ABC Journal of Advanced Research, Volume 8, No 2 (2019) ISSN 2304-2621(p); 2312-203X (e) CC-BY-NC 2014, i-Proclaim | ABCJAR Page 95 Handling Instance Spanning Constraints in Compliance Management Ruhul Amin Senior Data Entry Control Operator (IT), ED-Maintenance Office, Bangladesh Bank (Head Office), Dhaka, BANGLADESH * Corresponding Contact: Email: ruhulaminshuzon@gmail.com Manuscript Received: 26 July 2019 - Revised: 28 Sept 2019 - Accepted: 22 Oct 2019 ABSTRACT Instance spanning constraints refers to instruments to establish controls during multiple instances in or several processes. Many business entities crave an established ISC support system. Take, for instance, the bundling and unbundling of cargo from various logistics processes or the dependence of various examinations in medical treatment systems. During such systems, non- compliance with the ISC would lead to immense consequences and penalties, which can be fatal if it occurs in the medical field. ISC can also occur from process execution logs. Business execution store execution information for the process instance and, consequently, the characteristics of the execution logs. Discovering ISC early enough helps in supporting ISC design and execution. The purpose of this study is to contribute towards the categorization of the ISC and hence contribute to the digitalized ISC and its compliance management. Keywords: ISC, compliance management, spanning constraints This article is is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Attribution-NonCommercial (CC BY-NC) license lets others remix, tweak, and build upon work non-commercially, and although the new works must also acknowledge & be non-commercial. INTRODUCTION When software systems interact with the real world, event data will be created. The event data happen at a particular time stamp, and the collection of events known as the “event log.” Also, these event logs might contain event identification information, Name, date, etc. and collection or sequence of event logs named as traces. Process Mining has been done with this event data and the techniques that help to handle to operate real-time cases such as banking, public transport, hospital and other sectors. Therefore, process mining can be considered as a connection between event data and process model that used to configure software systems about fifteen years ago, Cook and Wolf were attempted first process mining practical applications (Awad, et al. 2010). After that, several works were conducted in this field and focused on the development of new algorithms for the automatic discovery of business processes