Information security at Hotels
Posted by Chelsey Stanton , Friday, April 23, 2010 10:34 PM
Hello all
For today's blog I thought I would try and focus on what kind of systems the Hotels use, and whether or not they are taking the proper security cautions in protecting my identity when I rent a room at their establishments. So For today I'll look at a Large Popular Hotel, what systems they use, and then Small, independent hotels...
Hilton
Hilton is a highly esteemed hotel that many travelers have frequented in the past years. But, whenever you stay at a hotel like this. Do you ever stop and think "golly is my information safe in the hands of these people". If you use a rewards program, obviously they remember you and store your information. So to be honest. The only reason I am bringing this up, is because of a case we were discussing in one of my classes this week. It was discussing just how easy it is to steal someone's identity. So lets discuss the number of items that a hotel would have to keep you safe. for hilton here is what they say.
- Personal Information We Collect
- Use of Personal Information Collected About You
- How We Share Personal Information
- Sensitive Information
- Personal Information From Children
- Non-Personal Information
- Links to Third-Party Websites
- Protecting Personal Information
- Changing Personal Information
- Retaining Personal Information
- Choices - Marketing Lists
- Other Information
- Policy Modifications
- Questions
Next lets look at yet another hotel and the security in their hotels. Now perhaps we could look at a competitor to Hilton. Such as Hyatt Ok here we go. On a random Hyatt website I again went down to the bottom of the page and found the Privacy policy that they are implementing on a day to day basis.
From what I could see they have a much more extensive and interesting layout for explaining how they use your information, and what they do to protect it. Here is an exert of
1) they introduce the policy.
2) the application of the policy
3) types of personal information we collect
4) How we use personal information
5) Disclosure of personal information
6) Centralized Data Processing Activities
7) Information We collect when you visit us Online
HALT
This part is interesting.... They actually tell us how they protect your security with cookie technology
Conclusion: That is pretty much what I wanted to cover for this blog. I don't think I should inundate you with too much information, I want you to be able to read this happily. I am also going to let you know that i'm open to suggestions on what I should blog. So feel free to leave some sort of comments :D