Browse Definitions :

As you requested, per and as per

Writing for Business

Which is correct?

me2 small b&w ___________________________, I’m attaching my tax records for the years 1987-2012.
a. Per your request
b. As per your request
c. As you requested

Answer: c.

Explanation:
Per can mean according to or in accordance with — so it’s not wrong, exactly. People often use it to make their writing more formal, but it sounds fusty. Writing guides usually condemn it as jargon. As per is worse — it’s not only fusty but also redundant, which makes it silly. Silly and overly formal make for a bad combination, made all the sillier because it’s apparent that the writer is trying to sound very businesslike and official.

The Oxford dictionary of American usage and style (ed. Bryan A. Garner) lists examples:

“When used to mean ‘according to’ (per your request, per your order), the expression [per] is business jargon at its worst and should be avoided.” (Charles T. Brusaw et al., The Business Writer’s Handbook, 1987)

As per: This hybrid is inexcusable. Instead of ‘as per your request,’ say ‘in accordance with your request’ or ‘in compliance with your request.’ (Maurice H. Weseen, Crowell’s dictionary of English Grammar, 1928)

As you requested is straightforward and, really, as formal as you ever need to be.

Dig Deeper on Writing for Business

Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • crypto wallet (cryptocurrency wallet)

    A crypto wallet (cryptocurrency wallet) is software or hardware that enables users to store and use cryptocurrency.

  • zero-day (computer)

    A zero-day is a security flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching ...

  • backdoor (computing)

    A backdoor attack is a means to access a computer system or encrypted data that bypasses the system's customary security ...

CIO
  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

  • chief operating officer (COO)

    A chief operating officer (COO) is the corporate executive who oversees ongoing business operations within the company.

  • project management

    Project management is the discipline of using established principles, procedures and policies to guide a project from conception ...

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing...

  • marketing stack

    A marketing stack, also called a marketing technology stack, is a collection of technologies used by marketers to perform, ...

  • social media influence

    Social media influence is a marketing term that describes an individual's ability to affect other people's thinking in a social ...

Close