Tag Archives: Credit Cards

What’s your data breach response plan?

data breach

While businesses prefer to avoid cyber perpetrators entirely, these days nearly all organizations are at risk of a breach.

As the number of incidents (and claims) continues to rise, the prudent strategy is for firms to not only work diligently to prevent an intrusion, but also to have a plan in place to respond quickly and effectively if they suspect information has been compromised.

A data breach response plan proactively outlines the necessary actions a business must take, providing a framework that can be regularly matched against emerging risks and updated if the firm’s situation changes — for example, if additional staff are added in key data privacy or technology roles or if partnerships are formed that could change the way sensitive information is processed.

Developing a data breach response plan, one that is easy to follow and quick to implement, gives businesses time to prepare the necessary resources and mitigate the damage an exposure can inflict. Leaving key tasks to the last minute, such as scrambling to identify qualified outside legal counsel, is unwise and can significantly impact the timeliness and expense of a breach response. Likewise, pulling the plug on a single server without seeking guidance from an experienced technology expert may not shut down the unauthorized access that caused the exposure, thus leaving the business open to further harm. Worse, it may even erase key information a computer forensics company may need to assist the investigation. Getting the firm’s ducks in a row in advance of any breach is a far more effective cyber mitigation strategy.

One component of many small business breach response plans is accessing the financial and technical support available through a well-structured Cyber Liability insurance policy. Coverage options vary widely, so businesses (or the insurance broker) must carefully examine their needs before crafting a policy. For those firms with lean internal resources and thin financial margins, the right insurance can be a key asset when it comes to implementing a solid breach response plan. Below, three steps that will help organizations mitigate data breach disruptions before they occur.

1. Assemble the team

Who needs to be involved in responding to a breach? Before attempting to pull together more than a cursory list of post-exposure action items, it’s critical that the firm identify those individuals or groups that should be contacted in the event of a potential breach. The team will vary from one business to the next, but most organizations will want to include representatives from the executive group, legal (either internal or an outside consultant), privacy or information security, risk management, information technology, human resources and public relations.

Given the growing reliance on external partners — cloud providers, payroll processors and the like — firms should also consider where vendor touchpoints exist and how or when those third parties will contribute to the breach response process. They may need to be included on the contact list or they may even be responsible for raising the initial alarm if a breach occurs. It’s also important to ensure vendor contracts clearly spell out the company responsible when a breach occurs and who is liable for notifying those impacted. Other vendors are also commonly part of the response team, such as media relations consultants experienced in crisis management and notification firms with the resources necessary to quickly inform breach victims about the situation.

If the business has Cyber Liability coverage, the insurance company should also be part of the breach response plan. There are support services included in many policies that will be helpful in the event of an exposure, ranging from forensic investigation teams to data recovery specialists. To maximize the value of any applicable coverage, firms must be ready to access available features quickly and through the most efficient channels.

Click to read the article

Comments Off on What’s your data breach response plan?

Filed under Crime, Insurance, Liability, Management And Ownership, Risk Management

The Rising Cost of Money (Lodging Magazine)

money

Troubling events in the global economy—stock market volatility, weak growth in China, and plunging oil prices, among others—coupled with a moderate slowdown in industry growth, have hoteliers more cautious regarding new business opportunities. However, hiccups in the global economy do not mean the hospitality world stops turning. Hoteliers still find themselves in a time of healthy growth and industry dynamism, and many owners are looking to reposition their properties while the economy can support it.

That said, property improvements can still be expensive. This especially holds true for brand-mandated property improvement plans (PIPs), which some say have become increasingly aggressive in recent years. According to Boaz Ashbel, managing director of the Aztec Group, a full-service investment banking firm located in Miami, Fla., one of the main drivers of this push is the industry’s desire to capture the millennial demographic, whose footprint in the hospitality marketplace grows larger every year.” Many brands are changing the look and feel of their properties to try and appease the millennial traveler,” Ashbel says. “This is true both in new brands and in PIPs for established brands—all of the decision makers have the same goal, and it’s something that hotel owners and operators will have to tackle sooner rather than later.”

There are several situations in which hoteliers may find themselves facing an aggressive PIP or redevelopment project. One of the most common in today’s economic climate happens when a property changes hands. “If the hotel isn’t entirely up-to-date regarding brand standards, it may present a problem for a potential buyer,” Ashbel cautions. This is because when a hotel falls under new ownership, the franchise is not assumed by the new owner—he or she must apply for the flag as though they are applying for a new franchise. And, for a hotel to meet the requirements of a new franchise, it must reflect the latest brand standards. “An astute owner who is planning to sell a particular property is wise to order a change of ownership PIP from the brand before even exposing that hotel to the market,” Ashbel says.

Due to the very active state of the lodging marketplace, with a huge number of properties being bought and sold, most lenders know that every branded property they work with will likely have a PIP component. “Moreover, they should be demanding that the money that will be acquired for the PIP is going to be put up and reserved in closing exclusively for the PIP,” adds Ashbel, who says that every single transaction he’s seen in this time of high activity has had some sort of a PIP component.

And, per Ashbel, hoteliers looking to acquire a property and keep it branded, or rebrand it under a new flag, should always plan for investments in an improvement plan. “If the buyer doesn’t take these steps, she’s in for a rude awakening when she goes to sign her franchise agreement,” he says.

But what if you’re a hotelier who isn’t in the process of buying or selling a property but still needs to pay for a large-scale PIP or renovation? Peter Berk, president of PMZ Realty Capital, a hotel finance group based in New York City, explains that refinancing could be the answer if the hotelier doesn’t have the liquid capital on hand. “There is a lot of refinancing going on right now in the lodging industry for renovations and PIPs,” he says. For example, if someone has a $6 million loan pending due, and he needs to take on a major PIP, he can refinance the property for $8 million and have the lender hold back the difference for the PIP. “We see this type of situation quite often,” Berk adds.

Luckily for hoteliers, there are a wide variety of lenders in the hospitality marketplace who still have a lot of liquidity available for loans. “There are a bunch of lenders out there offering different types of loans—furniture, fixtures and equipment (FF&E) loans, credit funds, bridge loans, Small Business Administration (SBA) loans, commercial mortgage-backed security (CMBS) loans, regular bank loans—everything just depends on the hotel’s business plan,” Berk explains.

Jordan Ray, managing director of financial advisory firm Mission Capital’s debt and equity finance group, says that while there are many loan options out there, it is getting increasingly difficult to finance improvement plans. “As a whole, the financing business for hotels is certainly tighter than it was a year ago,” he says. Ray attributes this tightening to the high levels of supply in the lodging marketplace, especially in primary markets like New York City.

For more: http://bit.ly/1UtcEUC

Comments Off on The Rising Cost of Money (Lodging Magazine)

Filed under Finance, Hotel Industry, Management And Ownership

Insurance Helps Protect Against Data Breach Fallout

data

Joshua Gold of Anderson Kill speaks about the different types of insurance coverage to protect against data breaches at the Hospitality Law Conference. (Photo: Bryan Wroten)

The past year was a big year for data breaches in the hotel industry, and industry experts say there’s no sign of it stopping any time soon. That means hoteliers not only need to work on prevention, but they also need protection in case an attack does occur.

Panelists in the session “Nailing down responsive cyber coverage that responds to hospitality industry risks” at February’s Hospitality Law Conference told attendees that everything about the current digital age that makes it great, such as connectability and massive data storage, also makes it a risk.

Attempting to list all of the data breaches in the past 12 months would overwhelm the presentation screen, said Joshua Gold, a cyber-insurance attorney at Anderson Kill, and the problem continues to grow.

“It’s getting worse, not better,” he said.

Insuring for different scenarios
Darin McMullen, an attorney at Anderson Kill, said there are four overlapping causes of data breaches at a company:

  • Accidental internal, a common cause of breaches, occurs when an employee loses a device with company business data on it, and it might fall into someone else’s benign or malicious possession.
  • Accidental external breaches occur through third-party vendors or subcontractors who have access to a company’s system or network. While they’re not trying to compromise their client’s security, they may cause harm through their own negligence.
  • Intentional internal breaches happen when a disgruntled employee creates the breach. This can be a common problem in hospitality where turnover can be high. Employees don’t necessarily have to be high-level to access sensitive data.
  • Intentional external breaches are the more traditional hacking events caused by criminal organizations or hacker activists, or hacktivists.

“Some you have control over; some you have virtually no control over,” McMullen said, who added that hoteliers should review their insurance options to protect against different risk exposures.

Gold said he’s working on an insurance claim for a client who had a former employee introduce malicious code into the company’s system. The code fried every controller, he said, causing physical damage to real pieces of hardware. For a networking company, this was a huge loss.

“The insurance company is saying electronic commands can’t cause real property damage,” he said. “It is covered under the literal language, but they don’t want to set that precedent. We will have to sue them.”

When looking for different cyber-insurance policies, Gold said, it’s important to keep in mind all the potential scenarios as some have provisions that exclude what hoteliers might need and think would be included, such as the physical damage in his client’s case. He said hoteliers should work with a savvy broker who specializes in cyber-insurance packages. There are so many different primary forms out there, he said, which can change every three to four months based on what clients face.

For more: http://bit.ly/1TZLnue

Comments Off on Insurance Helps Protect Against Data Breach Fallout

Filed under Guest Issues, Hotel Industry, Insurance, Management And Ownership, Risk Management, Technology, Theft

Congress Cracks Down on Hotel Scams

congress

Imagine you’ve been planning all year for your family vacation at the beach. You find the perfect hotel—a spacious room with a view of the ocean and a big pool for the kids—and book the room using an online travel site. The whole family is excited for a week of surf, sand, and relaxation.

Everything is going great until you arrive at the hotel. After a few minutes of clicking around on the computer, the front desk woman asks you to spell your name again. Her brow furrows, and you start to worry. You are exhausted and just want to crawl into a clean bed and get some sleep. What is going on with this hotel room?

Now the manager arrives to help. “When did you make this reservation?” she asks. You tell her and you hear her typing some more. “Could it be under another name?” You feel a sense of panic as you shake your head no. What could be happening?

Finally, the bad news: There is no reservation. The website where you made your booking was a fraud, and now your dream vacation has become a nightmare. Many vacationers, and hoteliers, find themselves in this exact situation. According to the American Hotel & Lodging Association, millions of fraudulent bookings are made every year as these deceptive websites and call centers mislead vacationers by giving the appearance of being connected to a hotel, but actually have no legal relation to the brand or lodging property.

For consumers, the fraud takes several different forms. Unassuming guests could be charged additional hidden fees when they arrive, fail to get the accommodations they requested, lose expected loyalty points, or worse, they could learn that their reservation was never actually made. In the last year alone, close to 15 million reservations were made on such deceptive sites, resulting in hotel guests finding themselves out hundreds of dollars for either a worthless reservation or one that delivered much less than promised. It is estimated that these scams have cost upward of $1.3 billion per year in lost reservations, extra fees or charges, lost rooms, and costly inconveniences.

As you know, hotels are often mistakenly blamed for these fake reservations. Though they do all they can to assist swindled travelers, their reputation suffers as these stories are shared online or by word of mouth.

For these reasons, I have introduced bipartisan legislation with U.S. Reps. Ileana Ros-Lehtinen (R-Fla.) and Bill Shuster (R-Pa.) in Congress to help crack down on call center and online hotel scams. First, our legislation would require all third-party hotel booking websites to disclose, clearly and conspicuously, that they are not affiliated with the hotel for which the traveler is ultimately making the reservation. This new requirement would help consumers tell the difference between name-brand hotel websites and fraudulent ones masquerading as name-brand sites.

Second, our legislation would give state Attorneys General the ability to go after perpetrators in federal court with the same remedies available to the Federal Trade Commission (FTC). Today, only federal authorities can fully penalize individuals who commit online hotel booking fraud. If the offense is small, federal authorities may forgo prosecution to go after more expansive crimes. Giving state Attorneys General the ability to pursue damages and restitution for victims will leverage the power of all 50 states to hold fraudsters of all levels accountable and deter criminals.

Our bill would also require two provisions to help illuminate the true extent of these crimes. It requires the FTC to produce a report on the impact of these fraudulent sites on consumers and it encourages the FTC to simplify its online complaint procedure for reporting hotel booking scams, a request we have recently made in a letter to FTC Chairwoman Edith Ramirez.

My colleagues and I understand that online fraud is a serious problem for not only consumers, but also the entire lodging industry. It is also an especially significant issue for Florida, which is the top travel destination in the United States. With that said, I look forward to continuing to work with the AH&LA to move this important legislation forward to Congress, and tackle these scams. This way, travelers can get back to their vacations and hotels can focus on providing the world-class services that the American hotel industry is known for.

 

For more: http://bit.ly/1Qgrg7k

Comments Off on Congress Cracks Down on Hotel Scams

Filed under Crime, Guest Issues, Hotel Industry, Management And Ownership, Technology

How to Ramp Up Employee Cybersecurity Training

employee

In 2015, the hotel industry suffered unprecedented cyberattacks. In one month alone, Hyatt Hotels Corporation, Starwood Hotels & Resorts Worldwide and Hilton Worldwide Holdings all fell prey to savvy cyber thievery.

Hyatt confirmed hackers used malware to collect cardholder names, card numbers, expiration dates and verification codes from at least 250 hotels globally. Just a few days after the company announced its planned merger with Marriott International, Starwood Hotels also stated malware had been used to steal credit and debit card data that was found on point-of-sale cash registers.

Hilton also began investigating credit card breaches at several of its properties, including its Hilton, Embassy Suites, DoubleTree, Hampton Inn and Suites, and Waldorf Astoria Hotels & Resorts brands. Hilton confirmed the breach and, much like Hyatt and Starwood, cited unauthorized malware that targeted payment card information in point-of-sale systems as the cause of the breach. Additional hotels targeted by hackers in 2015 included The Trump Hotel Collection, Mandarin Oriental and White Lodging Services Corporation.

To help prevent breaches, management should take steps to clearly define employee policies and procedures, which include:

Create protocols for access and transfer of sensitive information

Once a hotel has its IT network secure, only certain individuals should have access to the data. Further, user activity should be monitored using insider threat detection solutions that notify management of suspicious activities, both externally and internally. This includes monitoring applications for phones or computers that have access to sensitive data.

Hoteliers should tighten all network security. Simple ways to help accomplish that include:

  • ensure logins expire after short periods of inactivity;
  • require strong passwords that are never written down in public or unsecured locations; and
  • scan devices for malware every time they are plugged in.

Confirm that off-site technology is secure

Data housed off-site should be routinely backed up, and hoteliers should ensure that Web application firewalls are cloud-based solutions that are secure and encrypted. Hoteliers also should use top-notch anti-malware software and update it routinely.

Securing paper files that might include personal information

Employee files are a major target area for data breaches by way of paper files. They are typically easy to access (particularly in smaller hotels) and provide a significant source of data for a low-tech inside job.

Employee files also might include medical information protected by HIPAA. According to the Department of Health and Human Services, hacking has been involved in the HIPAA breaches of nearly 3 million patient records since 2009. Employees across all industries, including hospitality, should be aware that this highly sensitive information needs to be protected.

For more: http://bit.ly/1mHKrMn

Comments Off on How to Ramp Up Employee Cybersecurity Training

Filed under Crime, Employee Practices, Hotel Employees, Hotel Industry, Management And Ownership, Risk Management, Training

Enhancing Check-in and Loyalty with ID Verification Solutions

Loyalty

There’s no weariness quite like the fatigue and impatience that sets in at the end of a long day of travel. You’ve made it through security gauntlets, cramped seats, noisy kids, and traffic to arrive at your destination. What’s next, a long line of your fellow crabby travelers, or a quick trip straight to your comfy room and minibar? As an hotelier, you know which of these customer experiences translates into greater loyalty, advocacy, and revenue.

 

When it comes to business and personal travel, customer expectations have always been high; customers increasingly expect more convenience, personalization, and flexibility from hospitality brands. Online booking options, mobile technology, and social media reviews have made the market intensely competitive. Customer loyalty is a key driver for revenue growth and competitive advantage. In fact, a recent Forrester study commissioned by Sabre Hospitality found that a 1-point score increase on their Customer Experience Index provides $6.52 in annual incremental revenue per customer—a significant cumulative impact, especially for larger brands.

The same study found that two-thirds of leisure travelers and more than half of business travelers claim they are not loyal to any hotel brand. The study’s findings point to intelligent applications of technology and data as primary avenues for improving customer experience and loyalty, with an emphasis on integrated enterprise solutions. Feel-good experiences engender loyalty more surely than cost or convenience, and loyalty translates directly to good news for the bottom line. How can we begin to incorporate technology that leaves customers raving about their experience and returning for more the next time they travel?

One of the big pain points for customers—the dreaded check-in process—presents a huge opportunity for hotels that extends well past what happens at the front desk. Solutions for scanning and verifying IDs and passports, including mobile scanning and self-service kiosks, are transforming the check-in process and providing a key link between customers and data-driven, integrated hospitality platforms. With mobile scanning, check-in can begin anywhere (even remotely) and be completed in less time with fewer errors. Advanced scanning solutions quickly and accurately read all data off drivers’ licenses, passports, and other official identity cards, automatically populate data records and store a digital replica of the ID for regulatory and security purposes.

Once a guest’s ID data has been scanned into records, it can then be cross-checked with other databases (DMV, credit bureaus, etc.) to verify the customer’s identity. The data can also be connected with the hotel’s enterprise systems for security, billing, and customer service management, as well as personalization and loyalty programs. The ability to quickly and accurately gather this data at the point of entry eases and enriches all the subsequent processes and interactions that rely on such data. These days, customers expect that you have their information and will use it to provide them with a more polished and personal experience. The information scanned at check-in can also be used for seamless sign-up to loyalty programs. Hotels and casinos have found that insights and information gleaned from this data allow them to tailor rewards to guests’ preferences and analyze guest spending patterns in response to various promotions.

A recent Software Advice study of hotel guest preferences found that 60 percent of respondents would be more likely to choose a hotel that allows check-in and keyless entry via smartphone, and 37 percent are more likely to choose a hotel with lobby technology such as self-service kiosks. This follows the general preference of Millennials for automated customer service options. It’s also reassuringly good news for hotels striving to deliver better customer service while controlling staffing costs. Front desk agents can spend more time on personal greetings, solving exceptions, and addressing complaints when they are freed from manual data entry tasks. A serene, smoothly run lobby makes for a more welcoming space than one crammed with guests waiting to check-in.

For more: http://bit.ly/1QcmxGI

Comments Off on Enhancing Check-in and Loyalty with ID Verification Solutions

Filed under Crime, Guest Issues, Hotel Industry, Management And Ownership, Risk Management, Theft, Training

The 2016 Hospitality Law Conference

hospitality

Intensive Hospitality Education. Exceptional Networking. It’s Not Just for Lawyers.

From development deals to management agreements, from food and beverage liability to labor and employment, and from claims management to anti-trust issues, the latest cases, trends and challenges in compliance, finance, law, risk, safety, and security are up for exploration at the 14th Annual Hospitality Law Conference, February 22-24, 2016.

The Owner Management Summit, co-located with The Hospitality Law Conference – 2016, intersects legal, finance and technology and includes sessions on: who owns the data, who is responsible for the data, development and unwinding management contracts.

The Hospitality Insurance and Loss Prevention Summit, co-located with the Hospitality Law Conference, includes sessions on risk management, the top claims in 2015, and coverages for cyber & data breaches.

Hotel and Restaurant Corporate Counsel have several opportunities to meet with their peers in facilitated conversations to explore common challenges, solutions and law department management.

Also featured during The Hospitality Law Conference – 2016, are break-out sessions and roundtables in Food & Beverage, Lodging, and Human Resources & Labor Relations.

Join Petra Risk Solutions’ very own Todd Seiders for, “Discussion of Most Frequent Claims and How to Prevent Them”

 

Todd Seiders - Petra Risk SolutionsSlips, falls, breaks, disruptions.  If you are involved in the hospitality industry, you face very real threats to your financial well-being and your reputation.  A security breach at your property, a slip by a patron, a defect in construction, or a natural disaster are examples of problems that could and should be addressed by your risk management program and your insurance.  In this session, Todd Seiders, Director of Loss Control at Petra Risk Solutions, and Allen Wolff, Insurance Recovery Attorney with Anderson Kill, will identify and analyze some of the most frequent claims that arise in hospitality industry and will offer analysis and insight for managing the risk of such claims, mitigating the losses caused by them, and obtaining insurance coverage for them.

Click here for more infomation on: TODD SEIDERS
And for more info on the conference: http://bit.ly/1KfrDiI

 

Comments Off on The 2016 Hospitality Law Conference

Filed under Conferences, Hotel Restaurant, Management And Ownership, Risk Management

Credit Card Switch: Is Your Hotel Compliant?

Credit Card

Following the nationwide EMV liability shift on Oct. 1, in-person credit card transactions in the United States are safer and more secure than ever before. Instead of swiping a credit card, vendors will be required to scan a high-tech chip that creates a unique code for each transaction. This means consumer information will be more difficult to duplicate, leading to increased data safety. Additionally, the widespread use of EMV (Europay, MasterCard, and Visa) microchip technology protects vendors—including hoteliers—from liability in cases of fraud. And, now that the country has finally caught up with global security standards, the long-term maintenance and success of the program is of the utmost importance.

According to Karen Cox, vice president of payment and retail solutions at Toronto-based payment processor, Moneris, U.S. vendors are in a very advantageous position as this solution spreads throughout the country. “Because the United States adopted EMV technology after other major markets, there have already been solutions developed for common issues, making the process easier,” she explains.

Most properties have already installed the POS hardware that include chip readers, but as the new EMV systems are fully integrated, hoteliers may need to add new processes during transactions. “You have to prove that the card is at the hotel for the transaction, so even if guests book with a credit card online, they may need to present the card during check-in and either sign or enter their PIN,” Cox says.

However, once the system is adopted and processes have evolved to facilitate the technology, keeping EMV technology up to date should not be an issue for most hoteliers. “The chip technology is very solid,” Cox describes. “There will likely be software updates, but if the properties keep up with the regular maintenance and renewal processes, they shouldn’t have any issues.”

While some hotels may not be using EMV technology yet, Cox recommends that these entities implement the systems as soon as possible. She adds that hoteliers who don’t know where to start should partner with a provider that can provide end-to-end solutions for the EMV shift.

For more: http://bit.ly/1N6JVAS

Comments Off on Credit Card Switch: Is Your Hotel Compliant?

Filed under Guest Issues, Hotel Industry, Management And Ownership, Risk Management, Technology

Management Update: “How to Future-Proof Your Hotel Company”

Smart hotel executives spend time dealing not only with the challenges of today but also the challenges of tomorrow. I don’t mean tomorrow as in the day after today. I mean tomorrow as in the future, six months from now, five years from now.

Our copycat industry is historically bad at this. We often take note of obstacles only after we’ve hit them head on. In a daze, we then rush to adopt the tactics of our nearest competitor.

Why? Maybe we’re not looking far enough ahead. Or maybe we’re not looking for the right signals ahead.

Across all industries, executives’ future-proofing exercises typically revolve around the proverbial Next Big Thing—what’s coming down the pike that’s going to change the world as we know it.

During a keynote at this week’s Marketing Outlook Forum, J. Walker Smith of the Futures Company suggested a different tact: The “Vanishing Point” approach.

It’s hard to spot the “Next Big Thing,” Smith said. When they first materialize, they’re often too small to notice. And they come on quickly, which makes it difficult to react when you finally do notice them.

Vanishing Points are the opposite, Smith said. They are the points at which big, established factors of influence wane out of relevance. That creates a vacuum that must be replaced by something new.

Spot them early, and you can begin to anticipate what will fill the void.

It’s like a big tree falling the in the forest, Smith said. That allows sunlight to penetrate the canopy and foster growth for something new.

An example: Screens are getting smaller. What once was a desktop became a smaller laptop which became a smaller tablet which became a smaller smartphone. Now wearables are on the rise, and screens are getting even smaller.

“This is the big vanishing point,” Smith said. “The active digital screen is going away. It is being replaced by sensors, or passive digital.”

Shoes will connect to Google Maps and buzz the right or left foot depending on which way you need to turn. Embedded technologies will track your health and fitness.

Instead of inputting data into a screen, sensors will track your behavior and send you information before you even know you needed it, Smith said.

He called it the “pivot to passive.” In the ecommerce space, Amazon is working to patent anticipatory shopping software that sends you products without you even putting them in your online shopping cart.

Think of that in travel context, Smith imagined. The agonizing booking funnel becomes an intuitive, anticipatory process that actively monitors your behavior and schedules a hotel stay accordingly.

Will it happen tomorrow? I hope not. (I’m not ready for buzzing shoes.) But it could happen one day. Maybe it will even be the Next Big Thing. Time to get out in front of it.

For more: http://bit.ly/1LGI05j

Comments Off on Management Update: “How to Future-Proof Your Hotel Company”

Filed under Hotel Industry, Management And Ownership, Technology

Tech Update: “Hotel Apps – Nightmare or Blessing?”

Most hotel chains and many individual hotels have their own hotel apps – a small program for smart phones, which is supposed to facilitate the check-in process, provide additional information, replace the room key card, and eventually support and facilitate the next booking at the hotel.

But are apps really the ultimate solution? These small programs can easily turn into an expensive exercise and they have to be programmed for the various operating systems. Most importantly, an app should be embedded in a centralized guest-oriented IT structure.

The hotel business is often compared with the airlines business. This is, however, misleading, as frequent travelers – the target group hoteliers like to attract – mainly use the same airline. Surveys show, however, that this is not the case when it comes to choosing a hotel. On average, a frequent traveler has four loyalty cards from different hotel companies and eventually has to get used to several apps. Is this a client-oriented approach or just an IT trend, which managers cannot resist to follow?

At the beginning of the Internet age IBM’s slogan was “Jump in!”. But not the ones who just jumped in and followed the latest trends have become or are successful, but those who took some time to verify, analyze and then deliberately chose the right – client-focused – strategy.

On the one hand, an app has to suit the respective overall concept; on the other hand, it has to be accepted by the guests. This is the main difference between the OTAs that focus on the guest, and many hoteliers, who just love their product. The guest should always be in the focus. This rule is taught to every trainee or student in the first year of apprenticeship or studies.

The figures show that consumers increasingly consider apps as annoying. The result is that downloads are stagnating considering the increasing share of smart phones in the total market. Travel apps only come in seventh in the download ranking. There is not even a separate category for hotel apps.

For more: http://bit.ly/1OZ8AdN

Comments Off on Tech Update: “Hotel Apps – Nightmare or Blessing?”

Filed under Hotel Industry, Management And Ownership, Technology