Skip to main content

Home/ Hospitality Technology/ Group items tagged legal

Rss Feed Group items tagged

natashacastro

What Are the Disadvantages of a Human Resource Management System? | Chron.com - 0 views

  • Human resources management systems offer efficient digital management of your employee data. You can monitor everything from benefits to payroll and paid time off with a few clicks on your computer. This makes your HR functions quick, but it doesn't always make them better.
  • Your employees entrust you with personal information. Everything from Social Security numbers to private health information and marital status gets stored in your HR management system. Several layers of management may have access to that information. In addition, a non-management employee may engage in identity theft and access a fellow employee's sensitive data. Such a breach of security with your management system can embroil you in legal problems and create poor employee relatio
  • ecause HR management systems do such a good job of listing employee accomplishments, certifications and degrees, managers may be tempted to promote based on the objective data your system provides. This may discourage supervisors from taking the time to get to know employees on a personal basis as part of their evaluation of what staff members can contribute to your company. The U.S. Office of Personnel Management points out that computerized employee evaluations can result in an impersonal narrative from the supervisor. Such evaluations may not be the most reliable guides for making decisions about promotions.
  • ...1 more annotation...
  • our system can contain so much data that you may find it difficult to analyze. You may need a separate analysis system just to sort the data into meaningful chunks
  •  
    This article examines the disadvantages of a human resource management system. Employees give all of their personal information from their social security to martial status. One obvious disadvantage to having all of this information is a security breach which could create legal problems if employees choose to take on legal action. Another negative to HRIS that is discussed in the article is the finances involved with using this system. Another cost would be training the staff to learn how to use the HRIS system. Throughout the entire article I thought this negative stood out the most. With so much information in the system, it could be difficult for any owner/manager/ or employee to analyze. It could be hard to generate reports and/or identify patterns, according to the article.
Yunfan Wu

TECHNOLOGY, MEDIA & TELECOMMUNICATIONS ISSUES IN THE HOSPITALITY SECTOR - Al Tamimi & C... - 0 views

  • Using hotels as a basic reference, one key area where specialist TMT legal support is essential is in respect of technology. 
  • Most hotels employ a combination of ‘off-the-shelf” and customized software applications in order to manage a variety of functions, such as reservations and F&B inventory. Such software applications must be appropriately licensed to the hotel by the software provider, and suitably maintained (eg. by an annual maintenance agreement with a service provider), so as to ensure that updates are applied and any errors in respect of such applications do not adversely affect operations.  Another example of the type of Technology work we handle is in advising some of the well-known international on-line travel or accommodation booking service providers about the extent to which their on-line activities may need to be licensed in the Middle East region.
  •  
    This is an interview between and head of hospitality practice and a technical specialist. They talk about the benefits the telecommunication skill brings to the industry, including to the hotels and  the customers.They also discussed some of the problems, such as the respetive practices overlap. The TMT team provide some legal support in this area.
cpaez007

Challenges to HRIS Implementation - HR Payroll Systems - 2 views

  • However, many companies make the mistake of getting wrapped up in the potential benefits and failing to properly address the challenges that come with HRIS implementation. Understanding what some of the top challenges to HRIS implementation are and how to address them can ensure greater implementation success.
  • Managing change is different from training, but can be addressed during HRIS training meetings. Additional support should also be available after training to help employees adapt to using the new system on a daily basis. Managers should clearly express how and when employees can reach out to discuss issues with the new changes, as with emails or specific office hours.
  •  
    This article discusses the integration of an HRIS system and its potential challenges. When getting the system, employees and management should really dedicate themselves in training with the new system. It is not something that can be learned so easily. In addition, there should be someone familiar assisting with the process, and this process includes the reason for the change. You will need to give the employees the reason why this is being implemented, and all of the new possibilities that can be accomplished. Some possibilities involve the maximization of the ROI. Another challenge includes the formulas within the system, it might be very difficult for users to understand or manage. The last few challenges include legal obligations, and the fact that legal rights are not impeded. The line must be clearly defined. Moreover, you want to ensure that all of the data placed on this system is secure. As long as these challenges are monitored, then the user will be fine.
shanegmark

Do job seekers' social media profiles affect hospitality managers' hiring decisions? A ... - 0 views

  • Social media plays an ever-increasing role in recruitment and selection
  • Likewise, many hospitality businesses are now using social media as a powerful recruitment tool, which is believed to be cost-effective and can quickly generate candidates for vacancies
  • Although SMPs could provide additional valuable information to hiring managers, they found that Facebook ratings actually did not do a better job in predicting job candidates' future performance, such as supervisor ratings of job performance, turnover intentions, and their actual turnover than the more traditional predictors, including personality, cognitive ability, and self-efficacy.
  • ...7 more annotations...
  • Moreover, they disclosed that recruiters using Facebook ratings tended to favour female and white applications, raising cautions of whether organizations can legally justify using SMPs in screening candidates.
  • According to their findings, job candidates' SMPs can also reveal personal information prohibited by the U.S. employment law.
  • Contradicting other studies that suggest social media has been widely used in employee screening (e.g., Kluemper et al., 2012; Sameen & Cornelius, 2015), the informants in this study hold reservations of such practices due to privacy concerns
  • LinkedIn was used by 45% of the informants (M2, M3, M5, M6, & M9) in screening candidates, but nearly all (10 out of 11) of the informants said they did not screen candidates' profiles on other social media networks than LinkedIn.
  • While most informants did not admit they screen candidates based on their SMPs, they showed favour to the following posts shared by the candidates: pictures about food, catering, and events (M1, M2, M3, M9, & M11), news articles (M4, M6, M7, & M10), organizational social activities (M3, M6, M7, M8).
  • Specifically, the informants looked for extroversion (M1, M3, M6, & M10), professionalism (M2, M5, & M6), good match (M6, M8, & M10), conscientiousness (M5 & M7), and agreeableness (M1 & M8), supporting the hospitality literature about the Big Five personality traits
  • Contrary to the business reports that suggests social media plays an increasingly important role in recruitment and selection (e.g., Becton et al., 2019; Evuleocha & Ugbah, 2018; Kwok, 2011; Ladkin & Buhalis, 2016), our findings suggest that hiring managers in the hospitality industry are screening candidates' SMPs with caution primarily due to the concerns of legal compliance.
  •  
    This research article looks at how social media has been used in recruitment for the hospitality industry. It highlights that while it has become common practice, there are many layers of concerns including it violating certain legal rights of potential employees, generating biased decisions based on gender and race, and the practice not producing demonstrably better results than hirings done without reviewing potential employee Social Media Profiles (SMPs).
isabelladlp

Confidentiality in the Hospitality Industry - 0 views

  • No specific laws govern confidentiality in the hospitality industry, but your contracts and policies should clearly dictate what degree of privacy customers can expect.
  • Hospitality businesses routinely swipe customer credit cards and may gain other sensitive financial data, such as a customer's bank account information.
  • If you inadvertently leak this data, you could be legally liable for your negligence, resulting in costly lawsuits.
  • ...18 more annotations...
  • If your connection isn't password protected, anyone can access the system.
  • And even with a password, computer-savvy network users can gain access to another user's data.
  • Hospitality workers don't have any special legal authority, so they can't physically restrain a customer. Instead, they should call the police if they suspect criminal activity.
  • Your company's confidentiality policy can educate customers about the amount of privacy they can expect.
  • If you promise a customer a specific amount of confidentiality and then break that agreement, you've broken your contract and can be sued.
  • No one can contract to engage in illegal behavior, and if someone is in immediate danger, it's your duty to take steps to protect him.
  • It also establishes guidelines for employees to follow, and a clear policy can even protect you against lawsuits.
  • The U.S. Supreme Court has established that hotel customers have a "reasonable expectation of privacy" in hotel rooms.
  • You can't enter or search a guest's room without her explicit consent, but guests are not entitled to any special privacy
  • As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality
  • confidentiality in employment is implicit, regardless of whether employees have signed an agreement.
  • If a member of your staff violates this explicit or implicit agreement, the penalty for breach of confidentiality can be severe and long-lasting.
  • an employee who signs this type of agreement agrees that a violation of confidentiality is also a violation of the employment contract. The penalty for breach of confidentiality isn’t restricted to employees who have signed confidentiality agreements,
  • if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of confidentiality.
  • Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims.
  • Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment.
  • As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.
  • Employers will not look favorably on any prospective employees who were terminated due to a confidentiality breach, or convicted of a crime related to that type of violation.
kayshap96

The importance of IT security in the hospitality industry | Marathon Professional Services - 0 views

  • The importance of IT security in the hospitality industry
  • One of the industries with the highest risk of security breaches in the hospitality industry. A large volume of customer data is handled on a daily basis, including card details, names and addresses.
  • All companies are legally required to meet certain expectations of data protection regulations, and as an IT provider, it is your responsibility to ensure that all IT infrastructure provided to your clients contributes to data protection.
  • ...4 more annotations...
  • With the number of security breaches worldwide each year, it is no surprise that more and more people are aware of their data being given to anyone, and knowing it is sufficiently protected. Each person needs to be able to trust their hotel or the place that they’ve visited to keep their details private at all times.
  • Perhaps the hardest to recover from is the damage caused to customer trust, and brand reputation, which can be difficult to rebuild. The result of failure to comply can also include significant financial penalties and legal complications where affected parties are able to seek compensation for insufficient security measures being taken to protect them.
  • Most businesses will now store the majority of their secure information on computers, which means their IT infrastructure needs to be able to restrict unauthorised access and prevent breaches. Without implementing security measures, a breach can result in downtime for your customers, which can be both costly and time-consuming. You should ensure that there are restrictions to access different levels of information, and implement all basic security features within their IT infrastructure such as usernames and passwords.
  • Having a plan for your customers to manage all the data that they have is also important, and the most effective way of doing this is to create an Information Security Management System, or ISMS.
  •  
    A large volume of customer data is handled on a daily basis, including card details, names and addresses. With the number of security breaches worldwide each year, it is no surprise that more and more people are aware of their data being given to anyone, and knowing it is sufficiently protected. All companies are legally required to meet certain expectations of data protection regulations, and as an IT provider, it is our responsibility to ensure that all IT infrastructure provided to your clients contributes to data protection. As the potential IT and Cyber attack, the customers are truly sensitive with their personal information privacy, especially when they stay in hotel, with all of their ID and financial information. The hotel should be more sensitive with our customer private information than they do, give our customer a relatively guarantee scenario in IT security in order to set them down without worries while they stay in the hotel or select the hotel when they booked. The more security in IT you give to them in both realistic life and promise, the more consumer will be glad to choose your hotel with an significant customer loyalty.
lvela051

Digital Marketing Strategies for the Hospitality Industry in Hyderabad - Digital Market... - 11 views

  • It has also been observed that those who embraced digitalization are enjoying profits now.
    • lvela051
       
      The biggest on going trend.
  • Today, if you are in the hospitality industry, there is no way out but embrace the digitalization that has become a part of it.
  • Trend #1: Video marketing
  • ...21 more annotations...
  • ranslate into longer visits to the websites, lower bounce rates, and better conversation and engagement.
  • Trend #2: Social marketing
  • important to promote social marketing to get the company’s reputation up.
    • lvela051
       
      creates brand loyalty.
  • Trend #3: Social Media Marketing
  • immense potential to reveal characteristics about demographic buying behavior and also helps to segment your customers.
  • social media platforms such as Facebook, Tumbler, LinkedIn, and Twitter for research.
    • lvela051
       
      Biggest platforms to advertise.
  • Trend #4: Wearable Technology
  • latest marketing strategy for the hospitality industry.
  • Disney magic band can be used as the key for the hotel rooms, in place of tickets and probably to plan their entire Disney holidays.
    • lvela051
       
      I have tried this and its very convenient.
    • lvela051
       
      Creating reports help to target audience and other aspects of the business.
  • Trend #5: Data Analytics
  • 60 percent on data analytics
  • analysed deeply to reveal customer behavior.
  • better services and stunning performances.
  • Trend #6: Mobile Marketing
  • A majority of the world’s population is constantly browsing on their mobile phones.
    • lvela051
       
      Smart phones and laptops are constantly marketing.
    • lvela051
       
      Standards that can affect and change based on success of the e-marketing.
  • Diversity
  • Safety and Security
  • Legal Issues
  • Demographics
  •  
    The article is highlighting the digital marketing trends in the Hospitality Industry today. Since technology has such a strong presence, in the world we live in, e marketing such as social media, video and social marketing are becoming more important in building brand loyalty. The 6 trends mentioned in the article, are stating how these types of marketing skills have the ability to reach a broader audience and also helps to provide real-time data on how the company is performing. The use of this marketing strategy is creating higher profits and increasing the standards within the hospitality industry. Hoteliers have a bigger focus on legal issues, safety and security, diversity and demographics and the value that such technology brings or adds to the business. A great example used within the article is the use of social media, i think this is the most effective and cost effective tactic. It doesn't take much to have the marketing department create a social media platform(s) and try to advertise via e-flyer, e-menus and even videos that help to increase sales. The use of e-marketing allows a company to reach a bigger audience then just locally. There are plenty of shops that start off small but gain massive success with advertising online. Best example would be Salty Donuts, main source of advertising being social media.
lvela051

Shaping the Events Industry - THISDAYLIVE - 1 views

  • An industry that contributes conservatively over N100billion to the Gross Domestic Product (GDP) of Nigeria annually and potentially has about N1trillion in turnover clearly needs to regulate itself.
  • This prompted the convener of Events Market Nigeria (EMN), Temitope Amodu, to bring all the players together such as wedding vendors, stakeholders, entrepreneurs, make-up artistes, DJs and event market enthusiasts among others who gathered for a day of networking, mentoring and discussions on pertinent issues about Nigeria’s ever growing event industry.
  • The 10th edition of the Event Market Nigeria Meet and Greet was the largest free gathering of participants in the event industry in recent times,
    • lvela051
       
      Have a free gathering of over 700 attendees.
  • ...16 more annotations...
  • said a country that has a population for almost 200 million people and a reputation for an ostentatious culture, it is a no-brainer that the events industry is a rough diamond
    • lvela051
       
      None seem interested in such a profitable industry with potential.
  • to share industry related insights and emphasised the importance of collaboration as the new completion within the event cycle.
    • lvela051
       
      Collaboration is needed to create a successful event.
  • He noted that since people love events and have fun, they look for any excuse to throw a party (it is the only thing that can make people sane in a recession or in a volatile emerging market). Thus, it is a no-brainer to set up a business or be involved in any trade or activity that cashes in on this idiosyncrasy.
  • The recent growth in the events industry has contributed to the spontaneous growth in many business verticals e.g. event planning, venue, photography, food and many more services along this massive value chain.
    • lvela051
       
      All contributors in the success.
  • the hospitality industry has been a source of optimal returns for investors.
    • lvela051
       
      event management being a part of that industry.
  • The events industry has grown at an average pace of 6.2 per cent each year globally since 2003.
  • 7 million dollars was spent on parties in Lagos over a five months period in 2013.
  • Nigerian company or middle-class family spends over 15,000 dollars per event.
  • The goal is to create an ecosystem that allows growth and development to take place, one that identifies, creates and drives excellence within the youths and veterans of the event industry.
    • lvela051
       
      Main goal within the event industry.
  • It involves studying the brand, identifying the target audience, devising the event concept, planning the logistics and coordinating the technical aspects before actually launching the event.
    • lvela051
       
      Event Management:
  • Basically, there are two types of events, namely; corporate and social events.
    • lvela051
       
      Its important to determine which events are mostly going to be catered too.
  • It is not a very organised industry; particularly because there is no specific legislation regulating this sector of the economy.
  • A common complaint from customers/clients of the industry is the issue of liability.
  • when disputes arise between a professional in the events industry and a client, there are no regulations on the applicable dispute resolution mechanisms
  • the industry is too fragmented.
  • Protect your business via written contracts, create a proper corporate structure for your business, adhere to the simple principles of corporate governance (e.g. have a board of directors or advisors etc), retain a good audit and tax firm to examine your books annually and make your business tax efficient, retain a legal partner to mitigate your legal risks. Run a business and not a hobby!”
    • lvela051
       
      Important to Protect the business legally.
  •  
    The focus of the article is to highlight how the event industry is becoming more popular among the hospitality industry in Nigeria. It mentions the Events Market Nigeria (EMN) group aims to provide a places that allows for growth and development within the event industry with the newcomers and experienced event planners. The event that was hosted by the EMN, provides free gathering that offer different speakers to offer advice and their experience to those attendees willing to listen. Throughout the article, it states that the country of Nigeria has a population of "almost $200 million people and a reputation for an ostentatious culture", which makes it a perfect place to invest in the event industry. Especially due to the fact that the industry is a source of a more favorable return on investment even though other sources in Nigeria are considered more attractive. What makes the event industry profitable, is the ability to venture with other businesses such as venues, catering, event planning and more. But with all the good, the article does point out the issues such as liability and the lack of rules that are set for the industry. I think that it's an important topic to consider because hotels are implementing a source of revenue with renting out meeting spaces and catering services to outside companies. With more and more events being planned, I think it's a great business to venture in. The ability to have an events department within a hotel or even a restaurant gives the establishment to produce more revenue within other departments. Such as a hotel, the planning of a meeting not only brings in the revenue of the space being rented but also to Food and Beverage with the catering aspect and the front desk with the rooms being occupied by the clients and attendees.
vivduru

The blessing and curse of proximity marketing | Marketing Dive - 1 views

  • Over the last few years, retailers have increasingly seen consumers migrate away from brick-and-mortar retail stores in favor of convenient digital outlets.
  • Proximity marketing is a way to appeal to these fundamental consumer desires without sacrificing a focus on the in-store experience. 
  • The Federal Trade Commission (FTC) has brought several enforcement actions against both online and offline companies for failing to comply with their posted privacy policies, failing to adequately safeguard data, failing to honor consumer opt-out promises and for a general lack of transparency.
  • ...9 more annotations...
  • This type of technology has potentially widespread applications for retailers and marketers working in partnership with each other and sharing data — for example, in airports or shopping malls where a specific marketer may not have a relationship with a particular consumer, but can provide a platform where other retailers can integrate their apps and reach out to that consumer.
  • Today's consumers engage in a shorter purchasing process, but the essential principles that underlie business-to-consumer marketing have not changed — consumers still make emotional buying decisions, they still want to comparison shop t
    • ngerv001
       
      Proximity marketing provides a means to place targeted messages in the hands of consumers, literally. It's the next best thing to actually walking up and putting a product in a customer's hands yourself. Customers might walk right by a sign and ignore it or scroll right past an ad in a social feed but a notification can't be overlooked quite so easily. Sending messages directly to nearby mobile users' phones increases engagement dramatically. Beacons drive promotions that are relevant to what clients are looking for, in real time, in places where it is easy for them to make a purchase.
  • Whether you are a fashion retailer or a chain drugstore, proximity marketing should be on your radar
  • According to recent studies, including a report by Retail Touchpoints, nearly half of retailers in the U.S. la
  • unched proximity marketing programs going into 2016, and the number has only skyrocketed this year. 
  • Department stores such as Macy’s, Nordstrom and Neiman Marcus, as well as major fashion retailers such as Urban Outfitters and American Eagle, are already using beacons to target consumers based on their physical location
  • t a basic level, beacons emit radio signals to connect with nearby consumers’ mobile devices, working in conjunction with a retailer-specific app in order to push certain notifications to consumers when they are in proximity to the beacon — for example, a special offer for a product in the aisle in which they are browsing.
  • From marketers’ perspective, navigating these requirements poses a unique dilemma: how can they create content compelling enough to convince the consumer to stay committed through the opt-in process to share their data?
  • These reports and guidelines highlight the need for consumers to be informed of any data or tracking that they may not expect — for example, interaction with a broad-spectrum beacon that reaches beyond the confines of an affirmatively-downloaded retailer app.
  •  
    This article helped me gain a better undestanding of proximity marketing and beacons. Beacons emit radio signals to connect with nearby consumers' mobile devices. This article discusses some of the pros and cons to proximity marketing in order to best engage consumers. Proximity marketing is a fairly new concept that is beginning to skyrocket.
  • ...1 more comment...
  •  
    I found the information about the legal requirements very interesting. If a notification pops up on my phone to ask if I would like to share information, like location, I almost never do.
  •  
    Modern society is an era of big data. There are indeed many benefits to using proximity marketing. But pay attention to avoid excessive spam, so as not to cause customer dislike.
  •  
    This article talks about the benefits of proximity marketing and why it is the new wave in which companies should get engaged and begin finding ways to utilize this kind of marketing amongst their consumers. The collected data is priceless information for a company to gather about its ideal customers and how to engage them. However, the downsides the article brings up are the legalities around opt-in and the opportunity to allow consumers to opt-out with ease, and the pressures to get the marketing continuously. That is a compliance issue that companies should stay clear and consider. Also, it the importance to build security features to care for this data and information being shared online.
Michelle Munne

NoWait Helps Restaurants Master the Wait in Augusta - 0 views

  • Home News Center Blog Login Create Account United States United Kingdom France China Front Page Arts Business Education Environment Government Industry Lifestyle Sports Tech OtherAutomotiveComputerEventsHealthHome and Family Legal / LawMediaMiscellaneousOpinion / EditorialPodcasting ScienceSociety Friday, March 22, 2013 RSS E-mail Newsletters Put PRWeb on your site NoWait Helps Restaurants Master the Wait in Augusta Mobile waitlist technology to replace outdated restaurant pagers and grease-pen wait list systems to manage massive crowds; NoWait to donate to Augusta Warrior Project
  • The company, NoWait, is working with Augusta Mayor Deke Copenhaver to equip the city’s restaurants with an army of iPads outfitted with NoWait’s seating management technology.
  • Because NoWait’s system is phone-based, customers can move freely between local establishments while they wait. That is revenue we wouldn’t normally receive...revenue that means jobs.”
  • ...6 more annotations...
  • In no-reservation restaurants, NoWait’s cloud-based, mobile seating service streamlines operations and optimizes turnover thanks to its ease of use, speed, and overall simplicity.
  • Smartphone holders also may view their place in line via a link inserted in the instant confirmation text.
  • Once the table is ready, the diner receives a text to return to the restaurant to be seated without delay.
  • The training and product are very easy to use,
  • According to Ware Sykes, NoWait’s New York City-based CEO, the company is now seating more than a million diners a month, with plans to roll out significant enhancements to its system over the next 60 days.
  • About NoWait NoWait is a mobile seating management service that enables restaurant owners and managers to get a view of the queue and optimize turnover, while diners have the freedom to “Wait Where You Want” until their table is ready for seating.
  •  
    This article is about a company, NoWait, that is quickly expanding throughout the U.S. and Canada.  They provide technology in the form of software or apps on an iPad that helps busy restaurants to maximize table turnover and minimize wait times for guests.
jie shen

Hotel Safety Tips For Travelers - Detective Kevin Coffey - 0 views

  • Copy all credit cards, airline tickets, passports and important documents, front and back.
  • What to look for in a safe hote
  • Elevator safety
  • ...2 more annotations...
  • Hotel Safe Considerations
  • Hotel Security Products
  •  
    The article tells all the things about the safety tips for a traveler. Before trip, copy all the documents. It also gives you advice what to look for that may ensure you in a safe hotel. It talks about the safe in the hotel which is always the legal issues happens. It shows different type of hotel security products.
Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
Alexandra Givner

How is personal data tracked and sold? | SmartPlanet - 0 views

  •  
    This article describes how third party companies are able to track and record consumer information and sell to companies. The way these companies gather the information is done when social media users sign in to their accounts via their mobile device. The information gathered by these companies are: the user's number, data that has been transmitted, the size of the data, the time and the date. Depending on the mobile carrier, this information is held for a specific amount of time. In my opinion, I think this is very valuable information for companies but there has to be some sort of legal regulations to ensure that the information is not misused, lost, or hacked. If companies wish to have access to this information, they should and must be willing to pay a significant amount of money for it.
  •  
    Is this similar to Google releasing the information when consumers use their search platforms? Unlike the old days when consumers read the fine print to calm their suspicions, I fear everything being done on any mobile device is free game without any warning. I agree there should be some legal regulations.
Jia Kim

What Are the Advantages of a Human Resource Information System? | eHow - 0 views

  • HRIS is a database or a combination of databases that share information.
  • HRIS has three basic components
  • employee information, payroll and benefits.
  • ...6 more annotations...
  • core business functions of an organization's human resources department
  • HRIS simplifies reporting and management decision-support activities
  • These systems generate reports and documentation required by state and federal agencies, such as the W-2 Wage and Tax Statement, the Equal Employment Opportunity Commission EEO-1 Employer Detail and Summary Report, and the Department of Labor's Illness and Injury Report
  • monitor employee grievance and performance issues
  • HRIS program will allow for data sharing and integration with other essential business systems, such as finance and supply-chain management.
  • HRIS also links a company's human resources department with its managers and employees
  •  
    This article is about the advanages of HRIS in the organization. Human Resources Information System(HRIS) is a database or a combination of databases that share information related with human resources in the company. HRIS has three basic components such as employee information, payroll and benefits. These represent the core business functions of an organization's human resources department. The HRIS has several advantages as following. First, it facilitate automating and Streamlining Processes which frees up HR staff to do project work and address problems. Secondly, the system supports reporting and decision process. HRIS simplifies reporting and management decision-support activities. Most systems include a variety of standard HR reports that can be used to manage the business and plan for the future, such as, compensation by pay period and year-to-date, benefits enrollment, and employee time and attendance Thirdly, it supports legal compliance. These systems generate reports and documentation required by state and federal agencies, such as the W-2 Wage and Tax Statement, the Equal Employment Opportunity Commission EEO-1 Employer Detail and Summary Report, and the Department of Labor's Illness and Injury Report. It also help to monitor employee grievance and performance issues.
Jessica Schwec

FCC: Marriott used Wi-Fi jammers to block customers' personal hotspots - Tech News and ... - 0 views

  • The FCC announced the results of its yearlong investigation on Friday, concluding that Marriott “intentionally interfered with and disabled Wi-Fi” networks at the Gaylord Opryland Hotel in Nashville, Tennessee. As a result of the investigation, Marriott will pay a $600,000 penalty to settle the complaint.
  • The investigation found that Marriott’s Wi-Fi monitoring system sent de-authentication packets to Wi-Fi hotspots. This use of radio frequencies to disrupt personal hotspots violated FCC spectrum use regulations.
  •  
    Follow this link to learn how a jammer works: http://electronics.howstuffworks.com/cell-phone-jammer1.htm Recently, Marriott was found to be noncompliant with FCC regulations that ban the use of any "Jammer"-to include cell, radio, Wi-Fi and others-by any individual or entity that is not an approved federal agent. The result? A $600,000 fine and removal of the jamming equipment from any Marriott property currently participating in the illegal activity. In a regular Wi-Fi network, a user connects to the Internet by connecting to the ISP, which could be a wired modem and separate Wi-Fi router or a combined wireless modem/router that will connect the computer to the ISP server and allow the user to launch their browser where they can search the web or access a particular URL. In Marriott's case, the company utilized a Jammer to prevent users from accessing their chosen ISP-their personal Wi-Fi networks, typically provided via cell phone companies. The jammer functioned by interrupting Wi-Fi signals that operated on a particular frequency. By placing their own Wi-Fi on a different frequency, Marriott's service was the only signal capable of connecting a user to an ISP service and the Internet and was therefore offered at a premium price. The management decision to utilize this technology was short sighted and over all a very poor decision. The decision was made based on the greed of money. By jamming competitors' signals, Marriott was attempting to force patrons into paying premium prices for Wi-Fi service during their stay, including large business accounts (meetings and events). What Marriott either failed to research or decided to ignore was the legality of such a decision. According to the FCC, Jammers of all types are strictly illegal except by approved Federal Entities and Agents. The Marriott management team made their own bed by making a poorly evaluated decision that has since come back to bite them in the rear.
apembert1920

California's Green Chemistry Initiative: "Work Plan" basics and the 7 product categorie... - 0 views

  • Under the Green Chemistry Initiative, manufacturers of “Priority Products” – product/chemical combinations targeted by the DTSC – must conduct an Alternatives Analysis, evaluating the use of substitute chemicals with lesser environmental harm and reporting results to regulators.
  •  
    This article is about California's newly implemented law called the Green Chemistry Initiative to "increase the regulation and oversight of consumer product chemical exposure". They are the first state to legally force companies to actually be aware of not only what their products are made of but also how it can be hurt the consumer once disposed. The best part is that they force the companies to provide a list of alternatives that will also be reviewed before a decision is made by the Dept of Toxic Control. at the moment there is a short list of products but California would like to expand this initiative. With expansion, my concern would be how many products actually being regulated and would there be enough funding and manpower to conclude these in-depth reviews for them to be accurate?
Maria Zuniga

Cyber and data security in the hotel industry - PwC Middle East - 0 views

  • In the Digital Era, technology is everywhere; people can connect to your company, your employees, customers, providers and competitors through laptops, smartphones and even wearable devices.
  • With increasing reliance comes increasing risk, many of which are outside the Enterprise’s control.
  • Legal and regulatory problems bring their own special range of issues. Locking horns with regulators, litigants and judges is the last thing that business needs.
  • ...13 more annotations...
  • This is a landmark piece of legislation that will radically change our perceptions on how personal data should be handled in business
  • The simple truth is that cyber security and data privacy problems can be big news and newsworthiness drives awareness levels
  • Cyber and data security emerged to prominence as a massive risk area, due to a series of high profile breaches affecting payment cards
  • There is also the economic interest in gaining commercial advantages from the use of personal data. Gaining better customer insights and providing them with personalised services are now recognised by many in the hotel industry as core business goals.
  • The purpose of the GDPR is to put people back in control of their personal information and to improve how entities look after personal information while it is in their custody.
  • when things go wrong and they are fully aware of the fact that some of the world’s biggest, richest and more powerful entities have been humbled by poor approaches to security and privacy.
  • This case has established a need for the development of comprehensive information security programmes, annual security audit cycles and post-incident investigations in the hotel sector.
  • Businesses need to think about trust, confidence and brand health and reputation.
  • they have to do much more to tackle the security and cyber risks they face and to live up to the expectations that society places in them
  • People responsible for security and privacy in hotels ought to ask themselves whether their entities have appropriate Visions for desired end states. If not, they should bring together the stakeholders to discuss ways to take things forward.
  • regulation is seen as the antidote to market imperfection.
  • Trust, confidence and brand health may operate in a different timeframe to share prices.
  • In other words, suffering security and privacy failure might be like a cancer, where the harm is hidden from view until it is too late. This returns the focus to legal risk.
  •  
    This article is extremely important. I feel like everyone should read it because it goes hand in hand with what we have learned this week in class. The topic of cyber security is something that people need to shift paradigms. This article brings us great points about the digital era we live in. since everything we do in business now a days has to do with technology, it is important to have security and trust in this. With the increase reliance on this technology comes a higher risk. The article brings up that awareness levels of cyber security and data privacy issues are growing at a steady pace. It is extremely important that in the hospitality industry, Businesses think about trust, confidence and brand health and reputation. This highlights the fact that it doesn't matter if security systems are costly, in the long run if something goes wrong that will end up being the most costly. The article mentions that there will be a regulation established by the EU called General Data Protection Regulation (GDPR). The purpose of the GDPR is to put people back in control of their personal information and to improve how entities look after personal information while it is in their custody. In conclusion, this gives companies a competitive advantage.
espence13

Marriott Hotels: Series Of Data Breaches Reveals Lack Of Security Awareness - 0 views

  • The data breach hitting Marriott Hotels Group was huge. The joint-second largest to have ever taken place, in fact, after Yahoo’s disastrous 2013 breach (and on par with Yahoo’s 2014 breach). While the amount of data that was taken from Starwood Hotels’ reservation systems (a company acquired by Marriott in 2016) was vast, what’s most staggering is the fact the breach went undetected for four years, and an acquisition also took place but the alarm still wasn’t raised. Since news originally broke of the release, it’s also been revealed that the hotel group’s own security team was hit by an attack in June 2017. Clearly something has gone amiss.
  • The issue is compounded by the fact that security is still not high enough up the list of priorities for business leaders. Despite well-known organizations frequently hitting the headlines for data breaches (in 2018 alone we’ve had Ticketmaster, Quora, British Airways, Under Armour and plenty more) and a ‘when not if’ warning  being peddled by the security industry for years, many businesses still haven't got to grips with just how critical proper security is. The fact that reviewing security may not have been part of the acquisition process of Starwood by Marriott – and if it was, not well enough – is further evidence of this apparent blindness to the impact of poor security. So, what’s going wrong? A research report from security company Bromium earlier this year suggested that the average large enterprise spends $16.7 million per annum on security, with the vast majority found to be on ‘the human cost of maintaining cyber security systems’. While most firms clearly aren’t 2,000 people sized enterprises, the research provides a good indication that spending on security isn’t the issue. Instead, it’s people.
  • We need to look at different approaches to skills development and, in many ways, imitate cyber criminals themselves who are continually iterating ideas to solve problems, rewarding perseverance and curiosity as well as encouraging further development. The ‘white hats’ need to approach their roles the same way – not rely on what they heard in a classroom six months previously.
  •  
    The recent cyberattack at Marriott International Inc. has many hoteliers wondering what are the legal and business risks associated with security attacks? The recent breach at Marriott further proves the point that businesses should prepare now or be willing to pay for it later. In November 2018, the Bethesda, MD-based hotel company revealed there had been unauthorized access to the Starwood guest reservation database, which contained guest information relating to reservations at Starwood properties on or before Sept. 10, 2018. Businesses face a multitude of risk when looking at the potential consequences resulting from a cyberattack or breach. As we've seen recently with the Marriott breach, there can be significant impact to brand equity in the marketplace. This impact can be far reaching for publicly traded businesses, resulting in material impacts to businesses and business valuation, and long-term impact to user adoption. In addition to the downside risk from the market, businesses must also mount expensive defenses against litigation that increasingly takes the form of class actions. Reputation is important in every trade but is especially important in the hospitality industry. This, coupled with the fact that consumers are becoming more sensitive to privacy and security related issues, means that businesses in the hospitality industry must manage against these types of risk and allocate appropriate levels of funding toward information security. What should hoteliers learn from the Marriott breach? Pay attention. Marriott was aware that there was a potential issue shortly after it acquired Starwood, but did not, apparently, investigate in detail. Marriott may not have created the problem, but it bought the problem and didn't treat it with the seriousness that was necessary.
msoma003

7 Benefits That HR Software Brings Your Company - 0 views

  • HR systems are available in the cloud and can be accessed securely by employees via the internet
  • many companies still manage their workforce with a haphazard system of spreadsheets, documents and post-it notes
    • msoma003
       
      Living in the past
  • many companies still manage their workforce with a haphazard system of spreadsheets, documents and post-it notes
  • ...11 more annotations...
  • Efficiency of Administration
  • consuming
    • msoma003
       
      Streamlines the process for an HR manager
  • save you real money
    • msoma003
       
      Less expenses=more profit
  • requires one less full time member
    • msoma003
       
      Wages and salary are typically the highest expense for a company
  • ollecting data opens up analytical opportunities that will assist you in making informed decisions
  • allowing more people to make good use of the data you hold.
  • he effort required in getting the same insight using a paper-based system simply makes this type of analysis unfeasible.
    • msoma003
       
      This is a task that an HR manager would not have though about previously and opens an opportunity for improvement
  • Improved Communication
  • If all this contact information is stored in a filing cabinet it slows down communication massivel
  • owing that an employee was sent a particular message but that they also have accepted the contents of the communication
    • msoma003
       
      This can prevent a legal disaster and save a lot of money in the long run
  • Most HR systems will incorporate disaster recovery features such as being hosted on mirrored servers and keeping database backups at secure separate locations enabling the system to be restored extremely quickly even in the most calamitous disasters
    • msoma003
       
      For example in Miami if a hurricane hits then the HR manager can still access pay roll of site
  •  
    This article discusses what benefits an HRIS will provide a firm. Some of the most important benefits include cost savings. The system allows an HR manager to manage more employees so they firm can hire less in the HR department. Additionally it provides insight into other departments if turnover is high and the system can save money in the long run in the case of legal disputes. For employees it allows them to access their information and get contact information for other employees. All these benefits improve the job performance of everyone involved.
asant318

Consumers spend $5.2 billion annually in fraudulent and misleading hotel booking transa... - 2 views

  • scams and fraudulent and misleading travel websites and companies continue to mislead and confuse consumers.
  • 28.5 million hotel stays and $5.2 billion in fraudulent and misleading hotel booking transactions in 2017.
  • 39 per cent of travellers reporting that they most often book their hotel rooms through a third-party website
  • ...3 more annotations...
  • Taking a few extra seconds to book directly with a hotel or a trusted travel agent can save time and money in the long run, and lead to a better travel experience overall.”
  • constant flow of new companies entering the online travel market—suggests we need to do more to protect consumers.
  • AHLA encourages consumers to book directly through the hotel website or mobile app
  •  
    This article reviews a survey conducted by the American Hotel & Lodging Association which reveals that 23% of consumers say they have been misled by third-party traveler re-sellers. The article further explains the Federal Trade Commission's investigation of one of these companies, Reservation Counter, LLC which resulted in legal action. The article concludes that to protect consumers AHLA will support legislation known as the Stop Online Booking Scams Acts and strongly encourages travelers to book directly through the hotel or trusted travel agent. I think we are seeing the AHLA's opposition to OTA's in defense of hotel properties that want direct booking. The protection of customers is important, but it seems like an implied warning of ligitimate OTA's like www.booking.com.
1 - 20 of 82 Next › Last »
Showing 20 items per page