Category Archives: Technology

Hospitality Industry Employee Risks: Hotel Management Company Files Suit Against Two Former Employees And Employer Claiming "Theft Of Confidential Documents"

 “…Hersha Hospitality Management LP has filed suit against two former employees and their new employer, claiming the former employees allegedly could have stole thousands of confidential documents before leaving to take their new jobs…”

 In a 17 October filing in U.S. District Court, Hersha said the employees engaged in a “web of deception” in their final days at Hersha before leaving for positions at The Procaccianti Group, a private real-estate investment company. Before leaving, Hersha said in the filing, the two recruited two other key Hersha employees to also leave. The two denied recruiting the other executives, Hersha said in the filing.

By way of a computer forensic examination, Hersha also found the two former employees potentially stole “thousands” of sensitive computer files. “(Hersha) is now faced with the real possibility that its direct competitor, TPG, could have access to its most important competitive secrets and strategies,” Hersha officials wrote in the filing. “Upon information and belief, TPG encouraged this conduct by offering the former (Hersha) employees substantial raises in a blatant effort to harm (Hersha) by raiding its top managers and by inducing them to commit wrongs.”

 

A call to TPG president and CEO James A. Procaccianti was returned by the company’s director of communications Ralph Izzi, who said it is TPG’s policy to not comment on pending litigation. A Message left by HotelNewsNow.com with Hersha president and CEO Naveen P. Kakarla was not returned by deadline Friday.

 

For more:  http://www.hospitalitynet.org/external/4053560.html

 

2 Comments

Filed under Crime, Labor Issues, Liability, Management And Ownership, Privacy, Risk Management, Technology, Theft

Hospitality Industry Property Risks: New York Hotel Elevator Malfunctions And "Plummets" 8 Floors

 “There was an elevator malfunction… Our security team responded to the incident immediately… All guests were safely evacuated… We are ensuring the elevator car in question undergoes a thorough inspection…”

 They got into an elevator and headed down from the rooftop terrace, but when another couple got in on the 16th floor, the compartment dropped and plummeted eight floors before stopping.

The group, which also included British actor Guy Burnet, actress Rosie Fellner and comedian Seth Herzog, was leaving the afterparty for new movie Janie Jones at the Gramercy Park Hotel in Manhattan on Thursday night (27Oct11).

Janie Jones director Rosenthal tells Nymag.com, “We’ve all had a couple of drinks… and we’re just piling into the elevator… Everyone is yelling and hooting… (The couple) decide to jump in, and as soon as they jump in, the thing starts plummeting down. His girlfriend is lucky she didn’t get killed because her foot was barely inside the door when the elevator dropped. I think we fell eight stories before the emergency brake went off. We initially thought we’d gone all the way to the basement and bounced on the springs.”

Emergency services were called to the scene, but the frustrated group decided not to wait, and took action themselves, climbing out of a gap in the doors onto a floor.

For more:  http://www.hollywood.com/news/Actors_trapped_in_elevator_fall/8028652

Comments Off on Hospitality Industry Property Risks: New York Hotel Elevator Malfunctions And "Plummets" 8 Floors

Filed under Guest Issues, Injuries, Liability, Maintenance, Management And Ownership, Risk Management, Technology

Hospitality Industry Cyber Crime: Washington Hotel Room Used By "Identity Theft" Ring Exposed By Credit Card Company Alerting Card Owner Of Hotel Room Booked At Hotel

“…The man’s credit-card company had alerted him that someone using his card had booked a room there…”

“…Police say the search turned up cell phones, lap top computers, computer hard drives, iPod touches, electronic storage devices, magnetic card readers, routers, hotspots and computer peripherals…”

Police have arrested two men and say a search has turned up evidence that there may be more victims of identity theft. Police say they have yet to determine how many vicitms there might be.

Just after noon on Tuesday, East Precinct patrol officers met a man in the lobby of the Silver Cloud Hotel in the 1100 block of Broadway. Officers went to the room and found two men.

In the room, they saw several cell phones, laptops, a WiFi hotspot, router and papers with credit-card numbers.

Detectives with the fraud, forgery and financial explotation unit got a warrant to search the room and the suspects’ vehicle.

For more:  http://www.seattlepi.com/local/article/Seattle-cops-may-have-busted-identity-theft-ring-2239352.php

Comments Off on Hospitality Industry Cyber Crime: Washington Hotel Room Used By "Identity Theft" Ring Exposed By Credit Card Company Alerting Card Owner Of Hotel Room Booked At Hotel

Filed under Crime, Guest Issues, Management And Ownership, Privacy, Risk Management, Technology, Theft

Hospitality Industry Internet Issues: Hotel "Wi-Fi Networks" Are Facing "Exponentially" Higher Demand From Guest Usage Of iPads; Investment In More Bandwidth Necessary

“…Some hotel Internet service providers are proposing a solution that offers tiered Wi-Fi service. The lowest level, suitable for basic Internet requirements like checking e-mail, would be free, but other levels would be priced depending on bandwidth requirements…”

 “… iPads consume four times more Wi-Fi data per month than the average smartphone…”

Largely because of the broad use of iPads and other mobile tablets, which are heavy users of video streaming, the guest room Wi-Fi networks that most hotels thought they had brought up to standard just a few years ago are now often groaning under user demands.

“The iPad is the fastest-selling device in consumer electronics history, and because of it the demand placed on any public place Wi-Fi system has gone up exponentially in the last year and a half,” said David W. Garrison, the chief executive of iBAHN, a provider of systems for the hotel and meetings industries.

This means more hotel customers are unhappy with their Internet connections. Hotel owners, meanwhile, who are digging out from a two-year slump caused by the recession, will probably have to invest more money to provide more bandwidth.

For travelers, it may mean still another fee, since hotels will be paying their own Internet bills.

For more:  http://www.nytimes.com/2011/10/25/business/ipads-change-economics-and-speed-of-hotel-wi-fi-on-the-road.html

Comments Off on Hospitality Industry Internet Issues: Hotel "Wi-Fi Networks" Are Facing "Exponentially" Higher Demand From Guest Usage Of iPads; Investment In More Bandwidth Necessary

Filed under Guest Issues, Maintenance, Management And Ownership, Technology

Hospitality Industry Fire Safety Risks: "Fire Sprinkler" Shutoff Tool Can Minimize Water Damage From Accidental Activations

“…The amount of water that comes out of a fire sprinkler head can fill a bathtub in 2 minutes. Sometimes guests panic and don’t report the problem immediately which results in serious water damage. Or worse, the sprinkler water shut off system is in a room with a locked door…”

Shutgun is a one-handed tool that shuts off fire sprinkler heads fast and it fits comfortably in his pocket.

Hotels and accidental fire sprinkler activations seem to have their own dynamic. What seems to set them apart from other buildings is that few places have the constant influx of diverse visitors that a hotel does. The fact that in many hotel rooms there are signs that say, ‘Please do not hang garments from the fire sprinkler heads’, is a clear message that accidental fire sprinkler activations are not an uncommon occurrence.

More than once a wedding gown has been ruined just prior to the wedding by an unsuspecting bride-to-be hanging her dress from the sprinkler head. It is not hard to imagine. Wedding dresses with their long trains often don’t fit properly in closets. The sprinkler head looks high enough that once hung there the dress will not wrinkle. Unfortunately, when a sprinkler head is activated the dress is ruined beyond repair.

Other common activations can be caused by something as simple as a maid flicking a bed sheet that gets caught in the sprinkler head or a painter getting a dab of paint on the sprinkler head then trying to rub it off or kids having a pillow fight.

Read more: http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2011/10/21/prweb8894292.DTL#ixzz1bQLJSpp7

4 Comments

Filed under Guest Issues, Insurance, Liability, Maintenance, Management And Ownership, Risk Management, Technology, Training

Hospitality Industry Guest Room Security: "Mobile Phone Master Key ByPass" Technology Allows Instant "Neutralizing" Of Lost Or Stolen Master Keys

“…when a master key is lost or stolen, each and every lock must be manually re-programmed to ensure that anyone finding the master key cannot open every door in the hotel…”

 Hotel managers have long experienced the logistical and costly hurdles of having to manage the loss of staff master key cards. With the uptake of Mobile Key by OpenWays – the industry’s first and only ubiquitous mobile phone guest front desk bypass method allowing the unlocking of guestroom doors – hoteliers have been quick to realize the additional opportunity to help mobilize their workforce. As a result, OpenWays announces the launch of Mobile Master Key.

Appropriate administration of master keys is critically important for the safe and secure management of any hotel.

With OpenWays Mobile Master Key, neutralizing a lost or stolen master key happens simply with the push of a button. There are no locks to walk to and reprogram. It’s a highly secure and easy process. Since reporting the loss now has limited consequences, staff members are more inclined to immediately report a loss vs. trying to find their plastic card for hours before eventually reporting the loss to hotel security.”

For more: http://www.hospitalitynet.org/news/154000320/4053444.html

Comments Off on Hospitality Industry Guest Room Security: "Mobile Phone Master Key ByPass" Technology Allows Instant "Neutralizing" Of Lost Or Stolen Master Keys

Filed under Guest Issues, Labor Issues, Liability, Maintenance, Management And Ownership, Privacy, Risk Management, Technology

Hospitality Industry Social Media Risks: Hotel Management Must Asses Legal Risks Related To All Advertising Media Including Trademarks, Copyrights, Privacy And Data Security

“…from a risk-management and legal perspective, social media public relations, marketing and advertising efforts frequently present legal risks that are not always fully appreciated either by managers and directors, or those charged at the operations level with implementing the plans…”

The potential legal risks are wide-ranging and cover areas such as trademarks and copyrights, rights of publicity and privacy, data security, labor and employment issues, and the like. They also include compliance with the rules and regulations of state and federal agencies, such as the Federal Trade Commission.

  •  The potential legal risks are wide-ranging and cover areas such as trademarks and copyrights, rights of publicity and privacy, data security, labor and employment issues, and the like.
  • There is no reason not to proactively review the avenues of social media and begin the process of developing guidelines to mitigate risk. 
  • Fundamentally, a significant number of arising issues are no different than they are in traditional advertising mediums and require nothing more than policy tweaking.

For more: http://www.hotelnewsnow.com/Articles.aspx/6715/How-to-manage-legal-risks-of-social-media

2 Comments

Filed under Guest Issues, Insurance, Labor Issues, Liability, Management And Ownership, Privacy, Risk Management, Technology, Training

Hospitality Industry Guest Information Risks: Hotels Are Collecting More Personal Information On Guests And Protecting "Personally Identifiable Information" Is Top Priority

“…ensuring the security of this data is so important that it’s consuming hotel IT departments’ attention right now, said Josh Weiss, Hilton Worldwide’s VP of brand and guest technology…”

 “…The stakes involved in protecting “personally identifiable information” (data that can be used to uniquely identify, contact or locate a single person) are far higher with this personal information than with credit-card information…”

As hotels collect more personal information about guests and the Epsilon and Sony data breaches earlier this year shook people’s confidence in corporate data protection, hotel guests are increasingly asking hotels how well they’re securing their personal information, Mark McBeth, Starwood Hotels’ VP of information technology, said during a recent conference.

IT execs from Starwood and also Hilton and owner/operator White Lodging said they’re responding by making guest-data security their No. 1 priority. “PII is considered high-risk because if there were to be a breach, you’re exposing the guest’s identity,” he said. “It paints some pretty scary pictures.”

A “PII” breach could potentially lead to child abduction or a murder if information falls into the wrong hands, he said.

For more:  http://travel.usatoday.com/hotels/post/2011/10/starwood-hilton-work-to-protect-personally-identifiable-information/553616/1

Comments Off on Hospitality Industry Guest Information Risks: Hotels Are Collecting More Personal Information On Guests And Protecting "Personally Identifiable Information" Is Top Priority

Filed under Crime, Guest Issues, Insurance, Maintenance, Management And Ownership, Privacy, Risk Management, Technology, Theft

Hospitality Industry Information Security: Major Hotels Move Closer To "Secure Payments Framework" That Will Protect Guest Credit Card Data Through "Tokenization"

 “Every major hotel company is working to get as many of their systems as possible out of the scope of the Payment Card Industry Data Security Standards (PCI-DSS)…Most of these companies have focused on solutions based on tokenization, and many have implemented them or are in the process of doing so.”

Tokenization is a process whereby sensitive card data is stored in a single secure location, which may be operated by a hotel brand, a payment gateway or another third party, and replaced in hotel systems by substitute “tokens.”  The tokens can be used to complete the transaction, but are useless if intercepted electronically by a thief. 

Top hotel security executives met several times to discuss this problem as the HTNG Secure Payments Framework effort took shape during August and early September.  Early discussions indicated a broad agreement that a single industry framework is needed, and that the framework needs to work with existing security approaches in place at major hotel companies and in commonly used systems.  There was also agreement on the key elements needed for the industry framework.  The group intends to document this framework conceptually in a white paper that will form the basis for subsequent standards development.

  This new effort will leverage hotel companies’ prior investment in tokenization efforts, adding a layer of security that will enable those solutions to be extended to unrelated parties that may be involved in transactions, such as online travel agencies, global distribution systems, switches, channel management systems, central reservation systems, management companies, independent hotels, payment gateways, swipe devices, and other parties.  “The approach is intended to enable the tokenization of card data by the first system that touches the reservation,” said Rice.  “The sensitive data will remain stored in a secure vault, and all of the other systems will simply pass along the token in place of the credit card.  The hotel itself can then submit the token to its token provider or gateway to complete the card transaction.  The card data itself need never touch a hotel system.”

For more:  http://www.hotelnewsresource.com/article58324.html

Comments Off on Hospitality Industry Information Security: Major Hotels Move Closer To "Secure Payments Framework" That Will Protect Guest Credit Card Data Through "Tokenization"

Filed under Guest Issues, Liability, Maintenance, Management And Ownership, Privacy, Risk Management, Technology

Hospitality Industry Marketing Risks: Hotels Are Increasingly Reacting To "Negative" Postings On Social Media Sites As Guests Go "Online" Rather Than To Management

Social media has empowered consumers, forcing companies to be more transparent and responsive. That’s a good thing. But hotels have always been responsive, if not transparent. Lodging a complaint is as simple as marching up to the front desk.

So why is it that some guests, upon encountering an issue, log on to Twitter or Facebook and bring it to the attention of their entire social graph instead of to the one person who can fix it the problem: the manager?

  • Monitor review sites and social networks closely. Even if you aren’t active on them many of your guests likely are.
  • Respond quickly to all feedback, positive or negative.
  • If comments are negative, attempt to take it offline.
  • When responding to negative reviews and commentary, always thank, apologize, explain, invite back and follow-up. No excuses, and no bribes.
  • If guests are still on property, don’t let them leave until you’ve won them over. Convert twerrorists into twadvocates, so to speak.
  • If comments are offensive, abusive or repetitive, you have the option of ignoring them. Tweets have the shelf life of tuna sushi in the desert sun; Facebook wall posts can be deleted. Sanitize, but don’t censor.
  • A social media policy and guidelines will help minimize risks and prepare you to act swiftly to minimize fallout.
  • The more helpful and engaged employees are with guests the more likely guests will be to bring issues to their attention before logging on to Facebook.

For more:  http://www.htrends.com/researcharticle58059.html

Comments Off on Hospitality Industry Marketing Risks: Hotels Are Increasingly Reacting To "Negative" Postings On Social Media Sites As Guests Go "Online" Rather Than To Management

Filed under Guest Issues, Management And Ownership, Risk Management, Technology, Training