Premium Essay

Office Management Assessment

In:

Submitted By gilliangardner26
Words 1194
Pages 5
Office Management Assessment

Classic Interiors

1.0 Introduction
This report is to investigate restructuring the Classic Interiors organisational structure and practices. The Partners of the business would like to expand by offering their studio based service through the internet for their clients, as I have been appointed to the post of Office Manager, the areas that need change include; levels of decision making, office management, financial planning and budgetary control, delegation and leadership skills. With my recommendations, this will see the office staff morale boost, steady work productivity, leadership skills and enhance corporate image.

2.0 Terms of Reference
As part of my HND Y2 Administration and IT course, I have been asked by Chris Kennedy my Office Management lecturer to investigate and write a report outlining changes to the Classic Interiors organisational structure and practices and give recommendations that I find. This report was to be submitted by 16/10/2014.

3.0 Procedures
The information shown in this report was gathered from:
Office Management Student Pack Outcome 1 – Chris Kennedy

4.0 Findings
4.1 Levels of Decision making
There are two important levels of decision making that Classic interiors can adapt to which are:
4.1.1 Strategic This level is for overall decision making e.g. long term basis. Strategic planning is a management tool that can be used to determine mission, vision, values, goals, objectives, roles and responsibilities (Idealist, 2014). Those who make these decisions are chair person, managing director or general manager, decisions made are to be confirmed in a document entitled a Strategic Plan. All the activities should be related to, generated from and support the Strategic Plan (Tutor Notes, 2014). At this level management are there to help an organisation do a better job to ensure that members of

Similar Documents

Premium Essay

Asfsdfsdfsdf

...August 08, 2014 Dear Ma’am/Sir: Good day! We the Junior Office Management Society (JOMS), is asking for your permission to let your students to attend the CBM Acquaintance Party entitled “DENIM GLAM” to be held on the 15th day of August 2014 (Friday) from 07:00 pm until 10:00 pm at the TCU Auditorium. This activity is for all students under the College of Business Management (CBM). We hope for your consideration and for your approval. Thank you and God Bless. Mr. Jerwin Llovit JOMS PRESIDENT Note by: Prof. Rodney F. Espenida JOMS ADVISER August 08, 2014 Dear Ma’am/Sir: Good day! We the Junior Office Management Society (JOMS), is asking for your permission to let your students to attend the CBM Acquaintance Party entitled “DENIM GLAM” to be held on the 15th day of August 2014 (Friday) from 07:00 pm until 10:00 pm at the TCU Auditorium. This activity is for all students under the College of Business Management (CBM). We hope for your consideration and for your approval. Thank you and God Bless. Mr. Jerwin Llovit JOMS PRESIDENT Note by: Prof. Rodney F. Espenida JOMS ADVISER August 08, 2014 Dear Ma’am/Sir: Good day! We the Junior Office Management Society (JOMS), is asking for your permission to let your students to attend the CBM Acquaintance Party entitled “DENIM GLAM” to be held on the 15th day of August 2014 (Friday) from 07:00 pm until 10:00 pm at the TCU Auditorium. This...

Words: 288 - Pages: 2

Premium Essay

Very Good Dude

...RISK MANAGEMENT GUIDE FOR DOD ACQUISITION Sixth Edition (Version 1.0) [pic] AUGUST, 2006 Department of Defense Preface The Department of Defense (DoD) recognizes that risk management is critical to acquisition program success (see the Defense Acquisition Guidebook (DAG), Section 11.4). The purpose of addressing risk on programs is to help ensure program cost, schedule, and performance objectives are achieved at every stage in the life cycle and to communicate to all stakeholders the process for uncovering, determining the scope of, and managing program uncertainties. Since risk can be associated with all aspects of a program, it is important to recognize that risk identification is part of the job of everyone and not just the program manager or systems engineer. That includes the test manager, financial manager, contracting officer, logistician, and every other team member. The purpose of this guide is to assist DoD and contractor Program Managers (PMs), program offices and Integrated Product Teams (IPTs) in effectively managing program risks during the entire acquisition process, including sustainment. This guide contains baseline information and explanations for a well-structured risk management program. The management concepts and ideas presented here encourage the use of risk-based management practices and suggest a process to address program risks without prescribing specific methods or tools....

Words: 12584 - Pages: 51

Premium Essay

Miss

...Assessment Task 2 BSBINN601B Manage organisational change Develop a change management strategy © 2011 Innovation and Business Industry Skills Council Ltd Page 1 of 17 Assessment Task 2 BSBINN601B Manage organisational change Submission details Candidate’s name Phone no. Assessor’s name Phone no. Assessment site Assessment date/s Time/s The assessment task is due on the date specified by your assessor. Any variations to this arrangement must be approved in writing by your assessor. Submit this document with any required evidence attached. See specifications below for details. © 2011 Innovation and Business Industry Skills Council Ltd Page 2 of 17 Assessment Task 2 BSBINN601B Manage organisational change Performance objective The candidate will demonstrate the skills and knowledge required to develop a change management strategy. © 2011 Innovation and Business Industry Skills Council Ltd Page 3 of 17 Assessment Task 2 BSBINN601B Manage organisational change Assessment description Using the scenario information supplied, the candidate will undertake a cost-benefit analysis for high-priority change requirements, undertake a risk analysis, identify barriers, and develop mitigation strategies. The candidate will develop a change management project plan, assign resources and develop a reporting process. The candidate will then present their analysis and project plan to management for approval...

Words: 2783 - Pages: 12

Premium Essay

Corporate Governance

...Office of the New York State Comptroller Division of Local Government and School Accountability LOCAL GOVERNMENT M ANAGEMENT GUIDE Management’s Responsibility for Internal Controls Thomas P. DiNapoli State Comptroller For additional copies of this report contact: Division of Local Government and School Accountability 110 State Street, 12th floor Albany, New York 12236 Tel: (518) 474- 4037 Fax: (518) 486- 6479 or email us: localgov@osc.state.ny.us www.osc.state.ny.us October 2010 Table of Contents Who’s Responsible.............................................................................................................. 2 The Origin - Committee of Sponsoring Organizations ......................................................... 4 Integrated Internal Control Framework - The Big Picture ..................................................... 5 The Five Essential Elements of the Internal Control Framework ........................................... 6 Limitations of Internal Controls ..........................................................................................15 The Impact of Information Technology ...............................................................................16 The Role of Internal Auditors and Audit Committees ..........................................................17 Conclusion ....................................................................................................................... 20 Additional Resources...

Words: 8114 - Pages: 33

Free Essay

The Economic and Risk Analysis Division of the Sec

...Analysis (DERA) is an integral part of the Securities Exchange Commission as it interacts with every other office and division in the SEC. In this paper, I will be discussing the role of DERA within the SEC, how it was formed, the multiple offices within DERA, and a program enacted by DERA and what its responsibilities are. DERA was originally three separate offices in the SEC: the Office of Economic Analysis, the Office of Risk Assessment, and the Office of Interactive Data. The offices were combined in 2009 to create what is now the Division of Economic Risk Analysis. DERA was formed to make the most of their diverse expert staff in order to provide the most sophisticated and data-driven analyses to contribute to the agency’s policymaking, rulemaking, enforcement, and examinations. According to SEC Chair Mary Jo White, the division serves as a central role in the SEC’s ongoing commitment to rigorous economic analysis. Since its inception in 2009, DERA’s staff has doubled and expanded efforts to provide economic analysis and risk assessment to support the SEC’s mission. DERA is staffed by a wide range of professionals including economists, accountants, analysts, and attorneys. To that effect, DERA is comprised of nine specialized offices, each of which having an important role to play within the SEC. First, there is the Office of the Chief Counsel (OCC). This office provides guidance and counsel to the Chief Economist and other division staff regarding legal issues implicated...

Words: 1098 - Pages: 5

Premium Essay

Analysis of Performance Appraisal System of the Daphne Company Based on Kpi

...http://sass.sciedupress.com Studies in Asian Social Science Vol. 1, No. 2; 2014 Analysis of Performance Appraisal System of the Daphne Company Based on KPI Yanni Yao 1 & Yingying Li1 1 Management faculties of graduate students, Shanghai University of Engineering Science, Shanghai, China Correspondence: Yanni Yao, San Xin North road No.1800 20th floor, Room 5013, Songjiang, Shanghai, China. Tel: 86-150-0017-1162. E-mail: 15956976431@163.com Received: April 28, 2014 doi:10.5430/sass.v1n2p84 Abstract Performance appraisal is an important part of enterprise’s human resource management. It can provide an important basis for the salary adjustments of employees, job promotion and training development. This thesis is starting from the status of analysis of Daphne’s performance appraisal, adopting Key Performance Indictor performance appraisal in human resources management model, to analyze Daphne’s problems of performance appraisal. With the practical situation of the theory of knowledge combined with Daphne, the thesis aim at designing a full set of performance appraisal system. In the process of establishing the system, the first is to introduce the performance appraisal system which is applied to the theoretical overview; Secondly, we describe how to use key performance to analyze Daphne’s performance appraisal system after some introductions of relevant concepts of performance appraisal; Finally, as an example in HR positions, setting Key Performance Indicator's do...

Words: 4483 - Pages: 18

Free Essay

Management Critiques About Telecommuting

...Meg Whitman, Chief Executive of Hewlett-Packard and Marissa Mayer, CEO of Yahoo, have made management critiques about telecommuting. Both company leaders have claimed that telecommuting has led to poorer performance of their company’s employees. Meg Whitman wrote a memo, urging employees to show up at the office more often. Marissa Mayer wrote an article addressing the issue, in opposite favor of telecommuting. Whitman, Mayer as well as some other leaders have assessed that employees that work from home are the cause of poor financial performance and lackluster product innovation. The article I read, “A Better Way for HP to Boost Performance”, by Aubrey C. Daniels, addressed these two company leaders with a critical assessment of their management decisions on this issue. Daniels asserts that the claims of Whitman, Mayer as well as other company leaders and managers are not basing their managerial decisions on accurate assessments. She argues that this approach is misguided and flies in the face of the laws of human behavior. Daniels claims that furthermore, this method is likely to be counterproductive. The basis of the article is saying that leaders that are targeting telecommuting are missing the point that employees that work from home are not the cause of poor financial performance or lackluster product innovation, and policies forcing them back to the office will not solve the issues restraining growth. The article asserts that organizations that forbid working from...

Words: 598 - Pages: 3

Free Essay

Win - Win with Assessments:

...Guest Author: Win - Win With Assessments: The Due Diligence of the MPS Consulting Process By Petra Diener, James Duckenfield, and Neel Tikkoo NewField IT Established in 2003, NewField IT is headquartered in London and provides state of the art software and services. The company also has offices in France, the Netherlands, and the U.S., operating across more than 40 countries worldwide. The company takes a holistic and analytical approach – from discovery through design to implementation and support – in order to accomplish streamlined print and document workflow processes. NewField IT is not a supplier of Managed Print Services (MPS) or Managed Document Services (MDS); rather it has two core lines of business: Consulting and Systems Integration and Support. Through its consulting practices, NewField IT assesses the requirements for print and document workflow and management and provides procurement assistance. It also provides automated assessments and modeling of office workplaces and reprographics, deploying its in-house-developed Optimization Toolsets: Asset DB® and Analytics Platform CompleteView®. Through its Systems Integration and Support implementing practice, NewField IT integrates and supports 3rd party accounting and print management software such as eCopy Equitrac, EveryonePrint, NSi AutoStore, RightFax, SafeCom, and YSoft SafeQ. Assessments are the underlying bedrock and the genesis of any MPS strategy in a consulting process. They also represent an area...

Words: 1717 - Pages: 7

Premium Essay

Risk Assessment Proposal

...Risk Assessment Proposal We are creating a Risk Management assessment for a local doctor’s office. This office not only handles patient care but patient confidentiality with IT services that complies with HIPAA. This threat assessment is going to be important to know if our business plan is viable. We are going to assessing the possible and probable risk, vulnerabilities, and threats associated with the doctor’s office. This is going to require us to understand how risk management works by using quantitate and/or qualitative valuing. We will need to use management techniques of understanding, controlling, and planning for and against threats. We will also use a few techniques to manage vulnerabilities like people, technology and environmental events. We will also be determining how to reduce the probability of risk through mitigation. We will be determining how we can reduce an impact with contingencies. We will attempt to determine the amount of reduction using mitigation and contingency plans. Finally we will be determining our exposure left given what we cannot reduce. This doctor’s office may include anything from breach of patient’s medical records, lack of training with staff as it pertains to patient confidentiality, and operating systems. Also evaluated in this process will be environmental and device discovery with patients obstructing the network. This process will be conducted as a means to analyze current base-lines as to the operation of the office and to...

Words: 342 - Pages: 2

Premium Essay

Risk Assessment in Information Technology

...Risk Assessment in Information Technology Risk Assessment in Information Technology This paper will address risk assessment in Information Technology and discuss factors used to identify all kinds of risks in company network diagram. It will also assess the risk factors that are inclusive for the Company and give the assumptions related to the security data as well as regulatory issues surrounding risk assessment. In addressing the global implications, the paper will propose network security vulnerabilities and recommend the mitigation measures for the vulnerabilities. Cryptography recommendations based on data driven decision-making will be assessed, and develop risk assessment methodologies. Risk assessment in Information Technology Risk assessment is one of the mitigation methods for the Networks design. The scanners or vulnerability tools are used to identify the risks or vulnerabilities within the network design. The risks can be identified by these tools as they extend beyond software detects to incorporate other easily vulnerabilities including mis-configurations (Rouse, 2010). The shareware assessment tools are accessible online and can be used to supplement commercial scanners. Framework of risk assessment * Step 1 – categorizing information and information systems. Here unique department traits are highlighted and assigned impact levels (high, medium or low) in line with the security FISMA’s security objectives (confidentiality, integrity and availability)...

Words: 3240 - Pages: 13

Free Essay

Szt1 Community Assessment

...Pierce County, WA Community Assessment Western Governors University Pierce County, WA Community Assessment Community Description and Data Interpretation Pierce County is situated in the central west of Washington State. The county is divided by Puget Sound, with the majority of the land to the east of the major waterway. There are several small islands included in the county that are located near the southern edge of the Sound. At the county’s eastern border, the beginnings of foothills lead to the actively volcanic Mount Rainier’s summit. Many parts of the county today are built upon the deposits of lahar from past eruptions. The geography of Pierce county ranges from a rocky shore to a lush, national forest with many lakes, rivers, and creeks in between. Overall, the county has 1794 square miles of land and 118 square miles of water, not including Puget Sound (Pierce County Department Of Emergency Management, 2010). Pierce County became well known in the late nineteen hundreds when the city of Tacoma became the western terminus of the Northern Pacific Railroad – the first transcontinental railroad in the north. The introduction of this railroad led to an increase in shipping and manufacturing in the area. At the time, lumber, shipping, farming, and coal mining powered Pierce’s economy. With the exception of mining, all these industries are still present today, though industrialization has made them less prominent than in the past (Pierce County Department...

Words: 1765 - Pages: 8

Free Essay

Employee Portfolio

...University of Phoenix Material Employee Portfolio Complete one matrix for each employee. Employee name: Karen Jubensky |Self Assessment |Results Summary |Strengths |Weaknesses | |How Satisfied Am I |Very Satisfied |Motivated towards the job and life |General environment affects the | |with My Job? | |in general |perception of daily work | |Am I Engaged? |Yes |Take charge of work, committed and |Avoid office politics | | | |positive outlook | | |How Are You Feeling |Wonderful |Positive attitude, keep focus and |Share my positive outlook more | |Right Now? | |determination |often with peers | |What’s My Affect |Somewhat intentionally intense/38 |Laser sharp focus help getting work|Keep emotions in check in tough | |Intensity? | |done |situations | |What’s My Emotional |45 |Self awareness, empathy, motivation|Non | |Intelligence Score? | ...

Words: 891 - Pages: 4

Premium Essay

Is4550 Lab 9

...penetrates you IT infrastructure and gains access to your internal network Vulnerability Assessment and Management Policy Intra-office employee romance gone bad Security Awareness Training Policy Fire destroys primary data center Threat Assessment and Management policy communication circuit outages Asset Protection Policy Workstation OS has a known software vulnerability Vulnerability Assessment and Management Policy Unauthorized access to organization owned Workstations Asset Management Policy Loss of production data Security Awareness Training Policy Denial of service attack on organization e-mail server Vulnerability Assessment and Management Policy Remote communications from home office Asset Protection Policy LAN server OS has a known software vulnerability Vulnerability Assessment and Management Policy User downloads an unknown e-mail attachment Security Awareness Training Policy Workstation browser has software vulnerability Vulnerability Assessment and Management Policy Service provider has a major network outage Asset Protection Policy Weak ingress/egress traffic filtering degrades performance Vulnerability Assessment and Management Policy User inserts CDs and USB hard drives with personal photos, music, and video's Security Awareness Training Policy VPN tunneling between remote computer and ingress/egress router Vulnerability Assessment and Management Policy WLAN access points are needed for LAN connectivity within a warehouse Asset...

Words: 616 - Pages: 3

Premium Essay

Risk Management

...effect. Risk management is defined as being the coordinated activity to direct and control an organization with regard to risk. Risk management can also be defined as the process of identifying, quantifying and managing the risk an organization faces in regard to the management of office record. The objective is to maximize the positive effects of risk and to minimize the negative effects of risk. The Risk Management Framework A risk management framework is the ‘set of components that provide the foundations and organisational arrangements for designing, implementing, monitoring, reviewing and continually improving risk management throughout the organisation’. The risk management framework should include a risk management strategy, policy, a stakeholder engagement plan, and governance structure. Records managers should be aware of the risk management framework that exists in the agency. This is due to the importance of aligning the records management and risk management functions across the agency. Alignment enables records related risks and business risks with a recordkeeping component to be identified and addressed consistently. Alignment may be achieved by: • Ensuring that the risk management strategy includes recordkeeping requirements; • Aligning the risk and records management policies; • Regular communication between the records management and risk management teams; • Identifying any risks associated with the agency’s current records management practices ...

Words: 1887 - Pages: 8

Premium Essay

Term

...STRATEGY .............................................................................................5 SECURITY COMPONENTS ...................................................................................................................................12 RISK MANAGEMENT ................................................................................................................................................12 POLICY MANAGEMENT ............................................................................................................................................14 ORGANIZING INFORMATION SECURITY ....................................................................................................................16 ASSET PROTECTION .................................................................................................................................................18 HUMAN RESOURCES SECURITY ...............................................................................................................................20 PHYSICAL AND ENVIRONMENTAL SECURITY ...........................................................................................................22 COMMUNICATIONS AND OPERATIONS MANAGEMENT .............................................................................................24 ACCESS CONTROL .....................................................................................................................................................

Words: 14063 - Pages: 57