Free Essay

Cjs/250 Final

In:

Submitted By ghostdawg
Words 1458
Pages 6
CJS/250
FINAL
THE SECURITY PLAN
DANIEL BATTLE
7/31/2011
7/31/2011

This store is a small convenience store called 24 Hours.
24 Hours is located 5 miles away from the local police station in Akron Ohio. This store is also located in a neighborhood with an extremely high crime rate. 24 Hours is open 24 hours a day with three separate shifts working from 6am-3pm, 3pm-11pm, and 11pm-6am.
Because of the stores location they have a strict security layout and follow out orders to execute this plan on a daily basis. This plan consist of having a brinks truck come to them every 10 hours to pick up their cash income and it is to be dropped off at the bank, and to have all the employees on every shift to drop the money in a timed safe set for when the brinks truck comes to pick up the money. To have a set schedule and certain procedures followed as when to stock the merchandise only when there is no one in the store. The security features in this store include, has (CCTV) closed captioned television installed and lighting around the store including the parking lot witch is small.
This store also has bars on all three windows including the pickup window three cctv cameras on the outside of the store four on the inside two alarms on both doors three round in corner security mirrors, five brightly lit lights around the store or posted on the outside perimeter of the store four light posts around the parking lot and four light posts on the inner diameter of the parking lot with a total of eight light posts in the parking lot.
Some of their procedures when being robed are to cooperate, and communicate clearly with the robber as to not aggravate him or her. With the money insured just do as he or she tells you to do and don’t argue. The most important action a robbery victim must master during a robbery is to remain calm, or at least present the outward appearance of being calm! Even during a “simulated robbery,” it is not uncommon for the victim to panic. Training and application are the keys to minimizing the element of panic during a robbery. If you do not remain calm or keep your composure, you will not be able to obtain a good description. A robber will rarely hurt you unless you provoke them don’t be a HERO -- Your life is worth more than anything kept in the facility you work in COOPERATE WITH THE ROBBER!!
Primary objective of the robber is to take without complications never place yourself in a position where someone can approach you undetected. . Once you realize you’re being robbed, take a brief glance at the upper portion of robber(s) body (head to neck). Make note of hair, hat, complexion, eyes, glasses, scars, facial hair, jewelry, sex, nationality, age, and height. While handing the robber the money or goods, glance at the middle portion of his/her body (shoulder to waist).
Make note of jewelry, shirt, jacket, tie, pockets, name tags, rank/stripes, any writing on clothing, belt, and weight. To help you guess a robber’s weight, compare to your weight or to a co-worker’s. As the robber departs, glance at the lower portion of his/her body (waist to feet). Make note of pants, skirt, shorts, tennis shoes, dress shoes, barefoot, etc. These are some of the procedures to the stores floor plans when being robbed that I have used as an example.
24 Hours also has a walk up window with special bullet proof glass a gage like fencing on both sides of the glass including the other 2 windows in the store as well. The doors are closed locked, and alarm activated on all doors in the store one in the front and one in the back that is what the walk up window is for when they close the doors at 8pm every day so that there is less chance of robbery.
This store is also equipped with 3 big rounded mirrors that the clerks can look into in the other 3 corners of the shop to see offenders such as thieves and robbers before they can steal or make a move so they are better prepared to protect themselves when it does happen. This store also has a last resort and that is if the cops are called and everything is done that can possibly be done and they have no choice left they have two 12 gage shotguns loaded at all times next to their waists under the counter.
They also have protective glass surrounding them inside the store as well. 24 Hours has signs threw out the store posting that the customers and everybody is on camera so to further discourage any one from testing their limits and trying to commit the crime.

Bomb threat plan 1. Signal a person nearby 2. Take down information 3. Take the time of call 4. ask questions(when is the bomb going to explode, the location of the bomb, what the bomb looks like, what kind is it, what will cause it to explode, if the caller placed the bomb, why did they do it, the callers current location, and the caller’s name) 5. What is the callers address? 6. Other actions needed 7. Call 911 after information is received 8. Phone number of caller if possible 9. Description of caller’s voice 10. Accent (if any) 11. Date and time of call 12. Keep the caller on the line and do not hang up. 13. Try to remain calm at all times

Fire threat plan 1. Activate the fire emergency alarms throughout the building 2. Call 911 3. Initiate the fire evacuation plan and immediately evacuate the building, don’t re-enter 4. Identify the building fire warden and have them give a brief report to the fire officials stating the location of the fire, description of the fire, missing and injured employees 5. Once the building is evacuated, all fire wardens are to account for all personnel on their assigned teams and assess any injuries or damages 6. Locate and identify the injured and have them on standby until emergency personnel arrive Being able to have a up to date and reliable disaster response and emergency plan can truly save not only your life, but those who work in the building, customers, and at times save the building itself. The threat and risk assessments I chose happen nearly every day all over the nation.
Some liability issues in this store would be employer liability, which covers the employees in legal issues concerning things as sexual harassment. Some other issues such as if you run the store you are responsible for certain things that could happen there such as if a customer slips and falls due to a wet freshly mopped floor or the refrigerator that gives off to much condensation causing the slip and injury. For example in this store an employee has just mopped the floor and he/she did not put up a caution wet floor sign so the customer did not know to take his or her time while walking up and down the floor so they slipped and hurt themselves you are ultimately responsible for your employees so the problem is on you is on you.
There is no hired physical security on the premises, there only physical security there is at the store is the public police they only sit outside in their patrol car when in the area just to keep the robbers and thieves away with a physical presence of the Akron police but only for a limited amount of time every day for around a hour at a time at random. As for our information security, the store has two locked safes one for money witch is timed and the other for employee information.
Due to the failing economy, people are becoming desperate for quick cash, so banks are always the first target. Bomb threats come from disgruntled people that have a point to prove or a statement to make to the bank and public eye. The cyber war is becoming increasingly worse at a fast rate. Customers are getting scammed in different ways everyday leaving their lives in pieces once victimized. Employees are also becoming desperate and greedy in trying to receive more money fast at all costs.

References: 1. http://www.osha.gov/SLTC/etools/evacuation/eap.html 2. http://www.sans.org/reading_room/whitepapers/auditing/overview-threat-risk-assessment_76 3. http://www.msasecurity.net/security-consulting/emergency-management-planning/

Similar Documents

Premium Essay

Cjs 250 Week 9 Final

...The Security Plan CJS 250 University Of Phoenix [pic] Camera This is my security plan; it includes my layout as you see above What does security really mean to you? Many people do not consider what can happen if security is not adequate, or if countermeasures to possible problems are not in place. Above, I have outlined my floor plan, and now I will explain the positive aspects of my personal plan. Our first discussion points are: Possible threats: [pic] Fires [pic] Theft or fraud [pic] Bombings or bomb threats [pic] Information theft/hacking [pic] Burglary or armed robbery [pic] Kidnapping and Ransom Risk Assessment: Fires: Is is important that flammable things are always labeled and in the right place, and that no walkways are blocked. A store's chemicals are sometimes fire hazards, so ensuring that they are always in the right place limits the danger of fire. Theft or Fraud: Papers or documents can be used by unauthorized people. Documents that have important information should not be left lying around – these could be used for fraudulent purposes, or they might have computer access codes on them. Information theft/hacking: All computer networks need to be updated with security protocols –...

Words: 1495 - Pages: 6

Free Essay

Research

...Chapter 1 Example 1.1 The Apex Television Company has to decide on the number of 27- and 20-inch sets to be produced at one of its factories. Market research indicates that at most 40 of the 27-inch sets and 10 of the 20-inch sets can be sold per month. The maximum number of work-hours available is 500 per month. A 27-inch set requires 20 work-hours and a 20-inch set requires 10 work-hours. Each 27-inch set sold produces a profit of $120 and each 20-inch set produces a profit of $80. A wholesaler has agreed to purchase all the television sets produced if the numbers do not exceed the maxima indicated by the market research. (a) Formulate a linear programming model for this problem. The decisions that need to be made are the number of 27-inch and 20-inch TV sets to be produced per month by the Apex Television Company. Therefore, the decision variables for the model are x1 = number of 27-inch TV sets to be produced per month, x2 = number of 20-inch TV sets to be produced per month. Also let Z = total profit per month. The model now can be formulated in terms of these variables as follows. The total profit per month is Z = 120 x1 + 80 x2. The resource constraints are: (1) Number of 27-inch sets sold per month: x1  40 (2) Number of 20-inch sets sold per month: x2  10 (3) Work-hours availability: 20 x1 + 10 x2  500. Nonnegativity constraints on TV sets produced: x1  x2  0, 0 With the objective of maximizing the total profit per month, the LP model for this problem is Maximize...

Words: 12992 - Pages: 52

Free Essay

Fiction Versus Reality

...Fiction versus Reality CJS/220 02/13/2011 Crystal l. Wagoner This will be my final project for this class and it will be on Fiction versus Reality in the court room. This final project is due no later than February 13, 2011. In this project I will be explain the difference between television perspectives (fiction) about how court room drama is versus the real deal (reality). I will select a fictional television court room drama from the court television web site to help with my research, and then I will describe the fictional portrayals of the court room, including the trial process, the roles of the prosecution and defense, the roles of the court room participants and the handling or implementation of rights for the defendant and the victim. Then, draw parallels between the fictional portrayal and the reality of the court room within above identified aspects. I will then determine the accuracy of the fictional court room process as compared to that of the court room reality. I will also explain in my opinion, Given that entertainment differs from reality, what impact would fictional account of courtroom practices have on the average citizen’s perceptions of the real-life courtroom process. There are many people that make up a reality court room like: the bailiff...

Words: 1638 - Pages: 7

Free Essay

Cost Acounting

...KENYATTA UNIVERSITY SCHOOL OF BUSINESS DEPARTMENT: MANAGEMENT SCIENCE DEPARTMENT UNIT CODE & NAME: BMS 840 –QUANTITATIVE TECHNIQUES WRITTEN BY: Ms. Gladys Kimutai and Mr. Paul Sang Copyright © Kenyatta University, 2014 All Rights Reserved Published By: KENYATTA UNIVERSITY PRESS i ii MODULE SUMMARY During the last two decades, there has been a dramatic change in the business environment. The trend towards complexity has increased the risk associated with business decisions, making it more important to have a sound information base. To do well in such an environment, one will need to understand how to identify quality information and recognize the solid, reliable research on which one‟s high-risk decisions as a manager can be based. One also needs to know how to analyze the research findings. The study of quantitative techniques provides one with the knowledge and skills needed to solve the problems and the challenges of a fast-paced decisionmaking environment. Managers make decisions on a day to day basis and it is necessary for them to be able to analyze the data so as to be able to make optimal decisions. This module has ten lesson which cover matrix algebra, markov analysis, Linear programming, differentiation, applications of differentiation to cost, revenue and profit functions, integral calculus, inventory models, sampling and estimation theory, hypothesis testing and chi-square tests. iii MODULE OBJECTIVES By the end of...

Words: 36888 - Pages: 148

Free Essay

Security Objective Componants

...Security Objective Components STEPHANIE CASBY CJS 250 October 30th, 2011 Jenelle Velarde Security Objective Components Have you ever been to church and thought you had to worry about your safety? I know for myself that is one place besides my home that I have always felt safe. People in church attend with little thought given to their safety while they are there. Church is supposed to be a place of peace and serenity, not violence or death. In the last 50 years churches and other religious sites around the world has been victim’s to violent acts of crimes. There are several reasons for this type of crime in these religious places of worship; differences in religious beliefs, domestic disturbances, and racism are number one reason for these acts. In the last ten to fifteen years there has been an increase in violent crimes reported in churches, schools, and malls that seemed to be the target. In this paper I will discuss what component of the overall security objective deserves the most attention in the environments from the article. I will also discuss what components would be less pertinent for the environments during a vulnerability assessment. I will describe counter measures or possible solutions for the shootings, incidences of arson and bombing. Then I will discuss the components of the overall security objective that would be ore pertinent had the events occurred at the mall and if they would present alternative countermeasures that I will list and explain...

Words: 815 - Pages: 4

Premium Essay

Syllubus

...|[pic] |SYLLABUS | | |Axia College/College of Criminal Justice and Security | | |CJS/250 Version 2 | | |Introduction to Security | Copyright © 2009, 2007 by University of Phoenix. All rights reserved. Course Description This course is an introduction to contemporary security practices and programs. Students will study the origins of private security, its impact on our criminal justice system, and the roles of security personnel. Students will also examine the growth and privatization of the security industry, and study the elements of physical security including surveillance and alarm systems. The course will cover legal and liability issues, which determine the extent of private security authority as well as its limitations. This course will also focus on the current and future integration of private security services in law enforcement agencies. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: ...

Words: 1941 - Pages: 8

Premium Essay

Form

...OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the...

Words: 149595 - Pages: 599

Premium Essay

Legal History

...Bombay High Court 1 1862 - 2012 A Journey of 150 Years through some Memorable Judgments Part 1 2 PREFACE A tiny kernel of an idea planted by Justice Mridula Bhatkar took root, and has resulted in a humble effort to present before you a compendium of the crux of some of the judgments of the Judges who have served the Bombay High Court since its inception in 1862.1 The initial idea was to document one judgment of the First Court from each year which was modified to include a judgment of the Bombay High Court of each year. I soon realized that it was too expansive an idea to merit a single judgment a year. I could collect and collate, as many as ten judgments which would qualify to show the development of the law we desired to portray. Having found too vast a number of such judgments, I had to settle at a more reasonable figure of about five judgments each year to showcase the progress this Court has made from its illustrious beginnings. Our Chief Justice Mohit Shah and our Justice Chandrachud wholeheartedly supported the idea to complement the Book published on this the sesquicentennial of our Court. As the number of Judges grew, fewer judgments of each Judge would be selected as illustrations. These judgments are not the only path-finding groundbreaking ones; they are also ones with simplicity and legal elegance. The number of judgments we settled upon just would not permit all deserving judgments to be compiled; only a few have been picked from each year as the first in...

Words: 139867 - Pages: 560

Free Essay

Ww1104 Case Study

...[pic] MSc Industrial Environmental Management MSc Urban Water & Environmental Management WW1104 Case Study Monday 12th – Friday 16th February 2007 (University week 22) Module Tutors: Mr Jim Duncan & Professor Chris Jefferies. [pic] Welcome to Module WW1104A - Industrial Case Study The aim of this module is to assist participants to build on their understanding of the basic principles of environmental management as developed in previous modules. The emphasis throughout will be to complement theoretical knowledge gained in classroom activities with practical application. Students will work in groups to present their work, and most of the module assessment is associated group activity and interaction. Module Format The intensive five-day course is conducted at the University of Abertay Dundee, with visits to industrial and utility sites. The programme consists of seminars and group activities. Emphasis is given to developing teamwork skills and all group sessions will be interactive and will involve group working / discussion. Accommodation Rooms have being reserved at Dudhope Castle and details are given in the Case Study Week programme(see page 4). Module Assessment The module is assessed is by coursework only, which comprises the following THREE elements :- an individual report based on one of the industrial visits. a group report on the evaluation of the...

Words: 2336 - Pages: 10

Free Essay

Delay Defeats Equity

...Trust Equity & Fiduciary Relationship DELAY DEFEATS EQUITY Vigilantibus non dormientibus aequitas subvenit INDEX OF AUTHORITY BIBLIOGRAPHY * Equity, Trusts and Specific Relief, B.M. Gandhi, 4th Edition, 2007 * Snell’s Principles of Equity, p. 33 * Frunk and Wagnalls Standard Hand Book. Fernald J.C, 1973 * Black’s Law Dictionary, 9th Edition, 2009 INDEX OF CASES * Allcard v Skinner (1887) 36 Ch D 145 * Lindsay Petroleum Co. v Hurd (1874) LR 5 PC * Nwakobi v Nzekwu 1964 WLR 1019 * Poole Corporation v. Moody, 1945 KB 250 * Smith v Clay 28 U.S. (3 Pet.) 411 * Ramsden v Dyson 1866) LR 1 HL 129 * Willmot v Barber (1880) 15 Ch D 96 * Prince of Wales v Collom (1916) 2 KB 193 * Forbes v Rall AIR 1925 PC 146 * Jadunath v Chandra Bhushan (1858) 6 HL Cas 633 * Union of India v Kishorilal Bablani (1999( 1 SCC 48 * Chatrabhuj v Mansukhram AIR 1925 Bom 183 * DDA v Ravindra Mohan Aggarwal (1999) 3 SCC 172 * Thakur Bai v Laxmi Chand AIR 1990 Del 223 * Mahadav v Kalekar v State Bank of Hyderabad (1990) 4 SCC 174 * Gauri Shankar Gaur v State of UP (1994) 1 SCC 92 * Ratan Chandra v Union of India 1993 Supp 4 SCC 67 * Krishna Dev v Ram Piari AIR 1964 HP 34 * Raghavan Nair v State AIR 1956 Trav. Co 77 * Tannu Singh v State of UP AIR 1992 NOC 9 * P.K. Ramchandran v State of Kerala (1997) 7 SCC 556 * Pallav Sheth v Custodian (2001) 7 SCC 549 * Tilokchand Motichand...

Words: 2587 - Pages: 11

Free Essay

Management

...Op"erations Research This page intentionally left blank Copyright © 2007, 2005 New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2944-2 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com PREFACE I started my teaching career in the year 1964. I was teaching Production Engineering subjects till 1972. In the year 1972 I have registered my name for the Industrial Engineering examination at National Institution of Industrial Engineering, Bombay. Since then, I have shifted my field for interest to Industrial Engineering subjects and started teaching related subjects. One such subject is OPERATIONS RESEARCH. After teaching these subjects till my retirement in the year 2002, it is my responsibility to help the students with a book on Operations research. The first volume of the book is LINEAR PORGRAMMING MODELS. This was published in the year 2003. Now I am giving this book OPERATIONS RESEARCH, with other chapters to students, with a hope that it will help them to understand...

Words: 242596 - Pages: 971

Premium Essay

Crhypho

...SOLUTIONS MANUAL CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FOURTH EDITION WILLIAM STALLINGS Copyright 2006: William Stallings -2- © 2006 by William Stallings All rights reserved. No part of this document may be reproduced, in any form or by any means, or posted on the Internet, without permission in writing from the author. -3- NOTICE This manual contains solutions to all of the review questions and homework problems in Cryptography and Network Security, Fourth Edition. If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to ws@shore.net. An errata sheet for this manual, if needed, is available at ftp://shell.shore.net/members/w/s/ws/S. W.S. -4- TABLE OF CONTENTS Chapter 1: Chapter 2: Chapter 3: Chapter 4: Chapter 5: Chapter 6: Chapter 7: Chapter 8: Chapter 9: Chapter 10: Chapter 11: Chapter 12: Chapter 13: Chapter 14: Chapter 15: Chapter 16: Chapter 17: Chapter 18: Chapter 19: Chapter 20: Introduction ..................................................................................................5 Classical Encryption Techniques ...............................................................7 Block Ciphers and the Date Encryption Standard ................................13 Finite Fields .................................................................................................21 Advanced Encryption Standard ...................

Words: 21497 - Pages: 86

Premium Essay

Btc3150 Assignment Aus Flying School

...Letter of Advice Australian Flying School This letter is aim to identify all relevant tax issues in relation to AFS for the 2006/07 financial year. Main Issues (1) AFS was incorporated in State of Victoria in 1984; therefore, AFS is an Australian resident as defined in s6(1) ITAA36. AFS will need to pay tax on its taxable income, being the assessable income less deductions[1]. Assessable income includes ordinary and statutory income derived from all sources[2]; therefore, if the $3,300,000 received from the training contract with TCA Airways is ordinary income under s6-5 ITAA97, it will remain assessable even if it is sourced from New York. The $3.3m, although received as a lump sum, is earned by AFS as a result of carrying on an aviation business as set out in Californian Copper[3]. The diversification of business to a much wider client base does not affect the nature of the income. According to Jennings Industries [4]and Merv Brown[5] case, diversification is only a different method in conducting the business and does not deviate from their original business structure. This amount is regarded as the normal proceeds of a business, based on the fact that it is received as part of their normal business operation by providing aircraft pilot training and specialist instruction services for individuals. Therefore, this recurring receipt is likely to be an assessable income under s6-5. However, it is important to note that there may be double tax agreement between...

Words: 4070 - Pages: 17

Premium Essay

Cjs Syllabus

...Course Syllabus ________________________________________________________ CJS 200 Foundations of the Criminal Justice System Course Start Date: 08/01/2011 Group ID: AAGR0Z9835 Facilitator: Lee Rankin Copyright Copyright © 2011, 2010, 2009, 2007 by University of Phoenix. All rights reserved. University of Phoenix® is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft®, Windows®, and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited in accordance with University of Phoenix® editorial standards and practices. ------------------------------------------------- Course Description This course is an introductory overview of the organization and jurisdictions of local, state, and federal law enforcement, judicial and corrections agencies, and processes involved in the criminal justice systems. It examines the historical aspects of the police, the courts, and the correctional system, as well as the philosophy. Additionally, career opportunities and qualifying requirements, terminology, and constitutional limitations of the system will also be covered. ------------------------------------------------- Course Topics...

Words: 3639 - Pages: 15

Free Essay

Tommy Hilfiger

...IN-COMPANY TRAINING REPORT ON MARKETING STRATEGY OF TOMMY HILFIGER COMPLETED IN TOMMY HILFIGER LTD SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT OF BACHELOR OF BUSINESS ADMINISTRATION (BBA) GURU JAMBHESHWAR UNIVERSITY OF SCIENCE & TECHNOLOGY, HISAR TRAINING SUPERVISOR: SUBMITTED BY: MR. SAUMYA GHOSH MANDEEP SINGH (Senior Marketing Manager) Batch: 2007-2010 Enrollment No.: 07511213132 Session: 2007-2010 RNIS COLLEGE OF MANAGEMENT DIRECTORATE OF DISTANCE EDUCATION GURU JAMBHESHWAR UNIVERSITY OF SCIENCE & TECHNOLOGY, HISAR-125001 PROJECT REPORT ON MARKETING STRATEGY OF TOMMY HILFIGER COMPLETED IN TOMMY HILFIGER LTD SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT OF BACHELOR OF BUSINESS ADMINISTRATION (BBA) GURU JAMBHESHWAR UNIVERSITY OF SCIENCE & TECHNOLOGY, HISAR TRAINING SUPERVISOR: SUBMITTED BY: MR. SAUMYA GHOSH MANDEEP SINGH (Senior Marketing Manager) Batch: 2007-2010 Enrollment No.: 07511213132 Session: 2007-2010 RNIS COLLEGE OF MANAGEMENT DIRECTORATE OF DISTANCE EDUCATION GURU JAMBHESHWAR UNIVERSITY OF SCIENCE & TECHNOLOGY, HISAR-125001 STUDENT DECLARATION I hereby declare that the Summer Training Report conducted at “Marketing Strategy Of Tommy Hilfiger” submitted in partial fulfillment of the requirement of bachelor of business administration (BBA) RNIS College...

Words: 17393 - Pages: 70