StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A Business Proposal to Modify a Law - Essay Example

Cite this document
Summary
"A Business Proposal to Modify a Law" paper present the Business Proposal, the basic aim of which is to develop a modification of law based on the marketing plan for Visual Management Systems Ltd for expansion into the southern states of the country. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
A Business Proposal to Modify a Law
Read Text Preview

Extract of sample "A Business Proposal to Modify a Law"

BUSINESS MANAGEMENT PROPOSAL To FD Dixon Legislator Re: Business Proposal to modify a Law Respected Sir, I would like to present this Business Proposal on behalf of Visual Management Systems Limited and plead you to look into our profile and problem details in order to create a new law for the benefit of the society and the business. Background of the company Visual Management Systems Limited is a privately owned company setup in 1996 to deliver world leading IP CCTV integration software & consultancy services and to provide their customers and partners with CCTV solutions tailored to their specific needs. The company operates in different manners including development of Titan CCTV software and looks for direct clients or partners to integrate the customers existing CCTV assets with the latest technology, so as to provide custom solutions for the specific security needs of clients. (Rigby, 2005) Aim The basic aim of the proposal would be to develop a modification of law based on the marketing plan for Visual Management Systems Ltd for expansion into the southern States of the country. Apart form this central theme it would also be looked upon there should be enough opportunity and specified methods to penetrate and expand market segments for the company in relation to the use and capability of the CCTV related security technology from the parameters of marketing and for this aspects too your moral and legislative help is extremely needed. Rationale of the Business The world is in the midst of an all-purpose technological revolution based on CCTV related security technology, defined here as visual security, software related surveillance techniques, and CCTV related security equipment. The macroeconomic benefits of the CCTV related security technology revolution are already apparent in some economies, especially the United States and United Kingdom. Historical experience has shown that such revolutions have often been accompanied by financial booms and busts, and the CCTV related security technology revolution has been no exception. But, while spending on CCTV related security technology goods is likely to remain stable in the immediate future, as past overinvestment unwinds, the longer-term benefits for the global economy are likely to continue, or even accelerate, in the years to come. While technological change is an ongoing process, there are periods during which technological progress is especially rapid, resulting in new products and falling prices of existing products that have widespread uses in the rest of the economy. Such periods are generally identified with CCTV related security technology revolutions. (Hood, 2003) Earlier examples include textiles production and steam power in the industrial revolution, railroads in the nineteenth century, and electricity in the early twentieth century (the automobile could also be included, but its development was relatively gradual). The effects of such revolutions have generally occurred in three (often overlapping) main stages. First, technological change raises productivity growth in the innovating sector; second, falling prices encourage capital deepening; and, finally, there can be significant reorganization of production around the capital goods that embody the new technology. (Hall, 2006) The growth of the CCTV related security technology sector in the 1980s was an important development for the economy, but it spurred relatively little policy or media interest. True, CCTV related security technology was recognized as a driver of comparative advantage for the US and the UK and there were a few initiatives involving industrial policy and military preparedness, CCTV related security technology was of interest primarily to specialists. (Prawer, 2005) A unique confluence of forces certainly came together in the 1990s: rapid technological advances in the technology sector; widespread recognition that security could be used to comparative advantage as well as process it; the rapid spread of a simple, inexpensive, and powerful wide-area security network based on non-proprietary standards; and financial institutions ready to fund investment in advanced technology. (Reuvid, 2005) These forces led to very rapid growth of the CCTV related security technology. As parts of the firms and consumers in the economy flocked to the new security system in large numbers, it became evident that CCTV related security technology and development of market segment of the subject required serious attention as there were high potential of the development in this sector. This is where Market development plan for Visual Management Systems comes into discussion. (Powell, 2004) In this context it would be relevant to mention that in contemporary extremely competitive and cost induced market economy, maintaining a ready for action benefit by becoming a low cost or a differentiator puts a heavy effort on having highly dedicated marketing plans. (Hutt, 2001) Competitive advantage is not merely making distinctions between a product and service or in becoming the low cost but in also being proficient enough to tap the company's exceptional skills or core competencies and speedily respond to customer's requirements and competitor's processes. Competitive advantage lies in management's aptitude to merge corporate-wide technologies and production expertise into competencies that give power to individual businesses to become accustomed with rapidly changing opportunities. (Kumar, 2005) Thus it becomes necessary for the organization to understand that any advantage related to protection or defense mechanism becomes the competitive advantage of the organization and Market development plan for Visual Management Systems becomes a very important aspect of that security system strategy depending on the CCTV protection measures. (Tyerman, 2005) Another effective market segment in terms of security system related to CCTV is the aspect of public safely. A large number of factors pose threat to human life and create a feeling of insecurity among population, resulting in disruption in personal and social life. Public Safety is the concept of governmental organizations concerned with protecting their citizens from all kinds of threats. The term 'public safety' covers different aspects of protection of the general population. Some of these include Protection against Accidents and Trauma, Protection against Crimes, Protection against Natural Hazards. But area where homeland security is concerned is Protection against Terrorist Activity. It should be remembered that the disaster of 9/11 took place when the terrorists took advantage of the American social way of life where the number of domestic frequent fliers are high enough to suffer a low security system. The same is true about London underground rail blast. In both the cases the terrorists took advantage of the counties' way of social life and it would be impossible to alter this way of life putting security as an alibi where the menace is basically organized by a fundamentalist motive. (Pacione, 1997) No country should rupture ever under such motives. It is not really an obvious practice to regard the civilian population within the parameters of agents of a security organization but given the fact that damaging activities are on high mode of action from parties with ramifying interests the authorities is in no position to overlook the issue lightly. As a result the next level of public safety and homeland security needed a better look. For the purpose as a civilian, one has to be burdened with keeping vigilance over people and situations that may be the sign of an impending disaster. There are several situations that demand suspicious attention like keeping notice of an unidentified person loitering near a facility for an unusually long period of time or one has to eye a dubiously dressed individual, especially an over-clothed figure that is wearing long and heavy clothes in which something threatening may have been concealed. There are also situations when someone is asking individual specific questions about sensitive issues, e.g. security matters or a stranger is found engaged in surveillance of a facility i.e. doing photography, sketching, or video recording of some of part of a facility. (Lamb, 2004) Alarm should also be raised when one finds a stranger trying to enter a facility by claiming to be a technician, officer, or contractor etc. or an unidentified person is found taking some form of property from a facility or office. Other relating situations may include circumstances when any stranger tries to place something like a package or suspicious object outside a department or facility building, find a waif like a backpack, container, or box etc. in some part of a facility or any suspicious item (even if appearing harmless) lying in some part of the building or outside it. (Banyard, 2005) Problem The discussion so far would be enough to convince you about the importance of the business. However, in accordance to the law of the State of California it is illegal to monitor any individual without his or her consent and any breach of this law is subjected to be viewed as an intervention into private parameters and thus it is subjected to criminal offence. (Sioros, 2000) Under such parameters it is not possible to operate in this region but as you can understand from the above discussion that the aim and the basic rationale of this business is basically aligned with the fundamental concepts of social and national security thus this business can well be stated as a social approach. (Manning, 2003) Conclusion Sir, the only solution in this regard is the change or modification of the existing law makes it more business friendly. Under such conditions it is obvious that to attain such act it you who could be termed as the most dependable person. I would recommend you to intervene in this matter and instigate the alteration in the forthcoming meeting or legislative session. Thus I would humbly ask for your intervention into the matter to make the state more social and business friendly. Thanking you in expectation of a long termed relationship, J Hawker CEO- Visual Management Systems Limited References: Banyard, P. 2005, Ethical Issues and Guidelines in Sociology, Flanagan, Cara Publication, London, New York Hall, T. 2006, Urban Geography, Routledge Contemporary Human Geography Series; 3rd Ed, & Francis Routledge, London, New York Hood, J. 2003, Business Management systems, Journal of Risk Research 6 (3), 233-251 (2003), Glasgow Caledonian University, Glasgow Hutt, M. & Speh T. 2001, Business Management: A Strategic View of Industrial and Organizational Markets, Harcourt Collage Publishers, Philadelphia. Kumar, H. 2005, Win Some, Lose None: The Approach of a Successful Salesman, HBT & Brooks Ltd, New Delhi. Lamb, D. 2004, Cult to Culture: The Development of Civilization on the Strategic Strata; National Book Trust, Kolkata Manning, C S. 2003, Principals and Practices: Society Today, National Book Trust, Kolkata Powell, M. 2004, Anatomy of CCTV: Case Studies of Changing Strategies, AB Publications Ltd, Wellington Prawer, H A. 2005, Birth of Security: The Evolving Intelligence, Part II, Allied Publications, Dunedin Pacione, M. 1997, US Cities: Geographies of Division in Urban Britain, Taylor & Francis, London Reuvid, J. 2005, Managing Security: A Practical Guide to Protecting Your Family, 2Nd Ed. Kogan Page, Sterling, VA Rigby, B & Porges, F. 2005, Design of Services for Events, 4Th Ed. Taylor & Francis Routledge, New York Sioros, D. 2000, Building for the 21st Century California: Society, Energy and the Environment, Fairmont Press, Lilburn, Ga Tyerman, J. 2005, Invention of the Crusades: The Aggressive Approach of Social Construction, Arc Publishers, Canberra Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Business Management Proposal Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Business Management Proposal Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from https://studentshare.org/miscellaneous/1516771-business-management-proposal
(Business Management Proposal Essay Example | Topics and Well Written Essays - 1500 Words)
Business Management Proposal Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/miscellaneous/1516771-business-management-proposal.
“Business Management Proposal Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/miscellaneous/1516771-business-management-proposal.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Business Proposal to Modify a Law

Law-Making Powers of Parliament

Professional groups, voluntary organisations as well as pressure groups usually discuss and consult one another prior to the proposal to enact or change a law.... The paper "law-Making Powers of Parliament" describes that many cases are costly to bring to court already providing a divide between those who can afford and those who cannot.... There are several reasons why laws are enacted, or that new law should be passed.... Some of the most immediate reasons include the need to address emergency situations like a threat to peace and security of the people, terrorism, pressure on the Government to update laws that are no longer applicable, re-interpret, clarify or re-apply 'established principles of statute law' are only some of the general reasons (UK Parliament, 2011, P 2)....
10 Pages (2500 words) Essay

International Business Law Policy

government's attempts to promote uniformity in commercial laws from state to state is firstly, the relevant provisions of the US Constitution and also Section 118 of the General Business law which predates that of Section 7-210.... he UCITA, as a controversial model law promulgated by the National Conference of Commissioners on Uniform State Laws, covered transactions in computer and digital information, in place of Article 2 of the UCC.... Since the final draft of Article 2B as proposed was rejected by the American law Institute or ALI, the required approval of both bodies was thus lacking....
4 Pages (1000 words) Essay

Analysis of the Proposal of Company Law Reform Bill

The author before discussing on the proposal of the Company law Reform Bill containing the remedy of problems associated with director's duties discusses who is the director, what the are the duties of the directors and what are the problems being faced by them in the discharge of their duties.... [Charlesworth & Morse, Company law (1999)] aDe facto Directors: De facto Directors are those who act openly as directors and they claim to be directors on they being performed the functions of the directors, though they are not properly appointed....
10 Pages (2500 words) Term Paper

Comparison of The Uniform Commercial Code and UCITA

Business law: Before the UCC and UCITA, what was one of the first, and most significant, of the U.... The law should facilitate continued expansion of e-commerce and be technologically neutral.... Here the question arises "What is computer information transactions" "commercial agreements to create, modify, transfer or distribute computer software, multimedia interactive products, computer data and databases [and] Internet and online information" all these things are included in computer information transactions under the model act....
2 Pages (500 words) Essay

The Case of Customer Insurance

This essay "The Case of Customer Insurance" focuses on the discussion on the outline and extent of law restructuring in insurance law assures to be an exhilarating system for the future.... As long as agreed to the better consequence of customer security, both in the EU and UK, the common sentiment is that these proposals will effect law restructuring to the extent of customer insurance contracts are concerned.... The further step was to expand the consultation procedure to other difficult areas of insurance law, for example, post-contractual good faith, insurable concern, and compensations for the delayed payment of claims, with the publication of a different discussion paper in 2008....
10 Pages (2500 words) Essay

Bloom Energy

This paper analyses the decision of Bloom Energy to launch it innovative, state-of-the-art manufacturing center in Delaware in terms of the proposal's implication for key stakeholders and its cost and benefits.... There are several institutions involved here—cultural,.... ... ... l, management, and production—all of which rely on the vast number of people who furnish expert knowledge and skills as well as those who utilize, strengthen, and make the most of industrial, cultural, and educational infrastructures that are built....
5 Pages (1250 words) Research Paper

Land Law and Covenantee

The statement that the ‘law governing whether the benefit and burden of freehold covenants runs with the land is full of arbitrary rules and illogical distinctions and needs reform' is one that has been said countless times by commentators and legal experts.... It is evident that the current law is unnecessarily complex and in need of modernisation....
7 Pages (1750 words) Research Paper

Important Employment Law Issue

The paper "Important Employment law Issue" highlights that AB Plc needs to consider the fact that they had the obligation to consult the employees and check whether they wished to exercise their right to object to the transfer in which case their information, especially personal.... However, peaceful picketing has been allowed in law.... The proposal of Unifi to place employees in large numbers at AB premises may be illegal, as was laid out in the case of Gate Gourmet London Limited and Transport and General Workers Union....
11 Pages (2750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us