For any vacation rental company considering selling, there are many areas of preparation needed to realize a successful sales process. This article will discuss what types of technology-related data an owner should be prepared to provide based on the type of sale.
Technology in vacation rental companies ranges from simple to very complex, depending on the tools and solutions that are in use and the extent of digital transformation that has been completed.
For example, some VRMs have housekeepers using printed reports while others have a mobile application on their personal phones. A larger, geographically distributed company may have a wide area network connecting its systems while a smaller company may only provide wireless Internet access and leverage a software-as-a-service (SaaS) solution.
These examples can extend to all areas of operations in a VRM’s technology ecosystem. No two acquisitions are exactly the same, but there are common technology data requests depending on the sale type: contract buy (owner contracts/units), asset buy (stuff), or a stock purchase (company). One of the sticking points in a VR sale is the seller’s understanding of the technology systems involved. Frequently, VR owners do not have comprehensive documentation of the systems and assets that run the business.
The diligence an acquirer pursues will greatly impact his or her success in ongoing operations. In my experience, one deal included acquiring a proprietary system but not the add-on connector for distribution because it was not discovered or divulged in the diligence process.
Another purchase exposed the buyer to active network penetration and a resulting data breach because of a lack of focus on the current security in place. Failure to reveal a prior data breach resulted in fines that the buyer then had to recover from the seller in another deal. One website went dark for two days because it was not listed in the diligence data and lost connectivity to the PMS during system changes. Omissions can result in a financial loss to the seller, so it is important to provide all of the information available or requested.
Typical data requests in a diligence process are provided below. Depending on the size of the acquisition target and purchaser, the detail can be increased or flattened. Taking the time to develop this collection will prepare the target for a successful and productive engagement.
When an acquirer requests data from a target, the promptness and depth of the response signals a professional, well-run operation and provides confidence in the deal. While acquirers typically have a data request template, your prepared information can be easily pasted in or linked by reference. If there are questions that aren’t clear or understood, it is important to ask for clarification or help to ensure full transparency and data validity. It is important to note that this type of information should never be provided until a nondisclosure agreement has been executed. Deal brokers and consultants are available to help with this work, including data extraction and documentation if the seller wants assistance or needs to focus on other areas.
Contract Purchase Implications
In a contract purchase, the buyer typically does not need the current systems or technology services. The main focus is on the contracts and related data to be provided. Be ready to export data from your systems in a format the buyer can consume. The use of spreadsheets is common. Be sure to understand the scope of data the buyer will need and the date range. Two years of historical data is a common request.
Prepare a summary of all existing technology contracts to be used to terminate services no longer needed post sale. Plan to pay any early termination fees that may be required. Plan to maintain any systems or data needed to support any legal or financial reporting in the future, typically for three to seven years depending on the data type.
Asset Purchase Implications
For an asset purchase, the buyer purchases some or all of your assets, such as computers, websites, data circuits, and technology vendor contracts and services. In addition to these contract details, additional data related to the assets to be conveyed is needed. Compile accurate data for any assets or services to be transferred. Verify that existing agreements allow a transfer, and clearly detail any that have unique requirements for transferability.
Stock Purchase Implications
In a stock purchase, the buyer needs as much data as possible to sustain current operations and to support the staff, owners, and guests post sale. More detailed information about your technology ecosystem is needed to support the value and operations of the business. Collect all of your active technology-related contracts. These will include software systems (on-premise or SaaS); hardware support agreements; telecommunication products including voice, data, and cellular services; and any vendor support agreements.
The types of data needed are detailed below (but may not be fully comprehensive).
Tech Hardware
Computers, servers, network equipment, telephone systems, company cell phones with full detail of models, purchase date or age, and contract or warranty status. An inventory or all phone lines and data circuits should be included. A spreadsheet schedule is an easy way to track and share this information if no other asset inventory is available.
Software Systems
Include desktop software (Windows, Office, etc.), financial, HR systems, CRM, call center, PMS, housekeeping, maintenance, association management, collaboration tools, time tracking, payroll, point of sale, project management, website analytics tools, and source code of any proprietary systems. Be prepared to provide copies of all related contracts or proof of licenses, and verify the transferability of any that are needed.
Security Systems
These could include IT operating tools, antivirus software, firewalls, VPN, SFTP, application patching, and intrusion protection systems.
IT Support Structure
Provide current resource roles and reporting lines. If support is outsourced, supply the current agreement including the types of support it includes.
Network Diagram
Have a diagram that details your network, including all sites, major hardware, and IP addresses. This will visually represent how your systems connect and which data elements are passed between the systems.

Payment Systems
Provide details about your merchant identification, gateways, processors, and payment systems in use. This is an area many companies find complex to transfer. Leverage the vendors to support documenting this information.
Disaster Recovery and Business Continuity Plans
Document the processes used to maintain business operations in the event of a disaster or outage. In the event of a fire or hurricane, for example, detail how you communicate with owners, guests, and staff, potentially without access to all of your systems or data. If there was an Internet or network outage, provide your operating processes for maintaining standard services for all guest and owner interactions.
Prior Breaches
Provide full transparency on any data breaches that have occurred. This should include the scope of the breach, any notifications provided, and all corrective or preventative actions taken after the event occurred.
User Data
Export a list of all application users from significant systems. Provide detail on any super users and/or system administrators. Additionally, any shared accounts or service accounts should be highlighted.

Social Media
List all tools and accounts in use across your digital marketing tools. Include users and passwords.
Websites
Include a list of all owned domains, the domain registrars, and current status (active versus parked or redirected). Include relevant performance metrics that represent the level of engagement with the platform. If the platform is proprietary, provide full technology stack details along with support resources.
Channel Data
For all your sales channels (direct, web, OTA, etc.), provide the percent of revenue per channel. A full listing off all OTAs in use should be included.
Compliance Status
For PCI Compliance, present the prior four quarters of the required vulnerability scans, most recent Attestation of PCI Compliance, and inventory of all vendors with access to sensitive data, including credit card or personally identifiable information (PII).
Technology Projects
Any projects in progress, critically needed, or future planned projects should be supplied with details on the effort, the rationale, and the impact. Provide available budgetary data and timelines for these efforts.
Technology Spend
Present the total operating expense for all technology services in use, including systems, personnel, and vendors. Include the data as a percent of gross revenue. Provide historical and budgeted capital spending totals or percentages of gross revenue.
This is meant to be a guide to help VRs when selling their business. Each situation is unique and varies in complexity. There are consultants and deal brokers who are willing to help with this type of data development for those who would need that type of assistance.






















In fact, more than 42 percent of professional managers we surveyed are manually plugging gaps in property care by scheduling tasks from reservation reports, using paper checklists to perform quality assurance, and communicating internally through ad hoc systems, phone calls, and text threads. Another 40 percent are using a combination of tools which include their PMS systems, and workarounds that increase the likelihood that work will fall through the cracks.






In contrast, during the summer, 26 percent of guests arrived after booking an average of 78 days before arrival, and they stayed for an average of eight days.






A high-quality email database is pure gold on any day, but even more so when you need to save cash. Email should be one of your lowest acquisition costs for direct bookings and one of the highest converting marketing assets. When those two variables meet, you can generate huge revenue returns with very low expenses.





“As many travelers begin to choose alternative accommodation for the first time, it has become even more important that they find quality and comfort,” said Alex Nigg, Properly CEO and longtime advocate of establishing cleanliness standards in the short-term rental industry. “

Note: Airbnb combines stays and experiences in all of its reporting. In January 2020, Airbnb shared that it has 


Owner imports tend to bring in old and outdated information. You can run into unique situations in which commission distributions have changed over time. This can create a problem during an import if the commissions from old reservations are not represented correctly. This comes down to the way your software stores and calculates commissions. The last thing you would want would be for your owner to log into a portal where the commissions shown differ from those shown in past statements.
The working world suddenly moved away from brick-and-mortar offices and schools to “work-from-home” and “web-learning” environments. With the ability to work from anywhere, a new group of vacation rental traveler was born, and longer stays have become common. However, this guest avatar has the need for high-speed internet, easy-access charging outlets, and workplace areas in the home. As a result, vacation rental providers are switching up marketing to showcase more in-demand amenities, such as home office spaces, free Wi-Fi, and high-speed ratings to meet the needs of the Digital Nomad.
The absence of nightclubs, bars, and event venues has opened up the eyes of event promoters to the possibility of using vacation rental homes as bases for their special events. These large house parties are often illegal under COVID-19 restrictions and sometimes result in disturbances. Rental managers and owners need to review their event policies (minimum age, maximum occupancy, parking, events allowed, damage deposits), and educate booking agents as to suspicious bookings (e.g., a renter booking a home, with a residence in the same city, for a short weekend stay). Smart home technology can help deter overoccupancy and parties with outdoor video cameras, noise monitors, and cell phone/Wi-Fi usage monitors.
Destination Analysts reported in its September 2020 survey that just 29.9 percent of average American travelers have confidence that travel is safe. Another national tracking poll survey revealed, “Lodging properties with cleaning and hygiene programs are sought by 55 percent of travelers, and mask-wearing requirements and/or social distancing policies are desirable for 47 percent of those planning their U.S. trips.” (“COVID-19 Travel Sentiment Study,”
As community spread pops up in one area and is fully under control in other regions, travelers are looking for special COVID- 19-flexible cancellation policies as an easy way to protect their vacation investment.
The 
















[/su_column]

[/su_column] [su_column size=”1/2″ center=”no” class=””]


[/su_column] [su_column size=”1/2″ center=”no” class=””]

[/su_column] [/su_row]


Oct 13 — Why YOUR Thoughts Are Needed in the Vacation Rental Industry: A Woman’s Guide to Thought Leadership
