Caution signs: should only be used to warn
against potential hazards or to caution
against unsafe practices.
 The color yellow has been used to advantage
for marking physical hazards on stairs in both
back-of-the-house stairways and fire
stairwells.
 Areas of construction or remodeling should
have caution signs. Floor stand signs could
warn guests of wet floors and to watch their
step.
 Safety instruction signs: should be used
only where there is a need for general
instructions relative to safety measures.
 These signs are typically green with white
lettering. Signs with green arrows, for
example, could be used to note the path to
follow between buildings or on trails.
Security Procedures
 A hotel may be subject to numerous amount of
threats. Some are foreseeable and some are
not. It is always wise to be prepared and have
a set of procedures laid down so that at the
time of emergency, with appropriate in
advance training, such procedures may not
only help but reduce the risk level and
casualties at emergency situations.
 Nowadays, almost every hotel has a set of
security procedures laid down for such
emergency situations. Some of them are
discussed in this chapter.
Key Control
 The main aim of hotel is to provide safe and
secure environment for guest and their
belongings. Hence, proper key control will
ensure that the guest rooms are secure and
the guest property, as well as the guest, are
safe.
 For this a hotel should establish a clear
procedure for the control of keys.
Procedures for Key Control
 Authorization of a person to order keys from
suppliers.
 Control the number of keys to be duplicated and
keep a strict record on the number of keys
duplicated.
 Keep the keys in a safe place. Keys kept at the
Front Desk should not be left unattended or
accessible to anyone reaching over the desk.
 Ensure periodic inventory checks.
 Replace locks immediately following a break-in or
criminal activity.
 Change locks at regular interval of time.(The
police recommend a change once every two
year).
The cheapest system in a long run may be an
Procedures for Key Control
 Make sure that the keys are retrieved from the guest on
departure.
 Maintain locks to ensure that they are always in good working
conditions.
 Key racks should be kept out of view of the public.
 Set up a system whereby keys may only be issued on the
production of the pass(key card) given to the guest on
checking in which has to be returned at the time o checkout.
In addition to this, the front desk staff should always verify
name and room number(and any other information) of guest
and check this against the hotel records before handing over
keys.
 Retrieve guest room keys involuntarily left on the front desk
counter. A drop box should be made available.
 Consider a practice of using keys that do not have he
property’s name, address, logo or room number in them. This
practice makes it much more difficult for the keys that have
been lost to be traced to the appropriate property by who
Electronic Key System
 A variety of electronic systems are available; most include one or
more of the following elements:
 A mortise lock integrated with an electronic card reader.
 A key card which either communicates with the front desk computer and
permits entry or which is compatible with the permission-level within the
microchip in the lock set unit in the guestroom door. This establishes
entrance capability either at the time the key card is being produced or
upon introduction to the door lock.
 A computer terminal at the front desk or adjacent area which produces the
key card and selects the code which will permit entry by a new key card
and will reject all prior units issued for that room.
 A computer capable of providing millions of combinations for entrance to a
guestroom.
 A battery source and/or hard-wired system for energizing the lock system.
 touch-pad system.
 The capability of "timing" the card so it no longer functions as of a set time,
such as upon check-out.
Surveillance and Access control
 It is important that hotel security should know
who are in the building and the purpose of
their visit.
 If the public is invited to patronize certain
areas, such as bars, restaurant, banquet
room, etc, it does not mean that other areas
which are designated for guests, are also
available to the public.
 Anybody disguised as guest can get into the
hotel property and remember always to keep
on eye on suspected behaviour.
Precautions
 There are certain precautions that are needed to
be considered in monitoring access through
nonpublic areas:
Supervision of entrances E.g employee entrance,
delivery entrances and service entrances.
 The hotel will have many different entrances
which have to be taken special care of.
 Back-gate entrance of employee should be
practiced.
 Delivery entrance scanning, proper checking and
proper time allocation should be kept in mind
while receiving deliveries like food material,
maintenance parts, guest room supplies.
Routine Patrolling of guest corridor.
 Security personnel, guards or even elevator
operators should have an eye on the corridors
as these are accessible to only guest and any
suspicious person with bags, or harmful arms,
or equipments should be immediately informed
or taken required action.
 Apart from CCTV surveillance, patrolling from
time to time will help increase the security
perimeters as well as stop crime on time.
Elevator Control in high rise hotel buildings:
 Elevators are the easiest way to get to guest
rooms.
 The elevator operator should politely and
tactically ask the guest about the hotel rooms
or where they are staying to cross check the
guests if they are in-house guest or not.
 If the elevator is not operated by an operator,
then CCTV cameras should be continuously
monitored by the security personnel for any
suspicious guests.
Display of Staff identification on entrance,
work hours and exit from the Hotel to all
Staffs
 Hotel should issue proper name tags or
identity card so that one can easily recognize
whether the person is a hotel staff or not.
 While using the staff gate entrance or exit,
presentation of staff ID should be practiced to
ensure no unauthorized person enters through
the staff entrance.
Packages/ Parcel check to guard against
theft of hotel property by Employees
 Any packages or parcel going out of the hotel
should be checked before letting the hotel
employee exit or return home.
 Sometimes employees will intentionally take
away small valuable hotel properties which
may be undetected if not checked.
Identifying salesmen or deliverymen and their
purpose of Visit.
 Salesmen or delivery men should be asked to
present their identification like visiting card or
identity card and all details regarding the time of
entry, purpose of visit and the name of the person
they wish to see should be recorded in entrance
registers or log books.
 While entering, a proper visitor pass should be
produced by the guard to ensure that the
person(salesmen or deliveryman) is a visitor and
came for an official purpose.
Secondary or emergency Exit and entrance
should be monitored.
 Fire exit points in hotel are another easy way
to enter or exit the hotel.
 Since we cannot lock the fire exit, frequent
monitoring is required for those areas.
Every department should have an eye on
suspicious activity and secure their own
area from unauthorized persons.
 Reporting the security personnel if any
suspicious person or suspicious activity is
taking place.
 Unattended bags, car parked in no parking
zone intentionally or in a very busy areas, new
persons entering from the employee gate,
guest refusing to shoe any form of
identification, scanty baggage, etc.

More Related Content

What's hot

Geust safety and security in Hotel
Geust safety and security in HotelGeust safety and security in Hotel
Geust safety and security in HotelSuman Subedi
 
Hotel safety & security
Hotel safety & securityHotel safety & security
Hotel safety & securityzaffar abbasi
 
SOP of Handling a Bomb Threat
SOP of Handling a Bomb ThreatSOP of Handling a Bomb Threat
SOP of Handling a Bomb ThreatRiaSharma58
 
Safeguarding of Assets: Concerns for Safety adn Security in Housekeeping Oper...
Safeguarding of Assets: Concerns for Safety adn Security in Housekeeping Oper...Safeguarding of Assets: Concerns for Safety adn Security in Housekeeping Oper...
Safeguarding of Assets: Concerns for Safety adn Security in Housekeeping Oper...Jack Macey
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?Perk Security Ltd
 
Value of Enhanced Hotel Security
Value of Enhanced Hotel SecurityValue of Enhanced Hotel Security
Value of Enhanced Hotel Securityedharewood
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in HotelsPurvi tiwari
 
Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security HotelFaheem Ul Hasan
 
Front office dept.job
Front office dept.jobFront office dept.job
Front office dept.jobLeinoj Lopez
 
Security guard roles and responsibilities
Security guard roles and responsibilitiesSecurity guard roles and responsibilities
Security guard roles and responsibilitiesLavanya Priya
 
Security t raining for security guard
Security t raining for security guardSecurity t raining for security guard
Security t raining for security guardPasilo Drango
 
Safety & security in hotels
Safety & security  in hotelsSafety & security  in hotels
Safety & security in hotelsAMALDASKH
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveGrant Heanes
 
Workplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptWorkplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptFaheem Ul Hasan
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
Safety & security
Safety & securitySafety & security
Safety & securityRohit Mohan
 
Security training manual
Security training manualSecurity training manual
Security training manualANILDEVADKAR
 

What's hot (20)

Geust safety and security in Hotel
Geust safety and security in HotelGeust safety and security in Hotel
Geust safety and security in Hotel
 
Hotel safety & security
Hotel safety & securityHotel safety & security
Hotel safety & security
 
Hotel security
Hotel securityHotel security
Hotel security
 
SOP of Handling a Bomb Threat
SOP of Handling a Bomb ThreatSOP of Handling a Bomb Threat
SOP of Handling a Bomb Threat
 
Safeguarding of Assets: Concerns for Safety adn Security in Housekeeping Oper...
Safeguarding of Assets: Concerns for Safety adn Security in Housekeeping Oper...Safeguarding of Assets: Concerns for Safety adn Security in Housekeeping Oper...
Safeguarding of Assets: Concerns for Safety adn Security in Housekeeping Oper...
 
Unit 6
Unit 6Unit 6
Unit 6
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?
 
Value of Enhanced Hotel Security
Value of Enhanced Hotel SecurityValue of Enhanced Hotel Security
Value of Enhanced Hotel Security
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in Hotels
 
Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security Hotel
 
Front office dept.job
Front office dept.jobFront office dept.job
Front office dept.job
 
Hotel Safety & Security
Hotel Safety & SecurityHotel Safety & Security
Hotel Safety & Security
 
Security guard roles and responsibilities
Security guard roles and responsibilitiesSecurity guard roles and responsibilities
Security guard roles and responsibilities
 
Security t raining for security guard
Security t raining for security guardSecurity t raining for security guard
Security t raining for security guard
 
Safety & security in hotels
Safety & security  in hotelsSafety & security  in hotels
Safety & security in hotels
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should Have
 
Workplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptWorkplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.Ppt
 
Security training module
Security training moduleSecurity training module
Security training module
 
Safety & security
Safety & securitySafety & security
Safety & security
 
Security training manual
Security training manualSecurity training manual
Security training manual
 

Similar to Hotel security hand book

Employee management-security-controls
Employee management-security-controlsEmployee management-security-controls
Employee management-security-controlsRebecca Jones
 
What sssts safety training involves
What sssts safety training  involvesWhat sssts safety training  involves
What sssts safety training involvescodycunningham86
 
ASSIGNING ROLES AND RESPONSIBILITIES TO SECURITY GUARDS
ASSIGNING ROLES AND RESPONSIBILITIES TO SECURITY GUARDSASSIGNING ROLES AND RESPONSIBILITIES TO SECURITY GUARDS
ASSIGNING ROLES AND RESPONSIBILITIES TO SECURITY GUARDSPODUVATHRAVINDRANATH
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMMajor K. Subramaniam Kmaravehlu
 
Basic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionBasic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionJOEL JESUS SUPAN
 
Nssga alliance coresafetyprinciples
Nssga alliance coresafetyprinciplesNssga alliance coresafetyprinciples
Nssga alliance coresafetyprinciplesnssga
 
EMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfEMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfBimal Chandra Das
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfMax Secure Ltd
 
Describe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdfDescribe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdfarchgeetsenterprises
 
For Business hiring Security Firm Dallas, TX-converted
For Business hiring Security Firm Dallas, TX-convertedFor Business hiring Security Firm Dallas, TX-converted
For Business hiring Security Firm Dallas, TX-convertednationals359
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
Risk based approach
Risk based approach Risk based approach
Risk based approach Robin Patras
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
HSCG - Who We Are - What We Do
HSCG - Who We Are - What We DoHSCG - Who We Are - What We Do
HSCG - Who We Are - What We Dothommcelroy
 
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docxRunning head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docxcharisellington63520
 

Similar to Hotel security hand book (20)

Employee management-security-controls
Employee management-security-controlsEmployee management-security-controls
Employee management-security-controls
 
What sssts safety training involves
What sssts safety training  involvesWhat sssts safety training  involves
What sssts safety training involves
 
ASSIGNING ROLES AND RESPONSIBILITIES TO SECURITY GUARDS
ASSIGNING ROLES AND RESPONSIBILITIES TO SECURITY GUARDSASSIGNING ROLES AND RESPONSIBILITIES TO SECURITY GUARDS
ASSIGNING ROLES AND RESPONSIBILITIES TO SECURITY GUARDS
 
CISSPills #3.06
CISSPills #3.06CISSPills #3.06
CISSPills #3.06
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
 
Basic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionBasic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 Edition
 
Nssga alliance coresafetyprinciples
Nssga alliance coresafetyprinciplesNssga alliance coresafetyprinciples
Nssga alliance coresafetyprinciples
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
EMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdfEMPLOYEE PARTICIPATION IN SAFETY.pdf
EMPLOYEE PARTICIPATION IN SAFETY.pdf
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Describe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdfDescribe two methods for communicating the material in an Informatio.pdf
Describe two methods for communicating the material in an Informatio.pdf
 
For Business hiring Security Firm Dallas, TX-converted
For Business hiring Security Firm Dallas, TX-convertedFor Business hiring Security Firm Dallas, TX-converted
For Business hiring Security Firm Dallas, TX-converted
 
Enterprise Se.docx
Enterprise Se.docxEnterprise Se.docx
Enterprise Se.docx
 
Enterprise Se.docx
Enterprise Se.docxEnterprise Se.docx
Enterprise Se.docx
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Risk based approach
Risk based approach Risk based approach
Risk based approach
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
HSCG - Who We Are - What We Do
HSCG - Who We Are - What We DoHSCG - Who We Are - What We Do
HSCG - Who We Are - What We Do
 
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docxRunning head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
Running head KUDLER FINE FOODS APPLICATION OF ROLES 1KUDL.docx
 

Recently uploaded

Call Girls in Chattarpur Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Chattarpur Delhi 💯 Call Us 🔝9667422720🔝Call Girls in Chattarpur Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Chattarpur Delhi 💯 Call Us 🔝9667422720🔝Lipikasharma29
 
Call Girls In Majnu-ka-Tilla 9711800081 Low Cheap Price ...
Call Girls In Majnu-ka-Tilla 9711800081 Low Cheap Price ...Call Girls In Majnu-ka-Tilla 9711800081 Low Cheap Price ...
Call Girls In Majnu-ka-Tilla 9711800081 Low Cheap Price ...gitathapa4
 
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...aakahthapa70
 
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂door45step
 
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝thapagita
 
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Availablenitugupta1209
 
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCRthapariya601
 
Call Girls In {Aerocity Delhi} 98733@20244 Indian Russian High Profile Girls ...
Call Girls In {Aerocity Delhi} 98733@20244 Indian Russian High Profile Girls ...Call Girls In {Aerocity Delhi} 98733@20244 Indian Russian High Profile Girls ...
Call Girls In {Aerocity Delhi} 98733@20244 Indian Russian High Profile Girls ...aakahthapa70
 
Call Girls In Sector 94 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 94 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 94 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 94 Noida 9711911712 Escorts ServiCe NoidaDelhi Escorts Service
 
NASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNiteshKumar82226
 
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Service
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts ServiceBook Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Service
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Servicemonikaservice1
 
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts ServiceBook Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Servicemonikaservice1
 
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncrthapariya601
 
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)ayushiverma1100
 
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)thapagita
 
NAGPUR CALL GIRL 92628*71154 NAGPUR CALL
NAGPUR CALL GIRL 92628*71154 NAGPUR CALLNAGPUR CALL GIRL 92628*71154 NAGPUR CALL
NAGPUR CALL GIRL 92628*71154 NAGPUR CALLNiteshKumar82226
 
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCREscort Service
 
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)riyaescorts54
 
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝thapagita
 
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝Lipikasharma29
 

Recently uploaded (20)

Call Girls in Chattarpur Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Chattarpur Delhi 💯 Call Us 🔝9667422720🔝Call Girls in Chattarpur Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Chattarpur Delhi 💯 Call Us 🔝9667422720🔝
 
Call Girls In Majnu-ka-Tilla 9711800081 Low Cheap Price ...
Call Girls In Majnu-ka-Tilla 9711800081 Low Cheap Price ...Call Girls In Majnu-ka-Tilla 9711800081 Low Cheap Price ...
Call Girls In Majnu-ka-Tilla 9711800081 Low Cheap Price ...
 
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
 
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂
▶ ●─Cash On Delivery Call Girls In ( Sector 63 Noida )꧁❤⎝8375860717⎠❤꧂
 
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
 
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
 
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
 
Call Girls In {Aerocity Delhi} 98733@20244 Indian Russian High Profile Girls ...
Call Girls In {Aerocity Delhi} 98733@20244 Indian Russian High Profile Girls ...Call Girls In {Aerocity Delhi} 98733@20244 Indian Russian High Profile Girls ...
Call Girls In {Aerocity Delhi} 98733@20244 Indian Russian High Profile Girls ...
 
Call Girls In Sector 94 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 94 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 94 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 94 Noida 9711911712 Escorts ServiCe Noida
 
NASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALL
 
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Service
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts ServiceBook Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Service
Book Call Girls In Mahipalpur Delhi 8800357707 Hot Female Escorts Service
 
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts ServiceBook Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
 
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
 
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
 
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
Call Us ☎97110√14705🔝 Call Girls In Mandi House (Delhi NCR)
 
NAGPUR CALL GIRL 92628*71154 NAGPUR CALL
NAGPUR CALL GIRL 92628*71154 NAGPUR CALLNAGPUR CALL GIRL 92628*71154 NAGPUR CALL
NAGPUR CALL GIRL 92628*71154 NAGPUR CALL
 
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
 
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
 
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
 
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
 

Hotel security hand book

  • 1. HOTEL SECURITY Security  Security as a condition is the degree of resistance to, or protection from, harm.  It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.
  • 2.  Establishing or maintaining a sufficient degree of security is the aim of the work, structures, and processes called "security." Concept in Hotel  It is the moral and legal responsibility of a hotel to protect its guests and their property against threats
  • 3. posed by human beings with a conscious intent to harm them.  The security department of the hotel is responsible for the overall security of the building, in-house guests, visitors, day users, and employees of the hotel.
  • 5. Security? Why?  Hotel guests want to feel safe and secure in their temporary home. Hotels have a duty to protect them. After all, the business depends upon them.  Apart from the possibility of death or injury and destruction, the adverse publicity from an incident, can result in ruined reputations, failing business and knock-on effects to tourism in the country or region.  The risk to hotels can also increase because of the identity of an individual guest or his or her family. VIP’s, celebrities or the infamous can present special difficulties.
  • 6.  Hotel staff may not even become aware of risks that some guests may bring with them. Consequently a hotel must be vigilant at all times. What are the risks? Examples of Risk  • Terrorism  • Kidnapping  • Robbery by organized crime  • Opportunist robbery  • Burglary from rooms  • Baggage theft  • Fraud • Invasion of guest privacy, by locals, press, interest groups
  • 7.  • Blackmail of staff  Many more…
  • 10. Consequences  The use of technology, has greatly impacted how criminals can target hotels.  For instance, instead of visiting a hotel to collect many pieces of information, a criminal can now scan the Internet pulling up specifics about room numbers, location to other areas of interest, the leadership team and photos of critical areas in the property.
  • 11.  Using applications like Google Earth, a criminal can diagram the structure and their escape routes. Consequences  Possibility of death  Injury  Destruction  The adverse publicity from an incident  Result in ruined reputations  Failing business and knock-on  Effects to tourism in the country or region.
  • 12.  The risk to hotels can also increase because of the identity of an individual guest or his or her family.  VIP’s, celebrities or the infamous can present special difficulties.  Easy terrorist attacks Effective Hotel Security  Now since we know what could be the consequences, it is always better to prevent it than curing it.
  • 13.  Sometimes some things may be irreplaceable and it is always preferable to avoid such circumstances.  In order to avoid such circumstances, an effective hotel security program is formulated in the hotel organization.
  • 14. Effective Hotel Security Programs  An effective hotel security programs enables the hotel to avoid preventable incidents and react to a quick, appropriate manner.  Three basic elements should be included in the program. 1. People 2. Procedure
  • 15. 3. Equipments Effective Hotel Security Programs People  No matter which department or post everyone can contribute in making the hotel a safe place for all.  This is not only the concern of the security department. Procedure  Every property needs to have procedures for the staff to follow. The staffs should be well informed about the emergency procedures as well as any unusual events.
  • 16. Equipments  Simple safety equipments to state-of-the-art security surveillance system all help make today's hotels a safer and better place to be. Group Work How can an effective security system work?
  • 17. What are the equipments that could be used for security? Based on the three aspects we have discussed just earlier. Organizational Structure  The organization of the security department includes the chain of command or hierarchy from executive down to the front line.
  • 18.  The purpose of this section is to make clear who reports to whom and who has which responsibilities.  This gives a clear understanding of the duties and responsibilities along with all the answers regarding what are the limitations within the position and the line of authority, responsibilities and accountability.  The organizational structure depends upon the following criteria: 1. Division of work Span of Control Criteria Division of Labor: 2.
  • 19.  The division of labor refers to narrow specialization of tasks within a process so that each employee can become a specialist in doing one thing.  The degree of division of labor depends on the degree to which performance of particular tasks is measureable, the degree to which wages affect task performance, and the implementation of technology.
  • 20. Span of Control  Span of Control in an organization is defined as the number of employees reporting directly to one supervisor.  Traditionally, the span of control has been defined as four to seven subordinates under one manager.  The average size of the span of control, together with the total number of employees, determine the number of levels in an organization structure.
  • 21. Span of Control  In a large organization there is one head and a sub head. It is ideal to have a manager at the senior middle level so that one manager can take care of personnel/ operational side and the director can take the administrative or Investigative side. The director is still the highest authority but it saves a position.  the above mentioned positions can be skipped entirely if the organization is small to medium. in such case supervisors or shift managers can be allocated depending upon the number of frontline staffs.  The ideal proportion of supervisor to officer is 1:5, if there are 10 officers in a shift or team , there should be 2 supervisors.
  • 22. Span of Control  V.A Graicunas developed the term Span of Control in 1933 when he researched the effectiveness of varying management ratios. he determined that there were several factors, such as the physical location of the employees( whether they worked together or separately), personalities, types of work performed, and the capabilities of the employees.  The ratio was found to be acceptable at 4 employees to 1 supervisor all the way to 22:1 depending on those factors. Police departments operate at about 4:1 and the fire departments operate at about 3:1.
  • 23. Span of Control  Later after the introduction of the new technology ,"Computer and other automation system took away some of the duties of supervisors and managers.
  • 24. Organizational Hierarchy of Security Department Security Guards General Manager Director of Security Security Manager Security Supervisors Security Officer Doorman
  • 25. Group Work  Draw an organizational chart for a large hotel keeping in mind all the vulnerable areas, the no. of guards according to the 24 hour shift patterns in different departments of the hotel, public areas, entrances on the basis of the physical location of the employees( whether they worked together or separately), personalities, types of work performed, and the capabilities of the employees.  Please explain why you have chose the no. guards or supervisors in that particular area.
  • 26.  Assume that there is also a casino and 3 outlets including a bar, recreational area( gym, spa, swimming pool), 150 rooms & staff parking area. Types of Security Providers Depending upon the various factors such as the company profile, structure, capacity, location, safety requirements as well as feasibility and economy of the hotel, a hotel chooses one of the following types of security service providers: 1. Proprietary/ In- House Security 2. Contract Security  Proprietary security and contract security companies are responsible for protecting companies and businesses and ensuring the safety of employees and consumers.
  • 27.  A proprietary security company is controlled entirely by a particular company(hotel itself in this case) and is responsible for the hiring, firing and management of personnel.  A contract security company is operated by a professional security company and contracts its services to different companies. Cost  Proprietary security is more expensive because your company is in charge of paying for benefits and higher wages for experienced personnel.
  • 28.  Because the status of proprietary security is considered higher, it usually attracts a higher quality of guard.  The wages tend to be lower with a contract security company because uniforms, sick leave and training benefits are all covered by the service. Control  Proprietary security employees often feel more loyal to a particular company, because they feel a camaraderie with fellow employees
  • 29. and have an opportunity for growth and promotions.  There may be periods of time when a company may have to add or lay off workers, which can create a security problem within a company.  By using a contract security service, companies have the opportunity to deal with staffing problems easily and quickly. Consistency  If your company requires daily security organization that needs to be micromanaged,
  • 30. having day-to-day proprietary security may be the way to go.  An important consideration when deciding which type of company to use is that regardless of which type of security company you select, employee turnover is a possibility.  Depending on the site, this could be problem that affects the safety of the individuals in the area. Effectiveness  Proprietary security personnel are trained to the specific needs of the company, which helps them
  • 31. become more familiar with the layout of a building and recognize individuals coming in and out of offices.  Because of a high turnover rate, contract security guards aren't given the opportunity to become as friendly with employees.  This can affect their loyalty and commitment and adversely, to your detriment, affect their performance. Liability  When a company decides to go with
  • 32. proprietary security, it is responsible for taking the proper measures regarding background checks and ensuring that an applicant has the proper training and skills to handle a job of this magnitude.  When working with a contract security company, you don't have to worry about training, recruitment or background checks; it is all handled by that firm.
  • 33. Turnover  Blake & Associates Inc.(American Company) notes that turnover in contract security is high -- between 130 and more than 400 percent annually.  In-house security has the advantage of less turnover, as there is the perception of the job being a more permanent position.  A business wouldn't have to regularly retrain new contract staff about the company and building. In addition to having a stable work environment, inhouse employees view their employer as offering a higher- quality job and being more loyal to staff, according to Blake & Associates Inc.
  • 34.  Staffing-There might be periods where you would have to lay off or add more staff. The contract company can deal with this easily and quickly, In house does not tend to have this flexibility. Relationships  Company employees may feel more comfortable with in-house security, knowing that all parties are employed by the same group.  Having staff in a company can create an "us versus them" environment.  Employees may not report incidents or may hesitate to report because the contracted security is not "one of them" and may not understand the business or the
  • 35. people well enough to deal with the situation appropriately.  Whereas( Impartiality)-Guards aren't directly tied to your company so they can perform duties, & enforce regulations more effectively. They aren't going to get friendly enough with your business to get too Group Work  In your view which is a better option for a non chain 5 star hotel, non- star hotel and an internationally recognized chain hotel.  Why?
  • 36.  Presentation on the next day. Job Description Why do we need to understand the job responsibilities of different post.?
  • 37. Job Description of Security Manager  Responsible for: Security Department Main Scope and General Purpose of Job: To direct and co-ordinate the overall activities of the Security Department. To guarantee the safety of all the guests, employees and hotel property.  Give direction and control all activities relating to the Security department, ensure the hotel meets
  • 38. Job Description of Security its financial and guest satisfaction objectives. Responsible to create and coordinate trainings or anything related to employee development programs. Manager  Direct Responsibilities:  Performs duties common to all supervisors and other duties as may be assigned.  Establishes standard policies and procedures for recruitment. Be aware of the Fire and Emergency procedures, and your Departments responsibility in an emergency.  Be aware of the Security policies and procedures of the Hotel, and ensure that at all times in all areas of the Hotel that they are being strictly adhered to.  Be responsible for formulating the departmental plan and supervise it to be followed up.
  • 39. Job Description of Security  Briefs Supervisors on function, VIP arrivals and other events, which will necessitate additional or special preparations.  Cables relationship with all guest of the hotel.  Conduct regular operational meetings to review, monitor, adjust and upgrade the performance of the Department as a whole, explaining new directions and policies and procedures at the same time.  Conducts frequent front and back of house checks ensuring the procedures, standards of employee grooming and manning levels are in order and takes appropriate action where necessary.  Conforms to and enface policies & procedures and rules & regulations as laid down by the brand(hotel chain) and the hotel in order to achieve the highest levels of uniformity and guest service. Manager  Delegates to and supervise all staff within the department and assist them in preparing work schedules.
  • 40. Job Description of Security  Directs and controls all subordinate to ensure that all day to day operational matters are handled on time.  Establish control procedures in all operation aspects in accordance with hotel’s policy.  Implement and enforces safety regulations and house rules.  Investigate cases happened in the hotel. Should criminal cases are occurred in the hotel, Assist Police to do investigation work.  Maintain a Hotel logbook on incidents, complaints etc. and refer them, if required to the appropriate department for follow up action.  Performs special duties as required or designated by the General Manager.  Prepare job responsibilities of the security department. Adjust and update it according to the working situation.  Prepare the plan (especially during the densely populated or vehicle period) for external traffic, so as to keep the hotel area in good order. Manager
  • 41. Job Description of Security  Prepare various monthly reports as required by the General Manager.  Responsible for implementing the policies and procedures in operation of the Security.  Responsible for the entire operations, staffing and equipment of the Security Department.  Through close supervision recommend improvements and changes to the operation of the Security Department especially creating service standard of the hotel.  To handle and resolve all guest queries and complaints in an efficient manner and to establish an amicable relationship with all clients, customers and guests of the Hotel.  Trains personnel according to established procedures and security training conducts training meetings to discuss problems and future plans, gives information and assignment.
  • 42. Training The security manager is responsible for training the whole department about: 1. All hotel regulations and factors affecting the operations of the hotel. 2. Unarmed defense tactics 3. Fire prevention and safety techniques 4. Basic fire fighting 5. First Aid 6. Preservation of crime scene and evidence 7. Action, duties and power where crime is detected 8. Action in crisis situation 9. Report writing
  • 43. Security Guard Main Scope and General Purpose of Job:  The primary responsibility of a hotel security guard is to protect the hotel and the guests, employees and property within it.  Hotel security guards spend the majority of their time patrolling the grounds and premises of the hotel, or monitoring the hotel via security cameras. They report to either the head of security or the hotel manager.
  • 44. Main Duties of Security Guard  To make regular rounds of all hotel corridors and areas.  To observe any suspicious or abnormal activities on the part of staff or guests.  To be alert to undesirable persons such as pimps, prostitutes, drunks, etc. and to evict them from the premises.  To assist the Duty Manager in inspecting the rooms of doubtful clients and assisting with suspected “skippers”.
  • 45.  To investigate any offence reported whilst on patrol and to ensure full details are made available to the police when necessary.  To ensure that staff particularly maids, conform to rules when cleaning guests’ rooms. Main Duties of Security Guard  To look out for keys left in doors and to ensure their safekeeping.  To seize and deal with property found on patrol.  To maintain a close watch for any fire or safety hazards.  To provide escort where required for cashiers, etc.
  • 46.  To assist guests in decoding in-room safes.  To monitor security equipment e.g. CCTV, smoke detector.  To sign out pass/master key to employees.  Handle lost and found items(usually only valuables). Why read this?  Think?  Come up with answers……
  • 47. Ans  Enhance better team coordination as well as higher efficiency in task performance.  Proper division and allocation of staffs.  To calculate manpower or labor.  It properly defines the organization structure ensuring and facilitating effective communication, authority, limitations and responsibilities eradicating any confusions.  Better prepare the personnel for emergency or contingency situations where staffs need to take quick decisions.  To ensure specialization and no over or double work is done.  To know the limitation within the person and assign duties accordingly which he/she would be able to complete which eliminates the problem of inadequacy or incompetence.  It sets the standard for any establishment:  When things go wrong we know whom to catch.  When things surpass expectation, we know whom to appraise.
  • 48.  This act as the most powerful tool while dealing with problem regarding labor unions, managements decisions, financial planning, expansions, etc.  Overall guides all the employees towards attainment of the same objective- Security Equipments  What do you understand by Security Equipments?  Security Equipment are Firearms, ammunition, batons, chemical agents, security restraints and similar devices.  Can they work on their own?
  • 49.  They are aid to the security personnel and help them become more effective and efficient.  But how? While Choosing Security Equipments  Property management department should understand the uses and limitations of any given type of security equipment before authorizing its installation.  So before purchasing any security hardware or equipment, the hotel must evaluate the following: 1. Will the equipment to be purchased solve a particular security problem?
  • 50. 2. Is the equipment the most cost effective –in other words are there less expensive (in terms of both capital and operating cost) alternatives? This will include rental of equipment rather then purchase. 3. Will the equipment have counter-productive effects on the operations(not immediately noticeable)? 4. Who will be responsible for this equipment and whether he is capable of maintaining and using the equipment. Is the training required and if so at what? Why all of that?  Thorough cost benefits analysis must be carried out before making any purchase.
  • 51.  Hotel should not fall into the misconception that what works well in one hotel must work in others as well.  Every hotel will have its own set of threats, safety requirements.  So the hotel needs to be aware of all the requirements and the equipments required. Categories of Security Equipments They can be broadly divided into 5 categories:
  • 52. 1. Equipment for Physical Security and perimeter control. 2. Equipment for Surveillance 3. Communication System 4. Alarm System 5. Equipments for Guest Room Security Physical Security and Perimeter Control
  • 53.  Physical security involves the protection of the hotel buildings, its ground and the assets within the building.  Perimeter control is concerned with restricting access to a property.  What are the equipments used in physical security and perimeter control? Physical Security and Perimeter Control  Access control systems allow authorized personnel and material to move through normal access routes
  • 54. while detecting and delaying movement of unauthorized personnel and material.  Access control adds little, if any, enhancement to a structure’s physical barriers. The use of electrically operated locks and strikes with access control systems may actually reduce penetration delay times for doors.  Thus, access control systems must be integrated with other components of the overall physical security system to be effective. This will ensure that personnel seeking entry to the protected area are queued at the control point(s).  There are many different types of access control systems and they vary extensively in their complexity
  • 55. Equipments for Physical Security and Perimeter Control  Computer security equipment  Locks  Safes  Safety deposit centers  Security doors  Security fencing  X-ray machines, free standing metal detectors, halnd held metal detector  Shutters and grilles  Explosive detectors  Steel office storage and furniture
  • 56.  Vacant property protection: concrete, temporary fencing, barb wire Physical Security and Perimeter Control  There are certain areas or aspects that are needed to be considered before buying the equipments for physical security and perimeter control.  Layout and design  Lighting  Parking Area
  • 57.  Glass Protection  Landscaping Why? Layout and Design  Every hotel should incorporate necessary security and safety equipments during the designing of the building, pubic areas, hotel rooms, inter-departmental offices, recreation centers, parking and all other access points within the hotel premise.  Criminals operate best when undetected, this usually means under the cover of darkness or concealed behind obstacles.  Designs in hotel should be given great priority so that security measures are appointed at the most strategic
  • 58. locations which provides security as well as economy of movement, operation and, surveillance.  The security department should be aware of the layout and design of all the hotel and its related premise and assess all the areas for the level of risk and plan accordingly all the necessary risk limiting, Objective of Physical Security and Perimeter Control:  deter potential intruders (e.g. warning signs and perimeter markings);
  • 59.  distinguish authorized from unauthorized people (e.g. using keycards/access badges)  delay, frustrate and ideally prevent intrusion attempts (e.g. strong walls, door locks and safes);  detect intrusions and monitor/record intruders ( e.g. intruder alarms and CCTV systems); and  trigger appropriate incident responses (e.g. by security guards and police)
  • 60. Layout and Design Consideration Depending on  the type of establishments,  its client base,  business volume(rooms, seasons)  location,  theme,  no. of employees,  operational requirements( operating hours & services provided),  Compliance with the SOP of security procedures  risk levels or operational hazard and
  • 61.  Operating expenses, the hotel should choose effective and efficient security access limiting equipments but guest privacy and comfort should not be compromised which is the main objective of the hotel. Layout and Design Consideration  It is up to security designers, architects and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls, along with broader issues such as
  • 62. aesthetics, human rights, health and safety, and societal norms or conventions.  Physical access security measures that are appropriate for a high security prison or a military site may be inappropriate in an office, a home or a vehicle, although the principles are similar. Lighting  The elements of private security are to detect, deter, delay and respond to unwanted activity in a protected facility, lighting provides deterrence to criminal activity.
  • 63.  In the field of physical security, security lighting is often used as a preventive and corrective measure against intrusions or other criminal activity on a physical piece of property. Security lighting may be provided to aid in the detection of intruders, to deter intruders, or in some cases simply to increase the feeling of safety. Lighting is integral to crime prevention through environmental design  In most hotels, the interior lighting plan is generally more than adequate for most safety considerations however; the areas around the property, especially Case Study  Security lighting can be counter-productive.
  • 64.  Work as group and come up with the reason to why this happened.  Turning off lights halved the number of thefts and burglary in Övertorneå Sweden.  A test in West Sussex UK showed that adding all-night lighting in some areas made people there feel safer, although crime rates increased 55% in those areas compared to control areas and to the county as a whole.
  • 65. Lighting Consideration  Bright, unshielded floodlights often prevent people from noticing criminal activity, and help criminals see what they are doing.  While adequate lighting around a physical structure is deployed to reduce the risk of an intrusion, it is critical that the lighting be designed carefully as poorly arranged lighting can create glare which actually obstructs vision.  Studies have shown that many criminals are aware of this effect and actively exploit it. The optimal design will also depend on whether the area will be watched directly by humans or by closedcircuit television, and on the location of the observers or cameras.  Security lighting may be subject to vandalism, possibly to reduce its effectiveness for a subsequent intrusion attempt. Thus security
  • 66. lights should either be mounted very high, or else protected by wire mesh or tough polycarbonate shields. Other lamps may be completely recessed from view and access, with the light directed out through a light pipe or reflected from a polished aluminum or stainless steel mirror. For similar reasons high security installations may provide a stand-by power supply for their security lighting. Some typical considerations include: Reduce and prevent glare and situations mentioned above  Shielded or full cut-off (FCO) lamp housings which conceal the bulb could be used, which should direct light onto the ground or target and away from observers.  These lights should send no light above 80 degrees from the lowest point.(Nadir)
  • 67.  Lighting should be bright enough, and not "as bright as possible". In many cases a good rule of thumb is 0.5 watts per square metre (0.05 watts per square foot).  This might need to be increased in very confused environments, but conversely can be reduced in very open environments. Multiple lamps of moderate power instead of a few powerful lamps will reduce glare, provide more even illumination with reduced pools of shadow, and provide some redundancy if one lamp's bulb blows out or develops a bad counter balance.
  • 68. Glare
  • 69. Some typical considerations include: Prevent malicious tampering or interference. This means that besides the lamp itself, the entire circuit from the source (Electric company or generator), through the wires, to the lamp and back should be protected.  Luminaries should be accessible so that the maintainer can replace blown bulbs as quickly as possible and clean the luminaries periodically. However they should be protected or somehow made inaccessible to tampering.  Ensure the electric meter box is locked or inaccessible, or else power the lights from a different line.
  • 70.  Control and power lines, where outside or vulnerable, should be either buried well underground (in conduits preferably) or at a height of at least 8 metres ( about 24 feet ).  Ideally multiple circuits should be used to prevent an accidental or malicious short or cut causing all illumination to fail. Parking  If you look at the statistics, roughly 80% of the criminal acts at shopping centers, strip malls and business offices occur in the parking lot.  Lawyers make a good living off liability cases based on a lack of sufficient security measures or not taking "reasonable care" in the protection of employees and customers against criminal threats.  The lawsuits often revolve around lack of sufficient lighting, surveillance and response. Once crime takes a foothold in an
  • 71. area it is difficult to break the trend, but there are some things you can do that can improve security, deter crime, reduce potential liability and make your customers feel safer.  It's interesting to note that where parking lot security has been implemented, customer use has actually increased because they feel safer. Increased customer use means increased profit which can be used to justify the increased cost related to any security improvements. Types of Parking Parking areas can be generally categorized as  street parking,  surface parking lots,  freestanding structure,
  • 72.  and structures that are physically connected to the facilities.  Street parking are the parking that are on the side of the streets. Surface parking are the open areas that are allocated for parking. Structures built for the purpose of parking are the freestanding structure and parking facilities that are attached to compliment or ease people coming to a particular place like mall. Theatres,etc.
  • 74. Parking Security Equipments or Aids  Lights- Various type and use  CCTV  Guards  Mechanical or motorized Tire Spikes  Traffic Barrier post  Mirror  Under Chassis Vehicle / Car Inspection Mirror
  • 75. Consideration for parking Areas The following consideration should be taken before installing security equipments at the parking lots: 1. The type of parking 2. Capacity 3. Design 4. Operating hours 5. Use (public, private, for employees only, only for guest) 6. Terrain/ Landscape 7. Atmospheric conditions 8. Availability of natural lighting and natural
  • 76. Glass  Glass is an amorphous (non-crystalline) solid material. Glasses are typically brittle(fragile) and optically transparent  Selecting the right glass is important to the hotel as it not only add to the charm of the hotel but also provides a medium of safety and if proper considerations aren’t taken, the same could be a tool for hazards and accidents.  There are glass protecting products but it is wiser to select the proper glass then laying a protective layer over it, unless it is mandatory.
  • 77. Glass protecting Products/ Equipments  Bar or Grill  Aluminum or metal Protection Borders  Window Protection Films  Apart from this stronger glass are advised to be used. Types of Glasses  Normal (Annealed) Glass
  • 78.  Normal glass is synonymous with flat glass irrespective of the process of manufacture.  Float glass has a perfectly flat, brilliant surface, whereas sheet glass has slight distortions.  Both are referred as normal (annealed) glass and can be processed to obtain many different varieties of glass for use in buildings.  Applications  Normal glass is used in residences, shopping malls, hotels, restaurants, etc. for windows, shelves, doors and partitions, Solar Applications, Display cases, Shop fronts, Solariums, Greenhouse, Atriums & Railings etc. Types of Normal (Annealed)
  • 79. Glass  Clear Glass  It is normal annealed glass, though clear & transparent, it does posses some color tint usually greenish. It is due to presence of some impurities such as iron.  Clear glass has very high-energy transmission when exposed to sunlight.  It provides a clear view of the objects across it.  Applications: Used in doors, windows, solar applications, shelves etc.  It is also used for further processing to other glass types.
  • 80. Tinted glass  It is normal glass that is coloured by the addition of metal oxides into molten glass.  Tinted glass possesses filtering properties that help reduce eyestrain due to dazzle.  Its absorption properties help diminish energy transmissions when exposed to sunlight.  Tints like green allows more visible light and cut out infrared radiation.  Variations in the thickness of the glass would yield different performance in terms of light and solar radiation transmission.  Although darker shades reduce the amount of heat being transmitted to the interiors, they also reduce the amount of transmitted daylight.
  • 81.  Applications:  Used in doors, windows and partitions etc Tinted Glass
  • 82. Patterned, figured or rolled glass  It is a decorative and translucent glass with figures or patterns on one face.  In addition to diffusing light and obstructing visibility from the outside, the figures soften the interior lighting.  This type of glass is usually more fragile and less convenient to clean.
  • 83. Applications:  Interiors of the buildings, opaque glazing like bathrooms etc
  • 84. Patterned, figured or rolled glass
  • 85. Wired glass  It has wire mesh incorporated during its production. Wired glass is recommended for its fire protection property.  In case of fire, the glass cracks but broken pieces tend to remain in position restricting the spread of flame and smoke for some time. Applications:  Used where nominal fire protection is required in windows doors & partitions etc.
  • 87. Extra clear glass  Extra clear glass is a high value glass, free from impurities such as iron.  It has high light transmission of more than 92 percent and is free from interference with the true colour & sparkling of objects across it. Applications:  It is used for a sparkling display of expensive materials like jewellery, watches, crystal ware, fine fabrics, art wares, solar applications etc
  • 88. Ceramic printed glass  Also known as silk-screened glass for its appearance like a silk screen.  Certain areas of application make it important to mask a part or whole of glass for privacy or hiding the background or enhancing the look of a product or for purely aesthetical reasons.  The size, density and colour would determine the opacity and shading whereas the variety of dots, squares, checks and patterns will give many design combinations to achieve the desired effect.  It is not affected by moisture, oil, soaps, chemicals or detergents and retains its original appearance though out the life of the glass.
  • 89.  Applications:  Curtain walls, shower installations, glass
  • 91.  High security places, for example, banks, teller, and drive- through windows, ticket windows, gas stations, currency exchanges, armored vehicles, jewellery shops and burglar resistant showcases.   Other areas where laminated glass is used are:  • Curtain wall glazing  • Sloped glazing  • Skylights  • Glass roofs & floors  • Aquariums  • Animal observatory windows  • Safety glazing for partitions  • Security glazing for banks against bullets/ hand propelled objects.  • Earthquakes, high velocity winds & fire resistance applications.  • Museums  • Acoustic glazing
  • 92. Tempered Glass  Tempered glass is an extremely strong glass which is heat treated to a uniform temperature of approximately 650ºC and rapidly cooled to induce compressive stresses of 770 kg/cm2 to 1462 kg/cm2 on the surfaces and edge compression of the order of 680 kg/cm2.  Tempered glass is not manufactured on float line. It is a separate process.  Tempered or toughened glass gains its added strength from the compressed surfaces. However, if a deep scratch or an impact penetrates the surface, the glass will break into a number of small particles.  The heat treatment process for tempered glass requires that all fabrication be completed prior to toughening.
  • 93.  Any attempt to cut, drill, grind or sand blast the glass after toughening may result in glass breakage. The heat treatment process does not change the light transmission and solar radiant heat properties of the glass. Applications  It is used in commercial applications where wind, snow or thermal loads exceed the strength capabilities of normal (annealed) glass such as safety glazing for entranceway, railings, partitions or fire knock-out windows.  Tempered glass can be used in balustrades, escalator side panels, handrails, shower screens, bathtub enclosures, sliding/swing doors, squash, racquetball wall, showcases, partitions etc. Other areas where tempered glass should be used are:  • Mainly used for safety and strength  • Curtain walls of high-rise buildings
  • 94.  • Exterior and interior of buildings where strength is important  • Spandrels for walls and decorative paneling  • Door openings, showroom and lobby facades, escalator side plates, and  staircase handrails  • Viewing partitions of sports complexes, resorts and airports.
  • 96.
  • 97. Heat Strengthened Glass  Heat strengthened glass is a type of tempered glass which has been strengthened thermally by inducing a surface compression of 422 to 658 kg/cm2 as compared to a range of 770 to 1462 kg/cm2 in case of fully tempered glass.  It is valued for its mechanical strength, which is twice that of normal annealed glass though half of fully tempered glass.  With the exception of strength and breakage haracteristics, heat - strengthened glass retains the normal properties of annealed glass.
  • 98.  Heat-strengthened glass provides necessary resistance to thermal stress associated with high performance glazing materials such as tinted glass Applications  Reflective glass is used in office buildings, high-rise buildings,  • Entrance  • Privacy windows  • Decorative walls  • Spandrel glazing
  • 99.  • Vertical and sloped glazing Building facades Insulated Glass  The insulating glass is a prefabricated unit made of two or more glass panes, separated by a cavity and edges-hermetically(A hermetic seal has the quality of being airtight. In common usage, the term often implies being impervious to air or gas) sealed together.  This edge seal not only binds the individual sheets of glass together to maintain the mechanical strength of the joint but also
  • 100. protects the cavity between the glasses from outside influences.
  • 102. Applications  • Office buildings, hospitals, hotels, houses and buildings with exceptionally high heating or cooling requirements.  • Buildings that need the temperature and humidity strictly controlled such as telephone exchanges, laboratories, etc.  • Airport control towers, windows of coaches of trains, and other environments that need regulated atmosphere and prevention of condensation.
  • 103.  • Buildings near highways, railways and airports that need sound insulation property of Consideration of selecting glass in hotel Depending on  The location  Use – roofs, window, door, partition, etc  Safety measure  Practicality
  • 104.  Functionality- molding, design, Equipments for Surveillance  Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting.  The word surveillance is the French word for "watching over"; "sur" means "from above" and "veiller" means "to watch“  In simple terms it can be defined as the “careful watching of someone or something.
  • 105. Equipments of Surveillance  Apart from other sophisticated surveillance equipments such as Biometric Reader- retina recognition, voice recognition, finger print recognition or the surveillance from the satellite, hotel surveillance is done either personally or by the help of Closed Circuit Television Cameras which not only helps us to see what is going on but also record it at the same time on your PC, Laptops or smart phones as well. HOW HOTEL VIDEO
  • 106. SURVEILLANCE CAN BE BENEFICIAL  Security – Hotel video surveillance can help keep your guests safe from theft and other criminals by helping you track your visitors and prevent break-ins on your property.  Prevent theft – Hotel security cameras can help keep intruders out of exclusive hotel areas like swimming pools and gyms, where theft is common. A surveillance system in your store room and other maintenance areas can uncover potential employee theft.  Remain competitive – Along with providing security, a professional video surveillance system gives your guests peace of mind while staying at your hotel, and can help you increase your return business and remain competitive in an aggressive market.  Flexible – Modern security cameras are easy to install and can be adjusted at anytime to fit your needs. Unlike analog CCTV cameras, wireless IP cameras don't require technicians, power tools, or miles of wiring. All you do is mount the cameras and start recording.  Remote monitoring – Adding an NVR (Network Video Recorder) to your security camera system gives you the ability to broadcast your surveillance
  • 107. footage over the internet. This breakthrough in surveillance technology allows you to monitor any of your cameras at any time from any internet connection, POTENTIAL RISKS OF HOTEL/MOTEL SECURITY CAMERAS  Privacy – Protect the privacy of your guests and employees by keeping your surveillance cameras in public places like lobbies, restaurants, pool and spa areas, and meeting areas, and out of guest rooms and break rooms.  Damage – Cameras, especially when they are outdoors, can be damaged by storms or falling objects. While this kind of damage is rare, it's important to keep a secondary security system in
  • 108. place to protect your guests and property should they occur.  Outages – Power disruptions or surges can cause interruptions in recording or damage to your system Types of CCTV Cameras Indoor Camera: Indoor camera as the name suggests are used for indoor security mechanism. Depending upon your security needs, you can mount it at any suitable location inside the building. These are suitable for security in homes, schools, offices, hotels, etc. Outdoor Camera: Outdoor CCTV Camera is used for outdoor places. They are mostly used for entry and exit points with limited night lighting. Outdoor cameras typically have hard shell vandal-proof casings and a variety of lens options. IR Day/Night Camera: IR Day/ Night Camera are used for high alert security areas where surveillance needs to happen throughout day and night. In the daytime the
  • 109. camera functions like a normal camera with standard colors and at night it switches to low-lux black and white mode. When visibility decreases due to no-light at night, Infrared LEDs are automatically illuminated providing full security. These cameras are used by military personals, in parking lots, and high security zones. Dome Camera: Dome cameras are installed inside a dark dome and are designed in a way that they go unnoticed by visitors. They come in compact design for a discreet appearance. The thief does not know if the camera is recording. These cameras can also be rotated and tilted manually. Dome type cameras are used in public places Types of CCTV Cameras Bullet Camera: Bullet cameras are placed inside a bullet shaped housing, and they are used in residential places as well as commercial places. They are small in size, have an integrated design, and are really effective. They offer illuminate viewing even in darkness and are weatherproof as well. Vandal Proof Camera: Vandal proof cameras are used as outdoor security cameras. These cameras are sheltered within solid material and are covered by a "hub" of break-proof glass which doesn't hinder the quality of the video camera
  • 110. streams. It is difficult to break these cameras and this makes them perfect for high security. They are suitable for wall or ceiling mounting and are rain and fog resistant. Hidden Camera: Hidden cameras are compact in size and are used for secret monitoring. They are usually installed in public places like department stores, theatres, clubs, etc. Hidden cameras have a built-in recorder that records and broadcasts simultaneously. By using a large number of security cameras and networking them various strategic views of the place can be obtained. Pan Tilt Zoom Camera: Pan-tilt-zoom camera offers the ability to view and zoom in all directions. You can even set the camera to automatically rotate to different fields of vision
  • 111.
  • 112.
  • 113. Consideration before buying CCTV System  Your hotel or resort's specific security needs depend on many factors. Consider each of the following when you are purchasing and configuring your hotel video surveillance system:  Where do you experience the most thefts?  How do you currently manage security at your hotel?  Do you feel like your surrounding area contributes to your overall security?  How would you describe your average guest?  Business travelers  Leisure travelers Families  How is your hotel or resort laid out?  Single building housing guest rooms, amenities like pool and spa, and facilities.
  • 114.  Several buildings spread out over a large property Have you ever had issues with employee theft? Communication System  Communication is the most basic and the most important aspect or tool of efficient service and effective security.  Today hotel have adopted numerous communication devices which have eased the process of communication.  To respond quickly to a security need, a communication system is required to quickly notify staff responsible for the security function.
  • 115.  Our main aim is prevention is better than cure and this exactly fits in this definition.
  • 116. Types of Communication Equipments  Paging System(Pager) Alarm, Message or Call me  Walkie- Talkie(Two way radio communication) Uses radio frequency to communicate  Telephone- the easiest and most efficient medium – intercom, PABX, etc.
  • 117. Considerations while buying  The following things are needed to be considered before buying the communication equipments:  Size of the organization- Big, small, medium  Operational areas- Garden, Beach, Indoors, Basement  Distance- within the hotel premises, long distances, etc  Purpose- emergency awareness, message delivery, security check etc.  Durability  Functionality- specified to only one task or multi task, night visibility, internet connectivity
  • 118.  Design- easy to carry, small  Portability- hands free, wireless. Alarm System A burglar alarm is a system designed to detect intrusion – unauthorized entry – into a building or area. They are also called security alarms,security systems, alarm systems, intrusion detection systems, perimeter detection systems, and similar terms. Burglar alarms are used in residential, commercial, industrial, and military properties for
  • 119. protection against burglary (theft) or property damage, as well as personal protection against intruders. Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates. Types of Sensors on alarm  In hotel alarm systems are often used for monitor the many entrances and emergency exits found throughout a hotel.  There are various type of sensors used in the alarm according to its different functions – fire, burglary, heat, smoke etc.  Some of them are:  Infrared
  • 120.  Ultrasonic  Smoke, heat, Carbon monoxide  Microwave  Vibration  Magnetic Field  Glass Break etc Parts of an Alarm  The most basic alarm consists of one or more sensors to detect intruders, and an alerting device to indicate the intrusion. However, a typical premises security alarm employs the following components:  Premises control unit (PCU), or panel: The "brain" of the system, it reads sensor inputs, tracks arm/disarm status, and signals intrusions. In modern systems, this is typically one or more computer circuit boards inside a metal enclosure, along with a power supply.  Sensors: Devices which detect intrusions. Sensors may placed at the perimeter of the protected area, within it, or both. Sensors can detect
  • 121. intruders by a variety of methods, such as monitoring doors and windows for opening, or by monitoring unoccupied interiors for motions, sound, vibration, or other disturbances.  Alerting devices: These indicate an alarm condition. Most commonly, these are bells, sirens, and/or flashing lights. Alerting devices serve the dual purposes of warning occupants of intrusion, and potentially scaring off burglars.  Keypads: Small devices, typically wall-mounted, which function as the human-machine interface to the system. In addition to buttons, keypads typically feature indicator lights, a small mulch-character display, or both.  Interconnections between components. This may consist of direct wiring to the control unit, or wireless links with local power supplies.  Security devices: Devices to detect thieves such as spotlights, cameras &
  • 122. Types of Alarm  Local Alarms:-  Local alarms are those not hard-wired to a central monitoring location and may serve as deterrents(A thing that discourages or is intended to discourage someone from some act.)  Examples is the local alarm that is integrated with the panic hardware on a fire exit. When the exit door is opened, the circuit is broken and the alarm sounds.  Contact Alarms:-  Contact alarms systems are hard-wired to a central point. so the same can be monitored and appropriate action may be taken when the alarm goes off. Silent alarms are always hard-wired to a central point and may be considered for cashier areas, storerooms, and other areas. From such a point, the alarm can be silently transmitted to the telephone room, police department, or private security company; both the police and the onpremises security personnel can be alerted.  Example of a contact alarm sometimes used in cashier areas that is helpful during robberies involves using a money clip that cannot be removed from  Remote Alarms:-
  • 123. Types of Alarm  Remote alarm systems typically relying some sort of transmission for example, the more elaborate microwaves, radio waves and photoelectric light.  Microwave detectors are active units which transmit and receive electromagnetic energy are designed to detect motion. Perimeter protection with microwaves is used in some properties due to its long range capabilities; its potential for stability, once adjusted; and its virtually tamper-proof characteristics.  This is best used in locations where unwanted movement should be detected.  Radio frequency (R F) fields trip an alarm when any intruder breaks the radio wave by moving into an R F field. As with the use of the microwave detector noted above, these systems are of greatest value in locations where there should be no motion. This system is best used as an intruder alarm.
  • 124. Types of Alarm  Photoelectric light beam is a filtered light beam passes between a sending and receiving unit; as is the case in R F field systems,any break in the beam sets off an alarm.  This system is generally used for outside perimeter control, especially in resort properties.  And Finally Fire Safety Alarms:-  While the use of some alarm systems is usually optional, fire alarm systems are generally required by local fire and safety Laws.  Fire alarms is required to alert employees of fires or other emergency conditions. Because of this reason all hotels, motels and apartments must have a fire alarm system in proper operating condition which is tested at least every two months.
  • 125. Considerations while buying an alarm system  Initial cost  Maintenance cost  Durability  Visibility- easy detectable or not  Area of installation  Purpose / Need  Functionality- wireless, hard wired, size, shape, the sensors it uses.
  • 126.  Feasibility- whether the requirements of the system are easily available or not. Equipments for Guest Room Security  When we travel to different places, the main reason that we choose a good hotel is the assurance of a safe, clean and comfortable room.  Different security equipments installed in the room makes the guest feel safe and comfortable even when they are travelling away from their own safe dwellings.  Hotel guest room security may be enhanced by the use of security equipment such as hotel/motel function locks, safety chains, and similar devices.
  • 127.  Secondary access limiting devices on sliding glass, balcony, and connecting room doors, access limiting devices for operational windows, a guestroom telephone or other communication device available for use 24 hours a day, a peephole in or window next to the guestroom door etc.  The Following are the areas and equipments in the guest room security: Hotel Guest Room Locks:  Hotel Guest room Security locks can be a critical aspect of guest protection. Locks and locking systems are needed which lend themselves to the smooth and efficient operation of the property, but which are not easily compromised.  If a property uses a master keying system in which one key opens all or many of the property's
  • 128. doors, it should face the possibility that a master key may be lost or stolen. If this happens, every lock's code or combination ( that is, the arrangement of tumblers in the core of the lock) may need to be changed.  Depending on the type of locks used, this rekeying can be a relatively quick and inexpensive process or a long and costly one. [ One of the Biometrics  A new and highly technical access control system involves biometrics. Such a system utilizes human characteristics which are unique to a specific individual. No two Fingerprints are same anywhere in the world , the retina or iris of an eye, and the size, shape, and even the print of a hand.
  • 129.  In Future biometric applications there would be the possibility to include a person's voice being recorded at check-in and immediately being transmitted to the door accessing a restricted guestroom corridor, Secondary Access-Limiting Devices  Sliding glass doors another consideration in establishing the security of a guestroom. A number of secondary access-restricting devices are currently available and should be examined as possible additions to the single latch provided with each sliding glass door.  Hinged bars and metal and wood sections that can be placed in the sliding channel or additional lock units are sometimes used to add to the security of sliding glass doors. guestroom, health club, point-of-sales
  • 130.  A metal peg may be inserted in a hole drilled through both the sliding door and the frame to prevent the sliding door unit from being lifted out of the channel and removed from the frame.  Windows which open may need secondary latching devices. If local fire codes permit, devices which limit how far windows can be opened may be installed to help prevent intruders from entering through ground floor or balcony windows and to reduce or eliminate the possibility of children or even adults falling out of View ports  Consider the need for the guest to be able to identify a caller before opening the door. A view port [door viewer or peephole] is one device that can serve this purpose.
  • 131.  A wide-angle view port maximizes the view of the corridor adjacent to the guestroom door. Room Communications  Management should consider placing a telephone device in each guestroom. This telephone can be used by the guest to notify the property of emergencies or suspicious activities and by the property to notify the guest of emergencies like Fire, Bomb threat etc.
  • 132.  Nowadays hotels are exploring the feasibility of using two-way interactive cable television to provide security for emergency communication with the guest.  This facility usually delivers entertainment and programming to the guestroom, but it also has the capability to return communication via the same device. This permits monitoring of guest medical alerts, burglar alarms, and fire alarms etc. In-Room Security Information  There has been a great effort on the part of the hospitality industry to effectively involve the guest as a member of the security team for a property.  Hotels are required to have a floor plan or an information card be provided which indicates the location of the guestroom in relation to fire stairwells. This information card also lists the steps to be taken by the guest in the event of afire emergency.
  • 133.  In addition to fire protection data, consider including security data on the guestroom door. Decals or notices may be posted that:  How to double lock the guestroom door.  Notification for the guest to indicate that not to open the door without first identifying the person seeking entrance.  Instructions on a tent card for all guestroom security devices.  Mention the availability of safe deposit boxes at the front desk on the Guest registration card.  Any additional information about the locality of the property. Other Necessary Equipments  Smoke Detectors:-  Smoke or heat detection units are required by an increasing number of local jurisdictions. Regulations vary from those
  • 134. only requiring smoke and/or heat detectors in corridors, storerooms, and under stairways to those requiring full systems that provide protection in every guestroom, guest bathroom, public area, and back-of-the-house location. Smoke Detectors and Heat Detectors  Smoke and heat detection units also vary in their characteristics; some have the ability to report a heat buildup prior to evidence of smoke or flame, while others respond only to smoke and other products of combustion.
  • 135.  Single-station hard-wired smoke detectors require that the unit be on electric wiring as opposed to battery power. In some cases where the sounding of a unit can put the building into general alarm, a public address system can advise guests and staff within the property accordingly.  Automated systems, which integrate all smoke detectors in each location with a master panel, permit staff to immediately determine where a smoke detector has activated and to respond accordingly.  There are also battery back-up systems for use during power failures (which frequently occur in a fire scenario) that may be installed as a third level back-up when auxiliary power generation activates at the time of a primary electric source interruption.  Many local jurisdictions enacted regulations requiring fully automated smoke detector systems in all new construction and the retrofitting of smoke detectors for all lodging Fire Extinguishers:-  There are four classes of fires that a lodging property should be prepared for
  • 136.  1) Class A fires involve ordinary combustibles,  2) Class B fires involve flammable liquids,  3) Class C fires involve electrical equipment, and  4) Class K fires involve cooking oils and fats.  Tips: Although some jurisdictions will permit the elimination of fire extinguishers in a facility with a full sprinkler system, consideration should still be given to the use of extinguishers as they would permit the fighting of incipient fires rather than waiting for a fire to generate enough heat to activate
  • 137. Carbon Monoxide Detectors:-  Carbon monoxide is a dangerous by-product of a malfunctioning water heater, kerosene heater, coal boiler, or any other wood, coal, or petroleum product unit. (It is also the most critical toxic gas generated in any structural fire).  There have been tragic incidents in which carbon monoxide from such units has resulted in the death of a guest or staff. Since carbon monoxide is invisible and
  • 138. has no smell, it cannot be detected by natural means. Sprinkler Systems:-  Sprinkler systems are now mandated in an establishment four stories or higher, adhering to the Hotel and Fire Safety laws on each countries.  This requires a system covering back-of- the-house, public, and all guestroom locations.  Most jurisdictions now require full sprinkler systems in the new construction
  • 139. of any commercial occupancy regardless of the Accident Prevention Signs:-  OSHA(Occupational Safety and Health Administration) classifies accident prevention signs into three categories:  1) Danger signs.  2) Caution signs and, 3) Safety instruction signs.  Danger signs: which indicate immediate danger, should be posted to warn of specific dangers and to
  • 140. warn that special precautions may be necessary.  Red should be the basic color for identification of all danger signs, which include restricted area, in case Accident Prevention Signs:-  Caution signs: should only be used to warn against potential hazards or to caution against unsafe practices.  The color yellow has been used to advantage for marking physical hazards on stairs in both back-of-the-house stairways and fire stairwells.  Areas of construction or remodeling should have caution signs. Floor stand signs could
  • 141. warn guests of wet floors and to watch their step.  Safety instruction signs: should be used only where there is a need for general instructions relative to safety measures.  These signs are typically green with white lettering. Signs with green arrows, for example, could be used to note the path to follow between buildings or on trails. Security Procedures  A hotel may be subject to numerous amount of threats. Some are foreseeable and some are not. It is always wise to be prepared and have a set of procedures laid down so that at the time of emergency, with appropriate in
  • 142. advance training, such procedures may not only help but reduce the risk level and casualties at emergency situations.  Nowadays, almost every hotel has a set of security procedures laid down for such emergency situations. Some of them are discussed in this chapter. Key Control  The main aim of hotel is to provide safe and secure environment for guest and their belongings. Hence, proper key control will ensure that the guest rooms are secure and
  • 143. the guest property, as well as the guest, are safe.  For this a hotel should establish a clear procedure for the control of keys. Procedures for Key Control  Authorization of a person to order keys from suppliers.  Control the number of keys to be duplicated and keep a strict record on the number of keys duplicated.
  • 144.  Keep the keys in a safe place. Keys kept at the Front Desk should not be left unattended or accessible to anyone reaching over the desk.  Ensure periodic inventory checks.  Replace locks immediately following a break-in or criminal activity.  Change locks at regular interval of time.(The police recommend a change once every two year). The cheapest system in a long run may be an
  • 145. Procedures for Key Control  Make sure that the keys are retrieved from the guest on departure.  Maintain locks to ensure that they are always in good working conditions.  Key racks should be kept out of view of the public.  Set up a system whereby keys may only be issued on the production of the pass(key card) given to the guest on checking in which has to be returned at the time o checkout. In addition to this, the front desk staff should always verify name and room number(and any other information) of guest and check this against the hotel records before handing over keys.  Retrieve guest room keys involuntarily left on the front desk counter. A drop box should be made available.
  • 146.  Consider a practice of using keys that do not have he property’s name, address, logo or room number in them. This practice makes it much more difficult for the keys that have been lost to be traced to the appropriate property by who Electronic Key System  A variety of electronic systems are available; most include one or more of the following elements:  A mortise lock integrated with an electronic card reader.  A key card which either communicates with the front desk computer and permits entry or which is compatible with the permission-level within the microchip in the lock set unit in the guestroom door. This establishes entrance capability either at the time the key card is being produced or upon introduction to the door lock.  A computer terminal at the front desk or adjacent area which produces the key card and selects the code which will permit entry by a new key card and will reject all prior units issued for that room.
  • 147.  A computer capable of providing millions of combinations for entrance to a guestroom.  A battery source and/or hard-wired system for energizing the lock system.  touch-pad system.  The capability of "timing" the card so it no longer functions as of a set time, such as upon check-out. Surveillance and Access control  It is important that hotel security should know who are in the building and the purpose of their visit.  If the public is invited to patronize certain areas, such as bars, restaurant, banquet room, etc, it does not mean that other areas
  • 148. which are designated for guests, are also available to the public.  Anybody disguised as guest can get into the hotel property and remember always to keep on eye on suspected behaviour. Precautions  There are certain precautions that are needed to be considered in monitoring access through nonpublic areas: Supervision of entrances E.g employee entrance, delivery entrances and service entrances.
  • 149.  The hotel will have many different entrances which have to be taken special care of.  Back-gate entrance of employee should be practiced.  Delivery entrance scanning, proper checking and proper time allocation should be kept in mind while receiving deliveries like food material, maintenance parts, guest room supplies. Routine Patrolling of guest corridor.  Security personnel, guards or even elevator operators should have an eye on the corridors as these are accessible to only guest and any suspicious person with bags, or harmful arms,
  • 150. or equipments should be immediately informed or taken required action.  Apart from CCTV surveillance, patrolling from time to time will help increase the security perimeters as well as stop crime on time. Elevator Control in high rise hotel buildings:  Elevators are the easiest way to get to guest rooms.  The elevator operator should politely and tactically ask the guest about the hotel rooms or where they are staying to cross check the guests if they are in-house guest or not.
  • 151.  If the elevator is not operated by an operator, then CCTV cameras should be continuously monitored by the security personnel for any suspicious guests. Display of Staff identification on entrance, work hours and exit from the Hotel to all Staffs  Hotel should issue proper name tags or identity card so that one can easily recognize whether the person is a hotel staff or not.  While using the staff gate entrance or exit, presentation of staff ID should be practiced to
  • 152. ensure no unauthorized person enters through the staff entrance. Packages/ Parcel check to guard against theft of hotel property by Employees  Any packages or parcel going out of the hotel should be checked before letting the hotel employee exit or return home.  Sometimes employees will intentionally take away small valuable hotel properties which may be undetected if not checked.
  • 153. Identifying salesmen or deliverymen and their purpose of Visit.  Salesmen or delivery men should be asked to present their identification like visiting card or identity card and all details regarding the time of entry, purpose of visit and the name of the person they wish to see should be recorded in entrance registers or log books.  While entering, a proper visitor pass should be produced by the guard to ensure that the person(salesmen or deliveryman) is a visitor and came for an official purpose. Secondary or emergency Exit and entrance should be monitored.
  • 154.  Fire exit points in hotel are another easy way to enter or exit the hotel.  Since we cannot lock the fire exit, frequent monitoring is required for those areas. Every department should have an eye on suspicious activity and secure their own area from unauthorized persons.  Reporting the security personnel if any suspicious person or suspicious activity is taking place.  Unattended bags, car parked in no parking zone intentionally or in a very busy areas, new persons entering from the employee gate,
  • 155. guest refusing to shoe any form of identification, scanty baggage, etc.