NowtAdminCase Studiesmodule1Module2Module3Module4Module5Module6Glossary

 
nowtOrganisational StructureLife Cycle of MISCorperate StrategyInformation Data and KnowledgeManagement of ChangeLegal IssuesTrainingProject ManagementInformation and the Professionalnowt
endlegal AspectsAudit RequirementsDisaster RecoveryControlling the SystemRisk AnalysisLegislationH&SQuestions 1Questions 2end
 

Legal aspects

Legal Aspects

An organisation must take active measures to ensure the security of its information systems. Such systems are more vulnerable than paper based systems because:

  • The large amount of data processed makes manual backup impracticable and may result in errors being overlooked
  • Data can be changed without any obvious trace being left of the change.
  • A large number of people may have access to the system and it may be possible for unauthorised users to access the system remotely.
  • The system is developed and maintained by experts. The people using the system are reliant on the user interface. What is actually happening may be understood by only a few of the technical staff.
  • The consequences of system failure are usually far more serious than the loss of data in a manual system.
  • Data is likely to pass through a large number of processing stages than would be the case in a manual system. Controls are needed at each stage to prevent error or abuse.

An organisation, dependent on its information system, needs to take active steps to ensure the integrity of the system by implementing an Information Technology Security Policy. Such a policy is a mechanism for establishing agreed standard for controlling the operation of the information system in a secure way. The policy will outline procedures to be followed, detail the responsibilities and accountabilities of individuals. In addition the policy will make clear the disciplinary procedures and penalties for non-compliance with the policy. The policy then becomes a management tool for ensuring the secure operation of the MIS.

Management will need to ensure that employees are aware of the IT Security Policy and that they comply with its requirements. Awareness can be raised by staff training and by ensuring the proper supervision of staff.

   

© LEV