Thursday, June 20, 2019
Information Security Plan Essay Example | Topics and Well Written Essays - 3000 words
Information Security Plan - Essay ExampleThe makeup is housed in a detached, multi-storeyed building located in the central trade district of an Australian city. The lodge owns several assets that may at risk (Hall 2012, 273). The partnerships physical holdings include the tables, chairs, computers, lockers, calculators, printers, fax machine, scanner, sales pitch equipment, production equipment, inventories, and air conditions. The companys employees use the tables, calculators, and chairs to butt on their daily activities like recording business transactions. The business transactions include selling the companys goods and services. Further, the companys employees also use the chairs to accomplish their daily responsibilities of processing the sales and purchase of inventory items (Brigham 2010, 105). In addition, the employees use the chairs whenever they prepare their monthly reports. The employees use the chairs because it would be too taxing for the employees to stand u p the whole day while encode the companys business transactions. Management assigns one chair t each employee. ... In addition, the companys employees file their printed records in the cabinet (Schlesinger 2007, 2). The cabinet contains confidential printed records of the companys daily transactions. The transaction records include the number of items bought by the companys current and prospective customers. The transaction records include the sum of money and quantity bough from the current and prospective suppliers. Likewise, the company uses the printers to print the required hard copy reports (Stickney 2009, 366). The company also uses the printers to print sales letters that are submitted to the companys current and prospective customers. The company uses the printers to submit purchase requisitions to the companys current and prospective suppliers. The employees use the printers to prepare their monthly reports or presentations. In addition, the company uses the fax machines and scanners to send information to entities outside the companys premises (Hussey 2010, 11). The fax machines and scanners hasten the transfer of printed copies. The use of the fax machines and scanners eliminate the process of sending confidential data through the post office, snail mail. Normally, the fax machines can be used as telephones. In the same manner, the company uses lurch equipments (Hussey 2010, 11). The delivery equipments include trucks, cars, and other delivery vehicles. The company uses the delivery equipments to deliver the sold products to the companys current and prospective customers. In addition, the company harnesses the delivery equipments to retrieve the purchased products from the companys current and prospective suppliers. Further, the company owns inventories (Mendell 2006, 21). The inventories
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.