First Year Utilize and Maintain Organi. Inform
First Year Utilize and Maintain Organi. Inform
This learning guide is developed to provide you the necessary information regarding the following content
coverage and topics:
Checking and registering incoming mail
Identifying titles and locations
DISTRIBUTING urgent and confidential mail
Sorting and dispatching mail
Recording and reporting damaged items
This guide will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon
completion of this learning guide, you will be able to:
check and register incoming mail
identify titles and locations
distribute urgent and confidential mail
sort and dispatch mail
record and report damaged items
You can look at the Ethiopian Post Internet Site to find out about other delivery services that you may need to be aware of.
1.1.1 Checking incoming mail
As it is very easy to accidentally damage a letter or a document when you are opening an envelope it is best to take your
time and open each envelope with care.
Once you have opened an envelope ensure that you remove all the contents. Often an envelope will include a covering
letter and a number of attachments. You should check that all the attachments indicated in the covering letter have in fact
been included. See the 'Handling specific types of incoming mail' section below to understand what to do if items are
missing.
The followings are things that you should do if items are missing while handling mail:
Keeping items together
Ensure items that arrive in the same envelope are kept together. You can usually attach items with a paper clip. For
example, a cheque that arrives with a letter must be paper clipped to the letter otherwise someone could receive the letter
and assume that the sender has forgotten to send the cheque.
Date stamping
After the mail has been opened you should ensure that, where appropriate, each item is date stamped. Date stamping the
incoming mail helps identify when your legal firm received the mail. Original documents such as, birth certificates,
qualifications, contracts and agreements should not be date stamped. If a note of the date is required for original
documents, then a colored sticky note can be date stamped and stuck to the front of the document. For example, if a
contract has been sent to your
business then a colored sticky note with a date stamp would be used. If you are unsure as to whether an item should be date
stamped ask your supervisor. Each organization will have different procedures for date stamping incoming mail.
For example, some organizations expect all incoming mail, other than original documents, to be date stamped on the
reverse top left hand corner. Ensure that you are clear on the date stamping procedure at your workplace.
Enclosures
Once the mail has been registered it should be sorted and distributed to the appropriate personnel. Note that you may be
required to sort the mail before it is registered, again this will depend on the procedures followed by your workplace.
1.3 distributing urgent and confidential mail
1.3.1 Identifying and distributing urgent and confidential mail
As with all other types of mail you should ensure that you follow the procedures in place at your workplace for mail that is
marked 'Urgent'. As a general rule, ensure that urgent mail is delivered to the appropriate person as soon as possible and is
dealt with before other types of mail. Unless you are specifically authorized to do so, never open mail that is marked
'Private and Confidential', 'Personal', 'Confidential' or similar. Your company will probably have a procedure in place for
dealing with this type of mail. Ensure that you are familiar with this procedure.
Confidential mail ail marked confidential, personal or private should not be opened, unless you are
authorized to open it. If you open this mail by mistake, you should quickly re-seal the envelope with tape
and write on it' Opened by mistake and your initials. It is not possible to do this for faxes and emails. If an
email message is marked confidential and the addressees' name is written in the message subject line, you
can leave it unopened and forward it to the receiver or send a message to let them know the mail has
arrived.
Urgent mail Some mail is marked urgent. If it is also marked confidential or personal, you should treat it
as confidential first and not open it. You can either deliver urgent mail immediately to the person it is
addressed to or you can make sure it goes to the top of the pile when you are prioritizing mail for that
person. Another form of urgent mail is Express Post. The sender pays extra postage for an item to be
priority processed for prompt delivery, usually the next working day. An organization may have specific
procedure s in place for sorting and distributing urgent mail.
1.3.2 Delivering Urgent and Confidential Mail
Mail should always be forwarded to the recipient within the organizations designated time lines so business is
conducted effectively. Speak to your supervisor if you ever have any problems with the time lines. Sometimes the
problems may be out of your control; for example, if the mail is delivered late. You can distribute mail in various
ways.
For example, you may place mail for people in a separate e folder and deliver it to them in tray. Some organizations
may have an area where employees collect mail and you may be responsible for depositing mail in the correct
pigeonholes.
Large organizations may have mail collection points for each department. Organizations with numerous offices in
various locations may have an internal mail system, with specified collection points and pick-up and drop-off times.
There may be a number of different internal distribution systems operating at the same time.
1.4 Sorting and dispatching mail
Once the incoming mail has been opened, date stamped and registered it needs to be sorted and then distributed to the
appropriate personnel.
Depending on the size of your company and the processes in place you would normally sort the mail by business section or
by individual. Once the mail has been split in this manner you will be required to sort the mail based on its importance.
Urgent mail is usually at the top of the bundle, followed by mail that has been sent by courier. Below this mail should be
the private and confidential mail and finally any general correspondence.
Note that your company may have specific rules regarding the handling of cheques and invoices. Often this type of mail
will be directed to the accounts department or to a nominated person. Often more than one person needs to be present when
opening mail that contains cash orders or cheques.
Your supervisor will indicate how to process this type of mail. Once the incoming mail has been sorted it needs to be
distributed to the appropriate personnel.
Each company will have its own set of requirements with regards to the distribution of incoming mail. Often the mail will
need to be distributed by a specific time each morning. If you have been given the responsibility of distributing the mail,
ensure that you are aware of the requirements in place.
In order to efficiently distribute the mail, you will need to identify and understand the structure of your workplace and the
titles and roles that each person has. This is especially important when you receive a mail item that does not specifically
indicate for whom it is intended. When this happens, you will need to work out who the letter is for. This can be done by
asking your supervisor, calling the sender or reading the letter and then directing it to the appropriate person or business
section.
Often a company will have a tree-structure or an employee list that will help you identify each of the individuals and
sections in your company.
1.5 Recording and reporting damaged items
1.5.1 Dealing with damaged, suspicious and missing items correctly
On occasions you will need to deal with mail that has been damaged, mail that appears suspicious and lost mail items.
Damaged mail
Damaged mail should be sorted, date stamped and registered following the same process used for other incoming mail. The
damage should be recorded in the register.
Once the damaged item has been processed it should be delivered to the person to whom it has been sent with an
explanation regarding the fact that it arrived in a damaged condition. The recipient can then decide what action, if any,
needs to be taken.
Suspicious mail
Your company will have specific procedures in place for dealing with suspicious mail items. Ensure that you are aware of
the procedures to follow. Do not attempt to open a suspicious item. If you are suspicious about a particular item, then
discuss it with your supervisor immediately. If your supervisor is unavailable, then inform another senior member of staff.
Missing items
Often an envelope will contain a covering letter and one or more enclosures. The covering letter should indicate what
enclosures, if any are meant to be included. Check that all the enclosures detailed in the covering letter are, in fact,
included.
If an item is missing you should register the letter and any enclosures that have been included and then inform the recipient
of the letter that certain enclosures are missing. The recipient can then decide what action needs to be taken.
This unit to provide you the necessary information regarding the following content coverage and topics:
Evaluating and selecting best delivery options
Preparing items for urgent delivery
Collecting relevant and timely information
Using basic clerical support technology
Organizational requirements in handling information
This guide will also assist you to attain the learning outcomes stated in the cover page. Specifically, upon completion of this
learning guide, you will be able to:
evaluate and select best delivery options
prepare items for urgent delivery
collect relevant and timely information
use basic clerical support technology
apply Organizational requirements in handling information
door-to-door service
guaranteed one-hour service in your area for urgent documents
same day service
overnight express
international service
2.2 Preparing items for urgent delivery
To prepare items for urgent delivery perform the following: -
Print addresses and names as clearly as possible. Print in capital letters and check that all adder’s details are correct.
Do not use post-office box numbers. Couriers and transport companies cannot deliver items to post- office boxes, as
there is no-one to sign for the item when it is delivered.
Make sure all consignment notes, invoices and/or address labels are stuck securely to the document or parcel.
Make sure the address is the same on the item, the invoice and the consignment note.
2.2.1 Recording the dispatched items
You must register or make a record of every document or parcel sent by a courier or transport company y (similar to
the ordinary outgoing mail). There may be a different mail register for urgent items sent with each separate carrier.
Always ask the appropriate person if you are unsure how to register these it ems. Careful registration allows you to
track the movements of documents and parcels easily and quick ly.
Ethiopia Post’s packaging hints brochure contains helpful information about packaging items to ensure re your
documents and parcels arrive on time and intact.
Occasionally, a document or parcel may go missing. Most carriers have a free tracing service (unless the item was
sent more than six months earlier). You need to contact the service and make a request for an item to be traced.
2.3 Collecting relevant and timely information
Relevant information may include the following:
computer databases (library catalogue, customer records)
computer files (letters, memos and other documents)
correspondence (faxes, memos, letters, email)
forms (insurance forms, membership forms
invoices (from suppliers, to debtors)
minutes of meetings
personnel records (personal details, salary rates)
sales records (monthly forecasts, targets achieved
Records management
Records management, also known as the records and information management, is the professional practice of managing
the records of an organization throughout their life cycle, from the time they are created to their eventual disposal. This
includes creation, storing, retrieving and destroying or permanently preserving records.
An organization's records preserve its corporate memory. In determining how long to retain records, their capacity for re-
use is important. Many are simply kept as evidence of a transaction. Others document what happened and why.
Records are visually or mechanically or electronically readable materials regardless of their physical form that are
received or created in connection with the activities of individuals or organizations. Records can be either tangible
objects, such as paper documents like birth certificates, driver's licenses, and physical medical x-rays, or digital
information, such as electronic office documents, data in application databases, web site content, and electronic mail
(email). of business.
Not all documents are records. A record is a document consciously retained as evidence of an action. Records
management systems generally distinguish between records and non-records (convenience copies, rough drafts,
duplicates), which do not need formal management.
Many systems, especially for electronic records, require documents to be formally declared as a record so they can be
managed. Once declared, a record cannot be changed and can only be disposed of within the rules of the system.
Just as the records of the organization come in a variety of formats, the storage of records can vary throughout the
organization. File maintenance may be carried out by the owner, designee, a records repository, or clerk. Records may be
managed in a centralized location, such as a records center or repository, or the control of records may be
decentralized across various departments and locations within the entity. Records may be formally and discretely
identified by coding and housed in folders specifically designed for optimum protection and storage capacity, or they may
be casually identified and filed with no apparent indexing. Organizations that manage records casually find it difficult to
access and retrieve information when needed. The inefficiency of filing maintenance and storage systems can prove to be
costly in terms of wasted space and resources expended searching for records
Data that is (1) accurate and timely, (2) specific and organized for a purpose, (3) presented within a context that gives it
meaning and relevance, and (4) can lead to an increase in understanding and decrease in uncertainty. Information is
valuable because it can affect behavior, a decision, or an outcome. For example, if a manager is told his/her company's
net profit decreased in the past month, he/she may use this information as a reason to cut financial spending for the next
month.
A piece of information is considered valueless if, after receiving it, things remain unchanged. For a technical definition of
information
Collect information in a timely manner and ensure that it is relevant to organizational needs
Computer Databases
A word processor lets you create a document much like the drawing program, except mainly with words. Again, you can
print it out, paste the information into another document or save it.
A spreadsheet allows you to create a template that you can enter numbers in and other results can be computed. You may
occasionally go back and enter new data and new results calculated.
A computer database is, as the name implies, a collection of data stored within a computer. It is like an electronic file
cabinet full of documents. What makes computer databases useful is the ease with which the data can be entered, stored
and manipulated.
Computer Files
A computer file is a resource for storing information, which is available to a computer program and is usually based on
some kind of durable storage.
A file is "durable" in the sense that it remains available for other programs to use after the program that created it has
finished executing. Computer files can be considered as the modern counter part of paper documents which traditionally
are kept in office and library files, and this is the source of the term
Correspondences
Correspondence consists of memos, letters, and electronic mail. In engineering and science, correspondence is an effective
way to make requests, submit changes to a job, and deliver specific information. Unlike telephone conversations,
correspondence presents the audience with a legal contract that is dated and can support a claim in court. This section
presents formats for memos and letters. Because electronic mail usually has a built-in format, no format is assigned here
for it. In addition, this section provides helpful links for job letters and résumés.
2.4 Using basic clerical support/ technology
Technology encompasses a wide range of hardware, software and services that keep companies running and enhance
operations. Technology plays into every aspect of a business, from accounting to customer communications to product
design and development.
2.4.1 Filing Systems
computers and computer applications e.g. databases, spreadsheets, accounting packages, computer aided design (CAD)
and computer aided manufacturing (CAM), multi-media packages, bar-coding products and scanning information directly
to computer database personal schedules e.g. diary or software package Modems, Email, Internet/extranet/intranet
photocopiers for record keeping
In computing, a file system (or file system) is used to control how data is stored and retrieved.
Without a file system, information placed in a storage area would be one large body of data with no way to tell where one
piece of information stops and the next begins. By separating the data into individual pieces, and giving each piece a
name, the information is easily separated and identified.
Taking its name from the way paper-based information systems are named, each group of data is called a "file". The
structure and logic rules used to manage the groups of information and their names are called a "file system".
Business equipment/technology may include:
Binder (manual/computerized/electronic)
answering machine photocopier
computer printer
fax machine telephone
All files, confidential or not, are the property of the organization. Employees must be careful not to release information to
the public, competitors or anyone else outside the workplace.
Electronic files are more difficult to store separately, especially with a networked computer system, so other measures are
used such as password protection.
It is equally important to look after the organization’s files while you are using them.
When files are out of the filing system, they should be kept in a safe place and treated with care. Don’t leave documents
lying unprotected on your desk, especially overnight. Place them in a folder, a desk drawer or a file. Be careful not to
damage or remove material from a file.
If something must be removed from a file temporarily (for example, to photocopy it) it should be recorded by using a
marker, such as an out card, and returned to exactly the same place in the file
Organizational requirements in handling information may include:
dispatching and collecting procedures
legal and organizational policies, guidelines and requirements
procedures for deciding which records should be captured and filed
procedures for updating records
security procedures
Organizations usually have some of the following protocols in place for the processing of information:
Authority - limiting the number of people who have authority to access sensitive, confidential or
personal information.
Security/access - files are protected with passwords for security and employees are given a level of
security that enables them to access only the information which is relevant to their job.
Naming standards - both paper and electronic files need to be well organized and labeled correctly and
consistently so they are identifiable and easily accessed by employees.
Indexing is the process of deciding where the document is to be stored – the indexing unit
may be the keyword, customer number, business name, individual’s surname, geographic
location etc.
Coding makes it clear where the document is to be stored – either by highlighting the
keyword or the name under which it is to be filed, or writing the file number or a subject or
code on the document.
Version control - making sure any new or updated information is correctly identified as being the most
recent by making an incremental change to its associated letter or numerical code.
Tracking processes - most organizations have filing practices in place which allow the movement of
files to be monitored at all times.
This could include:
a. File movement register; a book, binder or electronic file, recording the file name, number, date
borrowed, borrower, and date returned etc. Entering details into the register allows others to know
the whereabouts of the file and saves valuable time in tracking the file.
b. File movement marker; an „out card‟ which is placed in the hard copy filing system where the file
came from, or a note in an electronic system showing the borrower’s details and date borrowed.
c. Barcode borrowing system for files (similar to borrowing a library book) or passing slips‟ (similar
to circulation slips or envelopes) recording the movement of files.
d. Cross referencing – if a file could be located in more than one location it may be necessary
to cross reference, the file. A marker is inserted in the filing system in the alternate location, directing
you to the actual location of the file.
Requests for information should be dealt with in accordance with the instructions received. Circulation of some
materials may involve photocopying, collating (or bringing together) a variety of materials or pages of
information, binding these pages together or inserting into a folder, marking the information as ‘confidential’ or
‘urgent’ and dispatching the information or records (e.g. internal mail, post, email) within a certain timeframe.
Rotary storage Double sided sections of shelving on a rotating base inside a cabinet, to enable
access to both sides of that section of shelving by rotating it 180 degrees.
Computer files For example, using Microsoft Word or Excel files on hard or floppy disk
New files
Steps in establishing a new file:
identify the need to create a new file
assign a file name or number
prepare a hanging file or folder for paper based files or a sub directory or folder on the
computer for electronic files
enter the new file in the file register or database
enter the file into the file index if necessary
gather items into the filing system in correct order
store as appropriat
4.2 Removing or relocating Inactive or dead files
Identifying and managing inactive records is an important step in the maintenance of a successful filing system.
Many filing systems break down and fail because drawers are clogged too full of paper to make records they hold
easily accessible. Electronic systems fail when too many versions of a document make it difficult to determine
which one is the final draft.
Active vs. inactive records
Inactive or dead files
It is necessary to identify record and store dead or inactive files in order to make way for new files.
Organizations have procedures for routinely checking for dead or inactive records and transferring them from the
active filing system to secondary storage at regular intervals.
Once records have been identified as no longer active:
Some will be retained for a specific period of time; e.g. financial records are retained for seven years as a
legal requirement.
Some records, usually of historic value, will be retained indefinitely as archive files (computer files may
be compressed prior to archiving to minimize space required on hard drive).
Some dead or inactive files can be immediately destroyed by shredding (if confidential) or recycling.
The file index will be updated to show current status of records on file, removing dead files from the
index. A records disposal register may also be maintained showing when and which records have been
removed from active storage.
Active records are consulted routinely in the daily performance of work.
Inactive records are rarely used, but must be retained for occasional reference or to meet audit or legal
obligations.
Identifying inactive records: Cut-off
The cut-off signals the point at which a record series becomes inactive. It is used to determine the beginning of the
retention period. The cut-off can refer to a specific event: termination of employment, end of funding period,
termination of contract, accreditation received. More usually, the cut-off is tied to a period of time: end of the
quarter, end of the calendar year, end of the fiscal year.
In determining the appropriate cut-off for a specific record series, a records analyst from Records Management
Services, in consultation with the Records Authority/Coordinator, will consider the following factors:
the frequency of reference to the files
the retention of the record series
the volume of the record series
the function of the record series (e.g., fiscal, personnel)
the function of the creating office (e.g., administrative, academi
Removing inactive or dead files may include:
compressing computer files prior to archiving
periodically archiving or deleting files
transferring files at regular intervals or routinely checking for dead or inactive files
transferring records from the active filing system to secondary storage
Relocation of dead or inactive files may include:
periodically archiving or deleting files – relocating them to secondary storage elsewhere in the
organization or offsite (secondary storage)
electronic storage of files (diskette, tape, CD-ROM, Zip files)
storing information, including printed and photographic materials on microfilm or microfiche
scanning information and storing electronically Recycling or shredding.
4.3 Establishing and assembling new files
Vital records
Vital records are recorded information, regardless of medium or format that must be protected in case of disaster.
Major considerations in establishing a filing system are the identification and protection of vital records.
Completing the analysis
Once the analysis is complete, a filing system can be developed. A filing system should be developed on paper
before it is physically implemented. Folders should be sorted, on paper, into the appropriate primary
classification. Within each primary classification folders are sorted, on paper, into record series.
There are always some records that don't fit neatly into a record series. In many cases they are really either
"Material That May Be Disposed of without a Specific Retention Period" or unsolicited material. Neither
should be included in the filing system. Materials without a specific retention period can be destroyed or
should be managed separately. Unsolicited material can be destroyed.
In the case of electronic records - word processing or email - the records can be saved to a directory which would
be the electronic equivalent of sorting the files into primary classifications. Within each directory files can be
sorted into folders which would be the same as sorting paper files into record series.
Arrangement
Within each individual record series, files are arranged in an order best suited for rapid retrieval and disposition.
A feature or characteristic of the record series is chosen as the basis for the arrangement.
This feature is most easily identified by determining how various types of records are requested. Features
may include subject, a name associated with the record, a number which identifies the record, a title.
Steps in establishing a new file:
identify the need to create a new file
assign a file name or number
prepare a hanging file or folder for paper based files or a sub directory or folder on the computer for
electronic files
enter the new file in the file register or database
enter the file into the file index if necessary
gather items into the filing system in correct order
store as appropriate
4.4 Updating reference and index systems
A database index is a data structure that improves the speed of data retrieval operations on a database table at
the cost of additional writes and storage space to maintain the index data structure. Indexes are used to quickly
locate data without having to search every row in a database table every time a database table is accessed. Indexes
can be created using one or more columns of a database table, providing the basis for both rapid random lookups
and efficient access of ordered records.
An index is a copy of select columns of data from a table that can be searched very efficiently that also includes a
low-level disk block address or direct link to the complete row of data it was copied from. Some databases extend
the power of indexing by letting developers create indices on functions or expressions. For example, an index
could be created on upper(last name), which would only store the upper case versions of the last name field in the
index. Another option sometimes supported is the use of partial indices, where index entries are created only for
those records that satisfy some conditional expression.