{"id":3622,"date":"2013-05-06T20:26:01","date_gmt":"2013-05-06T20:26:01","guid":{"rendered":"http:\/\/research-methodology.net\/?p=3622"},"modified":"2013-05-04T06:30:21","modified_gmt":"2013-05-04T06:30:21","slug":"information-system-management-and-legal-considerations","status":"publish","type":"post","link":"https:\/\/research-methodology.net\/information-system-management-and-legal-considerations\/","title":{"rendered":"Information System Management and Legal Considerations"},"content":{"rendered":"<p><a href=\"http:\/\/research-methodology.net\/wp-content\/uploads\/2013\/05\/Information-System-Management-and-Legal-Considerations.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-3623\" title=\"Information System Management and Legal Considerations\" src=\"http:\/\/research-methodology.net\/wp-content\/uploads\/2013\/05\/Information-System-Management-and-Legal-Considerations-150x150.png\" alt=\"Information System Management and Legal Considerations \" width=\"150\" height=\"150\" srcset=\"https:\/\/rm-15da4.kxcdn.com\/wp-content\/uploads\/2013\/05\/Information-System-Management-and-Legal-Considerations-150x150.png 150w, https:\/\/rm-15da4.kxcdn.com\/wp-content\/uploads\/2013\/05\/Information-System-Management-and-Legal-Considerations-100x100.png 100w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a>Being updated with the relevant legislations is the main responsibility of organisational managers in dealing with the legal aspects of firm\u2019s information system. Moreover, major legal areas of information systems to be addressed by managers include Data Protection Act(1998), appropriate dealings with intellectual properties, abiding to relevant contractual obligations and safeguarding the firm from breaching relevant criminal and civil laws.<\/p>\n<p>&nbsp;<\/p>\n<p>Main legal requirements of dealing with information in UK are specified in Data Protection Act (1998) and these are formulated through eight main principles. Neglecting or abusing these principles can result in civil or criminal charges for firms involved.<\/p>\n<p>The present age of information is causing the importance of management information systems to increase at a rapid pace and this tendency is expected to continue in the foreseeable future. Moreover, today firms have an opportunity of increasing the level of their competitiveness through increasing the level of information systems in decision making at strategic and operational levels.<\/p>\n<p>However, there is a set of important security, ethical and legal implications of management information systems discussed in this paper that should not be neglected by organisational managers. Neglecting or abusing these security, ethical and legal aspects of information systems can result in highly negative implications for the company such as damage to the brand image, loss of customer loyalty, or even civil or criminal prosecution in some instances.<\/p>\n","protected":false},"excerpt":{"rendered":"<a href=\"https:\/\/research-methodology.net\/information-system-management-and-legal-considerations\/\"><img decoding=\"async\" width=\"150\" src=\"\" class=\"alignleft wp-post-image tfe\" alt=\"\" title=\"\" \/><\/a><p>Being updated with the relevant legislations is the main responsibility of organisational managers in dealing with the legal aspects of firm\u2019s information system. Moreover, major legal areas of information systems to be addressed by managers include Data Protection Act(1998), appropriate dealings with intellectual properties, abiding to relevant contractual obligations and safeguarding the firm from breaching relevant criminal and civil laws. &nbsp; Main legal requirements of dealing with information in UK are specified in Data Protection Act (1998) and these are formulated through eight main principles. Neglecting or abusing these principles can result in civil or criminal charges for firms involved. The present age of information is causing the importance of management information systems to increase at a rapid pace and this tendency is expected to continue in the foreseeable future. Moreover, today firms have an opportunity of increasing the level of their competitiveness through increasing the level of information systems in decision making at strategic and operational levels. However, there is a set of important security, ethical and legal implications of management information systems discussed in this paper that should not be neglected by organisational managers. Neglecting or abusing these security, ethical and legal aspects of information systems can result in highly negative implications for the company such as damage to the brand image, loss of customer loyalty, or even civil or criminal prosecution in some instances.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[104],"yst_prominent_words":[],"_links":{"self":[{"href":"https:\/\/research-methodology.net\/wp-json\/wp\/v2\/posts\/3622"}],"collection":[{"href":"https:\/\/research-methodology.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/research-methodology.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/research-methodology.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/research-methodology.net\/wp-json\/wp\/v2\/comments?post=3622"}],"version-history":[{"count":0,"href":"https:\/\/research-methodology.net\/wp-json\/wp\/v2\/posts\/3622\/revisions"}],"wp:attachment":[{"href":"https:\/\/research-methodology.net\/wp-json\/wp\/v2\/media?parent=3622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/research-methodology.net\/wp-json\/wp\/v2\/categories?post=3622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/research-methodology.net\/wp-json\/wp\/v2\/tags?post=3622"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/research-methodology.net\/wp-json\/wp\/v2\/yst_prominent_words?post=3622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}