SlideShare a Scribd company logo
1 of 14
UNIVERSITY OF MYSORE
MANASAGANGOTHRI
FOURTH SEMESTER
Paper : Information Systems and Services
Seminar on : Information Policy
Presented to,
Sunil Kumar, M.
Lecturer Presented By
DOC in Library and Information Science Shalini B.G
Manasagangotri, 2nd year MLISC
Mysuru
• Introduction
• Information policy definition
• History Of Information Policy
• Information Policy Areas
• Objectives of Information Policy
• Types of Information Policy
• Information Policy Activities
• Conclusion
CONTENTS
Introduction
Information policy is the set of all public laws, regulations
and policies that encourage, discourage, or regulate the
creation, use, storage, access, and communication and
dissemination of information. It thus encompasses any other
decision-making practice with society-wide constitutive efforts
that involve the flow of information and how it is processed.
Information Policy Definition
Information policy is a set of policies issued by an organization to
ensure that all information technology users within the domain of the
organization or its networks comply with rules and guidelines related to the
security of the information stored digitally at any point in the network or
within the organization's boundaries of authority.
Information policy determines the kind of information collected,
created, organized, stored, accessed, disseminated and retained. Who can
use the information, whether there will be charges for access, and the
amount charged, is also covered. Usually associated with government
information, information policy also establishes the rules within which
private information providers and the media operate.
History of Information Policy:
The earliest sight of information policy was present
around the mid-1900s. The stages to begin evolving from an
industrial society to an information society sparked several
other transformations. The common industrial technologies
were beginning to be replaced by informational meta-
technologies.
In the 20th century, to cope with the privacy
problems of databases, information policy evolved further
safeguards. In the USA, the federal Privacy Act provides
individuals the right to inspect and correct personal information
in federal data files.
Information policy includes the following areas:
• Literacy
• Privatization and distribution of government
• Information
• Freedom of information access
• Protection of personal privacy
• Intellectual property rights
• Retention of archival copies of material
• Citizen's charter of information rights
Objectives of Information Policy
• To strengthen internal control and prevent unauthorized and improper access to data,
thereby ensuring the appropriate protection of information assets
• To appropriately protect the confidentiality and integrity of information assets
• To ensure that information is not revealed to unauthorized third parties during the
process of transmission or as a result of unintentional actions
• To ensure that all information security accidents or suspected security flaws have
appropriate reporting mechanisms so that superiors are notified and these incidents
are appropriately investigated and handled
Types of Information Policy:
The types of information policy can be separated into two different categories.
There are:-
1. Issues
2. Convergence
1. Issues: There are some issues around organizational
information polices, which are the interaction between human
beings and technology for using information, the issue to proceed
information policy itself, whether to-down or middle-up-down, is
the best way to approach information policy in an organization.
2. Convergence: Convergence essentially combines all forms of
media, telecommunications, broadcasting, and computing by the
use of a single technology: digital computers. It integrates diverse
technological systems in the hopes of improving performance of
similar tasks.
Security vs. freedom of information:
• A persistent debate concerning the government role in information policy
is the separation of security and freedom of information. Legislation such
as the Uniting and Strengthening America by Providing Appropriate Tools
Required to Intercept and Obstruct Terrorism Act of 2001 is an example of
security taking precedence over civil liberties. The USAPA affected several
surveillance and privacy laws to include;
• Wire Tapping which requires there be probable cause for real-time
interception of voice and data communication.
• Electronic Communications Privacy Act(ECPA) regulates government
access to email and other electronic communications.
• Foreign Intelligence Surveillance Act (FISA) authorizes the government
to carry out electronic surveillance against any person, including
Americans.
Information Policy Activities
• A policy is conditioned on the political, economic, social, and cultural
milieu. Policies are value in a number of ways such as they standardize
activities, facilitate
• decision making,
• minimize confusion,
• coordinate the activities of various units,
• conserve time in training.
• It comprehends a set of basic issues which are infrastructure
development,
• information services development,
• utilization of new technologies,
• manpower development and other general recommendations.
Conclusion :
Information policy is playing a greater role in the economy
leading to the production of goods and services, as well as selling them
directly to consumers . The cost of information varies from a tangible
good in that initial costs of the first unit are large and fixed; however,
after that, marginal costs are relatively low . As an increase from the
information services, information can be paralleled to that of
manufacturing several years ago .
Information policy sunil sir

More Related Content

What's hot

Chain indexing
Chain indexingChain indexing
Chain indexing
silambu111
 
Information Repackaging: A Panacea for Libraries and Information Resource Cen...
Information Repackaging: A Panacea for Libraries and Information Resource Cen...Information Repackaging: A Panacea for Libraries and Information Resource Cen...
Information Repackaging: A Panacea for Libraries and Information Resource Cen...
inventionjournals
 

What's hot (20)

Desidoc
DesidocDesidoc
Desidoc
 
Information policy ppt
Information policy pptInformation policy ppt
Information policy ppt
 
Oclc
OclcOclc
Oclc
 
Resource Sharing and Networking
Resource Sharing and NetworkingResource Sharing and Networking
Resource Sharing and Networking
 
Colon Classification: An Overview
Colon Classification: An OverviewColon Classification: An Overview
Colon Classification: An Overview
 
Need, steps and challenges of library automation
Need, steps and challenges of library automationNeed, steps and challenges of library automation
Need, steps and challenges of library automation
 
Greenstone Digital Library
Greenstone Digital LibraryGreenstone Digital Library
Greenstone Digital Library
 
NISCAIR by Jaya Singh
NISCAIR by Jaya SinghNISCAIR by Jaya Singh
NISCAIR by Jaya Singh
 
Unisist ppt
Unisist pptUnisist ppt
Unisist ppt
 
ISBD
ISBDISBD
ISBD
 
eprints digital library software
eprints digital library softwareeprints digital library software
eprints digital library software
 
Modes of formation of subject
Modes of formation of subjectModes of formation of subject
Modes of formation of subject
 
Post coordinate indexing .. Library and information science
Post coordinate indexing .. Library and information sciencePost coordinate indexing .. Library and information science
Post coordinate indexing .. Library and information science
 
NISCAIR.pptx
NISCAIR.pptxNISCAIR.pptx
NISCAIR.pptx
 
Library Automation & Criteria for selection Library Software
Library Automation & Criteria for selection Library SoftwareLibrary Automation & Criteria for selection Library Software
Library Automation & Criteria for selection Library Software
 
Chain indexing
Chain indexingChain indexing
Chain indexing
 
Electronic resource management system (ERM)
Electronic resource management system (ERM)Electronic resource management system (ERM)
Electronic resource management system (ERM)
 
Information Repackaging: A Panacea for Libraries and Information Resource Cen...
Information Repackaging: A Panacea for Libraries and Information Resource Cen...Information Repackaging: A Panacea for Libraries and Information Resource Cen...
Information Repackaging: A Panacea for Libraries and Information Resource Cen...
 
Salient Feature of Maharashtra Public Library Act 1967
Salient Feature of  Maharashtra Public Library Act 1967Salient Feature of  Maharashtra Public Library Act 1967
Salient Feature of Maharashtra Public Library Act 1967
 
IFLA.pptx
IFLA.pptxIFLA.pptx
IFLA.pptx
 

Viewers also liked

ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and PrinciplesICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV
 

Viewers also liked (8)

National Information Policy presentation
National Information Policy presentationNational Information Policy presentation
National Information Policy presentation
 
National information policy
National information policyNational information policy
National information policy
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
 
Introduction to Information Policy
Introduction to Information PolicyIntroduction to Information Policy
Introduction to Information Policy
 
Mos ppt
Mos pptMos ppt
Mos ppt
 
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and PrinciplesICEGOV - Tutorial 1 - Information Policy Concepts and Principles
ICEGOV - Tutorial 1 - Information Policy Concepts and Principles
 
Mass customization
Mass customizationMass customization
Mass customization
 
User experience issues -- Personalization vs. Customization
User experience issues -- Personalization vs. CustomizationUser experience issues -- Personalization vs. Customization
User experience issues -- Personalization vs. Customization
 

Similar to Information policy sunil sir

اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثاني
Bunayan ALdosari
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
jeanettehully
 
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
IJECEIAES
 
Imran research abstract 15042010
Imran   research abstract 15042010Imran   research abstract 15042010
Imran research abstract 15042010
Muhammad Imran Suid
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
Noriha Nori
 

Similar to Information policy sunil sir (20)

hackivism
hackivismhackivism
hackivism
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثاني
 
Week 4 - 6.pdf
Week 4 - 6.pdfWeek 4 - 6.pdf
Week 4 - 6.pdf
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docxRunning head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
Running head GOVERNANCE AND ETHICS 1GOVERNANCE AND ETHICS5.docx
 
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
The Indonesia Public Information Disclosure Act (UU-KIP): Its Challenges and ...
 
Imran research abstract 15042010
Imran   research abstract 15042010Imran   research abstract 15042010
Imran research abstract 15042010
 
ICT-POLICIES-Group-1-Report.pptx
ICT-POLICIES-Group-1-Report.pptxICT-POLICIES-Group-1-Report.pptx
ICT-POLICIES-Group-1-Report.pptx
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
21st Century Policing Presentation
21st Century Policing Presentation21st Century Policing Presentation
21st Century Policing Presentation
 
12 security policies
12 security policies12 security policies
12 security policies
 
Computer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdfComputer_Ethics_importance_of_computer_ethics.pdf
Computer_Ethics_importance_of_computer_ethics.pdf
 
Data Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdfData Privacy and Protection in the Digital Age - pdf.pdf
Data Privacy and Protection in the Digital Age - pdf.pdf
 
Information as element of enforcing the state`s information security
Information as element of enforcing the state`s information securityInformation as element of enforcing the state`s information security
Information as element of enforcing the state`s information security
 
Data Ethics and Privacy.pdf
Data Ethics and Privacy.pdfData Ethics and Privacy.pdf
Data Ethics and Privacy.pdf
 
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptxOVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
OVERVIEW OF DATA PROTECTION AND PRIVACY.pptx
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Impact of ict on privacy and personal data
Impact of ict on privacy and personal dataImpact of ict on privacy and personal data
Impact of ict on privacy and personal data
 
Mobile Internet's "Creative Destruction": Implications for Global Mobile Policy
Mobile Internet's "Creative Destruction": Implications for Global Mobile PolicyMobile Internet's "Creative Destruction": Implications for Global Mobile Policy
Mobile Internet's "Creative Destruction": Implications for Global Mobile Policy
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 

Information policy sunil sir

  • 1. UNIVERSITY OF MYSORE MANASAGANGOTHRI FOURTH SEMESTER Paper : Information Systems and Services Seminar on : Information Policy Presented to, Sunil Kumar, M. Lecturer Presented By DOC in Library and Information Science Shalini B.G Manasagangotri, 2nd year MLISC Mysuru
  • 2.
  • 3. • Introduction • Information policy definition • History Of Information Policy • Information Policy Areas • Objectives of Information Policy • Types of Information Policy • Information Policy Activities • Conclusion CONTENTS
  • 4. Introduction Information policy is the set of all public laws, regulations and policies that encourage, discourage, or regulate the creation, use, storage, access, and communication and dissemination of information. It thus encompasses any other decision-making practice with society-wide constitutive efforts that involve the flow of information and how it is processed.
  • 5. Information Policy Definition Information policy is a set of policies issued by an organization to ensure that all information technology users within the domain of the organization or its networks comply with rules and guidelines related to the security of the information stored digitally at any point in the network or within the organization's boundaries of authority. Information policy determines the kind of information collected, created, organized, stored, accessed, disseminated and retained. Who can use the information, whether there will be charges for access, and the amount charged, is also covered. Usually associated with government information, information policy also establishes the rules within which private information providers and the media operate.
  • 6. History of Information Policy: The earliest sight of information policy was present around the mid-1900s. The stages to begin evolving from an industrial society to an information society sparked several other transformations. The common industrial technologies were beginning to be replaced by informational meta- technologies. In the 20th century, to cope with the privacy problems of databases, information policy evolved further safeguards. In the USA, the federal Privacy Act provides individuals the right to inspect and correct personal information in federal data files.
  • 7. Information policy includes the following areas: • Literacy • Privatization and distribution of government • Information • Freedom of information access • Protection of personal privacy • Intellectual property rights • Retention of archival copies of material • Citizen's charter of information rights
  • 8. Objectives of Information Policy • To strengthen internal control and prevent unauthorized and improper access to data, thereby ensuring the appropriate protection of information assets • To appropriately protect the confidentiality and integrity of information assets • To ensure that information is not revealed to unauthorized third parties during the process of transmission or as a result of unintentional actions • To ensure that all information security accidents or suspected security flaws have appropriate reporting mechanisms so that superiors are notified and these incidents are appropriately investigated and handled
  • 9. Types of Information Policy: The types of information policy can be separated into two different categories. There are:- 1. Issues 2. Convergence
  • 10. 1. Issues: There are some issues around organizational information polices, which are the interaction between human beings and technology for using information, the issue to proceed information policy itself, whether to-down or middle-up-down, is the best way to approach information policy in an organization. 2. Convergence: Convergence essentially combines all forms of media, telecommunications, broadcasting, and computing by the use of a single technology: digital computers. It integrates diverse technological systems in the hopes of improving performance of similar tasks.
  • 11. Security vs. freedom of information: • A persistent debate concerning the government role in information policy is the separation of security and freedom of information. Legislation such as the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 is an example of security taking precedence over civil liberties. The USAPA affected several surveillance and privacy laws to include; • Wire Tapping which requires there be probable cause for real-time interception of voice and data communication. • Electronic Communications Privacy Act(ECPA) regulates government access to email and other electronic communications. • Foreign Intelligence Surveillance Act (FISA) authorizes the government to carry out electronic surveillance against any person, including Americans.
  • 12. Information Policy Activities • A policy is conditioned on the political, economic, social, and cultural milieu. Policies are value in a number of ways such as they standardize activities, facilitate • decision making, • minimize confusion, • coordinate the activities of various units, • conserve time in training. • It comprehends a set of basic issues which are infrastructure development, • information services development, • utilization of new technologies, • manpower development and other general recommendations.
  • 13. Conclusion : Information policy is playing a greater role in the economy leading to the production of goods and services, as well as selling them directly to consumers . The cost of information varies from a tangible good in that initial costs of the first unit are large and fixed; however, after that, marginal costs are relatively low . As an increase from the information services, information can be paralleled to that of manufacturing several years ago .