You are on page 1of 12

Risk Management in

Hotels
ABDELQADER ALKALHA
The Purpose of the Research

 Identify the risks the influence the security in the hospitality .


 The impact of those risks and how to reduce them
 How is the safety of the assets is the most important.
 To know the 6 steps of the risk management process and how to implement them.
 How to prepare the Hotel and act incase of a risk (Bomb Threats).
Introduction

 Operating a Hotel is like operating any Risks


other business when it comes to safety
and security.
 Fast actions will reduce the effect of the
impact of the risk on the establishment.
 Planning is the main part in the Non-
management process. Financial
Financial
From where does the Risks come from?

It can come from various sources such as:


 Strategic Risks: are risks that affect or are created by an organization's business
strategy and strategic objectives.
 Operating Risks: is the prospect of loss resulting from inadequate or failed
procedures, systems or policies. Employee errors. Systems failures. Fraud or other
criminal activity.
 Commercial Risks: in other words financial risks.
 External risks: such as Natural Disasters, and external online innovation.
How security in hotels could affect a
counties economy?
 It very important to know that tourism is a major source of income in some
countries. E.g. Cyprus
 In 2017 the readings according to the Stockwatch.com.cy:
 Cyprus had welcomed around 3.6million visitors, and this number keeps on increasing
year after year.
 And generated (996.4 million)euro.
Six Steps of the process of Risk
Management.
• Objective: the objective of the risk management program has to be decided by the
Management team.
1

• Risk identification tools comprise risk analysis questionnaire, interview, inspection of


the Hotels operation, and analysis of financial statement.
2
• Risk Evaluation: The study of risks based on the expected size of damage the can be
caused.
• Techniques: 1) size of potential loss 2)the potential loss that may occur 3)
3 availability of resources if it occurs.
• Implementing of the decision
• Based on the previous techniques the management has to implement their discussion, and
4 assign tasks to all heads of department to follow accordingly.

• Evaluating and Reviewing: in other words it is Testing the product.


• In some cases it is better to get an external consultant to review the product and make changes

5 if needed.

• Risk Management Framewor


De • Identify and asses • Eliminate /
min
6 gC
ycl
the Risk Minimize the
risk
e
Plan Do

Act Check

• Review the • Monitor


continues and Control
Improvement
Hotel Emergency Operating Procedure

Risks are found everywhere, but in our business it has to be dealt with in a more
secured and professional matter.
Constructing the hotel has to be done according to world safety standards:

Life Safety Systems include but are not limited to:


Emergency generators Smoke detectors
Heat detectors Fire alarm pull station
Tamper and flow switches Fire-proof exit doors
Hose Cabinets Fire extinguishers (Portable)
Automatic Sprinklers and Fire Pumps Smoke control system

Pressurized Stairway Emergency Lightning


Bomb Threats

 Bomb threats are becoming wider and universal, targeting small and large
establishments. The main idea of receiving a call from a bomb threat caller is to
create an atmosphere of panic and anxiety which will disrupt the normal activities
in the work place.
Action Plan
Remain Calm Notify the police immediately

Discreetly attract the attention of co-workers Keep the caller on the phone as long as possible

It is important to buy time, so keep asking Follow the pre-prepared check list
questions.

Add any relent information Evacuate according the evacuation plan


Sample of Checklist
 In case of receiving a call regarding this case, KEEP CALM.
 Try to acquire as much information as possible:
1. Where is the Bomb?
2. How much time left for it to explode?
3. The type of the bomb?
4. If its dynamite how many sticks?
5. How is the bomb activated? Clock, mechanical, chemical action?
6. Who is it packaged, in a box?
7. How to deactivate?
8. Is the call real or hoax?
9. Is there going to be any other calls?
10. How old are you?
11. Why did you put the bomb?
12. The voice: Man? Woman? Child? Age? Drinking?
13. Background noise?
Thank You

You might also like