Preview

Front Office Operations

Good Essays
Open Document
Open Document
4569 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Front Office Operations
Front office and guest safety and security

Security Issues
----------------------
Security encompasses areas such as security of the property itself, company assets, employees' and customers' personal belongings and valuables, life security, personal security etc. In all workplaces management stipulates that it is not responsible for valuables and employees personal belongings (their handbags, items kept in the personal lockers, etc.). Yet management must take all possible measures to prevent theft among employees and of employee belongings through its hiring practices and through the implementation of effective management, human resources and operational policies, such as: • Background checks of selected applicants • Policies related to employees' entry to, and exit from, the workplace • Spot checks of locker rooms and lockers • Effective supervision and control during the work cycle • Policies related to the discovery of criminal records and wrongdoing among, and by, employees • Control of people entering and exiting the workplace
With regard to guest valuables, management informs guests that the hotel is not responsible for valuables left in the room, advising them to secure these in safety deposit boxes provided by the hotel. Besides taking care of security issues related to the people they employ (as outlined above), management must undertake some necessary measures, among which: • Providing "secure" (safety) deposit boxes and areas to keep valuables • Policies and practices to ensure the security of these boxes and areas • Management and operational policies regarding the security of guest rooms • Management and operational policies regarding the security of public areas • Security policies and practices for the back-of-the-house areas • Employment and training of security personnel • Policies and practices to minimize the "presence" and "patronage" of "shady characters" and

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Security managers to keep an eye out the employees, have security cameras, metal detectors and have every employee checked before they leave the store, CCTV, employee screening for all employees.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Behaviors such as transferring files from a work device to a home computer that is not protected or maintained to IT’s standards, using personal communications that are not as safe as corporate communications, talking about sensitive company matters where others can hear the conversation, and failing to use a laptop privacy guard when working remotely in a public place all invite information theft. Employees also fail to safeguard equipment such as laptop computers and portable storage devices, which can be lost or stolen (Cisco Systems, 2008, p 5).…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    unit 2 p3

    • 632 Words
    • 2 Pages

    Security – security is something every buisness needs in order to make the customers and employees safe enough to be or enter the business. Security includes video cameras within the store just which could be used as proves if a robbery happen or somethin went missing within the business, security guard etc… the security guard need to have skills in order to work in the business, for example, Marks and Spencer need security guards who pocess communication skills as its important for them to communicate well with customers as they represent the business.…

    • 632 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    The level of security can determine the rise and fall of any organization, no matter how big or small the company may seem, so mitigating risk should always be the number one priority. Risk mitigation can be define as the process of implementing any form strategic actions that will reduce the level of threats that may cause financial hardship towards the organization. In addition, risk mitigation tracks, identify and evaluation all form of risk, including new and old. The focus of risk mitigation is to assist the organization’s department of security administration with identifying a list of potential problems that…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    In the course of all business activity, from the most routine, simple or mundane, to extremely complex, one must question the impact to the individual and the overall impact to the company and its stakeholders. Employees will be held responsible for their own conduct. Employees are expected…

    • 1310 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Est1 Task 1

    • 623 Words
    • 3 Pages

    The security rule has meaningful standards that are grouped into five categories; administrative safeguard, physical safeguard, technical standards, organizational standards, and policies, procedures, and documentation requirements. Administrative safeguards have several standards that help implement the security rule. The security operation purpose require organizations to evaluate their risks to security and implement policies and procedures that prohibit, detect, and acceptable security violations and to define appropriate approval for security violations. Another, workforce security has three implementation qualifications that are mandatory by the organizations. The organization has to contain policies and procedures to ensure that each members of the particular…

    • 623 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Miss

    • 2737 Words
    • 11 Pages

    Security and theft- You can improve the physical security of your organisation or service by installing electronic security systems such as cctv, intruder alarms and security lights. Improving perimeter security installing barriers, screens, using security personnel and contractors will also minimise risks of security breaches and theft.…

    • 2737 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Security is divided in three major areas: Physical security includes access to the building, offices, and the rooms housing the organization’s servers and other critical computing devices. External threats to the organization’s computing network such as hackers and malicious software. Access and permission to authorized users of the system as well as to the information.…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    business admin

    • 636 Words
    • 3 Pages

    Those same security procedures also help to protect your personal belongings while you are in the workplace to avoid any miss placement or stolen valuables.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Stealing in the Workplace

    • 5726 Words
    • 23 Pages

    Paulsell, Mary. "The Problem of Employee Theft." MissouriBusiness.net: Missouri Business Development Program. 10 Sept. 2007. Web. 08 Nov. 2009. .…

    • 5726 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Front Office Supervisors

    • 2395 Words
    • 10 Pages

    This is a report based on an induction programme and training programme for two newly recruited front office supervisors of Elephant Reach – YALA.…

    • 2395 Words
    • 10 Pages
    Good Essays
  • Good Essays

    There’s never been a better time to customize your sales process taking into account your products, people, the way you sell and who you sell to. We’ve come a long way from the days when we kept sales records on scraps of legal paper but the job is not done by a long shot. Early CRM gave everyone the tools to build rather rigid sales processes and the reports looked great though the impact on the sales force was dubious. Today we’re at a point where we can do a lot more and do it better because we have a choice of tools.…

    • 1036 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Front Office Department

    • 1094 Words
    • 5 Pages

    Telephonist supervises all the telephone operators’ call through the hotel. The staffs require good communication skills and language skills. Not only that, they obligated to place international calls and give wake-up calls as required by guest. The telephone exchange is normally located near the reception because of the extremely close working…

    • 1094 Words
    • 5 Pages
    Good Essays