Information system
by John Bandler
An information system is a group of information assets working together and relates to information, information assets, and technology.
I define it in my 2025 book on Cyberlaw this way:
Information system: A system to collect, process, store, and distribute information. Often used regarding a “computer information system” which involves computers (hardware, software, networks, data).
I define information assets in another article (link at bottom).
Obviously, as you think about individual information assets and how they work with other information assets, things get extremely complex. So before you get overwhelmed with complexities, start simple, with the individual information assets.
Information systems need to be properly managed. We can call that process information governance.
Disclaimer
This article is just a stub, a key term definition.
This article is (of course) not tailored to your circumstances, nor is it legal or consulting advice.
This is to inform and you assume all risk for cybersecurity decisions you make. This is an introduction and more can be written on this topic.
I may explain nuances further in other articles, or one of my books. Other experts may have differing opinions.
Ask ten different IT or IS experts, you will get ten or more different definitions for a term, and as many different recommendations for cybersecurity posture. Cybersecurity is about decisions and risk management.
Conclusion
Information systems are essential, for individuals and organizations. They are part of information systems.
If your organization needs help with improving its cybersecurity, feel free to contact me.
Additional reading
- Information asset
- Information asset inventory
- Information systems (this article)
- Information governance
- Cyberlaw book

- Cybersecurity
- Cybersecurity book (coming 2026 I hope)
- Policies and Procedures Book (includes cybersecurity)

- Bandler's Four Pillars of Cybersecurity
- Cybersecurity Policy (Free Version) (with an incident response plan)
- The Three Priority Cybercrime Threats
- Cybercrime
- Build Bandler's cybersecurity program yourself
- Five Components for Policy Work
- Cybersecurity and Privacy for You and Your Organization
- Cybersecurity for the Home and Office (2017 book)
- Cybercrime Investigations (2020 book)
- Cybersecurity Asset Inventory Forms for the Home
This article is hosted at https://johnbandler.com/information-asset, copyright John Bandler, all rights reserved.
Originally posted 11/26/2025, updated 11/26/2025.
