top of page
West%20Gazette%20Logo_edited.png

Rising Together –
Leadership in Every Stay



Integrity | Accountability | Empathy | Passion

RRI West recently embarked on an exciting journey by rolling out Hotel Key across all our hotels. This memo serves as a follow-up to assess our progress, address any concerns, and reinforce our collective efforts towards fully embracing this significant change.


Reviewing the Cycle of Change


Implementation Recap:

  • The new system was implemented with the goal of enhancing our operational efficiency and guest experience. So far, we've seen promising improvements in various areas, thanks to your cooperation and adaptability.


Current Status:

  • While we have successfully integrated the new system, ongoing adjustments and fine-tuning are necessary to optimize its performance. Your feedback over the past two weeks has been invaluable in identifying areas that need further attention.


Evaluation and Adjustment:

  • Continuous evaluation is crucial. We have been actively gathering feedback and monitoring system performance. Based on your input, several enhancements are already underway to address initial challenges and streamline processes further.


Embracing the New System


Now that Hotel Key is in place, it’s time to focus on making the most of its capabilities. Here’s how we can continue to maximize its benefits:


Leverage Innovative Features:

  • The new system offers advanced features designed to improve efficiency and guest satisfaction. Explore these tools to enhance your daily tasks and deliver exceptional service.


Ongoing Training:

  • Training doesn’t stop after the initial rollout. Take advantage of ongoing training sessions and resources to deepen your understanding and proficiency with the system.


Adaptability and Resilience:

  • Change can be challenging, but it also presents opportunities for growth. Continue to approach this transition with resilience and adaptability and support your colleagues as we all adjust to the new processes.


Collaborative Culture:

  • Collaboration is key to our success. Share your experiences, insights, and solutions with your team members. By working together, we can overcome any hurdles and ensure a smooth transition.


Moving Forward


We are at a pivotal moment where our collective efforts can turn this change into a resounding success. Your dedication and proactive approach over the past few weeks have been commendable. Let’s continue to build on this momentum and fully embrace Hotel Key to achieve our goals.


Thank you for your hard work and commitment to excellence. If you have any questions or need further support, please don’t hesitate to reach out to the Training Team at training@whgexstay.com or your RVPO!

  • People & Culture
  • Aug 12, 2024

August Birthdays!  

WISHING THESE AMAZING PEOPLE A GREAT DAY!! 

John Myers

IT Help Desk 

8/2

Robert Carson

FGM

8/4

Mitch Lutton

GM

8/11

Josephine Myers

GM

8/31

Michelle Ward

Training

8/31

August Workiversaries!   

WE ARE SO GLAD YOU’RE CAREER JOURNEY BROUGHT YOU TO RRI WEST!

Alberto Naranjo

AGM

3 years

8/2

Bernard Milligan 

Internal Audit

2 years

8/15

Joe Maddux

SVP

14 years (with us 😉)

8/20

Julie DaWalt

RVPO

36 years

8/26

Antoine Spurling

GM

1 year

8/28

Kendra Robinson

GM

3 years back! 

8/30


  • People & Culture
  • Jul 10, 2024

A friendly reminder from our IT department regarding data information, per the RRI West employee handbook.  Please see below and remind your staff of the importance of protecting information on company computers, as well as being mindful of accessing information (including websites) on company computers.


Per the Employee Handbook:


Right to Access and Inspect Computer Information / Waiver of PrivacyAll information created, stored, sent, or received using any Company computer, email and/or Internet system is the property of the Company. The Company reserves the right to and may, without advance notice and at any time, a\ccess, monitor and disclose for any purpose all information on the computer systems. Therefore, Users waive and do not have an expectation or a right to privacy regarding such information. Even if Users use passwords to access any type of information, the confidentiality of any information or message cannot be assured. The use of passwords or other security measures does not in any way reduce the Company’s right to access materials on its systems nor does it create any privacy rights for the Users in the messages and files on any system. All passwords created by a User must be revealed to the Company upon request. The Company reserves the right to view, modify and/or delete any software, information, messages, or attachments at its discretion, regardless of whether such information meets the qualifications outlined in this policy, or whether the information adversely impacts the proper and efficient operation of the system.


Email, Internet, and Transmitted DataCommunications and data transmitted via any Company computer, email or Internet access systems are the property of the Company. Only the intended recipient should access any such data. Although the Company computer, email and Internet access is intended for business use, incidental personal use is permitted. However, any use, whether business or personal, is subject to all aspects of this policy. Users are personally responsible for and strictly prohibited from using or permitting others from using Company computer, email, and Internet resources in an inappropriate manner, including, but not limited to:


  • Using the resources in a way that may be disruptive, offensive to others, harmful to morale or in any way violates Company policies including non-discrimination, sexual harassment, conflict of interest, and code of ethics policies. (this may include both written emails, accessed websites and other forms of media).

  • Messages which are considered offensive include those which contain comments that offensivelyaddress someone’s age, race, color, sex, gender identity or expression, marital status, sexualorientation, religious or political beliefs, national origin, or disability.

  • Distributing or storing chain letters, jokes, solicitations, offers to buy or sell goods, invitations to join or participate in non-company organizations or events, or other non-business material.

  • Emailing of any customer credit card data is strictly prohibited unless the credit card data is encrypted, or password protected.

bottom of page