Professional Documents
Culture Documents
COURSE DESCRIPTION: To develop skills and values on the basic principles of personal hygiene, food
safety and sanitation as applied in the tourism and hospitality industry. This course covers the following
topics:
1. Importance of personal hygiene and grooming as food handler, future restaurateur and hotelier.
2. Sanitation practices in the flow of the food to prevent the foodborne illness, contamination, hazards
and food poisoning.
Objectives:
- It is the possibility of something bad happening. Risk involves uncertainty about the
effects/implications of an activity with respect to something that humans value (such as health, well-
being, wealth, property or the environment), often focusing on negative, undesirable consequences.
Risk
- According to UNWTO is a situation that exposes someone or something to danger harm or loss. Risk
can be physical safety matter, a risk of property loss, a financial business risk and more. From the
moment a person engages himself in the business, whether sole proprietorship, partnership, or the
corporation, the risk immediately attaches.
Example:
1. Food handling is one issue that must be adequately addressed whenever someone prepares food for
the customers. The danger of food poisoning due to the contamination of food is high if the necessary
precaution based on standards will not be followed. The government has provided regulations that must
be complied with by any business ventures to make sure that the danger or harm is mitigated. Food
sanitation permit is a mandatory requirement for businesses in the food industry.
2. it is an inevitable practice in both tourism and hospitality businesses to get the necessary information
about their guests and clientele for security reasons, not only on the part of the guest but also on the
part of the management as well. The giving and obtaining information per se is considered risk in itself
that must be safeguarded accordingly.
What is Hazard?
- It defined as a potential source of harm. Substances, events or circumstances can constitute hazards
when their nature would allow them, even just theoretically, to cause damage to health, life, property or
any other interest of value. The probability of that harm being realized in a specific incident, combined
with the magnitude of potential harm, make up its risk, a term often used synonymously in colloquial
speech.
- Accordingly, hazard pertains to any source of potential damage, harm or adverse health effects on
something or someone, while risk is the chance or probability that a person will harmed and experience
an adverse health effect if exposed to a hazard. It may also apply to situations with property or
equipment loss, or harmful effects on the environment.
(Hazard is something to cause harm while risk is a chance any hazard will cause harm to somebody)
What are the Benefits of a Risk Management Framework?
- Improves accountability.
- What events or circumstances that could affect the achievement of our objectives?
- There are specific core principle in regards to risk management. When looking to perform an actual risk
assessment, the following target areas should be part of the overall risk management procedure (as
defined by the International Standards Organization; ISO):
- It should be continuously monitored and improved upon as the project moves forward
- When first addressing a risk management procedure for a project, take note of the aforementioned
principles to ensure that your specific assessment is matching up with the core ideals as defined by ISO
- There is a specific procedure that one should follow when it comes to performing a risk assessment.
The overall process can be itemized as follows:
1. Identification – Perform a brainstorming session where all conceivable risk are itemized
2. Planning – Once defined, plan for contingencies as part of the overall project plan; implement
controls as need
3. Derive Safeguards – Place specific ‘fallbacks’ into the overall project plan as contingencies for risk if
they arise
4. Monitor – continuously monitor the project to determine if any defined (or un-expected risk manifest
themselves
Content of a Typical Risk Management Plan
- Description of the internal and external context in which the agency operates
Fit for purpose? Risk management should be embedded in all the organization’s practices and processes
in a way that is relevant, effective and efficient. The risk management process should become part of,
and not separate from, those organizational processes. In particular, risk management should be
embedded into policy development, business and strategic planning and review, and change
management processes.
CHAPTER 2: SOURCES OF RISK
Objectives:
Sources of Risk
1. Uncertainty (in financial markets). One consideration that a manager should take into in the
conduct of his or her business is the uncertainty in the financial markets. Managers must be
vigilant enough in determining those uncertainties that could give more impact in the entirety of
his business
3. Legal liabilities (in tourism and hospitality industry). As discussed, the risk defined as a
potential loss or harm to persons and property. When applied to tourism and hospitality
industry, it could be any of the following: financial loss, damage to property or injury to workers
or guest. It is a given fact that most people in hospitality and tourism industry would like to get
rid of any legal responsibility attaching to the risk, the reason why they have been using risk
management as a precautionary measure. To emphasize, risk management is a tool to avoid
injury to guest and employees and to protect their business operations from financial or physical
inconveniences.
4. Credit risk. Credit is another source of risk that could impact the tourism and hospitality
industries. Credit risk defined in Principles for the Management of Credit Risk and is the
potential that a bank borrower or counterparty will fail to meet its obligations following agreed
terms. The effective management of credit risk is a critical component of a comprehensive
approach to risk management and essential to the long-term success of any banking
organization.
5. Accidents. Risks and accidents are sometimes being used interchangeably, but they are different
though they complement each other. Accidents are reactive while risk are preventive. The
effects are well known in an accident. There is a possibility of shock on the part of the injured,
anger at the one in fault and confusion on the thing that is supposed to be done immediately
after the accident. Accident management is necessary to reduce the costs pertinent to the
accident, damage to property, costs of rental and maximization of subrogation recovery.
6. Natural causes and disasters (Accidents due to fortuitous events or acts of god). Accidents in
connection with this category are beyond the contemplation of man. The causes are not within
the bounds of man. Who would ever forget the horrible Indian Ocean earthquake and tsunami
killed almost 250,000 people include tourist in Phuket Thailand and 13 other countries? Listed
below are some of the natural phenomena identified around the world: Earthquakes, Volcanic
eruption, Flood, Landslides, Erosion, Fire, Storm and Typhoon.
7. Deliberate attack from an adversary (Security-related accidents). No matter how careful the
management of a hotel and similar establishment is, there were still some reports of accidents
that could be attributed to accident and negligence cases like robbery and theft.
8. Events of uncertain or unpredictable root-cause. The strategies to manage risk typically include
transferring the risk to another party, avoiding the risk, reducing the adverse effect or
probability of the risk or even accepting some or all of the potential or actual consequences of a
particular risk. Certain aspects of many of the risk management standards have come under
criticism for having no measurable improvement on risk, whether the confidence in estimates
and decisions seem to increase.
Risk Identification
How can you identify the causes and effects of the risks in your company?
- In this first stage of the methodology, the possible specific causes of business risks identified in a
systematic manner, together with the range and possible effects thereof, which an entrepreneur must
confront.
- The proper identification of risk calls for a detailed knowledge of the company, of the market in which
it operates, of the legal, social, political and cultural environment in which it is set.
- Risk identification must be systematic and begin by identifying the key objectives of success and the
threats that could upset the achievement of these objectives.
Perception of the Risk
- The perception of risk as a threat is the system most often used in order to identify it. In this context,
managing the risk signifies installing control systems that will minimize both the likelihood that adverse
events will occur as well as the severity of such events (the financial loss that would be involved for the
entrepreneur). It is a focus of a defensive nature its aim is to allocate resources in order to reduce the
likelihood of sustaining adverse impacts.
From the perception of risk as an opportunity, risk management signifies using techniques that will
maximize the results, limiting the possible damages or costs. The focus is aggressive in nature.
Risk management from the perspective of risk as uncertainty aimed at minimizing the deviation
between the results that entrepreneur wishes to obtain and those that he or she actually does obtain.
SWOT Analysis
STRENGTHS WEAKNESSES
- Location of establishments - Commercial fragmentation
- Highly flexible cost structure - Limited access to financing
- Proximity of customers - Lack of specialized and trained personnel
OPPORTUNITIES THREATS
- Sector in expansion - Regulatory changes
- Specialization in market niches - Entry of new competitors
- Increasingly better informed consumers - Customer tastes change quickly
Classification of Risks
1. SECTOR: A risk that external factors independent from the entrepreneur’s management could
be directly or indirectly influence the achievement of his or her objectives and strategies to a
significant extent.
Examples: Strong exposure to regulatory changes, Business fragmentation, Appearance of new markets
2. OPERATIONAL: The operational risk are associated with the entrepreneur’s ability to convert
the strategy chosen into specific plans, by means of an effective allocation of resources.
Examples: Need for making an advertising effort, High staffing costs, Lack of operational and financial
planning, Tendency toward subcontracting and Tendency towards concentration
3. TECHNOLOGY: This measures entrepreneur’s exposure to the technological risks derived from
the need to undertake heavy investment in order to ensure the feasibility of his or her business
project within a specific period of time or the need for training the company’s employees in the
use of technology.
Examples: Significant investments, Low level of implementation and Low level of technological training
4. COMPETITORS: The size, the financial and operational capacity of the agents in a sector
determine the degree of rivalry in that sector and set the rules of the game that any new agent
has to consider in order to operate in the marketplace this can involve risks for the
entrepreneur.
5. SUPPLIERS: The role played by the suppliers in the sector could generate risk for an
entrepreneur due to variations in the price of raw materials, to the availability of a variety in the
supply and for a continuous period of time, as well as the degree of concentration of the
suppliers, which will determine the method of payment traditionally accepted in the sector.
Examples: Exposure to changes in the price of goods, Dispersion in the supply, Non-determination of the
quality of the service provided Increase in power of negotiation
6. CUSTOMERS: The customer can be a crucial focal point of risk for an entrepreneur, since they
are the generators of revenues; the risk can stem from changes in their tastes and needs, from
generating pressures forcing prices down or from lengthening the payment period, among other
factors, in such a way that the entrepreneur’s value proposal must always be customer oriented.
Examples: Increase in power of negotiation, Lack of loyalty, Social and demographic changes seasonality
and decline in the demand
7. FINANCIAL: The financial risk refer to the uncertainty associated with effective management
and the control of finances carried out by the entrepreneur, as well as to the effects of external
factors such as the availability of credit, exchange rates, movements in interest rates, etc.
Examples: Long-term financial incapacity, Exposure to interest rate changes, Lack of knowledge of
advantageous sources of financing , subsidies, etc.
Sources of risk are all of those company environments, whether internal or external, that can generate
threats of losses or obstacles for achieving the company objectives. A procedure that facilitates the
identification of risks is to ask oneself, with respect to each of the sources, whether weaknesses or
threats exist in each case. A brief list is set out below:
Objectives:
The tourism industry operates in a dynamic environment that involves many interconnected sectors. As
a result, it is constantly evolving and is particularly vulnerable to unexpected crises. Crises come in many
forms, including health threats like the 2020 global coronavirus pandemic, natural disasters such as
earthquakes and floods, political unrest and terrorist attacks. Such risk and crises poses significant
threats to the tourism industry, destinations and tour operators working in the sector.
- Environmental
- Diseases
- Financial
- Socio-cultural
- Product liability
- Property damage
- Security
Impacts of Hazards and Risk on Tourism Development
- Tourism risk management is a systematic approach to making decision under conditions of uncertainty,
dealing with the total risk, by anticipating possible opportunities and accidental losses and designating
and implementing procedures that minimize the occurrence of loss and /or ii) the social, economic and
environmental impact of the losses that do occur.
1. Risk Environment
- Stakeholders
2. Risk Identification
Identification should include all risk, whether or not they are under the control of the tourist destination
or local government. Use various methods and tolls like brainstorming, flowcharts, checklist, records and
experience.
4. Risk Treatment
Identifying the range of options available to operators and destinations, making plans and acting upon
them. Risk treatment strategies. Few risks remain static.
Data Security
- Hotels and similar industry are prone to hackers and cyber criminals considering the bulk of
information that they have been getting from the guest before the accommodation per se to assure the
payment for damages and sometimes a means to introduce their own reward programs. Single breach
by the hotel management on the data protection could compromise the information personal to the
guests (addresses, the government issued id’s, account details, others.) hence, hotel management is
duty bound to safeguard the privacy of the guests.
- Businesses in the hospitality sector such as hotels and restaurants often have a complex ownership
structure consisting of a management company which runs the business, a separate owner or group of
owners and a franchisor. These different entities may more store important data in different computer
systems and such information may be moved around frequently.
High Turnover Rate Creates More Challenges
- Having well trained staff is invaluable for ensuring the secure collection and storage of sensitive data.
However, the hospitality industry has a very high turnover rate due to the fact that it largely involves
seasonal work. Employees often leave after a few months or are transferred to other locations. Just one
untrained individual can give cybercriminals easy loopholes to gain access to sensitive customer data.
Insider Threats
- It is another type of risk faced by companies in the hospitality sector. It involves employees selling
customer data to third parties unknown to the management of their organization. Selling such data,
which may include information on customer preferences and behavior, could be a very lucrative
endeavor for such employees that have access to them.
Organizations in the hospitality sector can protect the data of their customers by implementing a
number of best practices for mitigating the risk associated with data collection.
This is one of the fundamental steps. It is also important to secure all electronic devices such as laptops,
desktop computers and flash drives.
This will help to ensure that every employee is trained and proficient with handling sensitive data
securely. Organizations can also limit the insider threat by limiting access to sensitive data to trusted
employees only and by implementing multi-factor authentication for uses who have access to such data.
Companies also benefit from adhering to relevant-regulations such as the PCI DSS regulation which
protects credit card data and the GDPR regulation.
(Using firewalls, network monitoring, traffic filtering and anti-malware security measures)
These should protect against common cybersecurity threats. Organizations could test their defenses by
simulating cybersecurity attacks and making adjustments as needed.
(A detailed response plan in the event that a data breach should occur)
Doing so enables the business to respond quickly, thereby limiting the harm caused by the breach. With
a proper understanding of the importance of data security in the hospitality industry, companies are in a
better position to implement effective strategies to ensure the safety of customer data. As companies in
this sector continue to expand the ways they collect data from their customers, it is more important
than ever that they commit to securely managing such data.
CHAPTER 4: PROVIDE SAFE FOOD
Objectives:
Definition of Terms
Contamination – Presence of harmful substance in food; some occur naturally, others are introduced by
human or the environment.
Cross Contamination – Occurs when pathogens transferred from one surface or food to another.
Flow of Food – Path food takes from receiving and storage through preparation and cooking, holding,
serving, cooling and reheating.
Foodborne Illness Outbreak – Occurs when two or more people get the same illness after eating the
same food.
Hazard Analysis Critical Control Point (HACCP) – Process that uses a combination of proper food
handling procedures, hazard and risk analysis, monitoring techniques and record keeping to help ensure
that the food you serve is safe.
Personal Hygiene – Sanitary health habit that include keeping the body, hair, and teeth clean, wearing
clean cloths and washing hands regularly especially when handling food and beverages.
Potentially Hazardous Food (TCS) – Food in which microorganisms can grow rapidly; history of being
involved in foodborne illness outbreaks.
Time-Temperature Abuse – When food has stayed too long at temperature that are good for the
growth of pathogens.
Challenges to Food Safety
Food service operations work hard to minimize foodborne illness. As the result of these efforts,
foodborne illness have declined in recent years. However, operations still face many challenges to food
safety:
Time – Pressure to work quickly can make it hard to take the time to follow food safety practices.
Language and Culture – Staff may speak a different language. This can make it difficult to communicate.
Cultural differences can also influence how food handlers view food safety.
Pathogens – Illness causing microorganism are more frequently found on types of food that once were
considered safe.
Unapproved Suppliers – Food that is received from suppliers that not practicing food safety can cause a
foodborne illness outbreak.
High-risk Customers – These are the elderly, people with compromised immune system such as people
with HIV/AIDS, undergo chemotherapy etc. children etc.
Staff Turnover – Training new staff leaves less time for food safety training.
4. Loss of reputation
6. Staff-missing work
8. Staff retraining
- Loss of work
- Death
How Foodborne Illnesses Occur
1. Biological - Pathogens are the greatest threat to food safety. They include certain viruses, parasites,
fungi and bacteria. Some plants, mushroom and seafood that carry harmful toxins are also included in
this group.
2. Chemical - Food service chemicals can contaminate food if they are use incorrectly. Chemical
contaminations can include cleaners, sanitizer and polishes.
3. Physical - Foreign objects such as metal shavings, staples and bandages can get into food. Naturally
occurring objects such as fish bones in fillets are another example.
Except for purchasing food from unsafe sources, each mistake listed above is related to four main
factors. These include the following:
1. Time-temperature abuse - Food has been time temperature abused when it has been stayed too long
at temperature that are good for the growth of pathogen. A foodborne illness can result if food is time
temperature abused. This can happen in many ways.
2. Cross-contamination - Pathogens can be transferred from one surface or food to another. This is
called cross contamination. The following are the ways it can cause foodborne illness:
- A food handler touches contaminated food and then touches ready to eat food.
4. Poor cleaning and sanitizing - Pathogens can be spread to food if equipment has not been cleaned
and sanitized correctly between uses.
Objectives:
Food handlers can also pass on contaminants when they are in contact with a person who is ill. Some
contaminants are passed very easily in any of these ways:
- From touching dirty food contact surfaces and equipment and then touching food
Biological Contamination
The following are the four types of pathogens than can contaminate food and cause foodborne illness:
- Bacteria
- Virus
- Parasite
- Fungi
Common Symptoms of Foodborne Illness
The symptoms of a foodborne illness vary, depending on which illness a person has. However, most
victims of foodborne illness share common symptoms.
- Diarrhea
- Vomiting
- Fever
- Nausea
- Abdominal cramps
Food handlers diagnosed with illnesses from the Big Six pathogens cannot work in a foodservice
operation while they are sick. According FDA, there are over 40 different kinds of bacteria, viruses,
parasites and molds that can occur in food and cause a foodborne illness. Of these, six have been singled
by the FDA.
- Shigella spp.
- Salmonella Typhi
- Hepatitis A
- Norovirus
Food – Most bacteria need nutrients to survive. TCS food supports the growth of bacteria better than
other types of food.
Acidity – Bacteria grow best in food that contains little or no acid. Bacteria grows best in food that is
neutral to slightly acidic.
Temperature – Bacteria grow rapidly between 41 and 135 Fahrenheit (5 and 57 degree Celsius). This
range known as the temperature danger zone. Bacteria grow even more rapidly from 70 degrees F to
120 degrees F. Bacteria growth is limited when food is held above or below the temperature danger
zone.
Oxygen – Some bacteria need oxygen to grown. Others grow when oxygen is not there.
Destruction:
- Good personal hygiene must be practice when handling food and food contact surfaces
The FDA has identified two viruses that are highly contagious and can cause severe illness:
- Hepatitis A
- Norovirus
Food handlers diagnosed with an illness from hepatitis A or Norovirus must not work in an operation
while they sick. Currently, a virus called Covid 19 (strain of corona virus) has become a pandemic.
Sources: Food, water or any contaminated surface. Typically occur through fecal oral routes
Parasites: Basic Characteristics
Source: Seafood, wild game and food processed with contaminated water such as produce
Prevention:
- Fish that will be served raw or undercooked, must be frozen correctly by the manufacture
- Throw out moldy food, unless mold is a natural part of the food
Biological toxins
Most foodborne illness are cause by pathogens a form biological contamination, but you also must be
aware of biological toxins or poisons that can make people sick.
Many people have gotten sick after consuming food and beverages contaminated with food service
chemicals. To keep food safe, follow these guidelines.
Sources: Symptoms:
- Certain types of kitchenware and equipment - Vary depending on chemical consumed
(items made from pewter, copper, zinc and some - Most illnesses occur within minutes
types of painted pottery) - Vomiting and diarrhea are typical
- Cleaners, sanitizers, polishes, machine,
lubricants and pesticides
- Deodorizers, first aid products and health
beauty products
Prevention:
- Store chemicals away from prep areas, food storage areas and service areas.
- Chemicals must be separated from food and food contact surfaces by spaces and partitioning.
- Use chemicals for their intended use and follow manufacturer directions.
- Make sure the manufacturer labels on original chemical containers are readable.- keep MSDS (Material
Safety Data Sheet) current, and make sure they are always accessible to staff.
Physical Contaminants
Sources:
- Common objects that get into food like metal shavings from cans, wood, fingernails, staples, glass,
jewelry and dirt.
Food can become contaminated when objects get into it. It can also happen when natural objects are
left in food like bones in a fish fillet.