THE SPY WHO FIRED ME the Human Costs of Workplace Monitoring by ESTHER KAPLAN

Total Page:16

File Type:pdf, Size:1020Kb

THE SPY WHO FIRED ME the Human Costs of Workplace Monitoring by ESTHER KAPLAN Garry Wills on the u A Lost Story by u William T. Vollmann Future of Catholicism Vladimir Nabokov Visits Fukushima HARPER’S MAGAZINE/MARCH 2015 $6.99 THE SPY WHO FIRED ME The human costs of workplace monitoring BY ESTHER KAPLAN u A GRAND JUROR SPEAKS The Inside Story of How Prosecutors Always Get Their Way BY GIDEON LEWIS-KRAUS GIVING UP THE GHOST The Eternal Allure of Life After Death BY LESLIE JAMISON REPORT THE SPY WHO FIRED ME The human costs of workplace monitoring By Esther Kaplan ast March, Jim data into metrics to be Cramer,L the host of factored in to your per- CNBC’s Mad Money, formance reviews and devoted part of his decisions about how show to a company much you’ll be paid. called Cornerstone Miller’s company is OnDemand. Corner- part of an $11 billion stone, Cramer shouted industry that also at the camera, is “a includes workforce- cloud-based-software- management systems as-a-service play” in the such as Kronos and “talent- management” “enterprise social” plat- field. Companies that forms such as Micro- use its platform can soft’s Yammer, Sales- quickly assess an em- force’s Chatter, and, ployee’s performance by soon, Facebook at analyzing his or her on- Work. Every aspect of line interactions, in- an office worker’s life cluding emails, instant can now be measured, messages, and Web use. and an increasing “We’ve been manag- number of corporations ing people exactly the and institutions—from same way for the last cosmetics companies hundred and fifty to car-rental agencies— years,” Cornerstone’s are using that informa- CEO, Adam Miller, tion to make hiring told Cramer. With the and firing decisions. rise of the global workforce, the re- the vanguard of big data in the cloud” Cramer, for one, is bullish on the idea: mote workforce, the smartphone and and a leader in the “gamification of per- investing in companies like Corner- the tablet, it’s time to “manage people formance management.” To be assessed stone, he said, “can make you boatloads differently.” Clients include Virgin by Cornerstone is to have your collab- of money literally year after year!” Media, Barclays, and Starwood Hotels. orative partnerships scored as assets and A survey from the American Cornerstone, as Miller likes to tell your brainstorms rewarded with elec- Management Association found investors, is positioning itself to be “on tronic badges (genius idea!). It is to have that 66 percent of employers moni- scads of information swept up about tor the Internet use of their employ- Esther Kaplan is the editor of the Investiga- what you do each day, whom you com- ees, 45 percent track employee key- tive Fund at the Nation Institute and was a municate with, and what you communi- strokes, and 43 percent monitor 2013–2014 Alicia Patterson Fellow. cate about. Cornerstone converts that employee email. Only two states, Illustrations by John Ritter REPORT 31 Delaware and Connecticut, require standard set of metrics for measuring was introduced as a safety measure companies to inform their employ- R.O.I.” Yet this has hardly when it was rolled out in New York ees that such monitoring is taking slowed adoption. six or seven years ago. Lists were place. According to Marc Smith, a posted at distribution centers to sociologist with the Social Media first got interested in the data- shame the biggest seat-belt scofflaws. Research Foundation, “Anything drivenI workforce not long after I But safety is not the reason given for you do with a piece of hardware moved from a dilapidated apartment telematics on UPS investor calls. On that’s provided to you by the em- in Brooklyn that had a live-in super to those, executives speak instead about ployer, every keystroke, is the prop- a slightly more solid walk-up that does the potential for telematics to save erty of the employer. Personal calls, not. I began to notice something frus- the firm $100 million in operating private photos—if you put it on the trating about my UPS deliveries. They efficiencies, including reductions in company laptop, your company never arrived. When I wasn’t home, fuel, maintenance, and labor. owns it. They may analyze any elec- I’d leave a note asking for packages to Indeed, around the time telematics tronic record at any time for any be left at the laundromat on the cor- was being introduced in New York, purpose. It’s not your data.” ner. I’d get an attempted- delivery note UPS began to increase the number of With the advent of wireless con- instead. The same thing sometimes stops on each route. At morning meet- nectivity, along with a steep drop in happened even when I was home—I’d ings at the distribution center, Rose told the price of computer processors, find an attempted-delivery note, but me, supervisors would announce, “Hey, electronic sensors, GPS devices, and no one had rung my doorbell. Packag- your stop count is going up by ten.” As radio-frequency identification tags, es were routinely returned to sender. recently as a decade ago, a driver’s stop monitoring has become common- Then I learned about UPS’s use of count might be eighty-five, but in re- place. Many retail workers now something called telematics. cent years it rose to ninety-five, then a clock in with a thumb scan. Nurses Telematics is a neologism coined hundred. These numbers are reflected wear badges that track how often from two other neologisms— in UPS corporate filings, which show they wash their hands. Warehouse tele communications and informatics— that daily domestic package deliveries workers carry devices that assign to describe technologies that wire- grew by 1.4 million between 2009 and them their next task and give them lessly transmit data from remote 2013, the years in which telematics was a time by which they must complete sensors and GPS devices to computers being rolled out—and these addition- it. Some may soon be outfitted with for analysis. The telematics system that al packages were delivered by a thou- augmented- reality devices to more now governs the working life of a driv- sand fewer drivers. Total domestic efficiently locate products. er for UPS includes handheld DIADs, employees shrank during the same In industry after industry, this or delivery- information acquisition period by 22,000. data collection is part of an expen- devices, as well as more than 200 sen- These days, on an average shift, Rose sive, high-tech effort to squeeze ev- sors on each delivery truck that track makes 110 stops and delivers 400 pack- ery last drop of productivity from everything from backup speeds to stop ages. He leaves his house at seven in the corporate workforces, an effort that times to seat-belt use. When a driver morning and seldom gets home before pushes employees to their mental, stops and scans a package for delivery, nine-thirty at night, when he is so ex- emotional, and physical limits; the system records the time and loca- hausted that he rarely makes it to bed— claims control over their working tion; it records these details again he grabs dinner and passes out on the and nonworking hours; and com- when a customer signs for the package. couch. “If you go to one of these UPS pensates them as little as possible, Much of this information flows to a facilities at shift-change time, you’d even at the risk of violating labor supervisor in real time. The Teamsters, think you were at a football game, the laws. In some cases, these new sys- the union that represents UPS employ- way people are limping, bent over, with tems produce impressive results for ees, won contract language that says shoulder injuries, neck injuries, knee the bottom line: after Unified Gro- drivers can’t be fired based solely on injuries,” said David Levin, an orga- cers, a large wholesaler, implement- the numbers in their telematics re- nizer with Teamsters for a Democratic ed an electronic tasking system for ports, but supervisors have found work- Union, a reform caucus within the its warehouse workers, the firm was arounds, and telematics- related firings Teamsters. “It’s fifteen years of rushing, able to cut payroll expenses by have become routine. rushing, rushing, working when you’re 25 percent while increasing sales by One warm day last fall I met with exhausted, working those long days, 36 percent. A 2013 study of five a man I’ll call Jeff Rose, who for the running up and down stairs with boxes.” chain restaurants found that elec- past fifteen years has driven a UPS Rose told me he knows at least ten tronic monitoring decreased em- delivery route in a working-class drivers at his facility who have had ployee theft and increased hourly neighborhood in one of New York knee or shoulder surgery. He suffers sales. In other cases, however, the City’s outer boroughs. He was taking from chronic back pain, but a sur- return on investment isn’t so clear. his two o’clock lunch break at a din- geon told him there was no point in As one Cornerstone report says of er on the corner of a modest com- operating—he has so many different corporate social- networking tools, mercial strip and a leafy residential injuries that surgery won’t help. UPS “There is no generally accepted street. Rose, who asked that I not use coaches drivers to follow eight rules model for their implementation or his real name, said that telematics for safe lifting, which Rose rattled off 32 HARPER’S MAGAZINE / MARCH 2015 the data from a single driver’s shift can be up to forty pages long.
Recommended publications
  • Pof: Proof-Of-Following for Vehicle Platoons
    Verification of Platooning using Large-Scale Fading Ziqi Xu* Jingcheng Li* Yanjun Pan University of Arizona University of Arizona University of Arizona [email protected] [email protected] [email protected] Loukas Lazos Ming Li Nirnimesh Ghose University of Arizona University of Arizona University of Nebraska–Lincoln [email protected] [email protected] [email protected] Abstract—Cooperative vehicle platooning significantly im- I am AV proves highway safety, fuel efficiency, and traffic flow. In this 2 and I follow AV model, a set of vehicles move in line formation and coordinate 1 acceleration, braking, and steering using a combination of path physical sensing and vehicle-to-vehicle (V2V) messaging. The candidate verifier authenticity and integrity of the V2V messages are paramount to platooning AV AV safety. For this reason, recent V2V and V2X standards support 2 distance 1 the integration of a PKI. However, a PKI cannot bind a vehicle’s digital identity to the vehicle’s physical state (location, velocity, Fig. 1: Platooning of AV1 and AV2: The AV1 acts as a verifier etc.). As a result, a vehicle with valid cryptographic credentials to validate AV2’s claim that it follows the platoon. can impact platoons from a remote location. In this paper, we seek to provide the missing link between the However, the complex integration of multi-modal physical physical and the digital world in the context of vehicle platooning. sensing, computation, and communication creates a particu- We propose a new access control protocol we call Proof-of- larly challenging environment to safeguard. The safety of the Following (PoF) that verifies the following distance between a platoon relies on the veracity of the V2V messages exchanged candidate and a verifier.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]
  • TINKER TAILOR SOLDIER SPY Screenplay by BRIDGET O
    TINKER TAILOR SOLDIER SPY Screenplay by BRIDGET O’CONNOR & PETER STRAUGHAN Based on the novel by John le Carré 1. 1 EXT. HUNGARY - BUDAPEST - 1973 - DAY 1 Budapest skyline, looking towards the Parliament building. From here the world looks serene, peaceful. Then, as we begin to PULL BACK, we hear a faint whine, increasing in volume, until it’s the roar of two MiG jet fighters, cutting across the skyline. The PULL BACK reveals a YOUNG BOY watching the jets, exclaiming excitedly in Hungarian. 2 EXT. BUDAPEST STREET - DAY 2 LATERALLY TRACKING down a bustling street, as the jets scream by overhead. Pedestrians look up. All except one man who continues walking. This is JIM PRIDEAUX. ACROSS THE STREET: More pedestrians. We’re not sure who we’re supposed to be looking at - the short stocky man? The girl in the mini skirt? The man in the checked jacket? A car driving beside Prideaux accelerates out of the frame. Across the street the girl in the mini-skirt peels off into a shop. The stocky man turns and waves to us. But it isn’t Prideaux he’s greeting but another passerby, who walks over, shakes hands. Now we’re left with Prideaux and the Magyar in the checked shirt, neither paying any attention to each other. Just as we are wondering if there is any connection, the two reach a corner and the Magyar, pausing to cross the road, collides with another passerby. He looks over and sees Prideaux has caught the moment of slight clumsiness and gives the smallest of rueful smiles.
    [Show full text]
  • Blood Bowl Rulebook 2016 with Errata Well After One and a Half Decade, Games Workshop Has Officially Re-Released Blood Bowl
    Blood Bowl 2016 October 2017 ★ BLOOD BOWL Rules Included: ● Bugman’s Star Players (May 2016) ● Rulebook (November 2016) ● Death Zone Season 1! (November 2016) ● Early Bird Special Play card (2016) ● Match Events (App December 2016) ● Winter Weather Table (Winter Pitch January 2017) ● Subterranean Stadium Conditions (Dwarf/Skaven Pitch January 2017) ● Warhammer Open Special Play card (January 2017) ● Referees (White Dwarf January 2017) ● Errata and FAQ(pdf May 2017) ● Winterbowl Inducements (January 2017) ● Savage Orcs, Human Nobility, Star Players, Inducements, Match Events (App, February 2017) ● Blitzmania Kick-off table (App update, February 2017) ● Blitzmania Special Play cards (League Event February 2017) ● Special Play Variant rules v3 (pdf, April 2017) ● Team-specific ball rules (White Dwarf March 2017) ● White Dwarf and Black Gobbo (White Dwarf May 2017) ● Death Zone Season 2! (May 2017) ● Dwarf Slayer Hold, Skaven Pestilent Vermin, Star Players, Inducements, Match Events (App, May 2017) ● Gobbo balls (White Dwarf June 2017) ● Updated Grak & Crumbleberry rules (PDF July 2017) ● Special Play Card “Gassy Eurption”, Warhammer World Exclusive (August 2017) Limitations and decisions: These rules are a collection of all new Blood Bowl rules merged together with previous Living Rulebook version 6. Please note that some of these rules are optional and have limited to no play testing. Some optional rules and play cards from the previous edition are also supplied here for reference. Minor modifications by the author: ● Added “apply to both teams” for some Blitzmania kick-off table results if a result required a roll from both players and the result would be a tie. ● Added limited duration for some match events which originally had no limit and severely affected the game.
    [Show full text]
  • A Short History of Army Intelligence
    A Short History of Army Intelligence by Michael E. Bigelow, Command Historian, U.S. Army Intelligence and Security Command Introduction On July 1, 2012, the Military Intelligence (MI) Branch turned fi fty years old. When it was established in 1962, it was the Army’s fi rst new branch since the Transportation Corps had been formed twenty years earlier. Today, it remains one of the youngest of the Army’s fi fteen basic branches (only Aviation and Special Forces are newer). Yet, while the MI Branch is a relatively recent addition, intelligence operations and functions in the Army stretch back to the Revolutionary War. This article will trace the development of Army Intelligence since the 18th century. This evolution was marked by a slow, but steady progress in establishing itself as a permanent and essential component of the Army and its operations. Army Intelligence in the Revolutionary War In July 1775, GEN George Washington assumed command of the newly established Continental Army near Boston, Massachusetts. Over the next eight years, he dem- onstrated a keen understanding of the importance of MI. Facing British forces that usually outmatched and often outnumbered his own, Washington needed good intelligence to exploit any weaknesses of his adversary while masking those of his own army. With intelligence so imperative to his army’s success, Washington acted as his own chief of intelligence and personally scrutinized the information that came into his headquarters. To gather information about the enemy, the American com- mander depended on the traditional intelligence sources avail- able in the 18th century: scouts and spies.
    [Show full text]
  • Gridiron Dinner” of the Sheila Weidenfeld Files at the Gerald R
    The original documents are located in Box 5, folder “3/22/75 - Gridiron Dinner” of the Sheila Weidenfeld Files at the Gerald R. Ford Presidential Library. Copyright Notice The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Gerald Ford donated to the United States of America his copyrights in all of his unpublished writings in National Archives collections. Works prepared by U.S. Government employees as part of their official duties are in the public domain. The copyrights to materials written by other individuals or organizations are presumed to remain with them. If you think any of the information displayed in the PDF is subject to a valid copyright claim, please contact the Gerald R. Ford Presidential Library. Some items in this folder were not digitized because it contains copyrighted materials. Please contact the Gerald R. Ford Presidential Library for access to these materials. Digitized from Box 5 of the Sheila Weidenfeld Files at the Gerald R. Ford Presidential Library THE WHITE HOUSE WASHINGTON THE GRIDIRON DINNER Statler Hilton Hotel SATURDAY - MARCH 22, 1975 Attire: White Tie and Long Dress Departure: 6:40 P. M. From: Terry O'Donne~ BACKGROUND: The Ninetieth Annual Dinner of the Gridiron Club will be noted for the initiation of the Club's first woman• member, Helen Thomas of UniteC: Press International. This will be the third year that women have been gues_ts at the Saturday evening dinner, but the first time in the Club's history that the First Lady has attended.
    [Show full text]
  • Axiomatic Design of a Football Play-Calling Strategy
    Axiomatic Design of a Football Play-Calling Strategy A Major Qualifying Project Report Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements for the Degree of Bachelor of Science in Mechanical Engineering by _____________________________________________________________ Liam Koenen _____________________________________________________________ Camden Lariviere April 28th, 2016 Approved By: Prof. Christopher A. Brown, Advisor _____________________________________________________________ 1 Abstract The purpose of this MQP was to design an effective play-calling strategy for a football game. An Axiomatic Design approach was used to establish a list of functional requirements and corresponding design parameters and functional metrics. The two axioms to maintain independence and minimize information content were used to generate a final design in the form of a football play card. The primary focus was to develop a successful play-calling strategy that could be consistently repeatable by any user, while also being adaptable over time. Testing of the design solution was conducted using a statistical-based computer simulator. 2 Acknowledgements We would like to extend our sincere gratitude to the following people, as they were influential in the successful completion of our project. We would like to thank Professor Christopher A. Brown for his advice and guidance throughout the yearlong project and Richard Henley for sharing his intellect and thought process about Axiomatic Design and the role
    [Show full text]
  • The Setauket Gang: the American Revolutionary Spy Ring You've Never Heard About
    University of Puget Sound Sound Ideas Summer Research Summer 2019 The Setauket Gang: The American Revolutionary Spy Ring you've never heard about Fran Leskovar University of Puget Sound Follow this and additional works at: https://soundideas.pugetsound.edu/summer_research Part of the Military History Commons, Political History Commons, and the United States History Commons Recommended Citation Leskovar, Fran, "The Setauket Gang: The American Revolutionary Spy Ring you've never heard about" (2019). Summer Research. 340. https://soundideas.pugetsound.edu/summer_research/340 This Article is brought to you for free and open access by Sound Ideas. It has been accepted for inclusion in Summer Research by an authorized administrator of Sound Ideas. For more information, please contact [email protected]. The Setauket Gang: The American Revolutionary War Spy Ring You’ve never heard about Fran Leskovar University of Puget Sound 2019 Summer Research I would like to express my appreciation to the Chism Award for funding this research. 1 A 21-year old Yale Graduate with a diploma in his hand set up on a dangerous expedition to British controlled Long Island. No man except the bravest of the brave would be bold enough to depart on that journey. Merciless smugglers, deserters, and gunrunners, both rebels and redcoats or just acting for themselves, controlled the pond and the land surrounding it. Their monopoly often challenged by the British Royal Navy that was scouting for the rebel privateers and sometimes, but very rarely, for British refugees crossing the Sound under the flag of truce. From all these British sailors and officers, the rebels were particularly afraid of a notorious captain William Quarme who was in charge of the sixteen-gun brig Halifax and was very often accompanied on his voyages by the ruthless Queens Rangers.
    [Show full text]
  • Defensive Back Manual
    SECONDARY MANUAL SECONDARY PLAY Objective: WIN Purpose: 1. Prevent Long ball/big plays (+15) 2. Create turnovers - dictate field position 3. Minimize opponent’s passing game 4. Defend the Perimeter Run Responsibilities: 1. Defend against opponents passing attack 2. Defend against opponent’s runs. 3. Defend against opponent’s inside plays by converging 4. Be great tacklers ! The team that makes the fewest mistakes will win football games. However, the mistakes we make over the course of a game can be analyzed by their degrees of impact on its outcome. To eliminate mistakes we must maintain a high degree of focus and concentration throughout each and every contest. To be a great secondary, we must eliminate the big plays - through the air and on the ground. Our goal is to be the best in the AFL. However, to be the best we must believe in our abilities to be successful. The way to success is through preparation. Don’t settle for mediocrity. Anyone can be average. ! Successful teams overachieve; but more importantly, they never settle for less. To be successful we must give the extra effort. Winning teams know how to give that second and third effort - which must be us. In our effort to achieve greatness, we must work hard and work with a common togetherness having the same goals in mind. To get to that next level we must mentally prepare ourselves to deal with the pressures and adversities of the game. TO PERFORM LIKE A CHAMPION...YOU MUST PRACTICE LIKE ONE!! SIX IMPORTANT FACTORS FOR DEFENSIVE BACKS FOR PASS DEFENSE 1.
    [Show full text]
  • FM 3-98. Reconnaissance and Security Operations
    FM 3-98 Reconnaissance and Security Operations JULY 2015 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. HEADQUARTERS, DEPARTMENT OF THE ARMY This publication is available at Army Knowledge Online (https://armypubs.us.army.mil/doctrine/index.html). To receive publishing updates, please subscribe at http://www.apd.army.mil/AdminPubs/new_subscribe.asp FM 3-98 Field Manual Headquarters No. 3-98 Department of the Army Washington, DC, -XO\ Reconnaissance and Security Operations Contents Page PREFACE............................................................................................................... v INTRODUCTION ................................................................................................... vi Chapter 1 IMPORTANCE OF RECONNAISSANCE AND SECURITY AND ROLES OF CAVALRY ORGANIZATIONS ........................................................................... 1-1 Section I – Role of the Cavalry Formation in Unified Land Operations ...... 1-1 Section II – Cavalry Employment in Unified Land Operations ..................... 1-5 Cavalry in Unified Land Operations ....................................................................1-5 General Employment of Cavalry Units ............................................................... 1-6 Reconnaissance Considerations at Echelons Above Brigade ........................... 1-7 Brigade Operations Officer and Squadron Employment within the BCT ......... 1-10 Section III – Organizations............................................................................
    [Show full text]
  • Control Summary
    ENHANCED ONLINE MANUAL Playstation 2™ Version ”The spirit, the will to win, and the will to excel are the things that endure. These qualities are so much more important than the events that occur.” --Vince Lombardi 2 Table of Contents CONTROL SUMMARY.................................................................................................. 6 MENU NAVIGATION................................................................................................... 6 IN THE HUDDLE................................................................................................................ 6 OFFENSE ........................................................................................................................ 10 AFTER THE SNAP............................................................................................................ 11 DEFENSE ........................................................................................................................ 12 SPECIAL TEAMS ............................................................................................................. 16 QUICK GAME................................................................................................................ 17 COACH MATCHUP.......................................................................................................... 17 IN-GAME PAUSE MENU............................................................................................. 19 THE CRIB™ ..................................................................................................................
    [Show full text]
  • Four County Career Center Adult Workforce Education 22-900 SR 34
    Four County Career Center Adult Workforce Education 22-900 SR 34 Archbold, OH 43502 Consumer Information, Public Safety, STNA, Annual Campus Safety & Security & Fire Safety Report July 1, 2019 – June 30, 2020 1 TABLE OF CONTENTS Institutional Information Welcome 4 About Four County Career Center 4 Geography of Four County Career Center 4 Mission/Vision Statement 4 Approvals and Accreditation 5 Non-Discrimination Policy 5 Accommodations for Students with Disabilities 5 Job Placement Assistance 5 ASPIRE: Adult Basic & Literacy Education Classes 5 Staff Directory 5 Office Hours 7 Policies and Procedures Admissions Policy 8 Inclement Weather Policy 8 High School Evaluation/Foreign Diplomas 8 Transfer Credit 8 Misrepresentation Policy 8 Copyright Protection Policies 9 Educational Costs/Cost of Attendance 10 Graduation Requirements 11 Graduation Rate 11 Retention Rate 11 Placement Rate 11 Types of Employment 11 Financial Aid 11 Eligible Programs 11 Academic Year 11 FCCC Federal School Code 12 Student Eligibility Requirements/Student Responsibilities 12 Confirmation of Citizenship 12 Dependency Status 13 Dependency Override 13 Verifications/Corrections 13 Professional Judgement 14 Types of Financial Aid Available 14 Federal Pell Grant/Lifetime Eligibility 14 Federal Student Loans/Deferment or Forbearance 14 Other Sources of Assistance 14 Grading Scale 15 Attendance Policy 15 Tardiness/Early Leave Policy 15 Satisfactory Academic Progress 15 Maximum Time Frame 16 Warning Status 16 Loss of Eligibility/Appeal Process 16 Special Grading Circumstances
    [Show full text]