...Communication Coordinator Tonya Krchelich HCS/320 August 25, 2014 Sandra Anderson Communication Coordinator A communication coordinator is responsible for connecting a company or business to the media. Responsibilities include building media lists, planning events, and creating press material to determine the success of a campaign. Communication coordinators may use traditional, electronic or social media communication methods to address the public. In the scenario given, a well-known public figure has been affected by a medication. We will examine advantages and disadvantages of using these forms of communication. This paper will, also, look at the effects of HIPAA regarding these communication methods. One of the worst things that can happen to a drug manufacturer, is that a well-known public figure is negatively affected by one of its medications. What happens next can determine the success of the manufacturer. Forms of communication, such as, social media can quickly get the word out to many consumers about the negative effects of the drug. Social media includes outlets, such as, Facebook, YouTube and Twitter. According to ECRI Institute, a study that was done in February of 2011 by the National Research Corporation showed, “that 41% of 23,000 respondents used social media to research healthcare decisions, almost 94% said that Facebook was their primary source, followed by YouTube at 32%,” (Health care risk control, 2011). This is because many people...
Words: 1106 - Pages: 5
...used for the purpose of secure e-mail message communication over an open network. The main idea behind introducing PGP, introduced is to increase the degree of security and efficiency of e-mail message communication. 1 Introduction Since the beginning of the era of e-mail message communication over open networks, the security of electronic mail (e-mail) has been a growing concern [1]. There have been several protocols developed and implemented to assure the security of such communication. These protocols provide the security services of message confidentiality and message authentication for an e-mail message, basically. Some e-mail security protocols that have been developed include: Simple Mail Transfer Protocol (SMTP) [2], Multipurpose Internet Mail Extension (MIME), and its enhancement, known as Secure MIME (S/MIME) [3]. Other protocols are: Certified Exchange of Electronic Mail (CEEM) [4], Secure E-mail Protocol (SEP) [5], Privacy Enhanced Mail (PEM) [6] etc. We will implement PGP(Pretty Good Protocol) which is the most popular protocol used nowadays in order to provide email security over the network. Pretty Good Privacy (PGP) [7] is an integrated cryptographic system, invented by Phillip Zimmerman in 1991, in order to establish the integrity, authenticity, compactness, confidentiality, and compatibility of e-mail message communication. Since its invention, PGP has been one of the most successful cryptographic systems used for e-mail security [7], because it has...
Words: 327 - Pages: 2
...Business Communication Trends The secret to a successful business is actually no secret, in fact everyone should know that that communication is the key to success in any business. There are several ways that people communicate within an organization. Business communication is done on a daily basis and it plays a huge part in the success of the company. A company communicates in different ways on a daily basis. One way that I have experienced in my previous workplace is that they communicate by sending e-mails to each other. I worked at a high school in the Admissions department and when there was an announcement or some sort of change in a rule or regulation then it is often sent to everyone’s e-mail address. Often everyone in the company was given an e-mail address as soon as they were employed by the company so that they may start receiving e-mails from day one. At my previous employment at the high school it was very important to have knowledge of business communication. In the admissions department I had to make sure there were no errors in the attendance that was taken by the teachers and make sure that the students were not marked absent an accident. Often the students were late and so they were marked absent because they walked in after attendance was taken in the computer’s software program and the teachers would not change it in the attendance log and submit it. The admission’s department receives the attendance once they submit it and then I would start to make...
Words: 521 - Pages: 3
...Monitoring Employees on Networks How does e-mail benefit an organization? Why might an organization want to limit how an employee uses e-mail during work hours? What is an e-mail’s path once it leaves an organization? E-mail communication can offer an organization a number of benefits. For one thing, communication between clients and employees becomes much easier, clearer, and faster. E-mails are a very effective organizational communication tool, but it has some disadvantages as well. For example, many employees would use their e-mail for personal instead of business use. Ultimately this decreases productivity and makes the company pass on higher prices to its customers. Another disadvantage of using personal e-mail at work is that a company must retain all of its e-mail correspondence for a certain period of time or pay heavy fines. If these e-mails are necessary in a lawsuit, it is important that they are available to the company. If a lawsuit should occur, it does not matter if a personal account or a work account sent the email – they are both the same thing as far as the court is concerned. No matter the nature of the email, ultimately the company will be held responsible for its contents. What is the effect of instant messaging on organizational networks? What are benefits and drawbacks of using instant messaging in an organization? Instant messaging is most useful to a company because it offers real-time communication capabilities. It is also free, which...
Words: 472 - Pages: 2
...Elizabeth Kachmor Analysis of business-related messages In business today most communication is relayed through electronic means. This is done using e-mail, texting or video chats. There are advantages and disadvantages to using virtual communication, examples of the advantages are increased productivity, ability to work at home, or in the field, and less time in the office. There is also the advantage of being able to connect to staff or clients without having to access the information in the office. Some of the disadvantages are being available twenty four hours a day, and loss of personal communication. There is also the possibility of miscommunicating messages. According to Deborah Roebuck, when writing for business it is essential that the writer formulate the writing prior to sending it with the process entailing “determining your purpose, analyzing your audience, organizing your thoughts, establishing a logical order, constructing your draft and editing and polishing your draft using the 7 Cs” (Roebuck ,2006, pg.31). To communicate effectively in a business environment it is important to create a system or follow a system such as the one mentioned previously. To many times those of us, in the business field are too busy to take the time to review what we are sending. This leads to confusion on the part of the receiver and creates further time researching clarification on the original e-mail. So, those few seconds reviewing your message can actually save time for both parties...
Words: 1069 - Pages: 5
...| | | | | | |Microsoft Exchange Server 2007 | | | |Customer Solution Case Study | | | | | | | | |Procter & Gamble Switches to Microsoft to Improve Productivity and Reduce Costs | | |[pic] | | | | | | | | | | | | | |Overview | | |“With the Microsoft solution, we were able to improve collaboration and reduce costs at the same | |Country or Region:...
Words: 2995 - Pages: 12
...Locker−Kienzler: Business and Administrative Communication, Eighth Edition III. Basic Business Messages 10. Informative and Positive Messages © The McGraw−Hill Companies, 2008 C H A P T E R 10 Informative and Positive Messages Learning Objectives After studying this chapter, you will know: 1 When to use common business media. 2 How to use the chosen channel effectively. 3 How to write letters and memos. 4 How to compose some of the common varieties of informative and positive messages. Locker−Kienzler: Business and Administrative Communication, Eighth Edition III. Basic Business Messages 10. Informative and Positive Messages © The McGraw−Hill Companies, 2008 IN THE NEWS All in a Day’s (Communication) Work im Donald, CEO and president of Starbucks, He is also known for visiting his stores, where he knows the value of informative and positive dons the green apron, goes behind the counter, and talks messages. His days are full of them. On the with employees. When he is in Seattle, he visits about day of his Fortune magazine interview, around 20 Starbucks a week; when he is traveling, about 10 a day. 6 AM he left a voice mail for Although you probably don’t 100 regional managers, wrote want his e-mail load, you might personal thank-you notes to “He gets 200–250 emails daily and appreciate his meeting time lim25 employees, and signed 500 responds personally to 75% of them.” its. He books meetings for an birthday cards. He will sign hour...
Words: 20520 - Pages: 83
...Communication PAP #7 In this day and age, e-mail has become one of the most prevalent forms of communication. It’s convenient, fast, efficient, cheap, versatile, and moreover, ubiquitous in business. Most people manage multiple accounts and check their inboxes on a fairly regular and frequent basis. Despite its many benefits, e-mail has its drawbacks and limitations. One of the biggest problems with e-mail is misinterpreting the message. This problem is not exclusive to E-mail, but the likelihood to misinterpret e-mail is greater than misinterpreting another mean of communication. Sarcasm and joking traditionally provide the biggest opportunity for miscommunication. An example of this is during an exchange with my manager from an unpaid summer internship at Impax Labs. He e-mailed me to ask me to work through the weekend and I jokingly replied that the internship should be paid - not expecting that he would take my request seriously. An hour later he responded saying that he talked to upper management, and they agreed about getting me on payroll. An example of an e-mail exchange gone wrong is last winter, when I sent my mother season’s greetings and she mistakenly thought I was asking for money. She replied with a massive wall of text lecturing me about the virtues of frugality before transferring a mere $20 into my bank account to teach me to practice the lesson in her lecture. E-mail is not the best way to break bad news. My roommate’s ex-boyfriend broke up with her...
Words: 538 - Pages: 3
...E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011 E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place. *1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer. Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition, state...
Words: 941 - Pages: 4
...Data and E-mail Archiving 1 Data and E-mail Archiving: Legal Concerns Joel Zart Capella University TS5536-Ethics in Technology Data and E-mail Archiving 2 Table of Contents Abstract……………………………………………………………………………………Page 3 Introduction to the world of Archiving……………………………………………………Page 4 Laws and penalties associated with archiving……………………………………………..Page 5 My ethical and legal dilemma……………………………………………………………...Page 6 Ethical dilemmas in archiving……………………………………………………………...Page 6 Process of identifying archiving liability…………………………………………………...Page 7 The solution based on law…………………………………………………………………..Page 8 The affects…………………………………………………………………………………..Page 9 The solution………………………………………………………………………………...Page 10 Conclusion………………………………………………………………………………….Page 11 References………………………………………………………………………………….Page 12 Data and E-mail Archiving 3 Abstract The purpose of this is to analyze the importance of data and e-mail archiving within an enterprise organization. At my organization I am currently in the planning stages of having a fully fledged data and e-mail archiving solution in place by the end of 2009. Archiving data and e-mail within an enterprise is important for legal litigation. According to industry experts 90% of communication in business takes place through e-mail and electronic documentation such as instant messaging and word documents (2009 para.1). Companies are now required to archive all communication to not only protect the company but also their employees....
Words: 2619 - Pages: 11
...Humphries. Kris Humphries demanded access to view emails Kim Kardashian had in a closed e-mail account. These e-mails were personal private property of Kim Kardashian’s and not a marital asset or a real asset. Because this was not a business situation, Kris Humphries could not claim he had rights to Kim’s personal e-mails. Cheeseman (2013) states, real property is immovable or attached to immovable land or buildings, whereas personal property is movable. In this situation, the e-mail account in question is personal property. According to FindLaw (2013), E-mail privacy is derived from the Fourth Amendment to the U.S. Constitution and is governed by the "reasonable expectation of privacy" standard. Rule Cheeseman (2013) states, "The law protects the rights of owners of personal property to use, sell, dispose of, control, and prevent others from trespassing on their rights." In the divorce case of Kardashian vs. Humphries the personal property belonged to one party of a divorce and does not belong to the other party. It is lawful for the owner of the personal party to prevent the other party from trespassing on their rights. In the case of divorce a party who wants access to the other party's personal property does not have a legal right to it. If this was a business managerial setting the electronic communication would be consider the company's property because the communication was created and stored using the company's network and computer equipment. This gives the...
Words: 670 - Pages: 3
...E-mail Acceptable Use Policy Purpose E-mail is a critical mechanism for business communications at Richman Investments. However, use of Richman Investments’ electronic mail systems and services are a privilege, not a right, and therefore must be used with respect and in accordance with the goals of Richman Investments. The objectives of this policy are to outline appropriate and inappropriate use of Richman Investments’ e-mail systems and services in order to minimize disruptions to services and activities, as well as comply with applicable policies and laws. Scope This policy applies to all e-mail systems and services owned by Richman Investments, all e-mail account users/holders at Richman Investments (both temporary and permanent), and all company e-mail records. Account Activation/Termination E-mail access at Richman Investments is controlled through individual accounts and passwords. Each user of Richman Investments’ e-mail system is required to read and sign a copy of this E-mail Acceptable Use Policy prior to receiving an e-mail access account and password. It is the responsibility of the employee to protect the confidentiality of their account and password information. All employees of Richman Investments will receive an e-mail account. E-mail accounts will be granted to third-party non-employees on a case-by-case basis. Possible non-employees that may be eligible for access include: • Contractors. • Employees. • Interns. Applications for these temporary...
Words: 1904 - Pages: 8
...Security policy of the company in the use of e-mail. Communication via e-mail is an efficient and fast way, but has a high-risk level in the traffic of the information. The security policies of this company, determines that all e-mail must have a formal means of communication within or without of the company. E-mail is more efficient than other media such as voice mail, Fax, or regular Mail. For this reason, people can misunderstand that this is an informal means. However, the information in a e-mail, like a letterhead letter, must have complete integrity, being truthful and maintain a confidential information. As everyone know, the e-mail is not encrypted, thus it is transiting within a public network as unencrypted text, which may cause an information leak when it is intercepted and read by third parties and may cause a violation of confidentiality. It is very important have a more careful with the documents attached to sent email, because the risk of confiability grows up according increasing the information. When someone send an e-mail can commit different types of errors like send a e-mail to wrong person. This wrong can occur when a person type the first three or four letters of the word, and the system automatically recognizes a previously email address used. Another common wrong is when people send email with "reply all" instead of "reply". All employees of the company should take special care in the e-mail they receive, because a unknown addresses can contain...
Words: 362 - Pages: 2
...utilize best practices when drafting e-mails since it is one of the primary modes of communication in the workplace. A helpful guideline for work e-mails is to KISSS – keep it short, simple and sweet. Keep it short. In the beginning of the e-mail, write a clear subject header with a maximum of 5 words and address the person correctly by title. Then, send a greeting in 1-2 sentences, present your main point and call to action in another 3-5 sentences and close with a short closing message and signature. Keep it simple. Make the e-mail simple and easy to read. Receiving a long e-mail is daunting not only to read but also to look at. A quick rule of thumb is to consider limiting e-mails to be no more than 5-10 sentences. Any additional information, like meeting notes and detailed information surrounding a project, should be sent in an attachment. This practice will allow the reader to understand the main point of the e-mail and revisit the details at a more optimal time. Keep it sweet. A recent study has shown that 64% of people have sent or received an e-mail that caused unintentional anger. An e-mail does not always have to be sweet but it is important to practice empathy when writing an e-mail. While proofreading, check your tone. If you have crafted a particularly angry e-mail on purpose, put the e-mail down for a couple hours or even a full day and think again before sending it. It is important to practice effective communication skills with coworkers to get your message...
Words: 314 - Pages: 2
... 7 Challenge………………………………………………………………………….. 10 Conclusion………………………………………………………………………….. 11 Works Cited………………………………………………………………………….. 14 INTRODUCTION It was a very long day at work. As I pull into the driveway I realized no one was at home. I looked at my phone and noticed my wife left me an e-mail letting me know that she and the kids would be delayed. I open the door and Jack, my golden retriever, is nearly doing cartwheels his way of asking me to take him outside. I take him out to do his business as I head for the mailbox. Undoubtedly there will be the usual bills and solicitations. As I open the box there was only one item – a letter. I think to myself that no one writes letters anymore. As I look at the sender’s address, it was from my grandmother. I began to wonder, what would my grandmother think about email today? Today the norm is to communicate via electronic mail or as it is more commonly known – email. There are several other forms of electronic communication but none have changed the game as much as has email. Email is the precursor to all our technological communication modalities such as texting and instant messaging. This mode of communication has become so pervasive that there are schools of thought that it will spell the end to the postal system as we know it. The United States Postal System is a very deliberate system which assures “Neither snow nor rain nor heat nor gloom of night stays these couriers from the swift completion of their...
Words: 3597 - Pages: 15