Regulatory and Legal Issues in Informational Management System

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

REGULATORY AND LEGAL

ISSUES IN
INFORMATIONAL
MANAGEMENT SYSTEM
(MIS)MANAGEMENT INFORMATION SYSTEM

MADE BY: GROUP-4


GUIDED BY: KUNAL KOTHARI
MRS. PARUL SINHA LOVISH TUTEJA

MAMTA DHAND

MANIK SINGH

MANU PANWAR

MANVEEN ARNEJA

MOHD.ARSHAD KHAN

MOHITA AGARWAL

NAMRATA MEDHI

● ● ●
ACKNOWLEDGEMENT

We would like to thank our Project Guide MRS. PARUL SINHA for her
immense guidance, valuable help and the opportunity provided to us to
complete the project under her guidance.

Any accomplishment requires the effort of many people and happens to be the
synergetic product of many minds. The project is a team-work of 9 students
who have put their heart & soul in making it.

Above all we have no words to express gratitude to the almighty GOD who
blessed us the wisdom and enlightened us to complete this project.
WHAT IS MIS?

A management information system (MIS) is a system that provides


information needed to manage organizations effectively. Management
information systems are regarded to be a subset of the overall internal controls
procedures in a business, which cover the application of people, documents,
technologies, and procedures used by management accountants to solve
business problems such as costing a product, service or a business-wide
strategy. Management information systems are distinct from regular information
systems in that they are used to analyze other information systems applied in
operational activities in the organization. Academically, the term is commonly
used to refer to the group of information management methods tied to the
automation or support of human decision making, e.g. Decision Support
Systems, Expert systems, and Executive information system.

IMPORTANCE OF MIS:

In today's scenario MIS plays a pivotal role in Organizations. Organizations


worldwide make extensive use of MIS. It is designed by the top management of
an organization, is a tool to assembling & accumulating facts & figures of all
the important business processes.
MIS is a very vast topics, it is very difficult to cover the whole in one article.
Thus here are some of the major importance / advantages of MIS in
organizations:

 The organization that uses MIS is able to record, process, route &
tabulate all important business transactions. As & when need arises the
organization is able to incorporate the needed changes & improvements
in the area of concern.
 MIS facilitates informed DECISION MAKING. It usually represents a
number of options from which one can choose the best.
 The top management ANALYSES whether its resources are being
utilized optimally.
 A TWO WAY COMMUNICATION FLOW is greatly enhanced by the
MIS. The management freely tells the job responsibilities to its
employees. The employees in return discuss their doubts & grievances.
 MIS supports the planning & controlling function of managers in the
organization. Managers use past/historical data as well as the current data
to analyse the performance & hence apply controlling measures.
 MIS encourages DECENTRALISATION in the organisation.
Decentralisation is possible when there's a system to measure operations
at the lower levels.
 It brings COORDINATION. It facilitates integration of specialized
activities by keeping each department aware of the problems &
requirements of other departments.

Hence, in some way MIS keeps the organization binded.

WHAT IS CYBER CRIME?

Cyber crime as any crime that is committed by means of special knowledge or


expert use of computer technology. So what exactly is Cyber Crime? Cyber
crime could reasonably include a wide variety of criminal offences and
activities.

The Internet – or Cyber Space as it s sometimes called, is a borderless


environment unlike a brick and mortar world. Even though it is indispensable as
a knowledge bank, it is an ideal tool for someone with a criminal bent of mind,
who can use this environment to his/ her maximum advantage.

It is not a surprise that Cyber Crimes like money cyber stalking, denial of
service, e-mail abuse, chat abuse and other crimes are on the rise.  Cyber
Terrorist and cyber mafia are emerging with great force, whose activities are
going to threaten the sovereignty of nations and world order.

TYPES OF CYBER CRIME:

1. CYBER STALKING: Can be defined as the repeated acts harassment or


threatening behaviour of the cyber criminal towards the victim by using
Internet services.

Stalking in General terms can be referred to as the repeated acts of

Harassment targeting the victim such as:


1. Following the victim
2. Making harassing phone calls
3. Killing the victims pet
4. Vandalizing victims property
5. Leaving written messages or objects

2. DENIAL OF SERVICE: This is an act by a criminal, who floods the


bandwidth of the victim’s network or fills his e-mail box with spam mail
depriving him of the services he is entitled to access or provide.

This act is committed by a technique called spoofing and buffer


overflow.  The criminal spoofs the IP address and flood the network of
the victim with repeated requests.  Since the IP address is fake, the victim
machine keeps waiting for response from the criminal’s machine for each
request. This consumes the bandwidth of the network which then fails to
serve the legitimate requests and ultimately breaks down.

3. HACKING: Hacking in simple terms means illegal intrusion into a


computer system without the permission of the computer owner/user. 

Purposes of hacking

 Greed
 Power
 Publicity
 Revenge
 Adventure
 Desire to access forbidden information
 Destructive mindset

4. ONLINE FRAUD:
The net is a boon for people to conduct business effectively, very quickly.
It saves businesses a lot of time, money and resources. Unfortunately, the
net is also an open invitation to scam and fraudsters and online frauds are
becoming increasingly rampant.
5. CHILD PORNOGRAPHY:
Child pornography is a very unfortunate reality of the Internet. The
Internet is being highly used by its abusers to reach and abuse children
sexually, worldwide.
The Internet is very fast becoming a household commodity in India. Its
explosion has made the children a viable victim to the cyber crime. As
more homes have access to Internet, more children would be using the
Internet and more are the chances of falling victim to the aggression of
pedophiles.

6. SNOOFING: (Illegal intrusion, posing as a genuine user)

 Spoofing means a hacker logs-in to a computer illegally using a different


identity than his own.
 He is able to do this by having previously obtained actual password.
 He creates a new identity by fooling the computer into thinking he is the
genuine system operator.
 Hacker then takes control of the system.

7. USE NET NEWS GROUP: (Usenet is a popular means of sharing and


distributing information on the web with respect to specific topic or
subjects)

 Possible Criminal Uses of Usenet.

 Distribution/Sale of pornographic material.

 Distribution/Sale of pirated software.

 Distribution of Hacking Software.

 Sale of Stolen credit card numbers.

 Sale of Stolen Data/Stolen property.


P
T
M
I
R
E
B
Y
C
b
y
C
k
D
v
c
H
l
O
a
w
t
f
p
S
m
e
d
s
u
r
V
g
n
o
i
F
O
WE CAN CATEGORIZE CYBERCRIME INTO:

TYPES OF CYBER CRIME

WHO CAN BE TYPICALLY EXPECTED TO INDULGE IN A CYBER


CRIME?

Insiders

Hackers
Virus Writers
Disgruntled employees and ex-employees,
spouses, lovers
Crack into networks with malicious intent
Pose serious threats to networks and systems
worldwide
Foreign Intelligence: - ٠ Use cyber tools as part of their services
Use cyber tools as part ٠ For espionage activities
of their Services ٠ Can pose the biggest threat to the security of
another country
Terrorists Use to formulate plans, to raise funds, propaganda

PREVENTING CYBER CRIMES / SAFETY MEASURES:

1.GENERAL TIPS:

 Do not give out identifying information such as your name, home


address, or telephone number in a chat room. Even vital details like age,
gender should never be divulged to anyone.
 Do not send your photograph to any one on the net unless you know the
person well enough.
 Do not respond to messages or bulletin board items that are obscene,
belligerent or threatening.
 Never arrange a face-to-face meeting with someone who you have just
‘met’ on the Internet. In case you have to meet this person, make sure you
have someone with you for the meeting. And inform someone of the
person and place you will be going to. Remember, people online are not
always who they seem to be.

2. CORPORATES TIPS:

 Setup an e-security program for your business


 Ensure your security program facilitates confidentiality, integrity and
availability
 Identify the sources of threats to your data from both internal and external
sources. Examples: disgruntled employees - leaving bugs behind in your
system, hackers looking to steal confidential information.
 The security program that you create for your business must have
provisions to maintenance and upgrades of your systems
 Administrators have access to all files and data. Therefore, one must be
mindful of who is guarding the guards
 Roles for security should be defined, documented, and implemented for
both your company and external contractors.

3. PROTECT YOUR PERSONAL COMPUTER

If you think that your home computer was safe from outside attacks, think
again. Home computers are as susceptible as office computers to online attacks.
Here are some extremely important guidelines for home computer owners.

1. Use the latest version of a good anti-virus software package that allows
updating from the Internet.
2. Use the latest version of the operating system, web browsers and e-mail
programs.
3. Don't open e-mail attachments unless you know the source. Attachments,
especially executables (those having .exe extension) can be dangerous.
4. Confirm the site you are doing business with. Secure yourself against
"Web-Spoofing". Do not go to websites from email links.
5. Create passwords containing at least 8 digits. They should not be
dictionary words. They should combine upper and lower case characters.

4. FOR PARENTS:

By taking responsibility for your children’s online computer use, parents can
greatly minimize any potential risks of being online.

Make it a family rule to never give out personal information - home address
and telephone number - while chatting or bulletin boards (newsgroup), and be
sure you’re dealing with someone that both you and your child know and trust
before giving out this information via E-mail.  

 Be careful before revealing any personal information such as age, marital


status, or financial information while chatting.
 Never post photographs of your children on web sites or newsgroups that
are available to the public.
 Consider using a fake name, avoid listing your child’s name and E-mail
address in any public directories and profiles, and find out about your
Internet Service Provider’s privacy policies and exercise your options for
how your personal information may be used.
 Get to know the Internet and any services your child uses. If you don’t
know how to log on, get your child to show you. Ask your child show
you what he or she does online, and familiarize yourself with all the
things that you can do online.

IT ACT 2000

MINISTRY OF LAW, JUSTICE AND COMPANY


AFFAIRS (Legislative Department)
New Delhi, the 9th June, 2000/Jyaistha 19, 1922 (Saka)

The following Act of Parliament received the assent of the President on the 9th
June, 2000,
and is hereby published for general information:-
(No. 21 OF 2000)

[9th June, 2000]

An Act to provide legal recognition for transactions carried out by means of


electronic data interchange and other means of electronic communication,
commonly referred to as "electronic commerce", which involve the use of
alternatives to paper-based methods of communication and storage of
information, to facilitate electronic filing of documents with the Government
agencies and further to amend the Indian Penal Code, the Indian Evidence Act,
1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India
Act, 1934 and for matters connected therewith or incidental thereto.

WHEREAS the General Assembly of the United Nations by resolution


A/RES/51/162, dated the 30th January, 1997 has adopted the Model Law on
Electronic Commerce adopted by the United Nations Commission on
International Trade Law;

AND WHEREAS the said resolution recommends inter alia that all States give
favourable consideration to the said Model Law when they enact or revise their
laws, in view of the need for uniformity of the law applicable to alternatives to
paper-cased methods of communication and storage of information;

AND WHEREAS it is considered necessary to give effect to the said resolution


and to promote efficient delivery of Government services by means of reliable
electronic records.
COMPUTER OFFENCES AND RELATED SECTIONS
C
5
6W
V
J
7
,1
P
L
H
Y
T
R
F
E
/
4
A
I
D
E
S
G
N
3
B
K
9
O
)
2
(
M
U
C
I,
C
0
T
z
m
Y
3
L
2
6
(v
g
y
).U
/w
S
5
4
7
o
ic
b
P
tp
n
e
d
fru
h
k
la
s1
R
+
PUNISHMENT FOR OFFENCES

AMENDMENTS STILL TO BE NOTIFIED


EXAMPLE: (E-BAY)
Strict policies on what can and cannot be sold in line with Indian laws and

regulations.

• Drugs & drug paraphernalia

• Firearms

• Fireworks

• Government identification licenses

• Hazardous materials

• Recalled items

• Human parts and remains

• Stocks and other securities

• Stolen property

• TV descramblers
REFERENCES:

http://indiacyberlab.in/cybercrimes/index.html
http://encyclopedia.jrank.org/articles/pages/6625/Information-
Security-Management.html
http://youngminds.com.np/Nepal/1-
ManagementInformationSystem-19.htm
http://www.unapcict.org/ecohub/resources/browse-
resources/legal-and-regulatory-issues
http://www.google.co.in/images?
hl=en&source=hp&biw=981&bih=404&q=information+technolo
gy&gbv=2&aq=1&aqi=g10&aql=&oq=INFOR
http://www.youtube.com/watch?v=b0LpQs5eYl4

You might also like