Atnaujinkite slapukų nuostatas

Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment [Kietas viršelis]

  • Formatas: Hardback, 334 pages, aukštis x plotis: 254x178 mm, weight: 780 g, 6 Tables, black and white; 2 Illustrations, black and white
  • Išleidimo metai: 29-May-2012
  • Leidėjas: CRC Press Inc
  • ISBN-10: 1439874360
  • ISBN-13: 9781439874363
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 334 pages, aukštis x plotis: 254x178 mm, weight: 780 g, 6 Tables, black and white; 2 Illustrations, black and white
  • Išleidimo metai: 29-May-2012
  • Leidėjas: CRC Press Inc
  • ISBN-10: 1439874360
  • ISBN-13: 9781439874363
Kitos knygos pagal šią temą:
A security director must have knowledge of criminal and civil law, risk and personnel management, budgeting and finance, and a host of other areas in order to be effective. Hospitality Security: Managing Security in Todays Hotel, Lodging, Entertainment, and Tourism Environment provides experience-based, proven methods for preventing and resolving the challenges faced by todays hospitality practitioner.

Designed for both novice security professionals and industry veterans in need of a reference, the book covers:





Risk assessment, where threats and vulnerabilities are calculated with probabilities to determine risk The security plan, where you decide how to apply various layers of control to mitigate the risks Budgeting: the amount of money available to implement the plan determines the next step Policies: how to document policies into a security manual, training manual, emergency procedures manual, and incident action plan Staffing: scheduling, wages, deployment, and contract security Training, including specialized topics such as use of force and bike patrol Physical security and patrol procedures Alarm and camera systems and various software programs Emergency procedures and response Investigations, interviews, and crime analysis Executive skills: learning from proven leadership styles

Ideal for novices and veterans alike, this accessible, reader-friendly primer enables security directors to evaluate what risks are inherent to hospitality environments, analyze those risks through threat and vulnerability assessments, and develop methods to mitigate or eliminate themall the while keeping customers and personnel safe and improving the bottom line.

Recenzijos

"Clifton takes his years as a proven industry professional and converts it in writing that should become a part of any hospitality security directors professional library. This book will demonstrate to the reader what a true professional security director is and ways to become one."Alan W. Zajic, CPP, CSP, from the Foreword

"Darrell has produced a magnificent compendium covering all aspects of hospitality, entertainment, and tourism security. A must-read for those entering the hospitality security industry after college or from law enforcement. The book serves as an excellent reference resource for the seasoned hospitality security professional."H. Skip Brandt, CPP, CLSD, Executive Director, International Lodging Safety & Security Association

"Darrells vast knowledge and experience show through in his book. Hospitality Security is a challenge given its many moving parts; however, Darrell has created a road map for success that can be used at all levels of management and/or discipline. The book should be read by every operational manager to ensure their property is protected from the many forms of risk."James C. Reynolds, CPP, CLSD, Hilton Worldwide

"Very well structured, compiled, and written. Darrell Clifton's book, Hospitality Security is a tour de force a landmark book in the hospitality industry and will remain so for many, many years to come."L. Burke Files, President, Financial Examinations & Evaluations, Inc., Tempe, Arizona

"An excellent resource for every security practitioner Those with security responsibilities in the hospitality industry would certainly benefit from the author's experience regarding "best practices," but I recommend it to every security professional."Security Management

Foreword xxi
Preface xxiii
Introduction xxv
About the Author xxvii
SECTION 1 Planning
1 Risk Assessment
3(12)
External Risk Assessment
3(1)
Internal Risk Assessment
3(3)
Step 1 Divide the Property
4(1)
Step 2 List Threats
4(1)
Step 3 Severity
5(1)
Step 4 Probability
6(1)
Gathering Local Crime Data
6(1)
Compiling Local Crime Data
7(1)
Gathering Proprietary Incident Data
8(1)
Gathering Market Incident Data
8(1)
Determining Likelihood
8(1)
Determining Risk
9(1)
Foreseeability
10(1)
Managing Foreseeability
11(4)
2 Security Plan
15(30)
Security Plan
16(1)
Outlining the Plan
17(10)
Department Mission
17(1)
Organization
18(2)
Policies and Procedures
20(1)
Overall Property
21(2)
Specific Areas
23(1)
Deployment
23(1)
Work Force
24(1)
Combining Layers
25(1)
Summary
26(1)
Specialized Patrol
27(6)
Armed Security
27(1)
Policy
28(1)
Training
29(1)
Discipline/Enforcement
29(1)
Nonlethal Weapons
30(1)
Dispatch
31(1)
VIP Protection
32(1)
Special Events
32(1)
Medical Program
33(4)
Defibrillators
33(1)
Justification
33(1)
Medical Sponsor
33(1)
Training
33(1)
Policy
34(1)
Storage and Access
35(1)
Follow-Up
35(1)
Medical Calls
35(1)
Medical Personnel
36(1)
Medical Equipment
37(1)
Antiterrorism
37(4)
Standoff
40(1)
Metal Detectors
41(1)
X-Ray Luggage
41(1)
Bomb Dogs
41(1)
Countersurveillance
41(1)
Video Surveillance
41(1)
Domestic Terrorism
41(1)
Data Security
42(2)
Data Investigations
44(1)
3 Budgeting
45(12)
Budgeting Basics
45(2)
The Process
45(1)
Prior Year
45(1)
New Year
46(1)
Full-Time Equivalent (FTE)
46(1)
Expenses
46(1)
The Paperwork
47(1)
Your Budget
47(1)
Capital Expenses
47(2)
Security Revenue
49(1)
Restitution
49(1)
Parking
49(1)
Special Events
49(1)
Lost and Found
50(1)
Back-Charging
50(1)
Justifying Security in a Down Market
50(1)
Crime Rates
50(1)
Internal Crime
51(1)
Guest Comfort Level
51(1)
Terrorism
51(1)
Making Those Cuts
51(6)
Creative Scheduling
51(1)
Briefing
52(1)
Supervisors
52(1)
Spending
52(1)
Procedural Changes
52(1)
Patrol Areas
53(1)
Arrests/Reports
53(4)
SECTION 2 Policies
4 Security Manuals
57(16)
Hierarchy of Rules
57(1)
Types of Manuals
58(1)
Company Manual
58(1)
Security Manual
59(1)
Training Manual
59(1)
Creating the Outline
59(7)
Foreword
60(1)
Department Policies---Section 1
60(1)
Organization---Section 2
60(1)
Employee Policies---Section 3
60(1)
Posts/Patrol Areas---Section 4
61(1)
Systems/Procedures---Section 5
61(1)
Laws Pertaining to Security---Section 6
61(1)
Laws Pertaining to Guests and Employees---Section 7
62(1)
Emergency Procedures---Section 8
62(1)
Incident Response---Section 9
62(1)
Documentation---Section 10
62(4)
Writing the Manual
66(2)
Other Sources
67(1)
Delegation
67(1)
Compiling
68(1)
Updates
68(1)
Emergency Manual
68(2)
Hazards and Threats
69(1)
Starting the Emergency Manual
69(1)
Testing the Manual
69(1)
Incident Action Plan
70(3)
Incident Overview
70(1)
Location
70(1)
Date/Time
70(1)
Workforce---Management
70(1)
Workforce---Posts
70(1)
Special Assignments
70(1)
Special Procedures
71(1)
Other Department Procedures
71(1)
Miscellaneous
71(2)
5 Staffing
73(16)
Hiring
73(4)
Recruitment
73(1)
Application Process
74(1)
Interview
75(1)
Second interview
76(1)
Group Interview
77(1)
Background
77(1)
Drug Testing
78(1)
Before Hiring
78(1)
Orientation
79(1)
Deployment
79(1)
Schedules
80(1)
Wage Structure
81(1)
Survey
81(1)
Base Wage
81(1)
Raises
81(1)
Training
82(1)
Experience
82(1)
Benefits
82(1)
Reputation
82(1)
Officer Development Program (ODP)
82(2)
Proprietary versus Contract
84(1)
Management
85(4)
Responsibility
85(1)
Supervision
86(1)
Training and Coaching
86(1)
Discipline
86(1)
Delegation
86(1)
Managing Managers
87(2)
6 Training
89(16)
Funding Training
89(3)
Liability
89(2)
Reduced Turnover
91(1)
Quality in Is Quality out
91(1)
Consistency
92(1)
Training Program
92(5)
Academy
92(2)
Field Training
94(1)
Task List
94(1)
Evaluations
95(1)
In-Service Training
95(1)
Defensive Tactics
96(1)
Use of Force Policy
97(5)
Use of Force
98(1)
Officer Presence
99(1)
Verbal Commands
99(1)
Soft Hand Controls
100(1)
Chemical Spray
100(1)
Hard Hand Controls
100(1)
Impact Weapons
101(1)
Deadly Force
101(1)
Special Training
102(1)
Bike Patrol
102(1)
Equipment
102(1)
Training
102(1)
Documentation
103(2)
7 Safety
105(20)
Program
105(4)
Compliance
105(1)
Awareness
106(1)
Training
107(1)
Communication
108(1)
Insurance Company
109(1)
Workers' Comp
109(1)
Accidents
109(1)
Documentation
110(1)
Risk Management
110(2)
Restroom Logs
111(1)
Safety Sweeps
111(1)
Spill Stations
112(1)
Escalator Shutdown
112(1)
Security Awareness
112(2)
Terrorism
112(1)
Emergency Response
113(1)
Workplace Violence
113(1)
Workplace Violence
114(6)
Type I Criminal Acts
114(1)
Type II Customer/Client/Patient Violence
114(1)
Type III Worker-on-Worker Violence
114(1)
Type IV Violence Stemming from a Personal Relationship
114(1)
History
115(1)
Conclusions
116(1)
Anger
116(1)
Workplace Violence Policy
117(1)
Developing the Program
117(1)
Related Policies
118(1)
Training Program
119(1)
Threat Management Team (TMT)
119(1)
Domestic Violence
120(1)
Bed Bugs
121(4)
SECTION 3 Physical Security
8 Patrol Procedures
125(54)
Posts
125(2)
Post Orders
127(3)
Hotel Policies and Procedures
130(9)
Room Entry
130(1)
Housekeeping
131(1)
Marijuana
132(1)
Service Animals
132(1)
Wheelchairs or Other Mobility Devices
132(1)
Parties in a Room
132(1)
Underage Drinkers
133(1)
Domestic Fights
133(1)
Cooking and Other Unsafe Practices
134(1)
Door Ajar
134(1)
Welfare Check
135(1)
Privacy
135(1)
Unknown Guest
136(1)
Room Inventories
137(1)
Weapons
137(1)
Room Thefts
138(1)
Violent Crimes
138(1)
Key Check Stations
139(1)
Restrooms
139(2)
The Lobby
140(1)
Lost and Found
141(1)
Restaurants
142(1)
Walkouts
142(1)
Employee Food Theft
143(1)
Retail Policies
143(4)
Shrinkage
143(1)
Shoplifting
143(1)
Catching Shoplifters
144(1)
Surveillance
144(1)
Arrests
145(1)
Preventing Shoplifting
145(2)
Flash Mobs
147(1)
Spas and Pools
148(3)
Lifeguards
148(1)
Pool Rules
149(1)
Safety Equipment
149(1)
Hot Tubs
149(1)
Spa Treatments
150(1)
Chemical Hazards
150(1)
Pool Parties
150(1)
Theft
151(1)
Valet
151(2)
Employee Theft
152(1)
Guest Accidents and Injuries
152(1)
Vehicle Damage
152(1)
Conventions
153(2)
Risk Assessment
153(1)
Security Plan
153(1)
Special Event Permits
154(1)
Outdoor Events
154(1)
Parking
155(2)
Cleanliness
155(1)
Lighting
156(1)
Access Control
156(1)
Security Patrol
156(1)
Parking Enforcement
157(1)
Casino Security
157(6)
Casino Controls
158(1)
Regulation Hierarchy
159(1)
Casino Patrol
160(1)
Detention
161(1)
Deployment
161(1)
Innovation
162(1)
Nightclubs and Bars
163(9)
Need for Security
163(1)
Human Security
163(1)
Door Host
163(3)
Floor Patrol
166(1)
Alcohol Service
167(1)
Dress Code
168(1)
In and out Privileges
168(1)
Wristbands and Stamps
169(1)
Gratuities
169(1)
Contract Security
170(1)
Staffing Ratio
170(1)
Occupancy
171(1)
Room Search
171(1)
Manual
171(1)
Security Measures
172(7)
Behavioral Recognition
172(2)
Search Stations
174(1)
Arrests
175(1)
Refuse Service
175(1)
Trespassing
176(1)
Last Resort
176(1)
Procedures
176(1)
Video Patrol
177(1)
Patrol Routes
177(1)
Patrol Techniques
178(1)
Camera Positions
178(1)
Smaller Operations
178(1)
9 Systems and Equipment
179(22)
Fire Alarms
179(3)
Automatic Detectors
180(1)
Manual Switches
180(1)
Control Panel
180(1)
Alert Devices
181(1)
Suppression
181(1)
Standpipes
182(1)
Panic Alarms
182(2)
Installation
183(1)
Associated Equipment
183(1)
Operation
184(1)
Intrusion Alarms
184(1)
Main Processor
185(1)
Monitoring
185(1)
Other Monitoring Systems
185(1)
Access Control
186(1)
Reader
186(1)
Authorization
186(1)
Mechanism
187(1)
Key Control
187(2)
Access Levels
187(1)
Grand Masters
188(1)
CCTV
189(5)
Cameras
189(2)
Camera Mounting
191(1)
The Switch
192(1)
Monitors
192(1)
Recorders
193(1)
Reporting Software
194(1)
Tracking Systems
195(2)
History
195(1)
Today
195(1)
Buttons
195(1)
The Reader
196(1)
Tracking Software
196(1)
Lost and Found
197(1)
Access Rights
197(1)
Audit Trail
197(1)
User Access
197(1)
Employee Lockers
197(1)
Lockers
197(1)
Locker Placement
198(1)
Security for Lockers
198(1)
Key Dispensers
198(3)
10 Emergency Procedures
201(24)
Planning
201(4)
Team
202(1)
Evacuation Planning
203(2)
Success
205(1)
National Incident Management System
205(2)
Communications
205(1)
Resource
206(1)
Command
207(1)
Business Continuity
207(2)
Emergency Response
209(16)
Medical Calls
210(1)
Active Shooter
210(2)
Fire Alarm
212(1)
Actual Fire
213(1)
Bomb Threat
213(4)
Bomb Evacuation
217(1)
Bomb Threat Call-Taker Instructions
217(1)
Explosion
217(1)
Suicidal Subject
218(1)
Earthquake
218(1)
Weather Emergency
219(1)
Riots
219(1)
Gas or Chemical Leak
220(1)
Bioterrorism
221(1)
Labor Strike
221(1)
Power Failure
222(1)
Escalator Accidents
222(1)
Missing Child
223(2)
11 Investigations
225(42)
Preliminary Investigations
225(2)
Response to Calls
225(1)
Training
226(1)
Photography
226(1)
Interview
226(1)
Evidence
227(1)
Report Writing
227(2)
Format
227(1)
Report Data
228(1)
Narrative
228(1)
Corrections
228(1)
Hint
229(1)
Attachments
229(1)
Investigations
229(12)
Report Follow-Up
229(2)
Personnel Investigations
231(1)
Interview
232(1)
Victim
232(1)
Witnesses
233(1)
Nonwitnesses
233(1)
Character Witness
233(1)
Suspect Employee
233(1)
Postinterview Conference
234(1)
Interrogation
235(1)
Resignation versus Termination
235(1)
Conclusion
236(1)
Cooperation
236(1)
Unions
236(1)
Translators
237(1)
Burden of Proof
237(1)
Criminal Investigation
237(1)
Private versus Public
238(1)
Restitution
238(1)
Workers' Compensation Investigation
239(1)
Guest Claims
239(1)
Triggers
240(1)
Statements
240(1)
Witnesses
240(1)
Analysis
241(5)
Metrics
241(1)
Data Sources
241(1)
Creating a Spreadsheet
242(1)
Crime Analysis
242(1)
Location
243(1)
Crime Type
243(1)
Time
243(1)
Suspect
243(1)
Other Sorts
244(1)
Crime Triangle
244(1)
Off-Property Incidents
245(1)
Reacting to the Data
246(1)
Special Operations
246(4)
Undercover Operations
246(1)
Outside Agencies
246(1)
Private Outside Agencies
247(1)
In-House Operations
247(1)
Covert Cameras
248(1)
Room Losses
249(1)
Bag Checks
249(1)
Drug Testing
250(2)
Random Testing
250(1)
Postaccident
251(1)
Cause Testing
251(1)
Prostitution
252(3)
Front Desk
253(1)
Bell Desk
253(1)
Suspicious Persons
253(1)
Hotel Rooms
253(1)
Homosexual Prostitution
254(1)
Outside
254(1)
Intervention
254(1)
Abandoned Luggage
255(1)
Risk Assessment
255(1)
Back Track
255(1)
Internal Procedures
256(1)
Official Response
256(1)
Internal Crime
256(8)
Internal Audit
257(1)
Security Audits
257(1)
Types of Audits
258(1)
Performing Audits
258(1)
Accounting
259(1)
Cashiers
260(1)
Restaurants
261(1)
Receiving
262(1)
Outgoing Theft
262(1)
Receiving Theft
262(1)
False Orders and Return Thefts
263(1)
Lost Merchandise
263(1)
Housekeeping
263(1)
Security
263(1)
Background Checks
264(3)
SECTION 4 The Security Executive
12 Executive Skills
267(18)
Executive Growth
267(1)
Finding Your Place
268(1)
Cooperation and Collaboration
268(1)
Executive Meetings
269(1)
Communicating with the Boss
270(1)
Communicating with Your Staff
271(5)
Maintaining Morale
272(1)
Officer Empowerment
273(2)
Open Door Policy
275(1)
Personal Growth
276(1)
Your Work Ethic
276(1)
Stress
276(1)
Time Management
277(1)
Delegation
277(1)
Personal Habits
277(2)
Visibility
277(1)
Respect
278(1)
Attitude
278(1)
Networking
279(2)
Regional Training
281(1)
Regional Communication
281(1)
Collaborating with Other Properties
281(1)
Mutual Aid
281(1)
Regional Disaster Planning
282(2)
Summary
284(1)
Index 285
Darrell Clifton, CPP, is Director of Security at Circus Circus Hotel Casino in Reno, Nevada. During his 25 years in Security Management, he has spearheaded the creation, writing, and implementation of new policies and programs on such topics as Workplace Violence Prevention, Hotel Security, Casino Security and Surveillance, Crime Prevention, Emergency Preparedness and Business Continuity, Drug Recognition, and many others. Clifton chairs several community and national organizations, including the Downtown Police Tax District, Alcohol Advisory Board, Washoe County Business Preparedness Committee, and the Northern Nevada Chapter of American Society for Industrial Security (ASIS). He also sits on the board of directors for Secret Witness, AlertID, and is the vice chairman of the Hospitality, Entertainment and Tourism Council. He is a frequent contributor to Security Magazine, Casino Journal, and a speaker at ASIS; Reed Exhibitions; University of Nevada, Reno; University of Nevada, Las Vegas; and Gamepath. Clifton is also a FEMA-certified Continuity of Operations Manager and participates in several state task forces to plan, write, and implement Continuity of Operations (COOP), Continuity of Government (COG), and other emergency plans. He was named by Security Magazine as one of the most influential people in the security industry.