KEY CONTROL
One of the most important factors of the guest room is the
lock on the door .
In past key control systems were limited to basic metal key
these were easily lost and were costly to replace.
Key control systems eventually evolved into systems that were
easier to replace called key cards . These plastic keys were filled with small
holes at the one end that the door could read when inserted . The drawback to
key card was that they had the room name printed on them this posed a major
security risk and thus had to be replaced as well.
Modern hotels today use computer controlled key control
system . A credit card type card is assigned a special code when activated by
the front desk . This key is preprogrammed with guest arrival and departure
information and will work for the duration of guest stay and for particular
period.
TYPES OF KEYS :-
EMERGENCY KEY
MASTER KEY
GUEST ROOM KEY
ELECTRONIC LOCKING SYSTEM
1. Emergency Key: A key that can open all doors double locked in hotels, among others:
Guest room door (Guest Room)
Door Office (Office)
Door Warehouse (Store)
This key is usually held by the Management Hotel or GM can use the emergency moment / emergency
Guest room door (Guest Room)
Door Office (Office)
Door Warehouse (Store)
This key is usually held by the Management Hotel or GM can use the emergency moment / emergency
2.Guest Room Key: Key available for use by the
guests to open the rooms such as CARD or a special card and some form of
regular keys, so-called Key Tag if the child is the key hanger.
3. Master Key: A key that can be used to open
the door on one floor / floor or one section area all single locked. So if the hotel consists of
8 floors / section in the hotel so there will be 8 pieces Master Key.
ELECTRONIC LOCKING SYSTEM
An electronic lock system (more precisely
an electric lock) is a locking device which operates by
means of electric current. More often electric locks are connected to an PROPERTY
MANAGEMENT SYSTEM. The advantages of an electric lock connected to an
property management system include: key control, where keys can be added and
removed without re-keying the lock cylinder; fine access control, where time
and place are factors; and transaction logging, where activity is recorded.
No comments:
Post a Comment