Question

In: Accounting

How can businesses that make offers protect themselves from the risk of loss associated with the...

How can businesses that make offers protect themselves from the risk of loss associated with the rules of offer and acceptance by post?

Solutions

Expert Solution

EXPLANATION : The above statement is related to the CONTRACT LAW and comes under POSTAL RULE OF ACCEPTANCE.

It states that acceptance of the offer takes place when the letter is posted to the recepient party. It is basically an exception to the normal rule of acceptance as per CONTRACT LAW.

Now businesses use this rule of offer and acceptance by post because it develops power by binding both parties and then acceptance can be exercised for that power. It also helps businesses in determining the time when both are reaching the consensus to the offer and acceptance and there is more possibilty of meeting of minds occuring then at a latter time as when the letter was actually delivered.

It can be said that it is good for offeree as it provides business convienience and also fair allocation of risk because it reduces the risk for circular communication and provides a fixed date for contract. Any delay in posting the letter can be a potential risk for both parties to the contract as the time period of delivery of letter is uncertain due to various circumstances so in that case a proper justification might be considered.


Related Solutions

How can businesses that make offers protect themselves from the risk of loss associated with the...
How can businesses that make offers protect themselves from the risk of loss associated with the rules of offer and acceptance by post?
how does one hedge, or protect themselves from economic risk?
how does one hedge, or protect themselves from economic risk?
Discuss online fraud and identify theft. How can one protect themselves?
Discuss online fraud and identify theft. How can one protect themselves?
What steps can companies that import from China or export to China do to protect themselves...
What steps can companies that import from China or export to China do to protect themselves from the fallout out associated with disruptions in trade occurring as a result of the recent coronavirus outbreak? Is this a warning sign that companies need to diversify their markets, production, and supply chains?
What is adverse selection, and how do insurance companies protect themselves from it? If the government...
What is adverse selection, and how do insurance companies protect themselves from it? If the government prohibited themselves against adverse selection, how would it affect insurance premiums?
How important are laws to protect the prosperity of businesses? How important are laws to protect...
How important are laws to protect the prosperity of businesses? How important are laws to protect society from the (perhaps unintended) costs of business? How important are laws to protect our Earth from the (perhaps unintended) costs of business? How important are law to protect the health of the environment? What balance should laws seek to maintain the rights of businesses and the rights of their customers? What balance should laws seek to maintain the rights of businesses and consumers...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent crime. The behaviors of 64 college students were compared with the behaviors of 56 nonstudents. One of the questions was "When asked to create a password, I have used either my mother's maiden name, or my pet's name, or my birth date, or the last four digits of my social security number, or a series of consecutive numbers." For the students, 25 agreed with...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent crime. The behaviors of 63 college students were compared with the behaviors of 58 non students. One of the questions was "When asked to create a password, I have used either my mother's maiden name, or my pet's name, or my birth date, or the last four digits of my social security number, or a series of consecutive numbers." For the students, 24 agreed...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent crime. The behaviors of 61 college students were compared with the behaviors of 55 nonstudents. One of the questions was "When asked to create a password, I have used either my mother's maiden name, or my pet's name, or my birth date, or the last four digits of my social security number, or a series of consecutive numbers." For the students, 22 agreed with...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent...
A study of identity theft looked at how well consumers protect themselves from this increasingly prevalent crime. The behaviors of 61 college students were compared with the behaviors of 59 nonstudents. One of the questions was "When asked to create a password, I have used either my mother's maiden name, or my pet's name, or my birth date, or the last four digits of my social security number, or a series of consecutive numbers." For the students, 24 agreed with...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT