Session_4_Back_Offic..

advertisement
Hospitality Information
Systems and
Technology
Back Office Systems
Systems Security &
Maintenance
Downtime
Back Office systems

Generally consists of four types
• Payroll/personnel systems
• Accounting systems
• Marketing systems
• Executive Information Systems
Payroll/Personnel Systems




Usually starts with an electronic time
clock
Time clocks now allow easier
transferring between departments
Have multiple rates
Allow for instantaneous reporting of
wages
Up to date reporting is important




Full service hotels generally spend 32% to
36% of revenue on direct labor
Just reducing labor is not the answer
Managing labor to make sure an
organization has the right amount on hand
to provide the necessary level of service
Labor is often viewed purely from a cost
standpoint – which can have negative
impacts on guest satisfaction
Use Your Tools

Design a broader approach taking
into account these key areas of
impact
• Guest service levels and guest
satisfaction
• Internal service levels
• Employee satisfaction and retention
Determine Your Objectives Up
Front

Focus on:
• Cost reduction expectations
• Integration of service standards
• Impact on employee satisfaction /
retention
Keep in mind the following
factors:
 Executive sponsorship and support
 Review labor cost figures continually on a
departmental and classification basis
 Departmental benchmarking
 Skill assessments and effective training
 It’s good for the employees – let them
know it
 Do it now
Key to effective labor
management through uses of
technology
 Eliminates unnecessary work through
processes
 Helps organizational structures find
opportunities to improve effectiveness
 Sets and monitors labor standards
 Assists in forecasting & scheduling
 Helps in analyzing data
Accounting Systems
 The back bone of financial reports
 Usually contains:






General ledger
Statement of operations
Departmental statements
Balance sheets
Accounts receivable
Accounts payable
Marketing Systems
 Sales & Catering Systems
 Internet / Web Sites
Executive Information
Systems
 Gives management the ability to turn large
amounts of operating statistics & property data
transactions into consolidated information
 Quick overviews for better, timely decisions
 Can be important as revenue management,
guest satisfaction and properly targeted CRM
marketing campaigns
Types of Reports




Daily Revenue Reports
Forecasting
Payroll Management
Consolidated Reporting
Some Topics to Address in an EIS
System




Infrastructure needed
What level of approval and ROI is
needed to get the project rolling
Any new emerging technology?
Maintaining your competitive
advantage
Infrastructure


The best systems are built from the
ground up
Connect all systems together – PMS,
POS, CRS, GDS, Sales & Catering,
Payroll
Making a More Efficient Manager

Instant access to data
• Yesterdays payroll costs
• Bookings by market segment
• Forecasting
• Average check trends
What ROI might you expect?




Payroll
Automation
Productivity enhancements
Forecasting and budgeting process
Systems Security & Maintenance


Detailed guest and operational statistics are
among the most valuable of any property’s
assets
Computer data is much more comprehensive
than manual data, but can be much more
vulnerable
Dangers to All Types of Data

Dangers to electronic data
–
Physical dangers

–
Fire, flood, etc.
Additional dangers


Flexibility and interconnections open databases up to
more outside threats, either deliberate or random
Need to reach a happy medium in security &
functionality
“ The only completely secure
system has no inputs or
outputs, is encased in concrete,
and lies at the bottom of the
sea”
Real world systems interact with
the outside world
Main Threats to Computer Systems

Human fallibility

Environmental

Electronic

Operational
Human Fallibility

The weakest link in system security
–
–
–
Software is written by people
Data entry errors
Dishonesty
Environmental

Situations or events that threaten the
structure of the system
–
–
–
–
–
–
Fire
Flood
Wind
Rain
Power losses
Loss of network connections
Protections Against Environmental
Concerns



Fire – basic physical security. Smoke
detectors, fire suppression systems
Floods/Water Damage – Locate the
computer room away from outside walls or in
the basement. Install double ceilings.
Power failures – UPS, backup generators,
dedicated power circuits, line conditioners,
surge protectors
Protections Against Environmental
Concerns


Network communications – include a
secondary means of communication
Practice – learn to run on a manual system
Protections Against Electronic
Concerns


Outside attacks from hackers or viruses
receive the most publicity
Most successful attacks are “in house” by
someone exploiting holes in standard
software, or taking advantage of “wide open”
PC’s and servers
Protections Against Operational
Concerns



Data entry errors
Carelessness
E-mail attachments
Patches to fix software holes
are readily available, yet not
kept up to date
It is important to keep up to date
on software developments and
should be a vital part of any
property’s system maintenance
plan
Security in Everyone’s Responsibility


Security is not just the system administrators
job
Even with the most current updates, antivirus software & PC browsers set to identify
risky attachments, all users must be trained
to be aware & exercise good judgment about
security risks.
Stay alert !

Scan any and all attachments with anti-virus
software before opening
Precautions to Take Against Electronic
Attacks

Anti-virus software

Firewalls

Security patches
Anti-virus software




Install it and use it!
Update files should downloaded regularly
Every two weeks is not too often
Updates should be distributed to all
workstations via sign on scripts
Hoax Viruses



Chain letter type e-mail
Do not contain damaging codes
Like regular chain mail, clogs up the system
by urging the recipient to keep passing it on
Firewalls



A separate device or a software program (or
both) that separates the property network
and the Internet
Restricts the types of messages sent in and
out, and/or restricts access to certain web
sites based on pre set parameters
Can mask the availability of com ports on the
server & IP addresses on network PC’s,
hiding them from potential hackers
Denial of Service Attacks


One of the most useful things a firewall can
prevent
Denial of service attack – small software
programs downloaded by hackers to
unsuspecting company servers, all triggered
to activate at once sending messages to a
single target server
Mobile Users


Access through the firewall must be subject
to specific authentication procedures, i.e.
tightly controlled passwords, physical keys
plugged into their laptops
Can use a Virtual Private Network
–
Encrypts all messages using any Internet
connection
Firewalls can track user activity


A good monitoring system helping to keep
everyone “honest”
Should something go wrong, can be a very
useful tool in tracking down the source
Security Patches



Security patches are corrections to software
code to close any “loopholes” that may be
found by hackers to a system
Should always be put in place as soon as
they become available
Never put a PC or server into service with
default configurations or passwords
Other Items


Modems – Individual workstations should not
have local modems. All outside access
should be routed through the company HSIA
with the firewall in place
Only exception – mobile users.
Network Documentation


Network mapping software applications –
auto detect and record all parts of the
network, identifying which PC’s and servers
are connected
It has been known to find system parts in
place but totally unsecured
Electronic Security is a never
ending process





Keep up to date
Monitor developments
Prioritize them for your property
Keep a sense of awareness about
real versus suspicious threats
Periodically invest into a security
consultant to check vulnerabilities of
your system
Security is Everyone’s
Responsibility



All users are responsible to some
extent for maintaining the integrity
and usefulness of the property’s data
Education and reinforcement =
policies and procedures
Multiple levels of security
Restricted Access




All good systems can be set to restrict
individual users access to various
combinations of menu functions
Don’t want to restrict too much. Users
must have access to all areas that affect
their work
Set up audit trails for program access
Immediately remove password privileges
for terminated employees
Policies and Procedures


Establish and maintain written
policies and procedures on system
use
Require all users to sigh agreements
on established policies and
procedures
• Raises security awareness
Typical Policies and Procedures




Standard software only (company
provided)
No personal storage devices
Personal usage
Responsible use of passwords
Computer Room Security




Computer room security must be
maintained at all times
Locate away from heavy traffic areas
if possible
Access on an “as needed” basis
Self locking door
General Security Principles

Regular system backups

Complete system documentation

Security audit checklist
Backups

Two types
• Manual operational procedures
• Electronic

Software & data backups – essential
• Can get you up and running with
minimal loss of information and revenue

Manual backups
• For severe emergencies only

Downtime reports
Documentation


Gain efficiency and peace of mind
Makes it easier to parts of the
network & rebuild if necessary
• One to cover hardware – physical
schematic
• One to cover software – different
applications and their interfaces
Security Audit

Checks to see that every aspect of
the operation is recognized and
covered
• Backup procedures
• Documentation
• Physical access
• Password management
Downtime Procedures
No matter what precautions we take, there
will eventually be a need for computer
systems to be down

It’s not a matter of if, but of when
Two Types of Downtime
Short duration – less than 8 hours
Long duration – greater than 8 hours
Short Duration Downtime
Causes / Reasons



Regular system maintenance
System errors of short duration
Power outages / weather
Long Duration Downtime
Causes / reasons


Major system errors/ maintenance
Weather – hurricanes, tornadoes, floods, etc.
Short Duration Downtime Reports
These reports should be run every day, at
least twice a day, “just in case”
Downtime reports should provide all
essential hotel status & guest billing
information
Run sufficient copies for each department
Reports to run at a minimum
In-house guest list
Room availability list
Expected departures list
Expected arrivals list
Guest ledger
Guest credit status


Cash basis
Approved credit
Reports to run at a minimum
Guest messages
Room availability at least one month out
Vacant room status (housekeeping)
Guest folios
Room change report
Early departures
All room status
Extended Downtime Status
Guidelines – each property is different, o
there is a need to “fine tune” guidelines to
the specific property
Key to running manually – GOOD
COMMUNICATION
Maintain guest service as much as
possible
Quick Response Checklist
Alert all management staff
Shut down all systems as quickly as
possible
Distribute the most recent downtime lists
Prepare for a manual audit
Issue radios to management staff
Key management Staff Roles
General Manager
Systems Manager
Front Desk manager
Front Desk Supervisors
Front Desk Agents
Reservations Manager
PBX Supervisor
Outlet Managers
Housekeeper
Controller
Night Manager
General Manager
Oversees operations
Makes and approves all operational
decision – especially those affecting guest
issues
Systems Manager
Determines magnitude of problem –
estimates down time
Maintains status of all correctional
activities in process
Notifies response team of severity of
situation, and recommends degree of
contingency to implement
Supervises repairs
Keeps management updated
Front Desk manager
Coordinates front office activity with
systems & reservations mangers
Supervises all front desk activity
Monitors controls & audit trails
Supervises runners
Keeps outlets updated with guest
information
Documents observed / perceived
operational problems for review / revision
Front Desk Supervisors
Monitor and control registration functions
Maintains room status control sheet
Maintains walk in list
Communicates status changes to
housekeeping
Supervises re-entry of data to system
Front Desk Clerks
Control filing of guest charges and
maintenance of current balances
Supervise generation of source
documents
Assist with posting of charges
Reservation Manager
Distributes updated room availability reports to
all agents
Supervises manual booking of reservations
Maintains manual reservations files
Maintains manual future rooms availability chart
Maintains communication with outside
reservation systems
Supervises re-entry of reservations
PBX
Maintains and updates telephone
reference list with help of front desk
Maintains manual message log
Assures that messages are distributed to
guests
Forwards any phone charges to front desk
for posting
Outlet Managers
Coordinate contingency plan with systems
manager
Supervises manual operation of outlets
Assists in balancing process
Responsible for manual check distribution
Controller
Coordinates accounting activity with the
system manager
Supervises accounting contingency plan
Supervises all data reconstruction
Assists front desk with maintaining guest
ledger
Monitors all cash and credit card activity
Housekeeper
Coordinates manual room status control
with front desk
Establishes initial room status report
Supervises vacant room inspections
Supervises distribution of updated room
status lists
Supervises manual assignment of room
attendants
Night Manager
Performs regular audit functions
Generates manual audit reports
Balance all hotel accounts
Assists in restoration of data
All Management Staff
Remain in constant communication
Regular inter department meetings
Keep guests updated as much as possible
Returning to Automated
Operations
• Process the first days work
• Make sure that any interface
systems that were not down did
not buffer information & begin
automatic posting
• Perform a full rooms &
operations audit
• Run a night audit process
Download