1/2. HOTEL SECURITY & SAFETY
|
|
- Ashley Stewart
- 8 years ago
- Views:
Transcription
1 1/2. HOTEL SECURITY & SAFETY Providing security and safety in a hotel includes protecting people guests, employees and others- and assets. Each hotel should develop it s own need-based security program keeping in mind the legal requirements and implications that prevail. To make the hotel a safe place for guests and employees, hotel management must pay attention to both SECURITY and SAFETY aspects with regard to prevention of a situation and if it occurs, then to develop procedures to deal with it in an appropriate manner. I. SECURITY aspects usually include security of physical assets, security relevant to persons both guests and hotel staff and security of systems II. SAFETY: Safety aspects may include: A. Fire prevention and control B. Accident prevention-guests & employees C. Dealing with sickness or death of guests III. Lastly, the hotel needs to have clear cut policies concerned with dealing with other situations that may occur from time to time. I. SECURITY IN THE HOTEL : Security in the hotel may cover the following aspects: i. Physical aspects ii. Security aspects of persons iii. Security of systems i. Physical aspects are further divided into: a. Internal security b. External security a. Internal security may include: * Guest rooms & Guest property * Public areas * Hotel assets These may, in turn, include: Prevention of theft -hotel and guests property- using safe deposit lockers, ensuring key control, etc. Dealing with bomb threats Prevention of personal damage or assault to guests and staff Robbery b. External security may include: protection of hotel from vandalism. ii. Security aspects regarding persons: a. Employees: management needs to have effective procedures of recruitment, adequate reference checks, etc. to ensure the recruitment of the correct employees; having proper procedures for handling keys, trash and a gate pass system for dealing with hotel property taken out of the hotel; locker inspections, periodic stock checks, staff training and awareness programmes and other similar steps to ensure security consciousness amongst employees. 1
2 b. Guests: taking care of scanty baggage guests, ensuring access of rooms to the legitimate guests only; providing various security measures such as locks and bolts and wide angle door viewer or peephole for them. iii. Security of systems: The term systems mean all means employed in the operations of the hotels, including the procedures, equipment and policies laid down by the management. These should be clearly outlined, explained or communicated and surprise checks, etc. must be carried out from time to time to check their effectiveness. It is important that all systems devised by management must be consistently followed up if they must prove to be effective. ROLE OF FRONT OFFICE IN HOTEL SECURITY IN GENERAL: A security program is effective only when the employees of the hotel participate whole-heartedly. Front office personnel play a vital role. Front office staff, including front desk staff, bell desk staff, door attendants, the concierge and parking attendants have the opportunity to continuously observe whoever arrives at or departs from the premises. Suspicious activities or circumstances involving a guest can be reported to the hotel s security department. Some procedures that front desk agents may use to protect guests and property are: Front desk agents should never give keys, messages or mail to anyone asking for them without first seeing appropriate identification. The agent should never announce an arriving guest s room number loudly to avoid being overheard. Most hotels have a policy that prohibits its staff members from providing information to callers or visitors. Guest room numbers are also not given out. People calling the hotel for the guest may be directly connected to the guest s room without being told the room number. Visitors calling in person on the counter may be directed to use the house telephones to call the guestroom. Front office employees may inform the guests of precautions they themselves may take. For example, front desk agents may suggest that a guest arriving by car should secure all valuables in the car. The bell person taking the luggage to the guest room can explain the features of the guest room, especially the operation of room equipment, the use of access control devices on the doors and windows, familiarize the guest with pertinent security information and point out any notices in the room relating to security. Regarding the guests personal property, the front office may develop a method for ensuring the safety and security of the luggage of the guests. A valet parking attendant should secure all parked vehicle keys so that they cannot be removed by anyone except authorized employees. Front office staff also plays an important role in protecting the hotel s assets collection of payments or even items stolen by the guest. Some security points for women guests in the hotel: Mirrored walls in elevators so one can see who is walking in behind them Well-lit public areas and guestroom floors corridors Issuing of card key/computerized key instead of conventional keys that can be easily duplicated 2
3 Valet parking to eliminate the need to enter a parking garage or basement Upgrading lady travelers to club floors or executive floors even without a reservation, where there is the 24-hour presence of a concierge Assigning rooms near the elevator to do away with the long, unprotected walk down a long corridor Assigning rooms on floors away from the ground floor where unauthorized access is more feasible Preferably not assigning them interconnecting rooms 1. INTERNAL SECURITY MEASURES IN HOTELS (IN GENERAL): Though a hotel is open to the public, it is finally a private property and it can monitor and control the activities of the persons on the premises. Every hotel has it s Security Department that is responsible for most crisis situations. Surveillance plays a great role in most aspects of guest and property protection. Though security in the hotel is the responsibility of the Security Department, it is every ones business. All staff should be security minded and should report anything of a suspicious nature. The slightest hint of a scandal is enough to bring down the reputation of the hotel. ON GUESTROOM FLOORS: A room attendant has access to all areas on these floors including the guestrooms and needs to be doubly careful since many guest belongings are left about. They should be instructed to issue the mastered keys with proper authorization and to keep them safely while in their possession. They should not open doors for guests without first confirming with the front desk. They should keep an eye on all activities and people on the floor and report any guestrooms found with the door open and any keys found hanging in the room door locks. They should not give their master keys to any other person-guest or employee. If any colleague needs the room door opened to carry out any task inside, they should open the rooms themselves and stand by till the job is completed and then lock the room door carefully. All faulty door locks and catches and other security mechanisms in the room should be reported to maintenance immediately. At night all French windows and balcony/patio doors should be locked securely. Special attention needs to be paid to the locking of interconnecting doors after the checkout of guests. Housekeeping should keep a lookout for and immediately report guests having drugs or firearms in their rooms. They should also follow proper procedures for handling lost and found items of the guest while reporting missing or damaged hotel items for recovering costs from the guests. Regular rounds of the floors are also taken by security personnel for checking any irregularities and suspicious people. IN PUBLIC AREAS: In public areas, the security officer moves casually amongst the guests keeping a sharp lookout for shady and suspicious characters. Bellboys also help in recognizing regular undesirable characters and are alert to people with a nervous or uncomfortable behaviour. 3
4 They also tend to remember previous unpleasant guest or those that create problems or even blacklisted guests. Anybody seen carrying firearms in the property should be reported immediately. In the lobby it should be possible for the front desk staff to observe the hotel s main entrance, elevators, escalators and stairways. Strategically placed mirrors can help. Front office staff can also be trained in the procedures for stopping elevators and escalators in the event of an emergency. Closed circuit television (CCTV) can be effectively used as a surveillance tool in multiple-entry hotels. The monitors may be placed in a control center. However, personnel would still be required to monitor the television. Therefore it must be kept in mind that the surveillance equipment is intended to assist the employees and not replace them. HOTEL ASSETS: Employees are physically checked upon their departure from the hotel. Any staff found to smuggle the smallest hotel property or guest belonging out of the hotel is terminated. A proper gate pass or red tag system should be employed for dealing with items of the hotel or guests being removed from the premises with proper authorization. Guestroom keys are most important and the slightest mistake or careless handling may cost one their job. Proper procedures should be laid and followed in the case of key handling. Even guest are expected to return room keys upon their departure. Housekeeping should also follow proper procedures for reporting missing or damaged hotel items for recovering costs from the guests. SPECIFIC AREAS OF INTERNAL CONTROL (Prevention of theft and ensuring guest security): a. KEY CONTROL & PREVENTION OF THEFT: All hotel properties use three types of guest room keys- emergency keys, master keys and individual guest keys. a) An emergency key or grand master key opens all guestrooms even when they are double-locked. These keys should be highly protected and their use should be strictly controlled and recorded. Such a key should never be removed from the premises. b) A master key opens all guestrooms that are not double locked. It should be secured in a designated place for safekeeping and should be issued to authorized personnel only and that after a written record is maintained of identity of individual and time taken and returned. It can be also called a floor master key or a section key depending on the area where it can be used. c) A guestroom key opens a single guestroom if the door is not double locked. This key should be given to a guest after proper identification of the registered guest. Front desk agents should remind guests to return the key at check out. Well- secured key boxes in the lobby and entrance can serve as additional reminders. Some hotels do not list their name, address or room numbers on guestroom keys to avoid tracing back if they fall in the wrong hands. A code number may be stamped on the key in place of the room number. Hotel keys should not be taken from the property at all. 4
5 Many hotels require that all keys be returned to security and placed in a locked cabinet when not in use. Keys issued should be entered in a logbook with such information as the date of issue, time of issue, person taking the key and the reason for issue along with the issuer s name. With the use of PMS, every door opening can now be recorded along with the user identity and the time of access, which improves the implementation and control of the security system. In case of any unauthorized or unlawful use of a key, or any loss or theft, every lock affected should be changed or rotated to another part of the property. Electronic Locking system: This has replaced the traditional mechanical locks with sophisticated computer-based guestroom access devices. a. Centralized electronic locking systems operate through a master console at the front desk, which is wired to every guestroom door. At registration, the front desk agent inserts a key or card into the appropriate room slot on the console to transmit its code to the guestroom door lock. b. Micro-fitted electronic locking systems operate as individual units. Each door has its own microprocessor that contains a predetermined sequence of codes. A master console at the front desk contains a record of all code sequences for each door. At registration, the front desk agent encodes a key/card with the next code in the sequence of the assigned room. The console and each microprocessor must agree on which code in the sequence is currently valid. Most electronic locking systems may provide other guest safety and convenience features such as a do not disturb signal (which in turn deactivates the doorbell). These keys are usually valid for the period of the guest s stay in the hotel. Many of these systems keep track of which keys or cards opened which doors, by date and time, which reduces employee theft. If the guest overstays, this key may be invalid so the same key may have the new time mentioned/ it may be extended or a new key valid for the new time period of guest stay may need to be issued. Note: All electronic keys can be mastered to serve as master keys or section keys or even grand master keys as in the conventional key systems. THEFT OF HOTEL PROPERTY: Take care of scanty baggage guests Guests suspected of stealing hotel property should be charged on the bill for souvenirs Proper guestroom key control Staff lockers check Staff physically checked on departure b. SAFE DEPOSIT BOXES (prevention of theft of guest property): Most hotels provide safe deposit lockers for the use of guests in which they can protect their belongings. Technically, the hotel that provides safe deposit lockers and informs the guest of such 5
6 facility has limited liability in case of theft of the article, since the guest had been informed of the facility and still chose not to avail it. The required notice can be made through postings made in the guest room, the registration card and through the front desk agent registering the guest. Safe deposit lockers or boxes should be placed in an area to which there is limited access and unauthorized guests or staff should not be allowed in the area. They are usually located near the front desk or in a room behind the front office cashier in a secure area. These days every guestroom is provided with in-room safes for the guest valuables. The guest can employ his own code for access. PROCEDURE FOR USING SAFE DEPOSIT LOCKERS covers 2 main steps: Issue of locker Surrender of locker Keys and key control for safes Strict control should apply to the storage, issue and receipt of safe deposit box keys. Even un-issued keys should be kept securely. Two keys should be required to open a safe deposit box- a control key and the guest key. The control key, which must be used in conjunction with the guest s key to open the box, should be secured carefully and kept in possession of employees authorized to access the boxes. It should always be accounted for at each change of shift. Even when more than one guest is using the same locker, there should only be one guest key issued. If a guest key is lost, the locker is drilled open in front of the guest in the presence of a witness and someone from the property. The safe deposit agreement signed by the guest should make it clear that the guest will be responsible for all costs related to the loss of the key. Issue and use of safes by the hotel guest: Access control is the most critical of all safe deposit responsibilities. The identity of the guest must be established before access is granted. Procedure: The guest is usually required to sign a form requesting access; the attendant then compares the signature with that on the initial agreement signed when the locker was issued. (Draw format of Safe Deposit Box Record Card) A personal piece of guest information- date of birth or mother s name - may be included on the initial agreement for the correct identification of the guest if in doubt. The important thing is that whatever procedure is adopted it should be followed carefully every time and for each guest. After identity has been ascertained, the attendant should accompany the guest to the safe deposit locker and use the control key and the guest s key to open the box in view of the guest. The guest may or may not be left alone as per hotel policy but the attendant is never left alone with the guest s belongings. Only the guest should place items into or remove them from the box or locker. When the guest is finished, the attendant should lock the box in view of the guest and return the guest s key. 6
7 Surrender of locker: When the guest relinquishes/ surrenders the box and returns the key, the guest and the attendant should sign a release notice that he has received all the articles that had been placed in the safe deposit box. In cases where space limits the number of boxes available for each individual guest, the guests may have to share lockers or boxes. In this case, each guest s property must be sealed in a container or envelope to keep it separate from the other guest s property. The guest key to the safe deposit locker should be maintained in a secure place and it s use should be recorded in a Safe Deposit Locker Register.(Draw format) c. Unusual access to safes If a guest fails to surrender a box upon check-out, the hotel should send the guest a registered letter requesting surrender of the box. If the guest does not respond within the appropriate time limit, the hotel should dispose of the contents of the box in accordance with hotel policy. If a guest mails the key to the hotel, the hotel should secure the key and ask the guest to sign a release. If the box is found to contain property, the guest should be requested to personally remove the contents and surrender the box, or forward a power of attorney for the guest s representative to do so. Under no circumstances should access to a safe deposit box be allowed based solely on telephone or telegram authorization. Proper records /formats should be maintained here as well. (Check format) In-room safes: These days, nearly all hotels provide in-room safes for the use of the guest. The guest can use his own personal code for operating this during his stay. There is a master override for the code in case the guest forgets the code or forgets to unlock the safe on his departure from the hotel. c. LOST AND FOUND: The lost and found function is usually assigned to the housekeeping. Nevertheless, most guests contact the front desk for any enquiries. Clear procedures should be developed to deal with such queries and appropriate records should be maintained. Under no circumstances should an article be mailed to the guest without his permission to do so or handed over to anyone other than the guest without proper authorization received from the guest. d. BOMB THREAT OR TERRORIST THREATS: In today s political climate nearly every public area or institutions is open to being a target for terrorists. This danger is even more so in hotels that cater to VIPs. Very often such hotels would be closely working and consulting with the local police for their security arrangements. In particular, staff would be expected to keep their eyes open and to report anything of a suspicious nature. All areas should be regularly patrolled and anything or any one of a suspicious nature should be reported to security. 7
8 All public areas should be checked and locked if possible when not in use such as banquet rooms, banquet floor restrooms, etc. baggage and other items that enter the hotel must be checked and kept securely. In the evenings all rooms and public areas windows should have the curtains closed to protect privacy and for safety of the residents. The chief threat is the telephoned bomb warning. Even though these could be hoaxes, they cannot be taken lightly. Usually the telephone operators are the ones handling calls and they should be trained to handle them correctly. HANDLING A BOMB THREAT CALL: There are two essential requirements: The caller should not be interrupted, and his words must be written down exactly. As soon as he is finished, you should write down as many details as you can remember about the caller s voice, mannerisms, accent, background noise, etc. Avoid decorating or exaggerating the facts. A standard form (Draw format of Bomb Threat Checklist) could be used to assist the operator. The general manager must be alerted and the police dept. will have to be informed. Duties and responsibilities of various staff involved in the emergency procedures to be followed must be clearly outlined and followed up. The front desk will usually act as the centre of information for guests and employees. Depending on the advice from the police, the hotel may or may not have to be evacuated or a certain area of the hotel may have to be evacuated. In the extreme case that a bomb does explode on the premises, there should be a plan that includes the route for evacuation, procedures for emergency medical aid, and evacuation of the injured to a medical facility. The management must also have a plan for dealing with the debris removal and repairs to return the hotel to operational status. This may only be possible after receiving clearance from the police after they have finished their investigations. The front desk may serve as the command center in the event of any emergency, summoning onpremises security staff or the local police. Front office staff should: React quickly and efficiently Remain cool and calm Avoid panic Follow standard emergency procedures such as, those mentioned above and use any documentation necessary for notifying management and contact guests informing them of what precautions to take and how to behave in an emergency (as prescribed in the procedures laid down by management) e. ROBBERY Armed robbery is a possibility since a hotel has some cash on the premises. Front office staff should respond as reasonably as possible. They should not make any sudden movements and should comply with the robber s demand. They should not do anything to jeopardize their lives or those around them. They should remain quiet unless directed to talk, keeping hands in sight and not attempt to disarm the robber or use a weapon. 8
9 A secret silent alarm may be installed in the cashier s desk that is operated when a certain packet of bills is removed. The staff may make careful note of the robbers and their mode and direction of getaway or even a license plate in order to report it to the police, but very unobtrusively. The police may be notified as soon as it is safe to do so. f. PROTECTION OF THE GUEST FROM PHYSICAL ASSAULT should cover: Efficient key control Providing door chains or safety chains that operate efficiently Providing wide angle door viewer, deadbolt locks, double locks, night light, etc. in the room Regular room checks to ensure unoccupied rooms are undisturbed Investigation of reports of peeping toms Explaining the location and operation of security systems provided in the guestroom to the new guest Checking the locks on interconnecting doors when rooms are assigned to individual guests 3. EXTERNAL SECURITY: The measures used for achieving external security in general may involve: proper lighting of the perimeter and outside of the building/s proper fencing of the building planting of shrubbery along the perimeter of the building manning of all gates and entrances to the property and building/s fixing and monitoring of surveillance equipment External security may also include the prevention of vandalism or damage to hotel building property and premises by miscreants (including writing graffiti on the premises). Preventive steps to be taken against vandalism are: Blacklisting of all guests known to have caused problems Scheduling of regular patrols in and around the building Requesting damage deposits from guests Regular inventory checks Reporting any occurrences of vandalism to the supervisor immediately Report any faults immediately to maintenance to avoid damage through force used on doors, etc. such as kicking the door when not opening easily, by guests or staff. In extreme situations when things get out of hand front office should immediately inform security and the main door should be closed. The police may have to be called with the permission of the GM or FOM in dire situations. NOTE: The important thing to remember in any unusual situation is that a report of the event/situation has to be submitted by each department involved so that the management may be able to keep the records and use these to assess the situation, the actions taken, the burden of responsibility and ensure such steps that will prevent or reduce the occurrence of such events in the future. Assignments for journal & class discussion: (Use reference books, eg. Hotel Front Office Operations & Management by R. Tewari, etc. for further information and formats.) 9
10 Q1. How would you deal with the following situations? Please state in steps. a. An in house guest complains that he cannot find his Rolex watch he left on the dresser while he was out. b. The room attendant is cleaning an occupied room and finds a roll of foreign currency under the pillow. c. A report is received from room attendant on the floor that room 305 is checking out and is settling his bill at the front desk and there is a table lamp, worth Rs. 3000/-, missing from the room. d. At the F&B service area you notice an unknown person hanging around. e. The guest checking in has a woman with him who seems to be of suspicious nature. f. The guestroom key is found hanging in the door keyhole by the room attendant. g. A guest approaches you (hk attendant) on the guestroom floor claiming his key is with his wife who has gone out shopping, so could you please open his room? Q2. Explain the Lost and Found procedures followed by a hotel. Q3. Draw formats of: i. Safe Deposit Locker Register ii. Safe Deposit Box Record Card iii. Accident/Incident Report Form iv. Bomb Threat Check List v. Lost & Found Form and Register vi. Key Control Register ********** 10
The Complete Security Survey
The Complete Security Survey You should do a security survey of your office or property on a regular basis. Follow this checklist. It will provide you with an overview of the level of security in your
More informationSecurity Policy and Procedures
The British Section SHAPE International School Aims Security Policy and Procedures The aim of this policy is to ensure that the school can operate on a day-to-day basis in an environment that is safe and
More informationEMERGENCY EVACUATION PROCEDURES
EMERGENCY POLICY is committed to assuring a safe workplace for its employees. For this reason, the company has developed the following procedures for emergency situations. All employees should be familiar
More informationAide-Mémoire Suspicious Objects and Bombs
Aide-Mémoire Suspicious Objects and Bombs Terrorists, criminals and dissatisfied individuals continue to make use of improvised explosive device (homemade bombs). These incidents involving shocking acts
More informationBusiness Security Check List
DOORS, WINDOWS, AND OPENINGS: Are all entrance doors clearly visible from either the parking lot or the street? Do all entrances doors have shatterproof windows that allow a person to look outside before
More information1.4 The banking entities that provide customer service will keep controls of access to the premises.
RULE No. 01-2007 1 (dated November 21, 2007) "Whereby Minimum Security Standards are stipulated for the Banking Entities" THE BOARD OF DIRECTORS using its legal authority, and WHEREAS: Pursuant to Numeral
More informationHome Security Assessment Checklist DATE
Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.
More informationEMERGENCY PREPAREDNESS PLAN
EMERGENCY PREPAREDNESS PLAN Promontory Charter School ----------------Emergency 911--------------------- INTRODUCTION The purpose of this Emergency Preparedness Plan for Promontory Charter School is to
More informationCheckout and Settlement
Checkout and Settlement Check out and settlement are part of the final stages of the guest cycle. It is the final phase of the guest cycle and examines the various activities involved in checkout and settlement.
More informationhttp://homedefensesecurity.com
The Basics of Home Security Topics Covered: Home Security Basics Home Security Guides Home Security Products and Services The Value of Insurance in Home Protection Top Ten Tips for Your Home Security Essentials
More informationCourt Security Guidelines
July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative
More informationStatement of objective MALLS & MULTIPLEXES
//1// Statement of objective Security is an important factor today and in establishments that have large numbers of people visiting; it is necessary that they have a basic infrastructure of security. With
More informationEMERGENCY PROCEDURES
EMERGENCY PROCEDURES In an Emergency Call 911 Using County Telephone System Call 9-911 Fresno County Sheriff 600-3111 Fresno County Security 600-6785 TABLE OF CONTENTS Introduction 3 Accidents 4 Serious
More informationSample Emergency and Critical Incident Policy and Procedure
Sample Emergency and Critical Incident Policy and Procedure 1. Purpose and Scope Emergencies and critical incidents in the workplace can affect people physically and psychologically, and affect program
More informationLiving Arts Institute @ School of Communication Arts Emergency Preparedness Plan. - Table of Contents -
Living Arts Institute @ School of Communication Arts Emergency Preparedness Plan - Table of Contents - Purpose 1 Evacuation Procedures 2 Medical Emergency 3 Accident Report Form 4 Blood and Body Fluid
More informationFree For All Marketing Inc. Workplace Safety Program
Free For All Marketing Inc. October 2012 Free For All Marketing has developed a which focuses on measures and procedures to control the risk of workplace violence, including domestic violence, which may
More informationChippewa County Courthouse Security Emergency Procedures. Dial 9 9 1 1 FIRE POLICE AMBULANCE
Chippewa County Courthouse Security Emergency Procedures Dial 9 9 1 1 FIRE POLICE AMBULANCE Table of Contents Introduction... 2 Explosion... 3 Civil Disorder/Threat to Personal Safety... 4 Chemical Spill...
More informationEVENT SAFETY MANAGEMENT PLAN. A Small/ Medium Scale Event
EVENT SAFETY MANAGEMENT PLAN For A Small/ Medium Scale Event To be held at Location: Date: CONTENTS Section Page INTRODUCTION 1 1.0 Event Details 2 1.1 Event Overview & Location 1.2 Event Schedule & Timings
More informationBUSINESS SECURITY CHECKLIST
BUSINESS SECURITY CHECKLIST Bozeman Police Department 615 South 16th Avenue - Bozeman, MT - 59715 406-582-2000 - n Emergency bozemanpolice.com Exterior Doors, Windows & Openings Are all entrance doors
More informationModule 14 Handling Emergency Situations
Handling Emergency Situations The Shift Lead protects the team, customers and restaurant by monitoring safety. However, you cannot always prevent problems. Sometimes, things happen that you were not expecting
More informationSCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY
SCS1. UNIT TITLE: MAINTAIN HOTEL SECURITY UNIT DESCRIPTOR This unit covers the competencies required to create and maintain a safe and secure hotel property both inside the property and the surrounding
More informationEmergency Procedures Manual For MGEX Building Tenants
March 2011 Emergency Procedures Manual For MGEX Building Tenants Emergency Contacts Emergency/Security... ( 612) 250-3269 Police...911 Fire...911 Paramedics...911 Poison Control...1-800-222-1222 MGEX Property
More informationEmergency and Critical Incident Policy and Procedure
Emergency and Critical Incident Policy and Procedure 1. Purpose and scope Emergencies and critical incidents in the workplace can affect people physically and psychologically, and affect the business continuity
More informationSECURITY SURVEY AND RISK ASSESSMENT. any trends or patterns in the incidents occurring at the school; the efficiency of the chosen security measures.
SECURITY SURVEY AND RISK ASSESSMENT A security survey gives a rounded picture of the risks that your school faces and the security measures in existence. Without this information it is difficult to assess:-
More informationSection 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
More informationHow To Handle An Emergency At A Strata Corporation
24 HOUR ANSWERING SERVICE The regular office hours at our firm are 9:00 am to 5:00 pm Monday to Friday. After these regular hours, the same telephone number is answered by a Telephone Answering Service,
More informationPRESCOTT POLICE DEPARTMENT
PRESCOTT POLICE DEPARTMENT FORMING A NEIGHBORHOOD WATCH PROGRAM WHAT IS NEIGHBORHOOD WATCH? Crime or the fear of crime provides the impetus for residents to become better informed on how to protect themselves
More information"DOT IN-DEPTH HAZMAT SECURITY TRAINING"
PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow
More informationNOTE: DO NOT PULL FIRE ALARM IF A DEVICE IS OBSERVED OR FOR BOMB THREAT.
Bomb Threat and Explosives Plan and Procedures General Richard Bland College needs to be prepared for many unusual occurrences and possible disasters for our campus. A bomb threat or the unfortunate possible
More informationEmergency Response Manual
Page 1 of 9 Table of Contents NOTE: This emergency response manual is to be used as standard operating guidelines. IN ALL CASES, USE COMMON SENSE. Introduction... 2 Emergency Contacts... 3 1) Vehicle Accident
More informationSECURITY AND SAFETY TIPS HOME/RESIDENTIAL SECURITY
SECURITY AND SAFETY TIPS Below are some vital security tips compiled by the Lagos State Police Command and the state Security Service (SSS) under the instrumentality of the Lagos State Security Council
More informationSam Houston State University
Sam Houston State University Lowman Student Center EMERGENCY PROCEDURES July 2007 Emergency Procedures Found in this Document General Information for any Emergency Situation in the LSC...... 2 Vandalism,
More informationTommy Campsey. Introduction Brief background. Common goals
Tommy Campsey Introduction Brief background 36 +yrs. in Law Enforcement Father of three (1 son, 2 daughters) Life experience & common sense Common goals Protect life Protect property Educate you Provide
More informationGuidance on Lone Working in the Healthcare Sector
Guidance on Lone Working in the Healthcare Sector Our vision: A national culture where all commit to safe and healthy workplaces and the safe and sustainable management of chemicals Contents 1. Introduction
More informationEmergency Procedures IF YOU DISCOVER A FIRE. Upon discovering a fire: the following steps are to be taken:
IF YOU DISCOVER A FIRE Upon discovering a fire: the following steps are to be taken: 1. Leave the fire area immediately removing any person in immediate danger. Make sure that doors to the affected area
More informationEast Haven Police Department
East Haven Police Department Type of Directive: Policies & Procedures No. 410.2 Subject/Title: Issue Date: Preliminary Criminal Investigations July 29, 2014 Effective Date: References/Attachments: N/A
More informationEmergency Procedures. Emergency Phone Numbers. Unisafe (Security) (07) 838 4444 or extension 4444 Police, Fire Service or Ambulance 1-111
Facilities Management Emergency Procedures Unisafe Guidelines for managing emergency situations Unisafe (Security) (07) 838 4444 or extension 4444 Police, Fire Service or Ambulance 1-111 Emergency Phone
More informationMINIMUM HOME SECURITY
MINIMUM HOME SECURITY The 3 H's of a Secure Home: Hardware, Habits and Humans INSTALL HOME SECURITY HARDWARE Install & maintain deadbolt locks on all exterior doors, including garage service doors. Locks
More informationPOINT UNIVERSITY CAMPUS SECURITY Emergency Response Plan
POINT UNIVERSITY CAMPUS SECURITY Emergency Response Plan Introduction The Point University Emergency Response Plan establishes guidelines for campus-wide communication, service coordination and safety
More informationTENANT EMERGENCY PREPAREDNESS PLAN
JSR Management 2800 Corporate Exchange Dr. Suite #025 Columbus, OH 43231 614-882-1515 614-882-2301 fax jsr@jskilken.com TELEPHONE NUMBERS POLICE, FIRE, AMBULANCE 911 MANAGEMENT OFFICE JSR Management 2800
More informationHome Invasion Safety. Protecting Your Family
Home Invasion Safety Protecting Your Family Point of Entry and Confrontation A home invasion is when robbers force their way into an occupied home, apartment or hotel room to commit a robbery or other
More informationEast Mississippi Community College. Scooba Campus * Mayhew Campus Department of Public Safety. Campus Emergency Action Plan.
1 East Mississippi Community College Scooba Campus * Mayhew Campus Department of Public Safety Campus Emergency Action Plan Revised 2013 TABLE OF CONTENTS 2 Foreword & Emergency Numbers Page 3 Active Shooter
More informationPalm Beach County Sheriff s Office
Palm Beach County Sheriff s Office Home Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for thousands of people who live, work and visit Palm Beach County.
More informationsafe deposit box Early Late terms & conditions (effective from 5 open open Safe Deposit Box Terms And Conditions (continued) November 2014)
Safe Deposit Box Terms And Conditions (continued) safe deposit box 8.5 If we do not hear from you within 30 days of writing to you to terminate your safe deposit box account as set out in Term 8.4 then
More informationSTANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS.
STANDARD OPERATING PROCEDURE FOR DEALING WITH ANY TERRORIST ATTACK ON SCHOOLS. 1. Background: Experience gained in handing terrorism in recent years has shown that with a view to gain widespread media
More informationOFFICE OF THE PREMIER ACCESS CONTROL POLICY
OFFICE OF THE PREMIER ACCESS CONTROL POLICY - 1 THE ACCESS CONTROL POLICY 1. Purpose 1.1 To propose for the introduction of an ID card policy for the Office of the Premier. 2. Background 2.1 The Office
More informationGuide To EMERGENCIES
Guide To EMERGENCIES Campus Security 716-614-6400 Dial Extension 6400 or Extension 555 Emergency 911 Wellness Center 716-614-6275 New York State Police - 716-297-0755 Poison Control - 1-800-222-1222 Niagara
More informationHOTEL INFORMATION SYSTEMS. Chapter 6
HOTEL INFORMATION SYSTEMS Chapter 6 "The good news is that the PMS market has seldom seen such a variety of different approaches to solving your property's automation needs. Jon Inge, Hotel Systems Consultant
More informationTENNESSEE TEMPLE UNIVERSITY CRISIS MANAGEMENT PLAN
TENNESSEE TEMPLE UNIVERSITY CRISIS MANAGEMENT PLAN TABLE OF CONTENTS Emergency Numbers...................................... 3 Accident/Serious Injury/Illness.............................. 4 After-Hours
More informationREACT. Rapid Emergency Action Checklist. The University of Toledo Health Science Campus. Emergency Contact Information for Department or Lab
Emergency Contact Information for Department or Lab Main contact: Phone number: Back-up contact: Phone number: The University of Toledo Health Science Campus Rapid Emergency Action Checklist REACT This
More informationPhysical Security Policy
London School of Economics & Political Science Physical Security Policy Final Draft: 06/11/12 Approved by Estates Strategy Committee: 22/05/13 Next Review Date: 22/05/14 London School of Economics Physical
More informationPreventing Burglaries
Preventing Burglaries By Captain Binder The United States is one of the wealthiest countries in the world, home to some very affluent communities. Not surprisingly, some of the wealthiest cities are located
More informationPhysical Security Assessment Form
Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...
More informationDistrict Testing Guidelines 2014-2015
Assessment and Accountability District Testing Guidelines 2014-2015 807 W. Glenwood Tyler, Texas 75701 903/262-1014 Johnita G. Martin Director Max Gregory Coordinator of State Assessments Tamara Moss Administrative
More informationRELEASE OF INFORMATION
***For Immediate Release to Castle Hills Residents*** On August 23, 2014, at approximately 11:33 pm, officers from the Lewisville Police Department responded to a robbery call in the 2400 block of Hollow
More informationGUIDE FOR HANDLING AND TRANSPORTING CASH
1 INTRODUCTION Who should use this Guide? This Guide provides practical guidance for persons conducting a business or undertaking about managing health and safety risks associated with handling and transporting
More informationEMERGENCY PREPAREDNESS PLAN FOR
EMERGENCY PREPAREDNESS PLAN FOR Name of Child Care Center Provided by: 2014 Emergency Preparedness Plan Page 1 TABLE OF CONTENTS Page I: Introduction... 3 II: Emergency Response Organization... 3 III:
More informationWESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business
Business Name: Owner Name: Business Address: Officer: Survey No.: WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business "Being There When Needed" DOORS 1. Is the exterior doors solid core
More informationMENDENHALL RECRUITMENT CENTER
MENDENHALL RECRUITMENT CENTER EMERGENCY EVACUATION PROCEDURES CHAIN OF COMMAND FOR EVACUATION PROCEDURES OR UNEXPECTED EMERGENCIES In case of an emergency where crowd safety and well-being is jeopardized,
More informationEmergency Planning Guideline
www.hh.net.nz Essential Emergency and Security Systems Supporting and Complimenting the Home s Fire Evacuation Scheme POLICY: To optimise emergency readiness REFERENCE: NZS 8143: 2002 NB: Management is
More informationPulaski Bank. www.pulaskibankstl.com. Electronic Funds Transfer ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE
www.pulaskibankstl.com Electronic Funds Transfer ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE For purposes of this disclosure and agreement the terms "we", "us" and "our" refer to. The terms "you"
More informationSecurity Recommendations for the Small Business. Adapted from Security and the Small Business Retailer U.S. Department of Justice
Security Recommendations for the Small Business Adapted from Security and the Small Business Retailer U.S. Department of Justice Recommendations for Business Security - Robbery Because of the potential
More informationBarrington Hills Police Department
Barrington Hills Police Department Home Security Checklist Use this as a guide as you check your home for safety measures. Boxes marked indicate areas where you could take action to improve your home s
More informationEMERGENCY & SAFETY PROCEDURES 225 West Wacker Drive Chicago, Illinois 60606
EMERGENCY & SAFETY PROCEDURES 225 West Wacker Drive Chicago, Illinois 60606 Emergency Phone Numbers Fire/Police/Medical 911 Chicago Non-Emergency 311 Office of the Building (312) 759-2100 Building Security
More informationI. Frequently Asked Questions Regarding Housing
I. Frequently Asked Questions Regarding Housing 1. What should I do in case of an EMERGENCY? For a facilities/maintenance type of emergency (e.g., flood, severe electrical problem, elevator breakdown)
More informationSecurity Management Plan
Effective Date: 03/2015 1 of 10 I. Table of Contents: I Table of Contents II Authority III Purpose & Scope IV Policy Statement V The Joint Commission Standards VI Performance Standards VII DUPD Services
More informationDOT HAZMAT SECURITY AWARENESS TRAINING
ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader
More informationAPEC Private Sector. Supply Chain Security Guidelines
APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation
More informationCAMPUS KEY POLICY. Gerry, Bomotti, Senior Vice President for Finance and Business
Gerry, Bomotti, Senior Vice President for Finance and Business 1. PURPOSE The purpose of this policy is to provide optimal physical security and safety for building occupants and to protect the assets
More informationCommercial or Business Security Survey
Exterior Grounds Commercial or Business Security Survey Is there a fence around the property or a clear definition of Territoriality? If there is a fence, is it tall enough and maintained in good repair?
More informationPolicing requirements for Closed Circuit Television
Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems
More information2010 SECURITY AWARENESS TRAINING
2010 SECURITY AWARENESS TRAINING Hazardous materials are essential to the economy of the United States and the well being of its people. They fuel our cars and trucks and locomotives, heat and cool our
More informationAN ORDINANCE GOVERNING RANDOLPH COUNTY COURTHOUSE SECURITY AND BUILDING PROCEDURES
AN ORDINANCE GOVERNING RANDOLPH COUNTY COURTHOUSE SECURITY AND BUILDING PROCEDURES Section I. Purpose. This courthouse security and building procedures ordinance is designed to maintain a safe and contraband-free
More informationPreparing Your Business for a Flood
CHECKLISTS Before a Flood Stay in touch with what s happening and listen for warnings and advisories through the media or through local community messaging. A flood watch means flooding is possible. A
More informationHotel Fire Safety for staff
Teaching Guide Hotel Fire Safety for staff Seattle Fire Department Fire Prevention Division Hotel Fire Safety Instructor Outline Introduction Goals: To ensure that hotel employees are knowledgeable in
More informationNPCollege Crisis Management Plan Page 1 of 11. Table of Contents
NPCollege Crisis Management Plan Page 1 of 11 Table of Contents Introduction 2 A. Preface.. 2 B. Emergency Phone Numbers. 2 C. Public Agency Numbers 2 D. Emergency Team Chart 3 Part One: Emergency Plan..
More informationPalm Beach County Sheriff s Office
Palm Beach County Sheriff s Office Business Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for hundreds of thousands of people who live, work and visit
More informationALERT-360. An Overview of Alert-360 Technology. Tutorial M01. Alert Management Platform BEGIN
360 ALERT-360 Alert Management Platform Tutorial M01 01052015 An Overview of Alert-360 Technology Copyright 2015 Biosynq, Inc. All rights reserved. Alert-360 is a registered trademark of Biosynq, Inc.
More informationBusiness Security Checklist
Business Security Checklist The Grove City Division of Police The mission of the Grove City Division of Police is to serve and protect all by providing professional law enforcement services in partnership
More informationEmergency Procedures
FIRE AND LIFE SAFETY Building Systems Hayden Ferry Lakeside is state of the art and designed to offer maximum protection to its building occupants. The building is monitored 24 hours a day, seven days
More informationHARDWIRED CONTROL PANELS
USER GUIDE 9651 HARDWIRED CONTROL PANELS Contents 1. Introduction...3 The Alarm System...3 The Keypad...3 About This Guide...5 2. Everyday Operation...6 How Do I Know if the System is Working?...6 Setting
More informationUK SBS Physical Security Policy
UK SBS Physical Security Policy Version Date Author Owner Comments 1.0 16 June 14 Head of Risk, Information and Security Compliance (Mel Nash) Senior Information Risk Owner (Andy Layton) Ist Issue following
More informationKeeping your identity safe. Keeping you safe. Your home, shed and outbuildings. Bogus callers. Keeping your things safe. Internet safety.
// CRIME IS LOW IN LANCASHIRE We want to work with you to keep it that way. This section contains tips on how you can help to prevent crime and avoid becoming a victim of crime. Click on the contents below
More informationREGULATION E DISCLOSURE
MIDLAND NATIONAL BANK 527 N MAIN STREET PO BOX 427 NEWTON KS 67114 (316)283 1700 REGULATION E DISCLOSURE ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE For purposes of this disclosure and agreement
More informationNational Security Systems Inc (800)457-1999. Security System User's Guide
National Security Systems Inc (800)457-1999 Security System User's Guide Security System Glossary As security system technology has evolved, a special jargon has developed. Some terms widely used within
More information2015-16 Canyon Rim Academy Emergency Preparedness Plan
2015-16 Canyon Rim Academy Emergency Preparedness Plan I. EMERGENCY TEAM MEMBERS... 2 II. EMERGENCY TEAM DUTIES... 2 III. OTHER PERSONNEL DUTIES... 3 IV. COMMAND CENTER... 3 V. COMMUNICATIONS... 3 VI.
More informationCar Security Begins at Home
Please print out and complete this form to reduce the risk of car theft happening to you. In Australia, seven in 10 late model vehicles are stolen by the thief gaining access to the vehicles keys or transponder.
More informationAbington Bank 6 Harrison Avenue Abington, MA 02351 781 878 0045 TheAbingtonBank.com ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE
Abington Bank 781 878 0045 TheAbingtonBank.com ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE For purposes of this disclosure and agreement the terms "we", "us" and "our" refer to Abington Bank. The
More information*DD8108* ELECTRONIC FUND TRANSFER DISCLOSURE
ELECTRONIC FUND TRANSFER DISCLOSURE For purposes of this disclosure the terms "we", "us" and "our" refer to Central National Bank. The terms "you" and "your" refer to the recipient of this disclosure.
More informationDate: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No:
ISLE OF PALMS POLICE DEPARTMENT Thomas E. Buckhannon, III, Chief of Police 30 J. C. Long Boulevard Isle of Palms, South Carolina 29451 (843) 886-6522 BUSINESS SECURITY SURVEY Date: Business Name: Business
More informationSECURITY ENFORCEMENT AT MELIA BALI VILLAS & SPA RESORT
FOR IMMEDIATE RELEASE Contact : Evy Suryaningsih Public Relations Officer Phone : (62-361) 771510 Fax : (62-361) 776 880 E-mail : pr@meliabali.com SECURITY ENFORCEMENT AT MELIA BALI VILLAS & SPA RESORT
More informationSECURITY AWARENESS FOR WORK, TRAVEL & HOME
SECURITY AWARENESS FOR WORK, TRAVEL & HOME This easy-to-use Leaders Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the program and
More informationHOW CAN I PROTECT MYSELF?? You can start by learning some basic crime prevention information. For example, it helps to know:
Hunterdon County Sheriff s Office WHAT SENIOR CITIZENS SHOULD KNOW ABOUT CRIME PREVENTION 8 Court Street PO Box 2900 Flemington, NJ 08822-2900 908-788-1166 sheriff@co.hunterdon.nj.us CRIME IS A FRIGHTENING
More informationDEBIT CARD AGREEMENT AND DISCLOSURE
DEBIT CARD AGREEMENT AND DISCLOSURE Your Rights and Responsibilities The purpose of this disclosure is to make you aware of your rights and responsibilities when using our Debit Card. You have applied
More informationHotel Accessibility Pack
Thank you for considering the Hilton Garden Inn, Aberdeen City Centre. We are pleased to give you some information about our hotel that you may find useful when planning your visit. Arriving at the hotel
More informationSECURITY IN TRUCKING
SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS This checklist for fleet security has been compiled by the Private Motor Truck Council of Canada
More informationFrom a Private Investigator s Perspective: Conducting Dishonest Employee Interviews by Eric Echols, CFI
From a Private Investigator s Perspective: Conducting Dishonest Employee Interviews by Eric Echols, CFI Time and again, companies are faced with one of the biggest decisions they will have to makeone that
More informationHow Secure is Your Home?
How Secure is Your Home? About this guide: This is intended for residents to use as a guideline in evaluating how secure their home is, and to offer suggestions that may improve their security. Although
More informationGuide for Non-Profit Housing Societies Security Guide Table of Contents
Guide for Non-Profit Housing Societies Security Guide Table of Contents Chapter 1 - General Security Guidelines Chapter 2 - Target hardening Chapter 3 - Security window bars Chapter 4 - Anti-Graffiti solutions
More informationManor/Nursing Home Emergency Plan (Guide)
Manor/Nursing Home Emergency Plan (Guide) Version 2010 1 AUTHORITY All disaster planning in the comes directly under the Administrator. Authority is delegated by the Administrator to the various members
More information