Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Letter Header: Company letterhead, date, and recipient's contact details
2. Salutation: Formal greeting to the recipient
3. Purpose Statement: Clear statement of the letter's purpose - requesting approval for a new position
4. Position Details: Job title, department, and reporting relationship
5. Business Justification: Explanation of why the position is needed, including business impact
6. Resource Requirements: Budget implications, including proposed salary range and any additional costs
7. Timeline: Proposed hiring timeline and desired start date
8. Closing: Request for approval and next steps
9. Signature Block: Sender's name, title, and contact information
1. Market Analysis: Include when justification requires market salary data or industry benchmarking
2. Impact on Current Structure: Include when the new position affects existing team structures or workflows
3. Training Requirements: Include when the position requires specific training investments
4. Space and Equipment Needs: Include when the position requires significant new resources or workspace modifications
5. Risk Assessment: Include when the position involves regulatory compliance or risk management considerations
1. Job Description: Detailed description of the role, responsibilities, and requirements
2. Organization Chart: Current and proposed organization structure showing where the position fits
3. Budget Analysis: Detailed breakdown of financial implications
4. Skills Matrix: Required qualifications, experience, and competencies for the role
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
