ebook img

Hospitality Security: Managing Security in Today’s Hotel, Nightlife, Entertainment, and Tourism Environment PDF

519 Pages·2022·46.378 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Hospitality Security: Managing Security in Today’s Hotel, Nightlife, Entertainment, and Tourism Environment

HOSPITALITY SECURITY Hospitality Security: Managing Security in Today’s Hotel, Nightlife, Entertainment, and Tourism Environment, Second Edition provides experience- based, proven methods for preventing and resolving the challenges faced by today’s hospitality security staff and leadership. The lodging component of a hospitality environment creates challenges to the security professional by its complex set of assets and amenities—e specially when combined with gaming environments. Whether the reader is establishing, or improving, a professional, proactive proprietary security force, or the manager of a boutique hotel, the practical methods described herein are applicable to everyone. Author Darrell Clifton takes the reader through a logical and methodical process to first evaluate what risks are inherent to hospitality environments, how to assess those risks through threat and vulnerability assessments and methods to mitigate, eliminate, or transfer them. The book stresses the importance of prevention and investigation into the root causes of incidents as a tool for avoiding future undesirable events. This is especially important in that each registered guest brings with them their own unique set of circumstances, family values, problems, and social issues. The security function must operate to protect their individual rights, their right to privacy, and their desire to enjoy the facilities they are patronizing while contributing to the revenue stream. This must be balanced with the obligation, or duty, to provide reasonable care from foreseeable harm by the hotel to avoid incidents and litigation. Clifton, an experienced industry veteran, clearly establishes and identifies practical, reasonable, and cost- effective ways to accomplish this balancing of guest enjoyment with guest protection. This new edition includes expanded content on premises liability, security force behavioral recognition, workplace violence, active shooter scenarios, evacuation planning, social media and guest reviews, and hotel scams. Additional coverage on nightclubs and bars has been added including four entirely new chapters on specialized security for events and venues, crime prevention through environmental design (CPTED), advances in technology, and industry trends for the gaming and hospitality sector. Ideal for novices and veterans alike, Hospitality Security, Second Edition is an accessible, reader- friendly reference that enables security directors to evaluate what risks are inherent to hospitality environments, to analyze those risks through threat and vulnerability assessments, and to develop methods to mitigate or eliminate them— all the while keeping customers and personnel safe and improving the bottom line. HOSPITALITY SECURITY Managing Security in Today’s Hotel, Nightlife, Entertainment, and Tourism Environment Second Edition Darrell Clifton Cover Image: Top left, Maksym Fesenko/Shutterstock; top right, sixninepixels/Shutterstock; bottom left, dwphotos/Shutterstock; bottom center, one photo/Shutterstock; bottom right, diy13/Shutterstock. Second edition published 2023 by CRC Press 6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487- 2742 and by CRC Press 4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN CRC Press is an imprint of Taylor & Francis Group, LLC © 2023 Taylor & Francis Group, LLC First edition published by CRC Press 2019 Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www.copyri ght.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978- 750- 8400. For works that are not available on CCC please contact [email protected] Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. ISBN: 978- 0- 367- 48005- 9 (hbk) ISBN: 978- 0- 367- 48018- 9 (pbk) ISBN: 978- 1- 003- 03764- 4 (ebk) DOI: 10.4324/ b23281 Typeset in Palatino by Newgen Publishing UK Dedicated to the victims, survivors, families, and responders to the Las Vegas shooting on October 1st, 2017. May they rest in peace or find their peace. CONTENTS Preface xxix Prologue xxxi About the Author xxxiii What’s with the Pineapple? xxxv 1 Risk Assessment 1 Premises Liability and the Risk Assessment 1 External Risk Assessment 1 Internal Risk Assessment 2 Step 1— Divide the Property 3 Step 2— List Threats 3 Step 3— Severity 4 Step 4— Probability 4 Gathering Local Crime Data 4 Police Data and Statistics 6 Compiling Local Crime Data 7 Gathering Proprietary Incident Data 8 Gathering Market Incident Data 8 Determining Likelihood 8 Determining Risk 9 Foreseeability 10 Notice 11 Managing Foreseeability 12 Managing Risk 13 The Living Document 13 Talking Risk 14 What Does Risk Have to Do with Security? 15 Reacting to Risk 16 Pre- emptive Risk Assessments 17 Managing Threats 17 Many of the Questions that Came from Media and Others after October 1 19 vii CoNTENTS Reasonable Steps 19 Security Plan 20 Crime Prevention 21 The Crime Triangle 21 The Physical Protection System 21 What Is a Plan? 22 Accident/ Incident Prevention 23 Decisions 24 Building the Plan 24 Outlining the Plan 26 Organization 28 Job Description 30 Policies and Procedures 31 Overall Property 32 Specific Areas 33 Incident Action Plan 33 Summary 34 2 Policies and Procedures 37 Hierarchy of Rules 37 Regulations, Standards, and Other Legal Mumbo Jumbo 37 Elements 40 Codes 42 Standards 43 Guidelines 43 Best Practices 43 Company Policies 44 Types of Manuals 44 Policy vs. Procedure 44 Company Manual 45 Security Manual 46 Training Manual 47 Building Your Manual 47 Foreword 47 Department Policies— Section 1 48 Organization— Section 2 48 Employee Policies— Section 3 49 Posts/ Patrol Areas— Section 4 49 viii CoNTENTS Systems/ Procedures— Section 5 50 Crimes and House Policies— Section 6 50 Arrests 50 Emergency Procedures— Section 7 50 Incident Response— Section 8 51 Documentation— Section 9 51 Writing the Manual 51 Other Sources 52 Delegation 53 Compiling 54 Updates 54 Summary 54 Emergency Manual 55 Hazards and Threats 55 Starting the Emergency Manual 56 Testing the Manual 56 Incident Action Plan 56 3 Training 59 Making the Case for Training 59 Ability 59 Consistency 60 Liability 61 Funding Training 62 Guest Safety 62 Liability 63 Training Culture 63 Training Manager 64 Unique Classes 64 Include Everyone in the Process 64 Continue the Training from Day One until the End of Time 65 Quality In Is Quality Out 65 Consistency 66 Training Program 67 Training Components 67 Classroom 67 Training Objective 68 Basic Laws 69 ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.