Events
As a part of the consortium Safety Core leads the package related to security audits concerning CBRNe threats.
The process of a security inspection visit at a hotel is conducted by a specially prepared team of experts appointed within the consortium. They inspect hotel facilities, evaluating and analyzing all aspects related to the safety of guests and hotel staff.
The inspection visit includes the following steps:
Assessment of overall safety: Inspectors assess whether the hotel complies with specified safety standards and regulations, such as fire safety regulations, evacuation procedures, and others.
Testing alarm systems: Experts check the functionality of alarm systems, including fire alarms, intrusion alarms, and other warning systems.
Physical security: This involves evaluating physical security measures, such as access controls, CCTV systems, emergency signage, as well as entrance and exit barriers.
Staff training: Experts assess whether the hotel staff is adequately trained in safety procedures, including evacuation and response to crisis situations.
Review of documentation and emergency plans: Experts verify whether the hotel possesses up-to-date safety documents, including evacuation plans, contact lists, and procedures for responding to various threats.
Evaluation of emergency procedures: Experts assess whether the hotel has implemented appropriate procedures to respond to various emergency situations, including fires, terrorist attacks, or CBRNe threats.
Collaboration with local emergency services: During the inspection visit, experts consult with local emergency services to ensure that the hotel is prepared for collaboration in crisis situations.
Report and recommendations: Based on the assessment conducted during the inspection visit, experts compile a report that includes needs, observations, best practices, security system gaps, and recommendations, along with suggested corrective actions to enhance hotel safety.
Inspection visits at hotels within the HOTHREAT project aim to ensure the collection of essential data such as needs, gaps, and recommendations concerning the operation of the security system. This data is crucial for the further actions of consortium experts in preparing appropriate procedures and recommendations to enhance security in this sector against CBRNe threats.