Professional Documents
Culture Documents
Regulatory and Legal Issues in Informational Management System
Regulatory and Legal Issues in Informational Management System
Regulatory and Legal Issues in Informational Management System
ISSUES IN
INFORMATIONAL
MANAGEMENT SYSTEM
(MIS)MANAGEMENT INFORMATION SYSTEM
MAMTA DHAND
MANIK SINGH
MANU PANWAR
MANVEEN ARNEJA
MOHD.ARSHAD KHAN
MOHITA AGARWAL
NAMRATA MEDHI
● ● ●
ACKNOWLEDGEMENT
We would like to thank our Project Guide MRS. PARUL SINHA for her
immense guidance, valuable help and the opportunity provided to us to
complete the project under her guidance.
Any accomplishment requires the effort of many people and happens to be the
synergetic product of many minds. The project is a team-work of 9 students
who have put their heart & soul in making it.
Above all we have no words to express gratitude to the almighty GOD who
blessed us the wisdom and enlightened us to complete this project.
WHAT IS MIS?
IMPORTANCE OF MIS:
The organization that uses MIS is able to record, process, route &
tabulate all important business transactions. As & when need arises the
organization is able to incorporate the needed changes & improvements
in the area of concern.
MIS facilitates informed DECISION MAKING. It usually represents a
number of options from which one can choose the best.
The top management ANALYSES whether its resources are being
utilized optimally.
A TWO WAY COMMUNICATION FLOW is greatly enhanced by the
MIS. The management freely tells the job responsibilities to its
employees. The employees in return discuss their doubts & grievances.
MIS supports the planning & controlling function of managers in the
organization. Managers use past/historical data as well as the current data
to analyse the performance & hence apply controlling measures.
MIS encourages DECENTRALISATION in the organisation.
Decentralisation is possible when there's a system to measure operations
at the lower levels.
It brings COORDINATION. It facilitates integration of specialized
activities by keeping each department aware of the problems &
requirements of other departments.
It is not a surprise that Cyber Crimes like money cyber stalking, denial of
service, e-mail abuse, chat abuse and other crimes are on the rise. Cyber
Terrorist and cyber mafia are emerging with great force, whose activities are
going to threaten the sovereignty of nations and world order.
Purposes of hacking
Greed
Power
Publicity
Revenge
Adventure
Desire to access forbidden information
Destructive mindset
4. ONLINE FRAUD:
The net is a boon for people to conduct business effectively, very quickly.
It saves businesses a lot of time, money and resources. Unfortunately, the
net is also an open invitation to scam and fraudsters and online frauds are
becoming increasingly rampant.
5. CHILD PORNOGRAPHY:
Child pornography is a very unfortunate reality of the Internet. The
Internet is being highly used by its abusers to reach and abuse children
sexually, worldwide.
The Internet is very fast becoming a household commodity in India. Its
explosion has made the children a viable victim to the cyber crime. As
more homes have access to Internet, more children would be using the
Internet and more are the chances of falling victim to the aggression of
pedophiles.
Insiders
Hackers
Virus Writers
Disgruntled employees and ex-employees,
spouses, lovers
Crack into networks with malicious intent
Pose serious threats to networks and systems
worldwide
Foreign Intelligence: - ٠ Use cyber tools as part of their services
Use cyber tools as part ٠ For espionage activities
of their Services ٠ Can pose the biggest threat to the security of
another country
Terrorists Use to formulate plans, to raise funds, propaganda
1.GENERAL TIPS:
2. CORPORATES TIPS:
If you think that your home computer was safe from outside attacks, think
again. Home computers are as susceptible as office computers to online attacks.
Here are some extremely important guidelines for home computer owners.
1. Use the latest version of a good anti-virus software package that allows
updating from the Internet.
2. Use the latest version of the operating system, web browsers and e-mail
programs.
3. Don't open e-mail attachments unless you know the source. Attachments,
especially executables (those having .exe extension) can be dangerous.
4. Confirm the site you are doing business with. Secure yourself against
"Web-Spoofing". Do not go to websites from email links.
5. Create passwords containing at least 8 digits. They should not be
dictionary words. They should combine upper and lower case characters.
4. FOR PARENTS:
By taking responsibility for your children’s online computer use, parents can
greatly minimize any potential risks of being online.
Make it a family rule to never give out personal information - home address
and telephone number - while chatting or bulletin boards (newsgroup), and be
sure you’re dealing with someone that both you and your child know and trust
before giving out this information via E-mail.
IT ACT 2000
The following Act of Parliament received the assent of the President on the 9th
June, 2000,
and is hereby published for general information:-
(No. 21 OF 2000)
AND WHEREAS the said resolution recommends inter alia that all States give
favourable consideration to the said Model Law when they enact or revise their
laws, in view of the need for uniformity of the law applicable to alternatives to
paper-cased methods of communication and storage of information;
regulations.
• Firearms
• Fireworks
• Hazardous materials
• Recalled items
• Stolen property
• TV descramblers
REFERENCES:
http://indiacyberlab.in/cybercrimes/index.html
http://encyclopedia.jrank.org/articles/pages/6625/Information-
Security-Management.html
http://youngminds.com.np/Nepal/1-
ManagementInformationSystem-19.htm
http://www.unapcict.org/ecohub/resources/browse-
resources/legal-and-regulatory-issues
http://www.google.co.in/images?
hl=en&source=hp&biw=981&bih=404&q=information+technolo
gy&gbv=2&aq=1&aqi=g10&aql=&oq=INFOR
http://www.youtube.com/watch?v=b0LpQs5eYl4