Securing john jay hotel sample work

Running head: SECURING JAY HOTEL 1
Securing John Jay Hotel
Student’s Name
Institutional Affiliation
Course
Date
SECURING JAY HOTEL 2
The development of John Jay Hotel at the 59
th
Street in New York City is expected to take
several months. This construction is fundamental to that owners since a lot of resources from
research fee to construction material have/will consume a lot of money. The CEO of the company
seeks to obtain a reliable security measure to protect the hotel from the groundbreaking ceremony
through the grand opening to daily operations.
This paper seeks to explain in detail all the measures and strategies that I, together with my
security company will employ to secure the development process and the building when it is finally
launched for public access and use.
The securing strategy will focus on three significant phases, i.e., Ground Breaking, Grand
Opening, and Day to Day Operations. The following section will elaborate what the security
company will do to ensure that this costly process is secured from the start to the end.
Ground Breaking
This phase will necessitate plans to curb security threats during the groundbreaking
ceremony and after that security measures to secure building material as well as the construction
personnel. A well-constructed perimeter fence and a designated gate will be a clear signal to
intruders and any unauthorized personnel that access to the property is only possible when
permission has been granted. In that regard, the company will employ different types of fences to
protect the site and whatever there is.
A watchtower will be put in a strategic position to allow easy and efficient monitoring of
the crowd during the groundbreaking event. The Watchtower will be used as the command base
for all the security plans and act like a typical watch tower as well. This is appropriate since the
ground at this point will still be free from physical obstructions.
SECURING JAY HOTEL 3
Secondly, primary wooden fences will be constructed at the residential sites for the
construction personnel to monitor access and provide just enough restriction to the people who
will attend the ceremony. Such fences will also be employed at points of concern where not so
much security is required. This type offense will be used for controlling and organizing the crowds
during the groundbreaking ceremony.
Thirdly, Steel gates shall be constructed before the groundbreaking ceremony, and they
will remain part of the security strategies after the groundbreaking ceremony. The permanence of
these fences will be leveraged upon for the fact that they resist breakage and are more intimidating
to burglars. These will be employed at the main gates and other critical entry points.
Lastly and most important are automatic gates which are supposed to be in place before
the groundbreaking ceremony. These gates will come in handy since it will allow only guests to
enter the site and lock off uninvited guests. We will put in place these barriers in a permanent
manner since it will form a primary protective measure to the hotel after the opening ceremony.
Grand Opening
More advanced technology will be employed from this point onwards since the hotel will
now be complete and operational. Latest locks, surveillance cameras, and security alarms will have
been put in place at this time to bolster security efforts (Fischer, 2012). However, the two primary
measures that will be utilized on the grand opening day will be Smart Surveillance and Access
Control.
Smart Surveillance: This is a security measure which surveys the area around the building
and even the building itself automatically. This strategy will be employed to curb potential
threats and send alerts without the assistance of the security team which is expected to be
busy on a real day.
SECURING JAY HOTEL 4
Access Control: these will be employed primarily in the building itself since many people
will be seeking access to the building and bombers may take the fragility of the situation
to create security threats. Smart locks will have been installed to deter theft in the building
and make it easy to identify the suspects in case anything goes wrong.
Day to Day Operations
The primary goal of the security measures that will be put in place after the construction
and opening of the hotel will be to ensure a smooth operation by providing that the customers are
served with minimal disturbance if any. The system that will be employed must enable the staff to
respond to any form of threat and recuperate from all types of threats. The security firm will
establish a system whereby security is integrated into the building and tailored to allow advanced
detection and prevention of threats.
The integrated system shall be used in a manner that depending on the architecture of the
building, the cost of operating the system is brought to a minimum. The level of disturbance on
the operations will be considered in a manner that all the integrals are working in harmony. The
following systems shall be integrated into the building to foster other measures earlier discussed:
Security Cameras and audiovisual analytics: this is a system which will contribute to
the security of the premises, as well as the guests, are in safe hands always. This system
can detect threats and analyze videos to determine whether an occurrence is harmful or not.
This method can compare videos automatically and display the result enabling the security
team to respond in the most efficient manner (Fischer, 2012). It also facilitates smooth
checking. Other benefits that will accrue to the hotel by using this system include reducing
liabilities by recording precisely what is happening in real time.
SECURING JAY HOTEL 5
Access Control and Identification Badges: open door policy will make customers and
guests enjoy the comfort. The use of a combination of Identification cards and monitored
access will ensure that only people who have authorized special access sections of the
building for example administration offices. This will minimize interruption as well as theft
amongst members of staff.
Managed Services: A remote security plan is mandatory as it will serve as a back-up to
the existing human resources.
Cyber Security: This is one of the critical issues that will be addressed to ensure that the
security systems put in place are safe all the time and that they are functional and reliable.
Software known as Atlas will be installed to automatically scan the networks on a daily
basis for any issues and fix them accordingly (JenHwa Hu, 2005).
Lighting Control: automatic lighting system will be put in place to automatically light
dark spots in the hotel and avoid unnecessary discomfort on the guest’s side. Reduced
harassment of guests and staff is paramount to the future of the hotel, and hence lighting
should be supplied to various spots to mitigate possible fraudulent claims.
Finally, comprehensive training of all the staff members is a critical ingredient to secure the hotel
(Chan, 2013). Excellent security measures in place without a trained workforce is almost useless
since security systems cannot replace the human beings entirely but instead aid in all their actions.
Regular security meetings will be held to inform the members of the security team the various
current events and emerging issues as well as inform them of the technological changes that may
have been incorporated into the system. The team is supposed to be well equipped with the
necessary skills to respond to all forms of emergency and recognize any strange occurrence that
cannot be detected by the programmed technological systems.
SECURING JAY HOTEL 6
The staff will be trained alongside the security team to be in a position to detect and report
anybody who looks suspicious or does not belong to the group of regular guests. In case of an
emergency, the security firm will have a particular unit of staff to respond and act accordingly.
Fostering a friendly community within the fraternity of the hotel is paramount and critical. The
community will be asked to react to an incredible person within the environs of the hotel.
A combination of the latest technologies in the world of security and well-developed safety
protocols, it is almost sure that the safety of John Jay Hotel is guaranteed. The points mentioned
above are expected to develop a comprehensive coverage of the building from the time of inception
to the time of full operation. Security measures for all the three phases are interrelated and
dependent. We, as a security firm is confident that all the necessary steps that have been put in
place will secure John Jay Hotel all the time around the clock.
SECURING JAY HOTEL 7
References
Fischer, R., Halibozek, E. P., & Walters, D. (2012). Introduction to security. Butterworth-
Heinemann.
Jen‐Hwa Hu, P., Lin, C., & Chen, H. (2005). User acceptance of intelligence and security
informatics technology: A study of COPLINK. Journal of the Association for
Information Science and Technology, 56(3), 235-244.
Chan, E. S., & Lam, D. (2013). Hotel safety and security systems: Bridging the gap between
managers and guests. International Journal of Hospitality Management, 32, 202-216.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.