Basic etiquette and grooming standard
Introduction to guest mail and key handling
Key control
Policies for black listed person
Wake up call
left luggage
Scanty baggage
Daily Report
Basic etiquette and grooming standard
Introduction to guest mail and key handling
Key control
Policies for black listed person
Wake up call
left luggage
Scanty baggage
Daily Report
A detailed presentation to help the learner of the hotel management institute about the work of Bell Desk, Bell Boy, Bell Captain and Concierge. Also includes the various forms and formats used by the Bell Desk.
This PPT by Hotel Management Tutorials explains the cleaning process for public areas in a hotel.
For Video on the same topic follow us at :
https://www.youtube.com/channel/UCPAiJGawMvOStSDfcArCwdw
GUESTROOM CLEANING ACTIVITIES, TYPES OF SOIL, STANDARDS OF CLEANING, PRIORITY FOR CLEANING ROOMS, PROCEDURES OF BED MAKING, SECOND SERVICE AND TURNDOWN SERVICE.
The presentation differentiates between the safety and security, the broad measures adopted by a large and busy hotel. It also highlights the role a Front Office employee is expected to play during emergency situations.
PPT for students of 2nd semester of hotel management, it gives a brief but adequate understanding of the concepts related to Guest Cycle in modern hotels.
A detailed presentation to help the learner of the hotel management institute about the work of Bell Desk, Bell Boy, Bell Captain and Concierge. Also includes the various forms and formats used by the Bell Desk.
This PPT by Hotel Management Tutorials explains the cleaning process for public areas in a hotel.
For Video on the same topic follow us at :
https://www.youtube.com/channel/UCPAiJGawMvOStSDfcArCwdw
GUESTROOM CLEANING ACTIVITIES, TYPES OF SOIL, STANDARDS OF CLEANING, PRIORITY FOR CLEANING ROOMS, PROCEDURES OF BED MAKING, SECOND SERVICE AND TURNDOWN SERVICE.
The presentation differentiates between the safety and security, the broad measures adopted by a large and busy hotel. It also highlights the role a Front Office employee is expected to play during emergency situations.
PPT for students of 2nd semester of hotel management, it gives a brief but adequate understanding of the concepts related to Guest Cycle in modern hotels.
Nokego Security Solutions, Locksmith in Dublin, Ireland was established to provide our customers with a professional and reliable service whilst remaining a cost-effective choice. Our friendly and professional local technicians strive to offer expert advice, tailored solutions, and quality workmanship at the best price.
www.nokego.ie
Nokego Security Solutions, Locksmith in Dublin, Ireland was established to provide our customers with a professional and reliable service whilst remaining a cost-effective choice. Our friendly and professional local technicians strive to offer expert advice, tailored solutions, and quality workmanship at the best price.
www.nokego.ie
Nokego Security Solutions, Locksmith in Dublin, Ireland was established to provide our customers with a professional and reliable service whilst remaining a cost-effective choice. Our friendly and professional local technicians strive to offer expert advice, tailored solutions, and quality workmanship at the best price.
www.nokego.ie
Nokego Security Solutions, Locksmith in Dublin, Ireland was established to provide our customers with a professional and reliable service whilst remaining a cost-effective choice. Our friendly and professional local technicians strive to offer expert advice, tailored solutions, and quality workmanship at the best price.
www.nokego.ie
Introduction
A hotel is “Home away from Home”.
A place where a bonafide traveler can receive food & shelter.
Security of guest & his property is of great concern for the hotel.
The management of any place of work are legally bound to provide a hazard-free, safe and secure environment to their employees.
One of the basic need of the hotel to plan safety and security plan for the hotel, its property & belongings.
At the same time is able to plan an efficient & effective system for guests & his belongings in terms of protection from mishaps, such as fire, theft etc.
Types of Security
Internal Security
Against theft, fire security, proper lighting.
External Security
Proper fencing of the building.
Fencing of pool area to avoid accidents in night.
Manning of service gates to restrict entry.
Staff
Identification of staff
Locker Inspection
Inventory records of different amenities.
Trash handling
Guest
Taking care of scanty baggage guest.
Keeping check of room, if guest has stolen or taken something along with him.
Threats in Hotel
Hotel’s Guardsmen
Upgradation in Technology
Advanced CCTV Cameras:
Clear Night Vision
High Resolution camera
Auto focus OR Face Recognition feature
Tag and Track system
Sound Recognition
Gait Recognition
Monitoring activity with software
Upgradation in Technology
ZAPLOX integrates mobile key with ASSA ABLOY locking:
1 Application, Multi- Functions.
Mobile access functionality for guests through RFID technology.
Key distribution is very easy.
Includes mobile check-in and check-out, room upgrades, direct bookings, special offers and more.
Mobile keys are highly secure, since a guest's Smartphone is less likely to be misplaced than a plastic keycard.
Upgradation in Technology
Upgraded Fire Alarm system:
Multi-criteria detectors can be set to varying degrees of sensitivity.
Lets management or security check the area before sounding a general evacuation alarm throughout the property.
When several detectors within an area are triggered, the fire alarm system can be programmed to initiate a full evacuation.
Same device that monitors both: Smoke and Fire.
The dual fire and CO detectors reduce overall installation time and material costs.
Upgradation in Safety Measures
Lift usage:
People entering the lobby and taking the lift to any floor must be stopped.
Lifts should be programmed.
Swiping room card in the lift and then lift will automatically take them to particular floor.
Managers providing a sense of ownership to employees:
Security will be much tighter.
Giving them more responsibility.
Creating a sense of ownership by profit sharing.
More aware staff is the need of the hour:
Staff is more interactive with guests.
Staff monitoring the body language of the guests with unusual behavior.
Trainings of safety and security measures more frequently.
Staff regularly updated with the evacuation plans.
More attentive
Elevate Home Protection with Superior Door Cylinder LocksHarrison Locks
Securing your home is a top priority, and the type of door lock you choose plays a crucial role in enhancing overall protection. We'll delve into the importance of door cylinder locks, the common types available, their advantages, factors to consider when choosing one, installation and maintenance tips, the convenience of keyless options, and the integration of smart technology.
All businesses rely on encryption and other cryptographic technologies to keep data safe, so it is critical to understand how to keep your crypto keys safe to prevent a data breach.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Unit 8 - Information and Communication Technology (Paper I).pdf
Key and key control
1. Key and Key Control
• A key is a device which is used to open a
lock. A typical key consist of two parts:
• The blade, which slides into the keyhole to
unlock the door
•The bow, which is left protruding so that
torque can be applied by the user to open the
door.
•The blade is usually designed to open one
specific lock, although master keys are
designed to open sets of similar locks.
4. Emergency Key/E-Key
• The emergency key opens all guestroom doors, even
when they are double locked. It can be used, for example,
to enter a room when the guest needs help and is unable to
reach or open the door.
• The emergency key should be highly protected and its
use strictly controlled and recorded; it should never leave
the property.
• One procedure for emergency keys is to have them
locked in hotel safe, a safe deposit box or a metal cabinet
and signed out by the individual needing one.
• The log should be dated and signed by the individual
taking the key.
• The keys should not be used on day-to-day basis.
5. Master Key
• A master key is designed to open a set of several locks.
These keys open all guestroom that are not double-locked.
• These locks also have keys which are specific to each one
(the change key) and cannot open any of the others in the
set.
• Locks which have master keys have a second set of the
mechanism used to open them which is identical to all of the
others in the set of locks.
• For example, master keyed pin tumbler locks will have two
shear points at each pin position, one for the change key and
one for the master key.
• A far more secure (and more expensive) system has two
cylinders in each lock, one for the change key and one for the
master key.
6. • Larger organizations, with more complex
"grandmaster key" systems, may have several
master key systems where the top level
grandmaster key works in all of the locks in
the system.
• A master key opens all guestrooms that are
not double locked. Depending upon the need,
the master key may be further established as
a housekeeping staff master key, a floor
supervisor master key, and a grand master
key for management purpose.
7. 1. Grand Master Key
Key operates all locks in the Hotel. Including
laundry and linen rooms.
2. Floor Supervisors Master Key
Key operates all sections on the floor/ floors
supervised by the particular supervisor.
3. Housekeeping Staff Master Key
Key operates all rooms serviced by
particular
room maid or housekeeping staff.
8. Guest Key
• The hotel guest room key is normally
issued to open only one room for which it
was intended, viz. individualised key for
each lock.
• If the guest room lock is in shut-out mode
the guest room key can neither open it nor
lock from outside of the room.
9. KEY-CARDS
• Metal room keys are being replaced by
electronically coded key-cards.
• A key card, while not actually considered a
key, is a plastic card which stores a digital
signature that is used with electronic
access control locks.
• It is normally a flat, rectangular piece of
plastic and may also serve as an ID card.
11. • There are several popular type of key cards in
use and include the mechanical hole card, bar
code card, magnetic stripe card, smart card
(embedded with a read / write electronic
microchip), and RFID proximity cards.
• The key card is used by presenting it to a card
reader; swiping or inserting of magnetic stripe
cards, merely being brought into close proximity
to a sensor.
• Key-cards have the capability of being randomly
coded at the point of registration, which re-
emphasizes the guest perception of room
security. Key-card control is computer-based and
therefore creates the necessary audit trail
automatically.
12. • Master keys can be changed in a matter of a few
keystrokes and lost key-cards are easily
removed from the system.
• One of the best security features is the ability of
the computer to investigate each door lock and
get a printout of everyone who accessed a
particular room. This dramatically cuts down on
theft from the rooms by hotel employees.
• The security advantage of the key-cards has
made it popular and many medium and large
sized hotels are adopting this key-card system.
13. Security
• Above keys will not open the lock when the
Guest has Double Locked it from inside.
• From a security point of view, master keying is
undesirable; but from a practical point of view,
however it is necessary.
• Master keying presents two security drawbacks:
• First is the danger that if a master key is lost or
stolen, several locks in the system would be
compromised, thus providing access to all those
locks.
• Second is the loss of master key.
14. Key Control
• A system of key control is essential to the security of a
lodging property.
• It is the process of reducing theft and other security-
related incidents by carefully monitoring and tracking the
use of keys
• All keys whether metal or electronic should be
adequately controlled. The security of a key lock system
is seriously weakened when keys are issued to a great
number of people or to anyone who has no legitimate
need for a key.
• The best lock in the world may be unable to protect a
property or its guests if poor key control allows a criminal
to obtain a key to that lock.
15. If there is no key card lock system, the following
policies should be considered:
A) CODING : Precautions to be taken
• Room keys must not have any form of tag that
identifies the hotel.
• Keys must not have the number on them. They
must be identified by a numeric or alphabetic code.
The code should not be identical to the building or
the room number.
B) Issuing Keys
Only authorised person should be allowed to
access the keys and a high level of security should
be maintained.
16. ADVANTAGES
• It ensures complete security as no room number is
printed on card
• At the time of issue more than one keycard can be given
to the guest if there is a double occupancy in the room
• It is possible to trace the receptionist who issues the
keys from the print out at the end of the day (to avoid
unnecessary or extra duplication which may call for
security problems)
• An alarm is set on when a wrong key card is used
thereby alerting security.
• It helps the guest to avail other credit facilities form the
various outlets of the hotel. It also helps in conserving
electricity in the guest room
17. Handling Guestroom Keys
• These key have the minimum access,
unlocking just one room.
• When keys are given to guest the room
number must not be spoken aloud.
• The guest should be explained about his
security maintained through coding
system.
• During the checkout, the guest should be
asked for their room keys.
18. Handling Master & Sub-Master
Keys
• All the floor master keys, room master
keys, grand master keys should be signed
out each time they are taken and their
return noted in a key control sheet
• All the keys should be stamped “Do Not
Duplicate”
• Emergency Keys should be kept in a
safety box.
19. Custody of keys
• Employees should not be allowed to loan
the keys assigned to them to one another.
• Employees should handover keys
whenever they leave the property, even
for the meal breaks.
• Individuals who have been master keys
should be checked from time to time.
20. GUIDING PRINCIPLES IN KEY
CONTROL SYSTEM
• Security of keys is essential from the moment
they arrive on site. Keys should be stored
separately and securely.
• No unauthorised person should be allowed
access to any key, either to examine or handle
it, since a photograph or impression can be
taken in few seconds and duplicate
subsequently made.
• Keep a log book of all keys signed out.
• Establish protocol for distribution of keys.
• Use keys that do not identify the property’s
name, address, logo, or room number.
21. • Perform an annual key audit.
• When keys are lost or stolen, the locks
should be changed or rotated to another
part of the property.
• Authorised employees should remind
guests to return keys at check-out.
• The loss or suspected compromise of a key
should be reported immediately and, after
due investigation, a decision be made as to
whether or not the lock should be changed.
• Place well-secured key return boxes in the
lobby, at exit points of the property, and in
courtesy vehicles.
22. KEY WORDS
• Key Card : A plastic card which stores digital
signature that is used to control locks.
• Emergency Key : The key used to open all
guestrooms, even when they are double locked.
• Grand Master Key : Key that opens all locks in
a hotel (including laundry and linen rooms).
• Master Key : A key which is designed to open a
set of locks.