Tag Archives: Cybercrime

Tech experts clarify ins and outs of door lock security

Hotel guestroom door locks and keycard systems that are connected to the internet pose security risks, technology experts say, but there’s also some widespread misconception about the nature of those risks.

hotel door key lock

The physical and digital security of hotel guestroom door locks has been a hot topic in the news lately, with the sometimes-sensationalized story of a hacker who extracted a ransom for a hotel’s keycard system.

For some clarity on the issue, Hotel News Now reached out to tech experts who explained what can and can’t happen with electronic door locks, what is vulnerable and how hoteliers can protect their properties and their guests from hackers.

Improved security
Guestroom door locks were traditionally treated as a piece of equipment maintained by a maintenance/building facilities engineer, said Armand Rabinowitz, senior director of strategy and workgroups at Hotel Technology Next Generation. This employee didn’t tend to be well-versed in technology unless they happened to be so for another reason, he said.

“That has changed as the position has become increasingly more technical,” he said. “Ten years ago, electronic locks didn’t need to be, nor were (they) connected to the internet.”

Locks were connected to an encoder or local serial connection, he said, which is a basic protocol that doesn’t travel across internet-connected devices. The physical protocol became outdated as hotels moved to IP-based connections, he said, which requires hoteliers to be careful in how they implement the system.

Everything at Greenwood Hospitality’s properties is on a guarded back-office, closed network, said Paul Wood, VP of revenue generation. The network is scanned for malware and viruses, he said. Locks are sequenced with encoders, he said, and this is a safe process as long as hotels have the system set up correctly.

The code connects the guest key with the lock, he said. Once it hits checkout time, the sequence says it’s time, and the keycard access shuts off.

“From a safety factor/feature perspective, it’s been this way more than 20 years,” he said. “The industry has it down pat.”

Systems today have a long history in the industry, Rabinowitz said, and they’re widely adopted in the world. In most cases, the communication protocols between online door locks are so limited that to transmit a code that would constitute a virus is challenging, if not impossible, he said.

“There would have to be a physical compromise to the point of replacing parts, rendering it unusual by the existing system,” he said.

Training and policies
Hotel managers should treat a door lock system like any other valuable IT asset, Rabinowitz said. That means ensuring all implementation security standards have been put in place for both physical and remote access, he said. There also should be an update process to ensure the system is running on the latest software, he said, and antivirus and security software must be installed on all machines that touch or run any of the lock system-based software.

Click here to read more about Hotel News Now Tech Impact Report Article


Comments Off on Tech experts clarify ins and outs of door lock security

Filed under Hotel Industry, Hotel Security, Liability, Risk Management, Technology, Theft

The Ransomware Dilemma: Is Paying Up a Good Idea?

The ongoing fight against ransomware attacks and the cyber criminals perpetuating this menace is more than a full-time job. In a cyber world without boundaries, ransomware has become a worldwide problem where no organization is immune to victimization.

According to some security experts, the first known reports of ransomware attacks took place in Russia in 2005. Over the past 10 years, these attacks have spread to all corners of the globe, successfully targeting hundreds of thousands of business systems and home PCs. And, the effects are mounting: the FBI reported ransomware-driven losses of $18 million over a 15-month period in 2014 and 2015.

The way ransomware works is by making an infected device unusable by locking the screen or system, encrypting its data and then demanding a ransom to unlock and decrypt this data. In some cases, once the user’s PC is infected, the ransomware also displays threatening messages disguised as coming from a law enforcement agency in order to appear credible while intimidating the PC owner. Payment is usually demanded in the form of bitcoins, a virtual currency that is untraceable.


This is apparently what happened at Hollywood Presbyterian Medical Center in California in early February 2016 when it fell victim to malware, which locked the hospital’s computer infrastructure. According to reports, to remain operational and continue providing patient care, the hospital was forced to use “old school” methods including paper records, faxing, and good old-fashioned pen and paper.

In a letter regarding the attack, following a bitcoin payment of $17,000, hospital CEO Allen Stefanek stated “…The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key. In the best interest of restoring normal operations, we did this.”

Click here to read the entire article: http://bit.ly/2c6mdvh

Comments Off on The Ransomware Dilemma: Is Paying Up a Good Idea?

Filed under Business Interruption Insurance, Claims, Crime, Hotel Industry, Insurance, Management And Ownership, Privacy, Technology, Theft

What’s your data breach response plan?

data breach

While businesses prefer to avoid cyber perpetrators entirely, these days nearly all organizations are at risk of a breach.

As the number of incidents (and claims) continues to rise, the prudent strategy is for firms to not only work diligently to prevent an intrusion, but also to have a plan in place to respond quickly and effectively if they suspect information has been compromised.

A data breach response plan proactively outlines the necessary actions a business must take, providing a framework that can be regularly matched against emerging risks and updated if the firm’s situation changes — for example, if additional staff are added in key data privacy or technology roles or if partnerships are formed that could change the way sensitive information is processed.

Developing a data breach response plan, one that is easy to follow and quick to implement, gives businesses time to prepare the necessary resources and mitigate the damage an exposure can inflict. Leaving key tasks to the last minute, such as scrambling to identify qualified outside legal counsel, is unwise and can significantly impact the timeliness and expense of a breach response. Likewise, pulling the plug on a single server without seeking guidance from an experienced technology expert may not shut down the unauthorized access that caused the exposure, thus leaving the business open to further harm. Worse, it may even erase key information a computer forensics company may need to assist the investigation. Getting the firm’s ducks in a row in advance of any breach is a far more effective cyber mitigation strategy.

One component of many small business breach response plans is accessing the financial and technical support available through a well-structured Cyber Liability insurance policy. Coverage options vary widely, so businesses (or the insurance broker) must carefully examine their needs before crafting a policy. For those firms with lean internal resources and thin financial margins, the right insurance can be a key asset when it comes to implementing a solid breach response plan. Below, three steps that will help organizations mitigate data breach disruptions before they occur.

1. Assemble the team

Who needs to be involved in responding to a breach? Before attempting to pull together more than a cursory list of post-exposure action items, it’s critical that the firm identify those individuals or groups that should be contacted in the event of a potential breach. The team will vary from one business to the next, but most organizations will want to include representatives from the executive group, legal (either internal or an outside consultant), privacy or information security, risk management, information technology, human resources and public relations.

Given the growing reliance on external partners — cloud providers, payroll processors and the like — firms should also consider where vendor touchpoints exist and how or when those third parties will contribute to the breach response process. They may need to be included on the contact list or they may even be responsible for raising the initial alarm if a breach occurs. It’s also important to ensure vendor contracts clearly spell out the company responsible when a breach occurs and who is liable for notifying those impacted. Other vendors are also commonly part of the response team, such as media relations consultants experienced in crisis management and notification firms with the resources necessary to quickly inform breach victims about the situation.

If the business has Cyber Liability coverage, the insurance company should also be part of the breach response plan. There are support services included in many policies that will be helpful in the event of an exposure, ranging from forensic investigation teams to data recovery specialists. To maximize the value of any applicable coverage, firms must be ready to access available features quickly and through the most efficient channels.

Click to read the article

Comments Off on What’s your data breach response plan?

Filed under Crime, Insurance, Liability, Management And Ownership, Risk Management

Join Petra Risk Solutions at CH&LA’s California Conferences

CHLA Marketing Flyer 040116 FINAL

For more information on the Northern California Hotel & Lodging Conference, click here!

For more information on the Southern California Hotel & Lodging Conference, click here!

Comments Off on Join Petra Risk Solutions at CH&LA’s California Conferences

Filed under Conferences, Hotel Industry, Management And Ownership, Risk Management, Technology

The Rising Cost of Money (Lodging Magazine)


Troubling events in the global economy—stock market volatility, weak growth in China, and plunging oil prices, among others—coupled with a moderate slowdown in industry growth, have hoteliers more cautious regarding new business opportunities. However, hiccups in the global economy do not mean the hospitality world stops turning. Hoteliers still find themselves in a time of healthy growth and industry dynamism, and many owners are looking to reposition their properties while the economy can support it.

That said, property improvements can still be expensive. This especially holds true for brand-mandated property improvement plans (PIPs), which some say have become increasingly aggressive in recent years. According to Boaz Ashbel, managing director of the Aztec Group, a full-service investment banking firm located in Miami, Fla., one of the main drivers of this push is the industry’s desire to capture the millennial demographic, whose footprint in the hospitality marketplace grows larger every year.” Many brands are changing the look and feel of their properties to try and appease the millennial traveler,” Ashbel says. “This is true both in new brands and in PIPs for established brands—all of the decision makers have the same goal, and it’s something that hotel owners and operators will have to tackle sooner rather than later.”

There are several situations in which hoteliers may find themselves facing an aggressive PIP or redevelopment project. One of the most common in today’s economic climate happens when a property changes hands. “If the hotel isn’t entirely up-to-date regarding brand standards, it may present a problem for a potential buyer,” Ashbel cautions. This is because when a hotel falls under new ownership, the franchise is not assumed by the new owner—he or she must apply for the flag as though they are applying for a new franchise. And, for a hotel to meet the requirements of a new franchise, it must reflect the latest brand standards. “An astute owner who is planning to sell a particular property is wise to order a change of ownership PIP from the brand before even exposing that hotel to the market,” Ashbel says.

Due to the very active state of the lodging marketplace, with a huge number of properties being bought and sold, most lenders know that every branded property they work with will likely have a PIP component. “Moreover, they should be demanding that the money that will be acquired for the PIP is going to be put up and reserved in closing exclusively for the PIP,” adds Ashbel, who says that every single transaction he’s seen in this time of high activity has had some sort of a PIP component.

And, per Ashbel, hoteliers looking to acquire a property and keep it branded, or rebrand it under a new flag, should always plan for investments in an improvement plan. “If the buyer doesn’t take these steps, she’s in for a rude awakening when she goes to sign her franchise agreement,” he says.

But what if you’re a hotelier who isn’t in the process of buying or selling a property but still needs to pay for a large-scale PIP or renovation? Peter Berk, president of PMZ Realty Capital, a hotel finance group based in New York City, explains that refinancing could be the answer if the hotelier doesn’t have the liquid capital on hand. “There is a lot of refinancing going on right now in the lodging industry for renovations and PIPs,” he says. For example, if someone has a $6 million loan pending due, and he needs to take on a major PIP, he can refinance the property for $8 million and have the lender hold back the difference for the PIP. “We see this type of situation quite often,” Berk adds.

Luckily for hoteliers, there are a wide variety of lenders in the hospitality marketplace who still have a lot of liquidity available for loans. “There are a bunch of lenders out there offering different types of loans—furniture, fixtures and equipment (FF&E) loans, credit funds, bridge loans, Small Business Administration (SBA) loans, commercial mortgage-backed security (CMBS) loans, regular bank loans—everything just depends on the hotel’s business plan,” Berk explains.

Jordan Ray, managing director of financial advisory firm Mission Capital’s debt and equity finance group, says that while there are many loan options out there, it is getting increasingly difficult to finance improvement plans. “As a whole, the financing business for hotels is certainly tighter than it was a year ago,” he says. Ray attributes this tightening to the high levels of supply in the lodging marketplace, especially in primary markets like New York City.

For more: http://bit.ly/1UtcEUC

Comments Off on The Rising Cost of Money (Lodging Magazine)

Filed under Finance, Hotel Industry, Management And Ownership

Insurance Helps Protect Against Data Breach Fallout


Joshua Gold of Anderson Kill speaks about the different types of insurance coverage to protect against data breaches at the Hospitality Law Conference. (Photo: Bryan Wroten)

The past year was a big year for data breaches in the hotel industry, and industry experts say there’s no sign of it stopping any time soon. That means hoteliers not only need to work on prevention, but they also need protection in case an attack does occur.

Panelists in the session “Nailing down responsive cyber coverage that responds to hospitality industry risks” at February’s Hospitality Law Conference told attendees that everything about the current digital age that makes it great, such as connectability and massive data storage, also makes it a risk.

Attempting to list all of the data breaches in the past 12 months would overwhelm the presentation screen, said Joshua Gold, a cyber-insurance attorney at Anderson Kill, and the problem continues to grow.

“It’s getting worse, not better,” he said.

Insuring for different scenarios
Darin McMullen, an attorney at Anderson Kill, said there are four overlapping causes of data breaches at a company:

  • Accidental internal, a common cause of breaches, occurs when an employee loses a device with company business data on it, and it might fall into someone else’s benign or malicious possession.
  • Accidental external breaches occur through third-party vendors or subcontractors who have access to a company’s system or network. While they’re not trying to compromise their client’s security, they may cause harm through their own negligence.
  • Intentional internal breaches happen when a disgruntled employee creates the breach. This can be a common problem in hospitality where turnover can be high. Employees don’t necessarily have to be high-level to access sensitive data.
  • Intentional external breaches are the more traditional hacking events caused by criminal organizations or hacker activists, or hacktivists.

“Some you have control over; some you have virtually no control over,” McMullen said, who added that hoteliers should review their insurance options to protect against different risk exposures.

Gold said he’s working on an insurance claim for a client who had a former employee introduce malicious code into the company’s system. The code fried every controller, he said, causing physical damage to real pieces of hardware. For a networking company, this was a huge loss.

“The insurance company is saying electronic commands can’t cause real property damage,” he said. “It is covered under the literal language, but they don’t want to set that precedent. We will have to sue them.”

When looking for different cyber-insurance policies, Gold said, it’s important to keep in mind all the potential scenarios as some have provisions that exclude what hoteliers might need and think would be included, such as the physical damage in his client’s case. He said hoteliers should work with a savvy broker who specializes in cyber-insurance packages. There are so many different primary forms out there, he said, which can change every three to four months based on what clients face.

For more: http://bit.ly/1TZLnue

Comments Off on Insurance Helps Protect Against Data Breach Fallout

Filed under Guest Issues, Hotel Industry, Insurance, Management And Ownership, Risk Management, Technology, Theft

Congress Cracks Down on Hotel Scams


Imagine you’ve been planning all year for your family vacation at the beach. You find the perfect hotel—a spacious room with a view of the ocean and a big pool for the kids—and book the room using an online travel site. The whole family is excited for a week of surf, sand, and relaxation.

Everything is going great until you arrive at the hotel. After a few minutes of clicking around on the computer, the front desk woman asks you to spell your name again. Her brow furrows, and you start to worry. You are exhausted and just want to crawl into a clean bed and get some sleep. What is going on with this hotel room?

Now the manager arrives to help. “When did you make this reservation?” she asks. You tell her and you hear her typing some more. “Could it be under another name?” You feel a sense of panic as you shake your head no. What could be happening?

Finally, the bad news: There is no reservation. The website where you made your booking was a fraud, and now your dream vacation has become a nightmare. Many vacationers, and hoteliers, find themselves in this exact situation. According to the American Hotel & Lodging Association, millions of fraudulent bookings are made every year as these deceptive websites and call centers mislead vacationers by giving the appearance of being connected to a hotel, but actually have no legal relation to the brand or lodging property.

For consumers, the fraud takes several different forms. Unassuming guests could be charged additional hidden fees when they arrive, fail to get the accommodations they requested, lose expected loyalty points, or worse, they could learn that their reservation was never actually made. In the last year alone, close to 15 million reservations were made on such deceptive sites, resulting in hotel guests finding themselves out hundreds of dollars for either a worthless reservation or one that delivered much less than promised. It is estimated that these scams have cost upward of $1.3 billion per year in lost reservations, extra fees or charges, lost rooms, and costly inconveniences.

As you know, hotels are often mistakenly blamed for these fake reservations. Though they do all they can to assist swindled travelers, their reputation suffers as these stories are shared online or by word of mouth.

For these reasons, I have introduced bipartisan legislation with U.S. Reps. Ileana Ros-Lehtinen (R-Fla.) and Bill Shuster (R-Pa.) in Congress to help crack down on call center and online hotel scams. First, our legislation would require all third-party hotel booking websites to disclose, clearly and conspicuously, that they are not affiliated with the hotel for which the traveler is ultimately making the reservation. This new requirement would help consumers tell the difference between name-brand hotel websites and fraudulent ones masquerading as name-brand sites.

Second, our legislation would give state Attorneys General the ability to go after perpetrators in federal court with the same remedies available to the Federal Trade Commission (FTC). Today, only federal authorities can fully penalize individuals who commit online hotel booking fraud. If the offense is small, federal authorities may forgo prosecution to go after more expansive crimes. Giving state Attorneys General the ability to pursue damages and restitution for victims will leverage the power of all 50 states to hold fraudsters of all levels accountable and deter criminals.

Our bill would also require two provisions to help illuminate the true extent of these crimes. It requires the FTC to produce a report on the impact of these fraudulent sites on consumers and it encourages the FTC to simplify its online complaint procedure for reporting hotel booking scams, a request we have recently made in a letter to FTC Chairwoman Edith Ramirez.

My colleagues and I understand that online fraud is a serious problem for not only consumers, but also the entire lodging industry. It is also an especially significant issue for Florida, which is the top travel destination in the United States. With that said, I look forward to continuing to work with the AH&LA to move this important legislation forward to Congress, and tackle these scams. This way, travelers can get back to their vacations and hotels can focus on providing the world-class services that the American hotel industry is known for.


For more: http://bit.ly/1Qgrg7k

Comments Off on Congress Cracks Down on Hotel Scams

Filed under Crime, Guest Issues, Hotel Industry, Management And Ownership, Technology

How to Ramp Up Employee Cybersecurity Training


In 2015, the hotel industry suffered unprecedented cyberattacks. In one month alone, Hyatt Hotels Corporation, Starwood Hotels & Resorts Worldwide and Hilton Worldwide Holdings all fell prey to savvy cyber thievery.

Hyatt confirmed hackers used malware to collect cardholder names, card numbers, expiration dates and verification codes from at least 250 hotels globally. Just a few days after the company announced its planned merger with Marriott International, Starwood Hotels also stated malware had been used to steal credit and debit card data that was found on point-of-sale cash registers.

Hilton also began investigating credit card breaches at several of its properties, including its Hilton, Embassy Suites, DoubleTree, Hampton Inn and Suites, and Waldorf Astoria Hotels & Resorts brands. Hilton confirmed the breach and, much like Hyatt and Starwood, cited unauthorized malware that targeted payment card information in point-of-sale systems as the cause of the breach. Additional hotels targeted by hackers in 2015 included The Trump Hotel Collection, Mandarin Oriental and White Lodging Services Corporation.

To help prevent breaches, management should take steps to clearly define employee policies and procedures, which include:

Create protocols for access and transfer of sensitive information

Once a hotel has its IT network secure, only certain individuals should have access to the data. Further, user activity should be monitored using insider threat detection solutions that notify management of suspicious activities, both externally and internally. This includes monitoring applications for phones or computers that have access to sensitive data.

Hoteliers should tighten all network security. Simple ways to help accomplish that include:

  • ensure logins expire after short periods of inactivity;
  • require strong passwords that are never written down in public or unsecured locations; and
  • scan devices for malware every time they are plugged in.

Confirm that off-site technology is secure

Data housed off-site should be routinely backed up, and hoteliers should ensure that Web application firewalls are cloud-based solutions that are secure and encrypted. Hoteliers also should use top-notch anti-malware software and update it routinely.

Securing paper files that might include personal information

Employee files are a major target area for data breaches by way of paper files. They are typically easy to access (particularly in smaller hotels) and provide a significant source of data for a low-tech inside job.

Employee files also might include medical information protected by HIPAA. According to the Department of Health and Human Services, hacking has been involved in the HIPAA breaches of nearly 3 million patient records since 2009. Employees across all industries, including hospitality, should be aware that this highly sensitive information needs to be protected.

For more: http://bit.ly/1mHKrMn

Comments Off on How to Ramp Up Employee Cybersecurity Training

Filed under Crime, Employee Practices, Hotel Employees, Hotel Industry, Management And Ownership, Risk Management, Training

Enhancing Check-in and Loyalty with ID Verification Solutions


There’s no weariness quite like the fatigue and impatience that sets in at the end of a long day of travel. You’ve made it through security gauntlets, cramped seats, noisy kids, and traffic to arrive at your destination. What’s next, a long line of your fellow crabby travelers, or a quick trip straight to your comfy room and minibar? As an hotelier, you know which of these customer experiences translates into greater loyalty, advocacy, and revenue.


When it comes to business and personal travel, customer expectations have always been high; customers increasingly expect more convenience, personalization, and flexibility from hospitality brands. Online booking options, mobile technology, and social media reviews have made the market intensely competitive. Customer loyalty is a key driver for revenue growth and competitive advantage. In fact, a recent Forrester study commissioned by Sabre Hospitality found that a 1-point score increase on their Customer Experience Index provides $6.52 in annual incremental revenue per customer—a significant cumulative impact, especially for larger brands.

The same study found that two-thirds of leisure travelers and more than half of business travelers claim they are not loyal to any hotel brand. The study’s findings point to intelligent applications of technology and data as primary avenues for improving customer experience and loyalty, with an emphasis on integrated enterprise solutions. Feel-good experiences engender loyalty more surely than cost or convenience, and loyalty translates directly to good news for the bottom line. How can we begin to incorporate technology that leaves customers raving about their experience and returning for more the next time they travel?

One of the big pain points for customers—the dreaded check-in process—presents a huge opportunity for hotels that extends well past what happens at the front desk. Solutions for scanning and verifying IDs and passports, including mobile scanning and self-service kiosks, are transforming the check-in process and providing a key link between customers and data-driven, integrated hospitality platforms. With mobile scanning, check-in can begin anywhere (even remotely) and be completed in less time with fewer errors. Advanced scanning solutions quickly and accurately read all data off drivers’ licenses, passports, and other official identity cards, automatically populate data records and store a digital replica of the ID for regulatory and security purposes.

Once a guest’s ID data has been scanned into records, it can then be cross-checked with other databases (DMV, credit bureaus, etc.) to verify the customer’s identity. The data can also be connected with the hotel’s enterprise systems for security, billing, and customer service management, as well as personalization and loyalty programs. The ability to quickly and accurately gather this data at the point of entry eases and enriches all the subsequent processes and interactions that rely on such data. These days, customers expect that you have their information and will use it to provide them with a more polished and personal experience. The information scanned at check-in can also be used for seamless sign-up to loyalty programs. Hotels and casinos have found that insights and information gleaned from this data allow them to tailor rewards to guests’ preferences and analyze guest spending patterns in response to various promotions.

A recent Software Advice study of hotel guest preferences found that 60 percent of respondents would be more likely to choose a hotel that allows check-in and keyless entry via smartphone, and 37 percent are more likely to choose a hotel with lobby technology such as self-service kiosks. This follows the general preference of Millennials for automated customer service options. It’s also reassuringly good news for hotels striving to deliver better customer service while controlling staffing costs. Front desk agents can spend more time on personal greetings, solving exceptions, and addressing complaints when they are freed from manual data entry tasks. A serene, smoothly run lobby makes for a more welcoming space than one crammed with guests waiting to check-in.

For more: http://bit.ly/1QcmxGI

Comments Off on Enhancing Check-in and Loyalty with ID Verification Solutions

Filed under Crime, Guest Issues, Hotel Industry, Management And Ownership, Risk Management, Theft, Training

The 2016 Hospitality Law Conference


Intensive Hospitality Education. Exceptional Networking. It’s Not Just for Lawyers.

From development deals to management agreements, from food and beverage liability to labor and employment, and from claims management to anti-trust issues, the latest cases, trends and challenges in compliance, finance, law, risk, safety, and security are up for exploration at the 14th Annual Hospitality Law Conference, February 22-24, 2016.

The Owner Management Summit, co-located with The Hospitality Law Conference – 2016, intersects legal, finance and technology and includes sessions on: who owns the data, who is responsible for the data, development and unwinding management contracts.

The Hospitality Insurance and Loss Prevention Summit, co-located with the Hospitality Law Conference, includes sessions on risk management, the top claims in 2015, and coverages for cyber & data breaches.

Hotel and Restaurant Corporate Counsel have several opportunities to meet with their peers in facilitated conversations to explore common challenges, solutions and law department management.

Also featured during The Hospitality Law Conference – 2016, are break-out sessions and roundtables in Food & Beverage, Lodging, and Human Resources & Labor Relations.

Join Petra Risk Solutions’ very own Todd Seiders for, “Discussion of Most Frequent Claims and How to Prevent Them”


Todd Seiders - Petra Risk SolutionsSlips, falls, breaks, disruptions.  If you are involved in the hospitality industry, you face very real threats to your financial well-being and your reputation.  A security breach at your property, a slip by a patron, a defect in construction, or a natural disaster are examples of problems that could and should be addressed by your risk management program and your insurance.  In this session, Todd Seiders, Director of Loss Control at Petra Risk Solutions, and Allen Wolff, Insurance Recovery Attorney with Anderson Kill, will identify and analyze some of the most frequent claims that arise in hospitality industry and will offer analysis and insight for managing the risk of such claims, mitigating the losses caused by them, and obtaining insurance coverage for them.

Click here for more infomation on: TODD SEIDERS
And for more info on the conference: http://bit.ly/1KfrDiI


Comments Off on The 2016 Hospitality Law Conference

Filed under Conferences, Hotel Restaurant, Management And Ownership, Risk Management