Skip to main content

Home/ Hospitality Technology/ Group items matching "policy" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gyujin Chae

Hard Rock Las Vegas taps Vast eMarketing Potential with eSignature Solution | Hospitality Magazine (HT) - 2 views

  • Policy Patrol Disclaimers is very easy to operate and we have to do very little to maintain it,”
  • consistently brand their e-mails and customize them with information from the marketing department quickly and easily
  • We chose Policy Patrol, due to its close integration with Exchange Server and Active Directory. This allows us to configure one template that is automatically personalized with the sender’s contact information
  • ...8 more annotations...
  • consistently brand their e-mails and customize them with information from the marketing department quickly and easily.
  • “We chose Policy Patrol, due to its close integration with Exchange Server and Active Directory. This allows us to configure one template that is automatically personalized with the sender’s contact information,
  • Policy Patrol immediately applies updates to Active Directory contact information in the users’ e-mail signatures, which makes it very easy to maintain
  • We chose Policy Patrol, due to its close integration with Exchange Server and Active Directory. This allows us to configure one template that is automatically personalized with the sender’s contact information
  • “We chose Policy Patrol, due to its close integration with Exchange Server and Active Directory. This allows us to configure one template that is automatically personalized with the sender’s contact information,”
  • makes it very easy
  • very
  • In today's e-mail era, the Hard Rock Hotel & Casino in Las Vegas had two goals in mind; first to standardize the signature on all outgoing e-mail, to give them a more corporate and consistent feel
  •  
    The IT staff in the Hard Rock Hotel and Casino prefer to use the Policy Patrol Disclaimers from Red Earth Software in order to solve too goals: to standardize the signature on all outgoing e-mail with a more corporate and consistent feel, and the em-mail signatures had to be flexible enough to accommodate marketing promotions. E-mail is an important tool for team member to communicate with other parts as an entertainment marketing tools to streamline their brand and publicize the events. The reasons for choosing the Policy Patrol are, its close integration with exchange server and active directory. It can immediately applies updates to active directory contact information in the users' e-mail signature to make easy to maintain. Also, the Policy Patrol Disclaimers is very easy to operate and need little to maintain. It is consistent, reliable, and easy to use.
  •  
    The article is talking about that the Hard Rock Hotel and Casino communicates with vendors, partners, legal teams, and hotel and casino patrons via e-mail. Hard Rock had two goals for the e-mail signature to improve their e-marketing. One is to standardize the signature and the second is to be flexible enough to accommodate marketing promotions. The Hard Rock Hotel and Casino chose the Policy Patrol Disclaimers to help them achieve goals. The Policy Patrol has a close integration with Exchange Server and Active Directory. It allows the hotel to configure one template that is automatically personalized with the sender's contact information. The Policy Patrol also allows to easily updating e-mail marketing information for all e-mail signatures by configuring e-mail signatures from one central template.
  •  
    This article mentions a marketing tool through e-mails and a specific solution, eSignature Solution, implemented by Hard Rock Hotel and Casino in Las Vegas. The employees at the Hard Rock increasingly communicate with co-workers, partners, vendors, and customers via e-mails. The company realized that e-mails could be an important marketing tool which costs less than other tools, such as TV commercials. Thus, the Hard Rock implemented eSignature Solution which allows them to send out e-mails to customers, vendors, and partners with upcoming events, special deals, and so on. In addition, this centralized e-mail signatures program enables the company to configure one template that is automatically personalized with the sender's contact information, and to customize e-mails and its contents (events or special offers) based on customer information. According to Mike Essig, the director at the Hard Rock Hotel and Casino, the new solution is very easy to operate, update and mostly cost effective. Along with social media marketing, marketing through e-mail could be very effective and potential as the number of use of e-mail is significantly growing and e-mail is widely used in our lives.
augu010

5 Best Practices to Prevent Insider Threat - 0 views

  • Insider threat continues to be a problem with approximately 50 percent of organizations experiencing at least one malicious insider incident per year, according to the 2017 U.S. State of Cybercrime Survey.
  • While intellectual property (IP) theft, IT sabotage, fraud, and espionage have continued to appear as the primary forms of malicious insider threats, new research has led us to understand the patterns related to unintentional insider threats. These threats represent a significant risk for organizations and potential attack vectors for malicious insiders and external adversaries.
  • Know and protect your critical assets Develop a formalized insider threat program Deploy solutions for monitoring employees actions and correlating information from multiple data sources Clearly document and consistently enforce policies and controls Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees
  • ...18 more annotations...
  • The trust that organizations place in their workforce can leave them vulnerable to malicious insiders, who often use particular methods to hide their illicit activities.
  • Current technology allows seamless collaboration, but also allows the organization's sensitive information to be easily removed from the organization. A complete understanding of critical assets (both physical and logical) is invaluable in defending against attackers who will often target the organization's critical assets.
  • Critical assets can be both physical and logical and can include facilities, systems, technology, and people. An often-overlooked aspect of critical assets is intellectual property.
  • Formalized and Defined Program:
  • Organization-wide Participation:
  • versight of Program Compliance and Effectiveness:
  • Confidential Reporting Mechanisms and Procedures:
  • Insider Threat Incident Response Plan:
  • ommunication of Insider Threat Events:
  • Protection of Employees' Civil Liberties and Rights:
  • Policies, Procedures, and Practices that support the InTP:
  • Data Collection and Analysis Techniques and Practices:
  • Prevention, Detection, and Response Infrastructure:
  • Insider Threat Practices Related to Trusted Business Partners:
  • Insider Threat Integration with Enterprise Risk Management:
  • Organizations should ensure policies and controls provide: concise and coherent documentation, including reasoning behind the policy, where applicable consistent and regular employee training on the policies and their justification, implementation, and enforcement Organizations should be particularly clear on policies regarding acceptable use and disclosure of the organization's systems, information, and resources use of privileged or administrator accounts ownership of information created as a work product evaluation of employee performance, including requirements for promotion and financial bonuses processes and procedures for addressing employee grievances
  • wareness training for the unintentional insider threat should encourage employees to identify potential actions or ways of thinking that could lead to an unintentional event, including level of risk tolerance--someone willing to take more risks than the norm attempts at multi-tasking--individuals who multi-task may be more likely to make mistakes large amounts of personal or proprietary information shared on social media lack of attention to detail
  • Our intent was to develop a single definition for insider threat that covers malicious and non-malicious (unintentional) insider threats covers cyber and physical impacts applies to both government and industry is clear, concise, consistent with existing definitions of 'threat', and broad enough to cover all insider threats
  •  
    This article goes into detail about various safe practices that can prevent cyber threats. Policies and procedures must be created in order to protect us from cyber crimes. Governments have worked hard to protect data from being hacked.
ashleyb102

Environmentally-friendly practices in hotels - 1 views

  • As an important component of the accommodation sector, hotel operations are characterised by a massive number of activities that collectively exert a significant impact on global resources (Kirk 1995:3)
  • he considerable environmental effects of hotels contribute to problems, many of which are international in scope, with the major one being climate change
  • Demands from governments or regulators require hotels to implement green practices (Kim & Choi 2013:159). Green practices are ways to use products and methods that would not negatively impact on the environment through pollution or by the depletion of natural resources (Smith & Perks 2010:3). These green practices include sustainable management of water, energy conservation, solid waste management, ensuring air quality, environmental purchasing, community awareness and maintenance of permits (see Table 1).
  • ...12 more annotations...
  • With the negative impacts that hotels exert on the environment, greater pressure is placed on governments and role players in tourism to reinforce eco-friendlier enterprises and green consumption in hotels (Moreo 2008:1). This compels hotels to demonstrate responsible behaviour to become 'eco-friendly hotels' or 'green hotels', which refers to accommodation establishments that have made a commitment to implementing or following various ecologically-sound practices, such as saving water and energy as well as reducing solid waste
  • Because hotels exert a negative environmental impact, it is imperative that the management of hotels take action to mitigate their impact on the environment
  • Within the hotel sector, the areas of concern for the environment include pollution through solid and liquid waste, high energy consumption and the increasing release of greenhouse gases that cause changes in the atmosphere.
  • Consequently, practices such as recycling of waste, waste management, supplying clean air, energy and water conservation, environmental health, adopting a purchasing policy and environmental education are being considered in various hotels in mitigation of the negative impacts on the environment
  • According to estimations, an average hotel releases between 160 kg and 200 kg of CO2 per square metre of room floor area per year and the water consumption per guest per night is between 170 and 440 litres in the average five-star hotel. On average, hotels produce 1 kg of waste per guest per night
  • It is recommended that hotels implement and monitor the progress of the green initiatives in their establishments. The initiatives to be implemented may include any or some of the following:
  • • Water - Water may be saved by flushing toilets using a flushing system fed from rainwater harvesting. In addition, hotels can use low-flow shower heads and taps to reduce waste.
  • Energy - Occupancy sensors can be used in hotels so as to use energy in occupied rooms only. Also, hotels can use renewable energies such as solar power and wind energy.
  • Reuse of linen - Reuse of linens and towels save water, detergent and energy which reduces the release of greenhouse gases. Water saving information cards should be placed in rooms for guests to read.
  • Solid waste - Recycling is one way by which hotels can begin to participate in waste management. Composting at the establishment is also encouraged. • Air quality - Air filtration can be installed in hotels. In addition, the creation of smoking sections for guests to avoid involuntary exposure to second-hand smoke can also be helpful. • Installation of green roofs improves air quality, which includes the use of recycled material in the growing medium. • Environmental purchasing - Hotels should avoid procuring plastic-based packaging, which contributes to high levels of pollution and should rather use paper bags made from recycled products.
  • This research study determined the environmentally friendly practices adopted in 3- to 5-star-graded hotels in Zimbabwe and South Africa.
  • Against this background, this study was conducted to examine issues relating to environmentally-friendly practices of hotels in these two developing countries
  •  
    This article takes a look at 3 to 5 star hotels in Zimbabwe and South Africa and their environmentally friendly practices. Research shows that the hotel industry has a huge impact on the environment and the use of natural resources. The hotel industry has been negatively impacting the environment by consuming large amount of energy and water, and by producing large amounts of waste. The government has been demanding that hotels implement green practices, these are methods and products that do not negatively impact the environment. The results from the data collected from these two countries showed that none of the hotels had a written green management policy. Even though some of the hotels insisted that there is a green management policy in effect, it was not written down. It is important for policies like this to be written so there is a clear understanding of what is expected.
  •  
    It seems the main motivation to implement more eco-friendly practices would be legislation/regulation but I wonder how that would be received? Outside the hotel industry,. I wonder how much focus is generally given to environmental concerns? Interesting research.
tgood006

How Hotels Can Spring Clean Their Information Security Policies Ahead of the Summer Travel Season | - 8 views

  • Shockingly, nearly a third of hotels (32%) admitted they currently have no known policy for storing and disposing of documents
  •  
    Memorial Day weekend will soon be upon everyone and with summer officially kicks off. This article talks about how hotels can clean up and do better to protect their guest personal information. A few years ago, all major corporation were required to adopt General Data Protection Regulation (GDPR) regulations which helped some hospitality companies. In my current capacity with Marriott International as a Workforce Administrator we were required to schedule all customer facing associates for training on GDPR. Prior to Marriott acquiring Starwood hotel company they had their own data hacking which caused an increased expense for Marriott to let customer know they were doing all they can to stop the data breach and protect their personal information. They also created a dedicated call center for this effort to let guest know that they will continue to put protecting their personal information as a high priority. This article outlines how hotels can prepare for increased guest traffic and protect their guest personal identical information. One of my responsibilities as a Workforce admin is to handle staffing for all of Marriott International Customer Engagement Centers. Employee training on GDPR is required every year for Marriott associates. Training employees on how to better protect guest personal information is more cost effective than dealing with a data breach due to negligence of an absent-minded employee. Guest expect to know their personal information is going to be protected. This allows them to have piece of mind. Leaving a clear and clean area allows for guest to feel that their information is being protected. Imagine walking up to the front desk and finding the previous guest personal information cluttered in view. This will make the current feel their personal information will left unattended and viewable to the guest to walk up causing nothing but anxiety attacks. Unable to enjoy their summer vacation. Guest expect that the overall security of the hotel
  • ...1 more comment...
  •  
    32% of companies not having a known policy is startling considering that 77% of Americans find it to be important to them. Yet another IT issue the states finds itself behind the curve on.
  •  
    Another point as for the "clean desk" policy goes, it also needs to include stricter policies on securing credit card information. It should not be written down or repeated on the telephone. In an open environment sound can carry and unwanted parties can hear. Cell phones should be stored away from the desk, because cell phones are in itself a potential security breach.
  •  
    Our hotel as well has reinforced the clean desk policy. I remembered the data breach for Marriott it was in most major news channel and at work for several months we had the same questions from our guest requesting more information. As you stated a hotline was created and of of course the most surprising for me was the acceptance from our guest. Main responses were, with the new technology advance world we've coming and going into that is something we all have to face.
hankunli

Why Hospitality Leaders Should Reevaluate Their Information Security Policies to Regain Consumer Trust | - 0 views

  •  Nearly one in three (31%) hospitality companies said they do not have a policy in place for storing and disposing of confidential information on end-of-life electronic devices, and 19% don’t have a policy for storing or disposing of confidential paper documents.
  • With nearly a quarter (23%) of consumers reporting they would take their business elsewhere following a data breach, hotels
  • More than two in five (41%) hospitality businesses say they believe it’s likely their organization will experience a data breach in the next five years, and 44% believe the source of that breach will be human error or accidental loss by an employee or insider.
  • ...1 more annotation...
  • More than half of Americans (60%) believe that their personal data and information is less safe and secure than it was 10 years ago, which may be why nearly all (93%) hotel owners feel like they need to do more to show employees and consumers how they are protecting personal information.
  •  
    Almost a third of hospitality companies have reported that they do not have a policy in place for storing and disposing of confidential information. In that same group another 19% reported that they don't have policy for storing or disposing of confidential paper documents. This is a alarming because most hospitality companies have to store consumer information. Nearly 23% of consumers reported they would take their business elsewhere following a data breach which should be a walk up call in the industry to improve their current security. What is even more alarming 41% of hospitality businesses say they believe that their organization will experience some form of data breach in the next five years.
  •  
    The security of data in the hospitality industry is now more and more important. Although some hotel owners may not keeping it in mind as an important issue, a large percentage of hotel guests feel concerned about it. This discrepancy should be a wake-up call for hoteliers. Organizations can do three things to minimize risk: update security policies, train employees better, and regaining customer trust. Current statistics provided evidence that these three aspects are all important and can be improved.
adel168

Shred-it Helps Hoteliers Prevent Data Security Issues | Hotel Business - 0 views

  • One of the challenges hoteliers are facing today in terms of data security is the failure to identify information as confidential
  • “Another challenge is the strong focus on cybersecurity,” said Nickolas. “While it is of course important to ensure that online data surrounding hotels and their guests is protected, it’s just as essential to implement strategies that protect physical information as well.”
  • Consumers are more conscious than ever before about their personal data and information security, and it has become a major factor in the hotel booking process.
  • ...2 more annotations...
  • “Nearly one-third of hotels (32%) admitted they have no known policy for storing and disposing of documents,
  • “Employees can be a hotel’s greatest security asset if they put the right training and policies in place,”
  •  
    Shred-it, a global information security service provided by Stericycle Inc., is providing services such as document destruction, hard-drive destruction, media destruction, etc. Shred-it hotel clients are helped to stay compliant with the latest laws around protecting consumer data and confidential information. Shred-it also offers hotels with implementing new policies and procedures that will better help their physical security as well as policies limiting employee access to certain areas.
vickychapas2021

Proximity Marketing: Often Creepy, but It Doesn't Have to Be: Center for Digital Ethics & Policy: Loyola University Chicago - 0 views

  • That night at home, you get an email from the department store. “Still thinking about those shoes?” it asks. “Buy them now!”
  • proximity marketing is delivered via beacons placed strategically throughout a store that use Bluetooth to communicate with smartphones in their range
  • stores can catch up by providing some of the perks of online shopping in person,
  • ...16 more annotations...
  • Beacons can also help shoppers navigate a big store
  • beacon communication
  • often connected to an app
  • , which may gather even richer data, such as a customer’s product preferences, demographic information and purchase history, particularly if the app is hooked up to mobile pay.
  • customers now have access to a map that shows their location within a Target store
  • the state of Illinois proposed a bill that will make it illegal for companies to “collect, use, store, or disclose geolocation information
  • from a location-based application
  • Those who do want the discounts and the conveniences that come with location-based marketing should be able to participate knowing that their data and privacy are safe and respected.
  • displaying in-store signage notifying shoppers that their location data is being collected,
  • And there will always be companies that ignore guidelines
  • , and even break laws.
  • an Uber update surreptitiously removed an option that allowed users to opt out of location tracking when they were not using the app.
  • Instead, users had to sign on for tracking “always” or “never.”
  • they were also forced to sign on to tracking for up to five minutes after they had completed their ride and left the vehicle.
  • It took nine months for Uber to listen to their users. This August, the company finally announced it would stop tracking the location of its users when they were not using the app.
  • Target’s privacy notice is currently 4,359 words and the top of the page reads, “We may change or add to this privacy policy, so we encourage you to review it periodically.”
  •  
    This article mentions the many benefits and consequences of proximity marketing. For instance, there are policies regarding allowing access to one's location that many users are unaware of. Uber for many months allowed the drivers to still have the user's location even after a couple of minutes of dropping them off. They changed this months later, but these kinds of things coming to light makes customers want to leave their location off. Proximity marketing is great for learning more about who shops at our businesses and even to entice the consumer to shop more frequently, but many people would prefer to avoid it.
Ryan Jove

Headline Story | equities.com - 0 views

  • tw telecom CEO Keynotes COMPTEL PLUS Fall 2012 Convention & EXPO
  • called for the Federal Communications Commission (FCC) to embrace "smart, forward looking competitive telecom policy with price and service quality rules where incumbents have market power, regardless of technology used."
  • "The FCC should establish technology-neutral policies, a principle that is central to the Telecom Act of 1996 and competition policy,"
  • ...7 more annotations...
  • "The industry is moving from a physical infrastructure to a logical one. We're moving from circuits to services. Innovation is driving our success as a competitive indu
  • stry." 
  • Intelligent Network
  • Intelligent Network
  • "We as an industry must adapt to new technologies and capabilities as our customers adopt IT strategies for cloud services and solutions. And we must convince the FCC to update its competition rules to accommodate these changes.
  • "Competition drives innovation. Innovation grows the market,"
  • The company's fiber optic networks directly connect more than 16,300 buildings across the United States
  •  
    This article outlines the discussion about whether the Federal Communications Commission (FCC) should change their policies that were enacted in the Telecom Act of 1966.  At the COMPTEL PLUS Fall 2012 Convention and EXPO, Larissa Herda, the Chairman, CEO, and President of tw telecom urged the FCC to adapt to the new competitive technologies.  She emphasizes the importance of change going forward and discusses the Intelligent Network as an example.  She calls for the adoption of new IT Strategies for cloud services and solutions.  Above all, this article discusses the convention as a platform for the discussion of change in the tech world.
rebecca Bonet

Lost Tree Club Turns to ClubPay as Payroll, HR Partner | News | Hospitality Magazine (HT) - 2 views

  • It is designed to help the make the club's human resource and employee administrative work fast, efficient and, most importantly, accurate.
  • The Lost Tree Club of North Palm Beach, FL will begin using ClubPay's payroll and HR management solutions.  In addition to biometric time clocks, real time labor management and payroll processing, Lost Tree Club will benefit from ClubPay's new "HR and Benefit Essentials" online portal .  It is designed to help the make the club's human resource and employee administrative work fast, efficient and, most importantly, accurate
  • In addition to biometric time clocks, real time labor management and payroll processing, Lost Tree Club will benefit from ClubPay's new "HR and Benefit Essentials" online portal
  • ...3 more annotations...
  •  ClubPay will assume responsibility for processing payroll, printing checks, accurately managing deductions, ensuring compliance with payroll policies and filing payroll taxes
  • ClubPay will assume responsibility for processing payroll, printing checks, accurately managing deductions, ensuring compliance with payroll policies and filing payroll taxes
  • Lost Tree will have unlimited access to over 180 standard payroll and HR reports and the ability to easily create any custom reported needed for proactive decision making. 
  •  
    The Lost Tree Club of North Palm Beach, FL chose ClubPay for payroll and HR management solutions. ClubPay will help processing payroll, printing checks, accurately managing deduction, ensuring compliance with payroll policies and filling payroll taxes so that HR staff can focus on more centric activities. 
  •  
    This article talks about The Lost Tree Club that is located in North Palm Beach will be using ClubPay's payroll and HR management solution. Lost Tree Club will benefit from The ClubPay's new" HR and Benefit Essentials" online portal it designed to help the club's human resource and employee administrative work fast, efficient and, mostly importantly, accurate. It will help with processing payroll, printing check, accurately managing deductions, ensuring compliance with payroll policies and filling payroll taxes.
uhey77

Airbnb apologizes to hosts, dedicates $250M to coronavirus-related cancelations | PhocusWire - 0 views

  • Following the World Health Organization’s declaration of a pandemic on March 11, Airbnb instated a policy wherein guests would receive a full refund - regardless of host consent - on reservations with check-in dates between March 14 and April 14.
  • we couldn’t have guests and hosts feel pressured to put themselves into unsafe situations and create an additional public health hazard.
  • To that end, Chesky says Airbnb will pay $250 million to hosts to help cover the cost of coronavirus-related cancelations.
  • ...2 more annotations...
  • Airbnb is also creating a $10 million Superhost Relief Fund, designed to assist Superhosts who need help paying their rent or mortgages, as well as long-tenured Experiences hosts.
  • Also expected in April is a way for guests to send financial support to hosts they’ve previously stayed with,
  •  
    Reservations for stays and Airbnb Experiences made on or before March 14, 2020, with a check-in date between March 14, 2020 and May 31, 2020, are covered by the policy and may be canceled before check-in. Guests who cancel will have a variety of cancellation and refund options, and hosts can cancel without charge or impact to their Superhost status. Airbnb will either refund, or issue travel credit that includes, all service fees for covered cancellations. In order to cancel under the policy, you will be required to attest to the facts of and/or provide supporting documentation for your extenuating circumstance.
ivonneyee

Modern Management Technologies in the Hospitality Industry - 2 views

The article talks about how it's worth investing in proximity marketing to increase the speed of a customer's decision, increase engagement, and eloyalty. The article states that marketers who know...

Mohan Song

Hotel Security and Common SenseBy Josef Aukee - 0 views

  •  
    The many aspects of security at hotels boil down to policy and technology. The policy element includes emergency planning and the individual procedures implemented by a hotel. Technology now plays an integral role in the security mix, from badging and staffing communications to electronic keys and surveillance cameras. Hotels are attractive places for criminals to target travelers, who are inherently more vulnerable. Best bet: Always assess a hotel neighborhood and facilities with the same vigilance as at home or in other public spaces. Help your meeting attendees understand the policies and potential risks before they arrive. Security Questions for Hotels: Will trade-show exhibitors require secure storage for any display items? Are there areas near a hotel that attendees should be warned to avoid? Are hotel employees CPR certified? Is defibrillator equipment available onsite? Are there any policies and procedures organizers should be aware of in the event of an emergency?
lin liu

The latest from HTNG - Hotels unpack the future of credit card security | Hotel Management - 0 views

  • The Framework is aimed at reducing the cost and complexity of satisfying the Payment Card Industry Data Security Standards (PCI-DSS),
  • Travel Daily News reports that the new Framework calls for tokenization to encrypt the credit card information at the point-of-swipe.
  • Bloomberg BNA reports that on Feb. 14, the Council released new guidance for merchants who accept payments on mobile devices.
  • ...2 more annotations...
  • February also saw the release of the Council’s guidance on security and cloud computing.
  • The Council goes on to note that cloud computing remains an evolving technology, and merchants must be careful to evaluate competing cloud services and establish clear security policies and procedures.
  •  
    Hotels have to comply with Payment Card Industry Data Security Standards, which are constantly updated since technology is developing. Also, 'the hotel industry has unique vulnerabilities to credit card theft', since the cards should be available over the long period of time, and to different 3rd parties as well. The new technology will encrypt credit card information at the point-of-swipe, and the number never gets to any other place in the hotel or other business. The other issue is payments on mobile devices. Where it is advised to encrypt information prior to using the device, and avoid "bring you own device policy'.
  •  
    This article introduces the Secure Payments Framework in Hotel Technology Next Generation (HTNG) Conference. The Framework applies mobile payment and cloud computing technology to reduce the cost and complexity of satisfying the Payment Card Industry Data Security Standards. The credit card security is a big challenge for all hotels, especially for the small hotels, lacking expertise and budget to protect customers' card information. There are many advantages of the new card framework. Firstly, the new Framework can encrypt the credit card information at the point-of-swipe. In this way, the card number can't be stolen by other systems. Secondly, it is scalable for different sizes of hotel. Thirdly, new guidance is made for accepting payments on mobile devices. Before processing payment, the merchant need encrypt cardholder, to make sure more security. What is more, new policy on cloud computing. The cloud service provider and its clients are both responsible for the security of cloud data. The policy also need merchants to evaluate competing cloud services and carefully pay procedures.
Donald Wojciechowski

Hotel Cyber-Security | Past Issues | Past Issues - 0 views

  • Hotel cyber-security is facing increasing scrutiny from federal regulators.
  • last June the Federal Trade Commission sued Wyndham Worldwide hotels after apparently unsophisticated hackers allegedly stole the credit card information of more than 600,000 customers leading to a more than $10.6 million fraud loss
  • The FTC has claimed that Wyndham did not maintain appropriate firewalls, did not configure security software to protect credit card information, did not remedy known security vulnerabilities, and failed to use complex passwords allowing hackers to infiltrate through “brute force” – essentially by guessing the password of the administrator.
  •  
    This article discusses the Federal Trade commission's actions against Wyndham Worldwide Hotels. Unsophisticated hackers breached the hotels system and obtained the credit card records of 600,000 guests, causing the FTC to claim that the hotel group did not maintain proper system security. However, several groups file a Amicus Brief that the FTC is not clear as to what security standards they require. Currently the FTC requirements "will depend on the size and complexity of the business, the nature and scope of its activities, and the sensitivity of the information at issue". This means to many in the industry that company does not know if they are maintain proper security in the eyes of the FTC until they are sued by the FTC. The article goes on to say that a company should "Review your privacy policy immediately to insure it is compliant with the most recent standards and that the data security systems in place are actually consistent with the stated policy".
markh283

Hotel Cybersecurity: Protecting your guests and your property from vendor data breaches - Hotel Law Blog - July 19, 2017 - 0 views

  • Hotels rely on third-party vendors to help run their properties efficiently, and often must give them access to sensitive guest data. This leaves hotels vulnerable to cyber attacks; they’re only as secure as their vendors are, and may find themselves directly liable for a data breach.
  • July was another notable month for hotel data breaches – on a single day, several well-known hotel brands and managers, including Four Seasons, Trump Hotels, Hard Rock Hotels & Casinos and Loews Hotels all announced that customer data may have been compromised as a result of a security failure.
  • In analyzing the breaches, there is something that is common to almost all incidents: the vulnerability was not with a hotel, its manager or brand, but with a vendor.
  •  
    This article notes that many hotels have been the victims of cyber attacks. For example, in July of this year, the Four Seasons, Trump Hotels, and the Loews Hotels all had customer information hacked because of security failures. Furthermore, many of these resulted from vulnerability from the vendors. To address this issue, the article suggests that hotels should incorporate the following four actions: (1) Review data security policies; (2) Require vendors to take responsibility for their mistakes; (3) Analyze cybersecurity policies; and (4) Require brands and managers to test backup systems.
bhern082

4 Ways You Can Keep Your Business and Guests Safe from Data Breaches | Hospitality Technology - 0 views

  • external data breaches constitute 96 per cent of all breaches in the hospitality industry.
  • Many guests are increasingly choosing to stay at hotels that prioritize information security since many employees are working remotely or must take work away with them on vacation.
  • : Verify that the hotel’s privacy policy complies with federal and provincial laws that apply.  Ensure that your staff remains compliant of these laws by making them a mandatory part of staff training to avoid breaches and fines. 
  • ...4 more annotations...
  • Documents such as copies of travel information, passport and identity documents, licenses, customer lists, etc. should be shredded daily.
  • Invest in cyber-security tools such as firewalls and tokenization and encryption to avoid online breaches through the business’ website or third-party sites.
  • Regularly update equipment and software with monitoring systems that can detect breaches at numerous terminals to avoid PoS breaches.
  • Ongoing training helps ensure employees understand and follow policies and best practices. They should also be trained on how to recognize potential risks such as phishing.
  •  
    This article review four ways in which the hospitality industry can keep their guests safe. The first way is to have a company "shred list" so that the guests physical information is being shredded upon he completion of their stay. The second way is to remain compliant with federal laws when it comes to their privacy policy. The third way is to have IT safeguards like regularly updated equipment and have cyber security firewalls in place. ?The last way is to have constant employee training to keep the employees up to date on the best practices.
isabelladlp

Confidentiality in the Hospitality Industry - 0 views

  • No specific laws govern confidentiality in the hospitality industry, but your contracts and policies should clearly dictate what degree of privacy customers can expect.
  • Hospitality businesses routinely swipe customer credit cards and may gain other sensitive financial data, such as a customer's bank account information.
  • If you inadvertently leak this data, you could be legally liable for your negligence, resulting in costly lawsuits.
  • ...18 more annotations...
  • If your connection isn't password protected, anyone can access the system.
  • And even with a password, computer-savvy network users can gain access to another user's data.
  • Hospitality workers don't have any special legal authority, so they can't physically restrain a customer. Instead, they should call the police if they suspect criminal activity.
  • Your company's confidentiality policy can educate customers about the amount of privacy they can expect.
  • If you promise a customer a specific amount of confidentiality and then break that agreement, you've broken your contract and can be sued.
  • No one can contract to engage in illegal behavior, and if someone is in immediate danger, it's your duty to take steps to protect him.
  • It also establishes guidelines for employees to follow, and a clear policy can even protect you against lawsuits.
  • The U.S. Supreme Court has established that hotel customers have a "reasonable expectation of privacy" in hotel rooms.
  • You can't enter or search a guest's room without her explicit consent, but guests are not entitled to any special privacy
  • As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality
  • confidentiality in employment is implicit, regardless of whether employees have signed an agreement.
  • If a member of your staff violates this explicit or implicit agreement, the penalty for breach of confidentiality can be severe and long-lasting.
  • an employee who signs this type of agreement agrees that a violation of confidentiality is also a violation of the employment contract. The penalty for breach of confidentiality isn’t restricted to employees who have signed confidentiality agreements,
  • if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of confidentiality.
  • Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims.
  • Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment.
  • As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.
  • Employers will not look favorably on any prospective employees who were terminated due to a confidentiality breach, or convicted of a crime related to that type of violation.
tvill22

US E-Waste and Planned Obsolescence by Elizabeth Lamb - US Environmental Policy - 0 views

  • In order to increase sales, companies like Apple, Samsung, and Microsoft engage “planned obsolescence” to encourage per capita turnover of cell phones, tablets, computers, increasing electronic consumption and waste in the process.
  • For example, a company might manufacture a phone’s battery so that it breaks down earlier, a new software update might rely extensively on a new kind of hardware, or the manufacturer might make repairing the product so difficult or expensive that it makes more sense to buy a new product altogether.
  • Although e-waste only composed 2% of US landfills in 2019, it is responsible for over 70% of waste toxicity, and it is America’s fastest growing category of municipal waste.
  • ...8 more annotations...
  • Even worse, the US currently has no formal federal legislation regulating e-waste
  • exported up to 40% of its e-waste to other countries.[5] However, the waste landscape is changing quickly: China, a major waste importer, banned foreign waste shipments as of January 2018.[6] As the US must begin processing more waste domestically, it is increasingly important that proper regulations are set in place
  • 25 out of 50 states have independent e-waste recycling policies, but a federal policy has yet to come to fruition
  • Consumer Product Safety Commission possesses the ability to enforce durability standards.
  • Congress should pass an act
  • mandating a warranty on all electronic devices
  • Congress should officially instate a minimum warranty length of 2 years for all electronic devices.
  • By simply extending product lifetimes by even just a quarter through the measures mentioned above, the US can massively reduce the amount of e-waste that pollutes the US.
  •  
    This article talks about planned obsolescence and US e-waste. This article talks about how tech companies engage in planned obsolescence to encourage technology turnover. They talk about ways that the US can stop this planned obsolescence. One way would be to enforce durability standard for products creating a longer life time. This could be partnered with an enforced longer warranty on electronic devices.
shuo zhang

Feds Offer Best Practices for Customer Privacy | Top Stories | | Hospitality Magazine (HT) - 0 views

  • Hospitality industry operators often collect information to better serve their customers.  Information may be collected during various touch points, including employee-guest interactions, the company website, and through business partners, and may include personal identifiable information, preferences, groups with which customers are affiliated, etc.  While customers understand that sharing their personal information helps businesses better serve their needs, they also have a right to know how that personal information is being collected, used and shared.
  • Protecting Consumer Privacy in an Era of Rapid Change:  A Proposed Framework for Business and Policymakers
  • This final report calls on Congress to enact general privacy, data security and breach notification, and data broker legislation in order to protect consumer privacy.
  • ...5 more annotations...
  • The privacy framework applies only to commercial entities that collect non-sensitive data from more than 5,000 customers per year
  • This element recommends that entities build in privacy at every stage of product development. Substantive protections include data security efforts such as encryption, reasonable collection limits, sound retention and disposal practices, and data accuracy. Policies and procedures should be designed that:
  • •Protect personal information from unauthorized access; •Keep personal information accurate and up-to-date; •Require that business partners with which information is shared exercise reasonable efforts to maintain the confidentiality of personal information about customers; •Educate employees regarding privacy and best practices for protecting customer information; •Protect personal information transmitted via websites during online transactions or when using other technology.
  • : A customer should be offered a choice at the time, and in the context, that his or her data would be used.
  • A customer should be provided with reasonable access to company-maintained data.
  •  
    The problem of the security in the internet is always risky for companies. Even though the customer trust the companies, but acctually, the companies sell your information without ask you if you want to share your information. For me, the organization for keeping the customers' information secured is useful and make sense, but I don't believe any companies want to pay for such service. They want to get income through selling the customers' information to other for comercial using. However, if the government make policy and establish law for protecting the customers information, it will be different. I think it will become a trend to promote. 
Alexander Suarez

Education Week: Data-Mining Faces New Privacy Rules - 0 views

  • The Fe
  • The Federal Trade Commission recently outlined new policies that seek to close loopholes that the agency says too often allow websites and online services to gather information improperly from students and turn it over to third parties for advertising purp
  •  
    In essence this "data mining" related article explains how the FTC recently outlined new policies in an effort to close loopholes which allow websites to gather and turnover information gathered to third parties for advertising purposes.   Changes such as videos, photos, locations, etc, which cannot be pulled without parental approval are making impacts on what can be pulled and shared. Another change includes closing a loophole that gives apps/websites directed at children the ability to collect information through plug-ins, without parents permission. In conclusion, these rules are based on the Children s Online Privacy Act of 1998, which gave the FTC the authority to implement/periodically update rules pertaining to "how the law is enforced". These rules will go into effect on July 1, 2013.
1 - 20 of 209 Next › Last »
Showing 20 items per page