Preview

Assignment 6

Satisfactory Essays
Open Document
Open Document
376 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment 6
BUSINESS COMMUNICATIONS
CHAPTER 6 PLANNING BUSINESS MESSAGES

Assignment:

Complete the following messages: Page 183

6.12

June 13th, 2014

Mr. DeJuan Wilson
Fairfield Associates, Inc.
4290 Park Avenue
Fairfield, CT 06435

Dear Mr. Wilson:

As you requested the undersigned is transmitting to you the attached documents with look to the improvement of security in your business. To ensure the upgrading of your after-hours security, please, make a decision with what exactly you contemplate must have protection. You are concerned about your electronic equipment and paraphernalia, but also about your company records, information, and data.

As we know, you will want to obtain protection for both your equipment and data; therefore we will give you suggestions for taking a number of steps to inhibit crime:

1. Install defensive lighting. A consultant for lighting that is part of our staff can design both outside and inside lighting.
2. Exhibit security signs, because of the fact that inexperienced thieves are often as not deterred by posted signs on windows and doors.
3. Install space alarms, which are sensors that look down over the areas that are to receive protection, and activate bells or additional lights, thus scaring off intruders.

Please call me to start a verbal discussion about the protection of your business.

Sincerely,

Name e-mail company name

6.13

June 13th, 2014

Ms. Monique Faria
Grey Wolf BioSolutions
4210 Geddes Road
Ann Arbor, MI 48105

Dear Ms. Faria:

We would like to thank you for your interest in our employee leasing program. Small businesses like yours now can enjoy powerful personnel tools that were available just for large firms.

This concept allows you to outsource personnel duties so you can focus on the basic fundamentals of running your business.

Some administrative tasks we provide are:
Monthly payroll.
Quarterly taxes.
Records related to personnel matters.
Expert guidance in

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Childcare Level 2

    • 381 Words
    • 2 Pages

    Make sure that you know where the fire exits are in your setting. Never put anything in the way of a fire exit.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cda Competency Goal 1

    • 500 Words
    • 2 Pages

    I make sure electrical outlets are covered, wires and cords are not accessible to children.…

    • 500 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    a) Physical Security - Is intended to detect and deter unauthorized personnel from gaining access.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Cjs/250 Appendix D

    • 574 Words
    • 3 Pages

    The office building exterior has three outer doors and one window. The first door is marked with an Employees Only sign and requires a badge for access. The second door is the main entrance for visitors and is manned by a guard, who requires a visitor’s pass for admittance. The third door is an emergency exit only and is clearly marked. Any attempt to gain access through the first door without a badge, the second door without a pass, or the third door at all, results in alarm activation and guard response. The window is locked from within; any attempt to gain access through the window also activates the alarm and alerts the guard.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    | Metal detectors at all entrances, have armed guards and unarmed guards, security cameras and CCTV installed.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Assignment 3

    • 1286 Words
    • 10 Pages

    How this table was created? The constrains and other valuable information that was given by the question and with manual analysis was inserted into the Excel spreadsheet in an appropriate format. The Excel Solver function was utilized in order to get the solutions.…

    • 1286 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Ds31 1.2

    • 473 Words
    • 2 Pages

    Lounge – Fit socket covers to all accessible electrical sockets; fit radiator covers; apply an anti-slip underlay to the rug; tidy the TV cables out of reach and sight; apply stickers at child eye level on the glass patio doors to prevent children running into them.…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Remember, a locked door ensures the utmost safety of you and your loved ones as well as your personal belongings. You may also want to install a deadbolt for added security. Other important safety tips include: • Use your door’s peep hole to identify who is on the other side • Never hold the door open for a stranger when entering your building • Do not put your full name on your mailbox, instead use initials or just your last name • Invest in a personal security system It is in everyone’s best interest to keep their surroundings as safe as possible.…

    • 709 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The component of the overall security objective that deserves the most attention in the environments mentioned in the article is physical security. The reason why physical security would work for the environments described in the article is that under physical security components include security hardware such as alarms, closed captioned television (CCTV), locks and lighting. Having security officers, policy and procedure manuals in place for the entire security program helps to deter or even prevent threats. Locks and alarms can be used to protect the people and the property while CCTV can act as the eyes and two way intercoms can act as the ears of the system. Also under the physical security program, policy and procedure manuals grant the security professionals authority to perform the necessary security functions correctly (Clifford, 2004). The component that would be the less pertinent for this…

    • 936 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Assignment 6

    • 479 Words
    • 2 Pages

    Course criteria covered: Unit 2 1.1 Explain the historical development of the person-centred approach to counselling, including the people influential in its development. 1.2 Explain the philosophical basis of the person-centred approach. 1.3 Explain the key concepts and principles of the person-centred approach. 1.4 Explain how the person-centred approach informs the practice of a qualified trained counsellor. 1.5 Explain how the person-centred approach influences the understanding of the development of the concept of self. 1.6 Explain why it is important to have an understanding of a therapy model before using its methods and techniques. Unit 2 2.1 Explain the key features of the psychodynamic and cognitive–behavioural models of counselling. 2.2 Compare and contrast these models with the main model chosen…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the UK our homes contribute significantly to the carbon dioxide in the atmosphere. Becoming more energy efficient will help to reduce the amount of carbon emissions we create and the amount of energy we need to power our homes.…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Make sure your accommodation is secure at all times. Mugging, pick pocketing and jewellery theft are…

    • 1057 Words
    • 4 Pages
    Good Essays