Free Essay

Comp 285: Employee Privacy Report

In:

Submitted By vikasak07
Words 1131
Pages 5
Employee Privacy Report

• Write a 1,050- to 1,200-word report addressing e-mail, Internet use, and privacy policies. Answer the following questions in your report:

o What are the e-mail use, Internet use, and privacy policies at your job?
The email policy at my job at the Florida Foundation for Families (hereinafter “FFF”) are that work email is strictly to be used for work purposes and not for personal use. The policy is covered in our Employee Handbook, and states that the rationale for the policy is that we should only be working during work time, and that if we were to use work email for private use, it could expose the company to internet threats that would otherwise be easily avoidable. For instance, if we were to use email for private use and were to open an attachment that contained a virus, we could potentially jeopardize the entire system’s network. During our break periods and lunch we are allowed to use private email accounts, but we are likewise instructed not to open any attachments on our work computers in order to avoid the same threat that would be posed by using our private email accounts for such purposes.
Like our email policy, the internet is supposed to only be used for work purposes as well, however, since work purposes aren’t strictly defined there is definitely more leeway in how we can use the internet, since we could be looking at an article in an online magazine or newspaper that’s work related. We are still forbidden from using any networking sites, like facebook and myspace, since we would be using the internet for non-work purposes. Fortunately, however, like the email policy, we are also allowed to use the internet for personal use during break and lunch periods, but we are strictly forbidden from accessing any obscene or offensive material. This policy is strictly enforced since our organization caters to the development of good families, and it would hurt the organization’s image if a family member saw anything obscene on someone’s computer.
We are also told in the Employee Handbook that we have no expectation of privacy whatsoever in our work emails and whatever information may be on our work computers. FFF states that this is due to the fact that the computers are FFF’s property, not ours, and since they are supposed to be used primarily for work purposes (except during breaks and lunch), we should keep anything private we want to do with computers to our computers at home.

o What are the current laws regulating employee e-mail and Internet privacy? Currently, there is no Florida law that protects an employee from having their work email and work computer accessed by management, so there is no right to privacy that extends to work. In large part, this is based on the fact that an employee has a diminished expectation of privacy in his or her work email and internet usage, since in exchange for being employed by the company, the employee is sacrificing that expectation of privacy. This policy is consistent with an employer’s ability to drug test an employee, since again the employee chooses to sacrifice his or her privacy for employment.

o Why do companies implement e-mail and Internet use policies?

As I alluded to above, I believe the primary reason for companies to implement these policies is to make it clear that employees should be working during work time, and the fact that they have internet connections should not affect that fundamental policy. Additionally, due to the fear of an employee downloading a file that contains a virus or a Trojan horse, the company has a substantial interest in restricting employees’ usage, so they are not possibly exposed to these threats. A virus, for instance, could be spread throughout the network and might wind up costing the company thousands of dollars to repair whatever damage it caused. Additionally, a Trojan Horse could be even more damaging, since it could allow a hacker access to private information, such as social security numbers, credit card numbers, and bank accounts, of the familes’ who seek our assistance, who are already in a troubled financial state. o What assumptions might employees make about their privacy at work? How do these policies affect employee privacy at work?
If employees are unaware of their employers’ policies, many may believe that they have an expectation o fprivacy in their work email and whatever is on their work computer. Some may believe that their employer could look at the contents of their email of their browser history, but probably most believe that their employer would need to have some justification for doing so, such as a suspicion that the employee is stealing from the company or sending inappropriate emails.
Others may believe that they can use the internet and email for private purposes as well as work purposes, and that they would only violate their employers’ policy if they were to send something offensive using their work account to other co-workers. On the other hand, if the employee has to go through a background check, drug testing, or some other procedure that may inquire into his past or require him to divulge certain information he would otherwise believe was protected by his right to privacy, he may be significantly less likely to believe that his email and internet usage are private and could not be accessed by his employer. For instance, many employers require, or are mandated under state law, to conduct background checks on their employees, including inquires into their criminal histories if they have them.
The state of Florida requires that individuals in certain sensitive positions, such as those dealing with children undergo these background checks, which include their criminal records. See Florida Labor Code §§ 435.03 & 435.04. These employees would probably be much less likely to be under the false assumption that their work computers are their private property while they work for the company, and would probably be more likely to suspect that they could have their files checked. (See Sledge v. Department of Children and Families, holding that a home health care aide could be disqualified from sensitive employment for a conviction he sustained in 1992, although the statutes that authorized the sensitive employment background checks, Florida Labor Code Sections 435.03 and 435.04 did not become effective until 1995).
Thus, those in sensitive employment positions where they were subject to significant employment screening would probably be much less likely to think that they have a privacy interest in their emails and internet usage than those who do not have to undergo these screening procedures.

o Paper must include one outside reference.

Similar Documents

Premium Essay

Cyber Crime

...Project on Cybercrime www.coe.int/cybercrime Strasbourg, 15 January 2010 Draft Discussion paper Law Enforcement Challenges in Transborder Acquisition of Electronic Evidence from “Cloud Computing Providers” Prepared by Joseph J. Schwerha IV TraceEvidence, LLC Project funded by Romania, Monaco, Estonia, Microsoft, McAfee and the Council of Europe Council of Europe – Project on Cybercrime For further information please contact: Economic Crime Division Directorate General of Human Rights and Legal Affairs Council of Europe Strasbourg, France Tel: Fax: +33-3-9021-4506 +33-3-9021-5650 Disclaimer This technical report does not necessarily reflect official positions of the Council of Europe or of the donors funding this project or of the parties to the instruments referred to Email: alexander.seger@coe.int www.coe.int/cybercrime 2 Council of Europe – Project on Cybercrime Contents 1 2 3 4 Introduction ___________________________________________________ 4 Council of Europe Convention on Cybercrime Overview __________________ 5 What are Cloud Computing Providers? _______________________________ 6 The United States Perspective _____________________________________ 8 5 What are the challenges in the transnational acquisition of evidence from Cloud Computing Providers?_______________________________________________ 9 5.1 5.2 5.3 5.4 5.5 It can be impossible to know where the data resides ________________________________ 9 What Law Applies When...

Words: 10207 - Pages: 41

Free Essay

Vnu Catalog

...VINCENNES UNIVERSITY CATALOG Vol. LXIX August, 2010 No. 61 A COMPREHENSIVE TWO-YEAR COLLEGE OFFERING ASSOCIATE DEGREES IN THE LIBERAL ARTS, SCIENCES, EDUCATION, ENGINEERING, AND TECHNOLOGY AND OFFERING BACCALAUREATE DEGREES IN SPECIALIZED AREAS Accreditation The North Central Association of Colleges and Schools 30 North LaSalle Street, Suite 2400, Chicago, IL 60602 (312) 263-0456 www.ncacihe.org FAX 312-263-7462 Accreditation Review Council on Education in Surgical Technology and Surgical Assisting American Bar Association American Board of Funeral Service Education American Health Information Management Association Association of Collegiate Business Schools and Programs Commission on Accreditation of Allied Health Educational Programs Commission on Accreditation in Physical Therapy Education Federal Aviation Administration Higher Education Coordinating Board of the State of Washington Indiana State Board of Nursing Joint Review Committee on Education In Radiologic Technology National Alliance of Concurrent Enrollment Partnerships National Association of Schools of Art and Design National Association of Schools of Theatre National League for Nursing Accrediting Commission Printing Industries of America, Inc. Approved for Veterans Membership The American Association of Community Colleges Aviation Technician Education Council The Council of North Central Two Year Colleges The Higher Education Transfer Alliance The National Academic Advising Association The North Central Association...

Words: 107322 - Pages: 430

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Free Essay

Classified Employees Handbook Achieving Excellence Through Merit the Personnel Commission

...CLASSIFIED EMPLOYEES HANDBOOK THE PERSONNEL COMMISSION ACHIEVING EXCELLENCE THROUGH MERIT REVISED | JUNE 2011 TABLE OF CONTENTS PREFACE I THE LOS ANGELES UNIFIED SCHOOL DISTRICT The LAUSD’s Mission The School System Board of Education and Staff II THE BASICS FOR NEW EMPLOYEES Orientation Expectations and Guidelines Performance Appraisals Disciplinary Action Notification of Absences Use of Telephones and E-mail Change of Address and Telephone Number Accidents and Safety Personal Property Dress Standards for Employees Employee Organizations Credit Unions Charitable Contributions Political Activity Publications III IMPORTANT POLICIES Equal Employment Opportunity Statement Nondiscrimination Statement Ethics Policy Office of the Inspector General - Hot Line Whistleblower Protection Policy Health and Safety Policy Attendance Policy Drug, Alcohol and Tobacco-Free Workplace Policy Workplace Violence Prevention Policy Sexual Harassment Policy Confidentiality and Non-Retaliation Child Abuse Reporting Policy Fingerprint Policy …………………………………………..14 …………………………………………..14 …………………………………………..15 …………………………………………..16 …………………………………………..16 …………………………………………..16 …………………………………………..16 …………………………………………..17 …………………………………………..18 …………………………………………..18 …………………………………………..20 …………………………………………..20 …………………………………………..20 2 ……………………………………………5 ……………………………………………6 ……………………………………………6 ……………………………………………7 ……………………………………………8 ……………………………………………8 ……………………………………………9 ……………………………………………9 …………………………………………...

Words: 15281 - Pages: 62

Free Essay

An Examination of Discrimination Against Transgender Americans in the Workplace Hearing

...AN EXAMINATION OF DISCRIMINATION AGAINST TRANSGENDER AMERICANS IN THE WORKPLACE HEARING BEFORE THE SUBCOMMITTEE ON HEALTH, EMPLOYMENT, LABOR AND PENSIONS COMMITTEE ON EDUCATION AND LABOR U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS SECOND SESSION HEARING HELD IN WASHINGTON, DC, JUNE 26, 2008 Serial No. 110–99 Printed for the use of the Committee on Education and Labor ( Available on the Internet: http://www.gpoaccess.gov/congress/house/education/index.html U.S. GOVERNMENT PRINTING OFFICE 43–027 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 0ct 09 2002 10:55 Dec 17, 2008 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\DOCS\110TH\HELP\110-99\43027.TXT HBUD PsN: DICK COMMITTEE ON EDUCATION AND LABOR GEORGE MILLER, California, Chairman Dale E. Kildee, Michigan, Vice Chairman Donald M. Payne, New Jersey Robert E. Andrews, New Jersey Robert C. ‘‘Bobby’’ Scott, Virginia Lynn C. Woolsey, California ´ Ruben Hinojosa, Texas Carolyn McCarthy, New York John F. Tierney, Massachusetts Dennis J. Kucinich, Ohio David Wu, Oregon Rush D. Holt, New Jersey Susan A. Davis, California Danny K. Davis, Illinois ´ Raul M. Grijalva, Arizona Timothy H. Bishop, New York ´ Linda T. Sanchez, California John P...

Words: 49958 - Pages: 200

Free Essay

Help

...The Home Depot 2008 Annual Report Dear Shareholders: In 2008, our retail sales declined by 7.8 percent, with comp sales down 8.7 percent. Our adjusted earnings per share from continuing operations declined 22 percent. In ordinary times, these would be very disappointing results. But 2008 was not an ordinary year. Despite the difficult economic environment, we continued to improve our retail business, through investing in our associates and our stores, rebuilding our supply chain and improving customer service. We also made several strategic decisions to optimize our capital allocation, concentrating our efforts on our core business. In the first quarter, we closed 15 underperforming stores and reduced our pipeline of new stores by 50. In the third quarter, we renegotiated our private label credit card agreement, capping our cost of private label credit. In the fourth quarter, we announced our decision to exit EXPO and related businesses. These actions will make the Company stronger. On the financial side, we ended the year with a solid operating profit and $41 billion in assets. We generated cash from the business of approximately $5.5 billion, which allowed us to invest in the business where necessary and reduce our debt obligations while maintaining a healthy dividend. On the operational side, we implemented an “Aprons on the Floor” initiative, which deployed over $200 million in annualized savings onto the floor of the stores for customer service...

Words: 30302 - Pages: 122

Free Essay

Code

...6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate Chapter 8. The Limits in Open Code PART III: LATENT AMBIGUITIES 83 120 138 Chapter 9. Translation Chapter 10. Intellectual Property Chapter 11. Privacy Chapter 12. Free Speech Chapter 13. Interlude PART IV: COMPETING SOVEREIGNS 157 169 200 233 276 Chapter 14. Sovereignty Chapter 15. Competition Among Sovereigns 281 294 PART V: RESPONSES Chapter 16. The Problems We...

Words: 190498 - Pages: 762

Premium Essay

Khan

...This text was adapted by The Saylor Foundation under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 License without attribution as requested by the work’s original creator or licensee. Saylor URL: http://www.saylor.org/books Saylor.org 1 Preface Competing books are focused on the academic part of HRM, which is necessary in a university or college setting. However, the goal with this book is not only to provide the necessary academic background information but also to present the material with a practitioner’s focus on both large and small businesses. While the writing style is clear and focused, we don’t feel jargon and ten-dollar words are necessary to making a good textbook. Clear and concise language makes the book interesting and understandable (not to mention more fun to read) to the future HRM professional and manager alike. It is highly likely that anyone in business will have to take on an HRM role at some point in their careers. For example, should you decide to start your own business, many of the topics discussed will apply to your business. This is the goal of this book; it is useful enough for the HRM professional, but the information presented is also applicable to managers, supervisors, and entrepreneurs. Besides these differences, other key differences include the following:   This book utilizes a technology focus and shows how HRM activities can be leveraged using technology. We have also included a chapter on communication and information...

Words: 157258 - Pages: 630

Free Essay

Apple Valuation Case

...ANNUALREPORT2009 Dear Shareholders: In 2009, our comp sales declined by 6.6 percent, with total sales down 7.2 percent. Earnings per share from continuing operations were up 13.1 percent from last year, but on an adjusted basis declined 6.7 percent. At the end of 2008, the U.S. economy was in the most severe recession it has experienced since the great depression. We planned for this tough economic environment, and we executed well against our plan, exceeding the sales and earnings targets we set forth at the beginning of the year. We gained over 100 basis points of U.S. market share in 2009, a notable accomplishment on a base of fewer stores. We saw sequential improvement in our performance during the year and exited the year with a positive comp in the fourth quarter. We also saw signs of stabilization in some key macroeconomic indicators, such as Private Fixed Residential Investment as a percent of GDP. In Canada, the demand for home improvement products is showing improvement. And our Mexican team delivered positive comps for the year in a very tough economic environment. As we look to 2010, we believe we will see modest economic recovery in the markets we serve and expect our performance to continue to improve as the economy undergoes a steady, though slow, recovery. As a company, we made significant progress against our strategic imperatives in 2009. We enhanced customer service in our stores, introduced new and innovative products with compelling values...

Words: 32934 - Pages: 132

Premium Essay

The Management Bible

...TeAM YYePG Digitally signed by TeAM YYePG DN: cn=TeAM YYePG, c=US, o=TeAM YYePG, ou=TeAM YYePG, email=yyepg@msn. com Reason: I attest to the accuracy and integrity of this document Date: 2005.03.07 10:24:14 +08'00' T HE MANAGEMENT BIBLE T HE MANAGEMENT BIBLE BOB NELSON PETER ECONOMY John Wiley & Sons, Inc. Copyright © 2005 by Nelson Motivation, Inc. & Peter Economy, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or other wise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 6468600, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness...

Words: 71552 - Pages: 287

Premium Essay

Management Related

...THE MANAGEMENT BIBLE TEAM LinG - Live, Informative, Non-cost and Genuine ! TEAM LinG - Live, Informative, Non-cost and Genuine ! THE MANAGEMENT BIBLE BOB NELSON PETER ECONOMY John Wiley & Sons, Inc. TEAM LinG - Live, Informative, Non-cost and Genuine ! Copyright © 2005 by Nelson Motivation, Inc. & Peter Economy, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or other wise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 6468600, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties...

Words: 73928 - Pages: 296

Free Essay

Ceh Test Questions

...Exam : 312-50 Title : Ethical Hacker Certified Ver : 02-23-2009 312-50 QUESTION 1: What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. QUESTION 2: What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. QUESTION 3: Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer:...

Words: 34575 - Pages: 139

Premium Essay

Managing Information Technology (7th Edition)

...CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5 Data Governance at InsuraCorp CASE STUDY I-6 H.H. Gregg’s Appliances, Inc.: Deciding on a New Information Technology Platform CASE STUDY I-7 Midsouth Chamber of Commerce (B): Cleaning Up an Information Systems Debacle CASE STUDY II-1 Vendor-Managed Inventory at NIBCO CASE STUDY II-2 Real-Time Business Intelligence at Continental Airlines CASE STUDY II-3 Norfolk Southern Railway: The Business Intelligence Journey CASE STUDY II-4 Mining Data to Increase State Tax Revenues in California CASE STUDY II-5 The Cliptomania™ Web Store: An E-Tailing Start-up Survival Story CASE STUDY II-6 Rock Island Chocolate Company, Inc.: Building a Social Networking Strategy CASE STUDY III-1 Managing a Systems Development Project at Consumer and Industrial Products, Inc. CASE STUDY III-2 A Make-or-Buy Decision at Baxter Manufacturing Company CASE STUDY III-3 ERP Purchase Decision at Benton Manufacturing Company, Inc. CASE STUDY III-4 ...

Words: 239887 - Pages: 960

Premium Essay

Form

...OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the...

Words: 149595 - Pages: 599

Free Essay

Business Process Management

...Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen 6336 Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany Richard Hull Jan Mendling Stefan Tai (Eds.) Business Process Management 8th International Conference, BPM 2010 Hoboken, NJ, USA, September 13-16, 2010 Proceedings 13 Volume Editors Richard Hull IBM Research, Thomas J. Watson Research Center 19 Skyline Drive, Hawthorne, NY 10532, USA E-mail: hull@us.ibm.com Jan Mendling Humboldt-Universität zu Berlin, Institut für Wirtschaftsinformatik Unter den Linden 6, 10099 Berlin, Germany E-mail: contact@mendling.com Stefan Tai Karlsruhe Institute of...

Words: 147474 - Pages: 590