Premium Essay

Email Assisngment

In:

Submitted By randimcgowan1983
Words 347
Pages 2
Message 1
Sender:
To: Thomas Jans, HR Assistant
Subject: RE: Happy Anniversary!
Message:
Good morning!
Thank you! It has been a great five years with the company and I look forward to many more. Everything is going well and I appreciate your willingness to assist in any way possible. If I have any additional questions on my benefits I will let you know.
Thanks again!

Catering Director

Message 2
I do not see any need for a response to this email. It explains the new vacation policy thoroughly and is a mass announcement, not needing specific reply.

Message 3
Sender:
To: Michael Jones, Quality Foods
Subject: RE: Today's Conference Call
Message:
Hi Mike,
I apologize if there was any miscommunication. I’ve checked my calendar and I did not have the conference call noted. I’d be happy to visit with you any time today so that we can get this finalized. Are you available at 11:00am? Thank you for your flexibility and understanding. I look forward to talking to you later today. Please reply with the requested information or to set up another conference call.

Message 4
Sender:
To: Blake Edwards
CC: Thomas Jans, HR Assistant
Subject: RE: Summer Job Opportunity
Message:
Good afternoon Blake,
Thank you for your interest in Blue Bay Resorts. We are always looking for talented and energetic individuals to fill our summer needs. I am copying Thomas Jans in our HR department. As director of catering, I assist in the hiring decisions, but our application process starts with HR.
Our HR department will be in touch with you if they need any additional information.
Thanks,
Catering Director

Message 5
Sender: Angel Murphy, Kitchen Manager
To: Angel Murphy, Kitchen Manager
Subject: RE: Confidential Message:
Angel,
Thank you for bringing this to my attention. In terms of harassment complaints, we always notify HR when we have

Similar Documents

Free Essay

You Decide 3

...You Decide Scenario: Week 3 Detecting and preventing insider threats is its own discipline, with its own dynamics. If you put these countermeasures in place, you can reduce the threat dramatically. First, you can use an IP packet-filtering router. This type of router permits or denies the packet to either enter or leave the network through the interface on the basis of the protocol, IP address, and the port number. The protocol may be TCP, UDP, HTTP, SMTP, or FTP. The IP address under consideration would be both the source and the destination addresses of the nodes. The port numbers would correspond to the well-know port numbers (Vacca, 2009). Packet filtering lets you control data transfer based on the address the data is, the address the data is going to, and the session and application protocols being used to transfer data. The main advantage of packet filtering is leverage. It allows you to provide, in a single place, particular protections for an entire network. Consider the Telnet service. If you disallow Telnet by turning off the Telnet server on all your hosts, you still have to worry about someone in your organization installing a new machine (or reinstalling an old one) with the Telnet server turned on. On the other hand if Telnet is not allowed by your filtering router, such a new machine would be protected right from the start, regardless of whether or not its Telnet server was actually running. Another advantage of a packet filtering router is that...

Words: 622 - Pages: 3