SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Room status, key control and
occupancy ratio.
Name : shyam mishra
Roll. No : 33 hm sy bba
Subject : front office management
Key and Key Control
•A key is a device which is used to open a
lock. A typical key consist of two parts:
•The blade, which slides into the keyhole to
unlock the door
•The bow, which is left protruding so that
torque can be applied by the user to open the
door.
•The blade is usually designed to open one
specific lock, although master keys are
designed to open sets of similar locks.
TYPES OF KEYS
• Emergency Key
• Master Key
• Guest Key
• Supply Key
Emergency Key/E-Key
•The emergency key opens all guestroom doors, even
when they are double locked. It can be used, for example,
to enter a room when the guest needs help and is unable to
reach or open the door.
•The emergency key should be highly protected and its
use strictly controlled and recorded; it should never leave
the property.
•One procedure for emergency keys is to have them
locked in hotel safe, a safe deposit box or a metal cabinet
and signed out by the individual needing one.
•The log should be dated and signed by the individual
taking the key.
• The keys should not be used on day-to-day basis.
Master Key
•A master key is designed to open a set of several locks.
These keys open all guestroom that are not double-locked.
•These locks also have keys which are specific to each one
(the change key) and cannot open any of the others in the
set.
•Locks which have master keys have a second set of the
mechanism used to open them which is identical to all of the
others in the set of locks.
•For example, master keyed pin tumbler locks will have two
shear points at each pin position, one for the change key and
one for the master key.
•A far more secure (and more expensive) system has two
cylinders in each lock, one for the change key and one for the
master key.
•Larger organizations, with more complex
"grandmaster key" systems, may have several
master key systems where the top level
grandmaster key works in all of the locks in
the system.
•A master key opens all guestrooms that are
not double locked. Depending upon the need,
the master key may be further established as
a housekeeping staff master key, a floor
supervisor master key, and a grand master
key for management purpose.
1. Grand Master Key
Key operates all locks in the Hotel. Including
laundry and linen rooms.
2. Floor Supervisors Master Key
Key operates all sections on the floor/ floors
supervised by the particular supervisor.
3. Housekeeping Staff Master Key
Key operates all rooms serviced by
particular
room maid or housekeeping staff.
Guest Key
• The hotel guest room key is normally
issued to open only one room for which it
was intended, viz. individualised key for
each lock.
• If the guest room lock is in shut-out mode
the guest room key can neither open it nor
lock from outside of the room.
KEY-CARDS
• Metal room keys are being replaced by
electronically coded key-cards.
• A key card, while not actually considered a
key, is a plastic card which stores a digital
signature that is used with electronic
access control locks.
• It is normally a flat, rectangular piece of
plastic and may also serve as an ID card.
Key Card
• There are several popular type of key cards in
use and include the mechanical hole card, bar
code card, magnetic stripe card, smart card
(embedded with a read / write electronic
microchip), and RFID proximity cards.
• The key card is used by presenting it to a card
reader; swiping or inserting of magnetic stripe
cards, merely being brought into close proximity
to a sensor.
• Key-cards have the capability of being randomly
coded at the point of registration, which re-
emphasizes the guest perception of room
security. Key-card control is computer-based and
therefore creates the necessary audit trail
automatically.
• Master keys can be changed in a matter of a few
keystrokes and lost key-cards are easily
removed from the system.
• One of the best security features is the ability of
the computer to investigate each door lock and
get a printout of everyone who accessed a
particular room. This dramatically cuts down on
theft from the rooms by hotel employees.
• The security advantage of the key-cards has
made it popular and many medium and large
sized hotels are adopting this key-card system.
Security
• Above keys will not open the lock when the
Guest has Double Locked it from inside.
• From a security point of view, master keying is
undesirable; but from a practical point of view,
however it is necessary.
• Master keying presents two security drawbacks:
• First is the danger that if a master key is lost or
stolen, several locks in the system would be
compromised, thus providing access to all those
locks.
• Second is the loss of master key.
Key Control
• A system of key control is essential to the security of a
lodging property.
It is the process of reducing theft and other security-
related incidents by carefully monitoring and tracking the
use of keys
All keys whether metal or electronic should be
adequately controlled. The security of a key lock system
is seriously weakened when keys are issued to a great
number of people or to anyone who has no legitimate
need for a key.
The best lock in the world may be unable to protect a
property or its guests if poor key control allows a criminal
to obtain a key to that lock.
•
•
•
If there is no key card lock system, the following
policies should be considered:
A) CODING : Precautions to be taken
•Room keys must not have any form of tag that
identifies the hotel.
•Keys must not have the number on them. They
must be identified by a numeric or alphabetic code.
The code should not be identical to the building or
the room number.
B) Issuing Keys
Only authorised person should be allowed to
access the keys and a high level of security should
be maintained.
ADVANTAGES
• It ensures complete security as no room number is
printed on card
At the time of issue more than one keycard can be given
to the guest if there is a double occupancy in the room
It is possible to trace the receptionist who issues the
keys from the print out at the end of the day (to avoid
unnecessary or extra duplication which may call for
security problems)
An alarm is set on when a wrong key card is used
thereby alerting security.
It helps the guest to avail other credit facilities form the
various outlets of the hotel. It also helps in conserving
electricity in the guest room
•
•
•
•
Handling Guestroom Keys
• These key have the minimum access,
unlocking just one room.
• When keys are given to guest the room
number must not be spoken aloud.
• The guest should be explained about his
security maintained through coding
system.
• During the checkout, the guest should be
asked for their room keys.
Handling Master & Sub-Master
Keys
• All the floor master keys, room master
keys, grand master keys should be signed
out each time they are taken and their
return noted in a key control sheet
• All the keys should be stamped “Do Not
Duplicate”
• Emergency Keys should be kept in a
safety box.
Custody of keys
• Employees should not be allowed to loan
the keys assigned to them to one another.
• Employees should handover keys
whenever they leave the property, even
for the meal breaks.
• Individuals who have been master keys
should be checked from time to time.
GUIDING PRINCIPLES IN KEY
CONTROL SYSTEM
• Security of keys is essential from the moment
they arrive on site. Keys should be stored
separately and securely.
• No unauthorised person should be allowed
access to any key, either to examine or handle
it, since a photograph or impression can be
taken in few seconds and duplicate
subsequently made.
• Keep a log book of all keys signed out.
• Establish protocol for distribution of keys.
• Use keys that do not identify the property’s
name, address, logo, or room number.
• Perform an annual key audit.
• When keys are lost or stolen, the locks
should be changed or rotated to another
part of the property.
• Authorised employees should remind
guests to return keys at check-out.
• The loss or suspected compromise of a key
should be reported immediately and, after
due investigation, a decision be made as to
whether or not the lock should be changed.
• Place well-secured key return boxes in the
lobby, at exit points of the property, and in
courtesy vehicles.
KEY WORDS
• Key Card : A plastic card which stores digital
signature that is used to control locks.
• Emergency Key : The key used to open all
guestrooms, even when they are double locked.
• Grand Master Key : Key that opens all locks in
a hotel (including laundry and linen rooms).
• Master Key : A key which is designed to open a
set of locks.

Weitere ähnliche Inhalte

Ähnlich wie 33 Room status, key control.pptx

LOCKSMITH IN DUBLIN
LOCKSMITH IN DUBLINLOCKSMITH IN DUBLIN
LOCKSMITH IN DUBLINtisnatisna2
 
KEY REPLACEMENT IN DUBLIN
KEY REPLACEMENT IN DUBLINKEY REPLACEMENT IN DUBLIN
KEY REPLACEMENT IN DUBLINtisnatisna2
 
Safety and Security
Safety and SecuritySafety and Security
Safety and SecurityMohd Hazique
 
HIRMS COMPLETE DOOR LOCK LIST
HIRMS COMPLETE DOOR LOCK LIST HIRMS COMPLETE DOOR LOCK LIST
HIRMS COMPLETE DOOR LOCK LIST HARIS K.E.
 
Bank locker system
Bank locker systemBank locker system
Bank locker systemRahul Wagh
 
Lea 2 protective locks and Keys
Lea 2 protective locks and KeysLea 2 protective locks and Keys
Lea 2 protective locks and KeysColline Pecdasen
 
Elevate Home Protection with Superior Door Cylinder Locks
Elevate Home Protection with Superior Door Cylinder LocksElevate Home Protection with Superior Door Cylinder Locks
Elevate Home Protection with Superior Door Cylinder LocksHarrison Locks
 
security issues in retailing.pptx
security issues in retailing.pptxsecurity issues in retailing.pptx
security issues in retailing.pptxRenu Lamba
 
Upgradation in Hotel & Guest Security
Upgradation in Hotel & Guest SecurityUpgradation in Hotel & Guest Security
Upgradation in Hotel & Guest SecurityMudit Grover
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATUREravijain90
 
Chubb lock replacement.pptx
Chubb lock replacement.pptxChubb lock replacement.pptx
Chubb lock replacement.pptxnandusharma10
 
Hotel locks-solitaire-710-ii-brochure
Hotel locks-solitaire-710-ii-brochureHotel locks-solitaire-710-ii-brochure
Hotel locks-solitaire-710-ii-brochureMail Box Production
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmSai Kumar
 
Chapter 7: Security & the Lodging Industry
Chapter 7: Security & the Lodging IndustryChapter 7: Security & the Lodging Industry
Chapter 7: Security & the Lodging IndustryNicole Hay-Walters
 
WHAT IS SMART HOME p6 demo.pptx
WHAT IS SMART HOME p6 demo.pptxWHAT IS SMART HOME p6 demo.pptx
WHAT IS SMART HOME p6 demo.pptxMalarM11
 
Aaa lock smith company overview
Aaa lock smith   company overviewAaa lock smith   company overview
Aaa lock smith company overviewaaalocksmithinc
 
Best Self Storage Security Cameras Solutions
Best Self Storage Security Cameras SolutionsBest Self Storage Security Cameras Solutions
Best Self Storage Security Cameras SolutionsNexlar Security
 

Ähnlich wie 33 Room status, key control.pptx (20)

LOCKSMITH IN DUBLIN
LOCKSMITH IN DUBLINLOCKSMITH IN DUBLIN
LOCKSMITH IN DUBLIN
 
KEY REPLACEMENT IN DUBLIN
KEY REPLACEMENT IN DUBLINKEY REPLACEMENT IN DUBLIN
KEY REPLACEMENT IN DUBLIN
 
Safety and Security
Safety and SecuritySafety and Security
Safety and Security
 
HIRMS COMPLETE DOOR LOCK LIST
HIRMS COMPLETE DOOR LOCK LIST HIRMS COMPLETE DOOR LOCK LIST
HIRMS COMPLETE DOOR LOCK LIST
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Lea 2 protective locks and Keys
Lea 2 protective locks and KeysLea 2 protective locks and Keys
Lea 2 protective locks and Keys
 
SMART DOOR LOCKS FOR HOTELS AND RESIDENCES
SMART DOOR LOCKS FOR HOTELS AND RESIDENCESSMART DOOR LOCKS FOR HOTELS AND RESIDENCES
SMART DOOR LOCKS FOR HOTELS AND RESIDENCES
 
Elevate Home Protection with Superior Door Cylinder Locks
Elevate Home Protection with Superior Door Cylinder LocksElevate Home Protection with Superior Door Cylinder Locks
Elevate Home Protection with Superior Door Cylinder Locks
 
Ilco in-room-safes
Ilco in-room-safesIlco in-room-safes
Ilco in-room-safes
 
Are your crypto keys safe?
Are your crypto keys safe?Are your crypto keys safe?
Are your crypto keys safe?
 
security issues in retailing.pptx
security issues in retailing.pptxsecurity issues in retailing.pptx
security issues in retailing.pptx
 
Upgradation in Hotel & Guest Security
Upgradation in Hotel & Guest SecurityUpgradation in Hotel & Guest Security
Upgradation in Hotel & Guest Security
 
DIGITAL SIGNATURE
DIGITAL SIGNATUREDIGITAL SIGNATURE
DIGITAL SIGNATURE
 
Chubb lock replacement.pptx
Chubb lock replacement.pptxChubb lock replacement.pptx
Chubb lock replacement.pptx
 
Hotel locks-solitaire-710-ii-brochure
Hotel locks-solitaire-710-ii-brochureHotel locks-solitaire-710-ii-brochure
Hotel locks-solitaire-710-ii-brochure
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsm
 
Chapter 7: Security & the Lodging Industry
Chapter 7: Security & the Lodging IndustryChapter 7: Security & the Lodging Industry
Chapter 7: Security & the Lodging Industry
 
WHAT IS SMART HOME p6 demo.pptx
WHAT IS SMART HOME p6 demo.pptxWHAT IS SMART HOME p6 demo.pptx
WHAT IS SMART HOME p6 demo.pptx
 
Aaa lock smith company overview
Aaa lock smith   company overviewAaa lock smith   company overview
Aaa lock smith company overview
 
Best Self Storage Security Cameras Solutions
Best Self Storage Security Cameras SolutionsBest Self Storage Security Cameras Solutions
Best Self Storage Security Cameras Solutions
 

Mehr von shyammishra59

Event Management PPT.pptx
Event Management PPT.pptxEvent Management PPT.pptx
Event Management PPT.pptxshyammishra59
 
shyamMishra_33_PPT.pptx
shyamMishra_33_PPT.pptxshyamMishra_33_PPT.pptx
shyamMishra_33_PPT.pptxshyammishra59
 
Hotel Industrial training report
 Hotel Industrial training report Hotel Industrial training report
Hotel Industrial training reportshyammishra59
 
shyam_33_cihs_PPT1.pptx
shyam_33_cihs_PPT1.pptxshyam_33_cihs_PPT1.pptx
shyam_33_cihs_PPT1.pptxshyammishra59
 
CPI_PROJECT REPORT_33_HM.pptx
CPI_PROJECT REPORT_33_HM.pptxCPI_PROJECT REPORT_33_HM.pptx
CPI_PROJECT REPORT_33_HM.pptxshyammishra59
 
33 Front office operation in star hotel.pptx
33 Front office operation in star hotel.pptx33 Front office operation in star hotel.pptx
33 Front office operation in star hotel.pptxshyammishra59
 
33 Front office management and revenue management tool.pptx
33 Front office management and revenue management tool.pptx33 Front office management and revenue management tool.pptx
33 Front office management and revenue management tool.pptxshyammishra59
 
common food born microorganism and its characteristic.pptx
common food born microorganism and its characteristic.pptxcommon food born microorganism and its characteristic.pptx
common food born microorganism and its characteristic.pptxshyammishra59
 
MANAGEMENT AND SANITATION.pptx
MANAGEMENT AND SANITATION.pptxMANAGEMENT AND SANITATION.pptx
MANAGEMENT AND SANITATION.pptxshyammishra59
 
Spoilage of different food product.pptx
Spoilage of different food product.pptxSpoilage of different food product.pptx
Spoilage of different food product.pptxshyammishra59
 
INTRODUCTION_TO_VOLUME_COOKERY.ppt
INTRODUCTION_TO_VOLUME_COOKERY.pptINTRODUCTION_TO_VOLUME_COOKERY.ppt
INTRODUCTION_TO_VOLUME_COOKERY.pptshyammishra59
 
Humanvaluesandethics.pptx
Humanvaluesandethics.pptxHumanvaluesandethics.pptx
Humanvaluesandethics.pptxshyammishra59
 
Inventionofelevator.pptx
Inventionofelevator.pptxInventionofelevator.pptx
Inventionofelevator.pptxshyammishra59
 
Challengesin food servicesoperations.pptx
Challengesin food servicesoperations.pptxChallengesin food servicesoperations.pptx
Challengesin food servicesoperations.pptxshyammishra59
 
History of tandoor.pptx
History of tandoor.pptxHistory of tandoor.pptx
History of tandoor.pptxshyammishra59
 
Kitchenequipment.pptx
Kitchenequipment.pptxKitchenequipment.pptx
Kitchenequipment.pptxshyammishra59
 

Mehr von shyammishra59 (20)

Event Management PPT.pptx
Event Management PPT.pptxEvent Management PPT.pptx
Event Management PPT.pptx
 
shyamMishra_33_PPT.pptx
shyamMishra_33_PPT.pptxshyamMishra_33_PPT.pptx
shyamMishra_33_PPT.pptx
 
Hotel Industrial training report
 Hotel Industrial training report Hotel Industrial training report
Hotel Industrial training report
 
shyam_33_cihs_PPT1.pptx
shyam_33_cihs_PPT1.pptxshyam_33_cihs_PPT1.pptx
shyam_33_cihs_PPT1.pptx
 
PPT1 1.pptx
PPT1 1.pptxPPT1 1.pptx
PPT1 1.pptx
 
CPI_PROJECT REPORT_33_HM.pptx
CPI_PROJECT REPORT_33_HM.pptxCPI_PROJECT REPORT_33_HM.pptx
CPI_PROJECT REPORT_33_HM.pptx
 
33 Front office operation in star hotel.pptx
33 Front office operation in star hotel.pptx33 Front office operation in star hotel.pptx
33 Front office operation in star hotel.pptx
 
33 Front office management and revenue management tool.pptx
33 Front office management and revenue management tool.pptx33 Front office management and revenue management tool.pptx
33 Front office management and revenue management tool.pptx
 
common food born microorganism and its characteristic.pptx
common food born microorganism and its characteristic.pptxcommon food born microorganism and its characteristic.pptx
common food born microorganism and its characteristic.pptx
 
MANAGEMENT AND SANITATION.pptx
MANAGEMENT AND SANITATION.pptxMANAGEMENT AND SANITATION.pptx
MANAGEMENT AND SANITATION.pptx
 
Spoilage of different food product.pptx
Spoilage of different food product.pptxSpoilage of different food product.pptx
Spoilage of different food product.pptx
 
INTRODUCTION_TO_VOLUME_COOKERY.ppt
INTRODUCTION_TO_VOLUME_COOKERY.pptINTRODUCTION_TO_VOLUME_COOKERY.ppt
INTRODUCTION_TO_VOLUME_COOKERY.ppt
 
HKO ppt 1(14).pptx
HKO ppt 1(14).pptxHKO ppt 1(14).pptx
HKO ppt 1(14).pptx
 
FFO.pptx
FFO.pptxFFO.pptx
FFO.pptx
 
SOLAR ENERGY .pptx
SOLAR ENERGY .pptxSOLAR ENERGY .pptx
SOLAR ENERGY .pptx
 
Humanvaluesandethics.pptx
Humanvaluesandethics.pptxHumanvaluesandethics.pptx
Humanvaluesandethics.pptx
 
Inventionofelevator.pptx
Inventionofelevator.pptxInventionofelevator.pptx
Inventionofelevator.pptx
 
Challengesin food servicesoperations.pptx
Challengesin food servicesoperations.pptxChallengesin food servicesoperations.pptx
Challengesin food servicesoperations.pptx
 
History of tandoor.pptx
History of tandoor.pptxHistory of tandoor.pptx
History of tandoor.pptx
 
Kitchenequipment.pptx
Kitchenequipment.pptxKitchenequipment.pptx
Kitchenequipment.pptx
 

Kürzlich hochgeladen

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 

Kürzlich hochgeladen (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 

33 Room status, key control.pptx

  • 1. Room status, key control and occupancy ratio. Name : shyam mishra Roll. No : 33 hm sy bba Subject : front office management
  • 2. Key and Key Control •A key is a device which is used to open a lock. A typical key consist of two parts: •The blade, which slides into the keyhole to unlock the door •The bow, which is left protruding so that torque can be applied by the user to open the door. •The blade is usually designed to open one specific lock, although master keys are designed to open sets of similar locks.
  • 3. TYPES OF KEYS • Emergency Key • Master Key • Guest Key • Supply Key
  • 4. Emergency Key/E-Key •The emergency key opens all guestroom doors, even when they are double locked. It can be used, for example, to enter a room when the guest needs help and is unable to reach or open the door. •The emergency key should be highly protected and its use strictly controlled and recorded; it should never leave the property. •One procedure for emergency keys is to have them locked in hotel safe, a safe deposit box or a metal cabinet and signed out by the individual needing one. •The log should be dated and signed by the individual taking the key. • The keys should not be used on day-to-day basis.
  • 5. Master Key •A master key is designed to open a set of several locks. These keys open all guestroom that are not double-locked. •These locks also have keys which are specific to each one (the change key) and cannot open any of the others in the set. •Locks which have master keys have a second set of the mechanism used to open them which is identical to all of the others in the set of locks. •For example, master keyed pin tumbler locks will have two shear points at each pin position, one for the change key and one for the master key. •A far more secure (and more expensive) system has two cylinders in each lock, one for the change key and one for the master key.
  • 6. •Larger organizations, with more complex "grandmaster key" systems, may have several master key systems where the top level grandmaster key works in all of the locks in the system. •A master key opens all guestrooms that are not double locked. Depending upon the need, the master key may be further established as a housekeeping staff master key, a floor supervisor master key, and a grand master key for management purpose.
  • 7. 1. Grand Master Key Key operates all locks in the Hotel. Including laundry and linen rooms. 2. Floor Supervisors Master Key Key operates all sections on the floor/ floors supervised by the particular supervisor. 3. Housekeeping Staff Master Key Key operates all rooms serviced by particular room maid or housekeeping staff.
  • 8. Guest Key • The hotel guest room key is normally issued to open only one room for which it was intended, viz. individualised key for each lock. • If the guest room lock is in shut-out mode the guest room key can neither open it nor lock from outside of the room.
  • 9. KEY-CARDS • Metal room keys are being replaced by electronically coded key-cards. • A key card, while not actually considered a key, is a plastic card which stores a digital signature that is used with electronic access control locks. • It is normally a flat, rectangular piece of plastic and may also serve as an ID card.
  • 11. • There are several popular type of key cards in use and include the mechanical hole card, bar code card, magnetic stripe card, smart card (embedded with a read / write electronic microchip), and RFID proximity cards. • The key card is used by presenting it to a card reader; swiping or inserting of magnetic stripe cards, merely being brought into close proximity to a sensor. • Key-cards have the capability of being randomly coded at the point of registration, which re- emphasizes the guest perception of room security. Key-card control is computer-based and therefore creates the necessary audit trail automatically.
  • 12. • Master keys can be changed in a matter of a few keystrokes and lost key-cards are easily removed from the system. • One of the best security features is the ability of the computer to investigate each door lock and get a printout of everyone who accessed a particular room. This dramatically cuts down on theft from the rooms by hotel employees. • The security advantage of the key-cards has made it popular and many medium and large sized hotels are adopting this key-card system.
  • 13. Security • Above keys will not open the lock when the Guest has Double Locked it from inside. • From a security point of view, master keying is undesirable; but from a practical point of view, however it is necessary. • Master keying presents two security drawbacks: • First is the danger that if a master key is lost or stolen, several locks in the system would be compromised, thus providing access to all those locks. • Second is the loss of master key.
  • 14. Key Control • A system of key control is essential to the security of a lodging property. It is the process of reducing theft and other security- related incidents by carefully monitoring and tracking the use of keys All keys whether metal or electronic should be adequately controlled. The security of a key lock system is seriously weakened when keys are issued to a great number of people or to anyone who has no legitimate need for a key. The best lock in the world may be unable to protect a property or its guests if poor key control allows a criminal to obtain a key to that lock. • • •
  • 15. If there is no key card lock system, the following policies should be considered: A) CODING : Precautions to be taken •Room keys must not have any form of tag that identifies the hotel. •Keys must not have the number on them. They must be identified by a numeric or alphabetic code. The code should not be identical to the building or the room number. B) Issuing Keys Only authorised person should be allowed to access the keys and a high level of security should be maintained.
  • 16. ADVANTAGES • It ensures complete security as no room number is printed on card At the time of issue more than one keycard can be given to the guest if there is a double occupancy in the room It is possible to trace the receptionist who issues the keys from the print out at the end of the day (to avoid unnecessary or extra duplication which may call for security problems) An alarm is set on when a wrong key card is used thereby alerting security. It helps the guest to avail other credit facilities form the various outlets of the hotel. It also helps in conserving electricity in the guest room • • • •
  • 17. Handling Guestroom Keys • These key have the minimum access, unlocking just one room. • When keys are given to guest the room number must not be spoken aloud. • The guest should be explained about his security maintained through coding system. • During the checkout, the guest should be asked for their room keys.
  • 18. Handling Master & Sub-Master Keys • All the floor master keys, room master keys, grand master keys should be signed out each time they are taken and their return noted in a key control sheet • All the keys should be stamped “Do Not Duplicate” • Emergency Keys should be kept in a safety box.
  • 19. Custody of keys • Employees should not be allowed to loan the keys assigned to them to one another. • Employees should handover keys whenever they leave the property, even for the meal breaks. • Individuals who have been master keys should be checked from time to time.
  • 20. GUIDING PRINCIPLES IN KEY CONTROL SYSTEM • Security of keys is essential from the moment they arrive on site. Keys should be stored separately and securely. • No unauthorised person should be allowed access to any key, either to examine or handle it, since a photograph or impression can be taken in few seconds and duplicate subsequently made. • Keep a log book of all keys signed out. • Establish protocol for distribution of keys. • Use keys that do not identify the property’s name, address, logo, or room number.
  • 21. • Perform an annual key audit. • When keys are lost or stolen, the locks should be changed or rotated to another part of the property. • Authorised employees should remind guests to return keys at check-out. • The loss or suspected compromise of a key should be reported immediately and, after due investigation, a decision be made as to whether or not the lock should be changed. • Place well-secured key return boxes in the lobby, at exit points of the property, and in courtesy vehicles.
  • 22. KEY WORDS • Key Card : A plastic card which stores digital signature that is used to control locks. • Emergency Key : The key used to open all guestrooms, even when they are double locked. • Grand Master Key : Key that opens all locks in a hotel (including laundry and linen rooms). • Master Key : A key which is designed to open a set of locks.