Executive Summary The study reflects the business process of the Indagine Surveyors. The As-Is and To-Be models of business process modeling has been generated using BPMN 2.0 notation. The As-Is represents the current process of Indagine while the To-Be represents the improved business process. Answers to the various question such as use of business process modeling in the organization, importance of information and many more has been provided within the report. 1. Introduction: Business Processes are the core of any business foundation and serves as the base of maintaining profit from the business (Allweyer 2016). The organizations need to change the business process as the change of objectives or requirements. Within the study, the business process of Indagine Surveyors is presented. The As-is model represents the current process of the organization. On the other hand, the To-be model represents the improved business process. 2. Business Process Models: As-IS Model: To-Be Model: 3. General Questions: Answer to Question 1: The role of business process modeling in the organizations like Indagine Surveyors is to identify the business process. After the identification of the process, these processes are analysed for recognizing the gaps and issues. As-IS Model: To-Be Model: The As-Is business process model represents the current business processes of Indagine Surveyors and the To-Be model referents the processes that has been generated after mitigating the gaps and issues in process. These two models as stated above will provide better insight of the business to Mr. Mrtin Krowski. Answer to Question 2: The information is the source of any business. The organizations like Indagine Surveyors will use the information to provide accuracy and support to the business activities (Luftman, Lyytinen and Zvi 2015). Taken as an example, the information regarding the application will be the base of the application approving process in the organization. Without this information, no action can be taken. The Information technology is the core of enhancing business process quality for any organization. The Information Communication and Technology Systems will allow the organization to gather accurate data and transmit the data to the various department very quickly. This will improve the business efficiency and reduction in time of approval process (Lee et al. 2014). The less time required for analyzing the application will result in application satisfaction. Answer to Question 3: Outsourcing is the process of appointing executives outside of the organization to carry out specific tasks for the organization. The outsourcing can be contractual or monthly charge basis. The primary advantage of outsourcing is that the organization can concentrate on core business processes. Any issues in the product will be the headache of the third-party organization/group (Han and Mithas 2013). The final advantage is that Indagine Surveyors will be appointing professional and skilled employees for the task. The biggest disadvantage is that organization’s sensitive information can be revealed to the competitors (Schwalbe 2015). The issues associated with wide spread time frames of deliverable are common. The organization may have to put additional capital on task because of hidden costs. Answer to Question 4: Type Environment of Information Collection Type of Information Benefit From Information Web Analytics Sample Population Interaction between consumer and organization Better web app and user friendly interface Social Network Analytics Sample Organization Interaction of organization with the consumer and promotion plans Better grip on he consumer loyalty Customer Relationship Management Sample Population Requirements of consumers and trends Better relationship with the consumer Answer to Question 5: The privacy laws will be as following. i. The staff of Indigane Surveyors will not reveal any data to the unauthorized person ii. The information will collected only by authorized personnel (Acquisti, Brandimarte and Loewenstein 2015) iii. No personal questions will be asked to the participants Cyber Security Measures are as following. i. The information will be stored in the central database ii. The data will be encrypted (Siponen, Mahmood and Pahnila 2014) iii. No data will shared suing external physical devices   Bibliography: Abarbanel, Y., Singerman, E. and Vardi, M.Y., 2014, June. Validation of SoC firmware-hardware flows: Challenges and solution directions. In Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE (pp. 1-4). IEEE. Acquisti, A., Brandimarte, L. and Loewenstein, G., 2015. Privacy and human behavior in the age of information. Science, 347(6221), pp.509-514. Allweyer, T., 2016. BPMN 2.0: introduction to the standard for business process modeling. BoD–Books on Demand. Braglia, M. and Frosolini, M., 2014. An integrated approach to implement project management information systems within the extended enterprise. International Journal of Project Management, 32(1), pp.18-29. Han, K. and Mithas, S., 2013. Information technology outsourcing and non-IT operating costs: An empirical investigation. Mis Quarterly, 37(1), pp.315-331. Laguna, M. and Marklund, J., 2013. Business process modeling, simulation and design. CRC Press. Lee, G., DeLone, W., Tan, M. and Corrales, M., 2014. Special issue on leveraging the IS organization for business value creation. Luftman, J., Lyytinen, K. and ben Zvi, T., 2015. Enhancing the measurement of information technology (IT) business alignment and its influence on company performance. Journal of Information Technology. Schwalbe, K., 2015. Information technology project management. Cengage Learning. Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information security policies: An exploratory field study. Information & Management, 51(2), pp.217-224.