Eis - Summary Notes
Eis - Summary Notes
2
EIS 1.O
SUMMARY
NOTES ON EIS
Edition 1
Contents
Chapter 1 : Automated Business Process................................................................................................................ 3
Benefits of Business Process Automation Process which requires Business Process Automation
Time-sensitive processes
The streamlined processes eliminate wasteful activities and focus
on enhancing tasks that add value.
RISKS
Types of Risks
•Potential events that •Entire ERM process •This encompasses •Relevant information
might have an impact should be monitored tone of an is identified,
on entity should be and modified organisation & sets captured and
identified. wherever necessary. the basis of how risk communicated in a
is viewed and form and stipulated
addressed by an time frame .
entity’s people.
•Policies & •Risks which are •Management selects •ERM should ensure
procedures that are identified are an approach to align that management
established by analyzed to form assessed risk with has a process in
company ensures basis of determining entity’s risk place to set
that risk responses how they should be tolerance and risk objectives.
that mgmt. selected managed. appetite.
are effectively
carried out.
CONTROLS
Classification of controls-
• General Controls
• Application Controls
Objectives of IT controls-
Statement of desired result or purpose to
be achieved by implementation of
control procedures within a particular IT
activity.
• Monitoring:
Code to Remember: C.A.R .E .S 2 2 Ongoing & separate evaluations or some
combinations are used to ascertain whether each of
• Clear communication to management. the 5 components are present & functioning.
• Availability and reliability. • Information & communication:
• Resources allocation. Info. Is necessary for entity to carry out internal
• Recovery from new vulnerabilities. control responsibilities to achieve the objectives.
• Execution of new work. • Control activities:
Actions which are established through policies &
• Effective development of projects.
procedures that help ensure that mgmt.’s directive
• Security awareness on the part of the users. to mitigate risks.
• Risk assessment:
Basis for determining how risks will be managed.
• Control environment:
Set of standards, processes and structures that
provide basis of carrying out internal control across
the organisation.
Definitions
Name Description
“Access” Means gaining entry into, instructing or communicating with the logical, arithmetical, or
memory function resources of a computer, computer system or computer network
“Computer” Means any
Electronic, magnetic, optical or other high-speed data processing device;
Or system which performs logical, arithmetic, and memory functions by manipulations
of electronic, magnetic or optical impulse;
And includes all input, output, processing, storage, computer software;
Or communication facilities which are connected or related to the computer in a
computer system or computer network.
“Computer Means the interconnection of one or more Computers or computer systems or
Network” Communication device through:
(i) the use of satellite, microwave, terrestrial line, wire, wireless or other
communication media; and
(ii) Terminals or a complex consisting of two or more interconnected computers or
communication device whether or not the interconnection is continuously
maintained
“Information” Includes data, message, text, images, sound, voice, codes, computer program,
software and databases or micro film or computer-generated micro fiche.
“Data” Means:
1. A representation of information, knowledge, facts, concepts or instructions which
are being prepared or have been prepared in a formalized manner
2. Intended to be processed, is being processed or has been processed in a computer
system or computer network and may be in any form (including computer printouts
magnetic or optical storage media, punched cards, punched tapes) or stored
internally in the memory of the computer.
Non-integrated system-
System elements are not inter-linked and inter
dependent.
Types of Data
Application Software-
Application software performs many functions such as receiving the inputs from the user, interprets the
instructions and performs logical functions so a desired output is achieved. There are mainly 3 layers which
together form an application and as such called Three Tier architecture. These 3 layers are:
Application layer Operating system layer Database layer
PROCESS ASPECT
Aspects Risk Associated Control Required
Program There could be a possibility of information Requires bridging the information gap
Management gap between day-to-day. between traditional ERP-based function &
operational mgmt. functions.
Business Process BPR means not just change but dramatic Requires overhauling of organizational
Reengineering change and dramatic improvements. structure, management structure and
(BPR) systems, job descriptions etc.
TECHNOLOGICAL ASPECT
Aspects Risk Associated Control Required
Software Implementing all the functionality and Care should be taken to incorporate features
Functionality features just for the sake of it can be that are required by organization & other
dangerous for an organization. functionality that might be required.
Technological With launch of efficient technologies Requires critical choice of technology,
Obsolescence every day, ERP system also becomes architecture of product, easy enhancements
obsolete as time goes on. and upgrading, quality of vendor support.
Enhancement ERP Systems are not upgraded and kept Care must be taken while selecting the vendor
and Upgrades up-to date. Patches & upgrades are not and upgrade/support contracts should be
installed signed to minimize the risks.
Application Processes focus on selection of new IT organizations can begin to reduce
Portfolio Mgmt. business applications and the projects. duplication and complexity.
IMPLEMENTATION ASPECT
Aspects Risk Associated Control Required
Lengthy ERP projects are lengthy that takes Care must be taken to keep the momentum
implementation between 1 to 4 years depending upon high and enthusiasm live amongst the
time size of entity. employees, so as to minimize the risk.
Insufficient Budget for ERP implementation is It is necessary to allocate necessary funds for
Funding allocated without consulting the the ERP implementation project and then
experts & then implementation is allocate some more for contingencies.
stopped due to lack of funds.
Speed of Centralized database leads to heavy size This can be controlled by removing the
Operation and thereby reducing speed of redundant data, use of warehouse etc.
operations.
ERP systems should produce accurate, complete, and authorized information that is
supportable and timely. All these can be accomplished or achieved by combination of various
controls in ERP system. Controls are divided into General Controls and Application Controls.
Below is the diagrammatic representation of controls.
Audit of ERP system
Management Controls
controls deal with
organizations,
policies, procedures,
planning, and so on General Application
Controls Controls
Business Processes
Accounting & book keeping Source Document Journal Ledger Trial Balance
Adjustments Adjusted Trial balance Closing entries
financial statement.
DATA ANALYTICS is the process of examining data sets to draw conclusions about the information
they contain. Various software and techniques are used to draw meaningful conclusion out of
information we have. Types of Data Analytical applications:
Business Intelligence
Business Intelligence (BI) is a technology-driven process for analyzing
Meaning data and presenting actionable information and contains variety of tools
and applications to do so.
BI uses data from different sources and helps to find solutions to various
questions.
Examples of BI
Online transaction processing & online analytical processing is the
example of BI.
1. XBRL Tagging is process by which any financial data is tagged with most appropriate element in an
accounting taxonomy,
2. Represents the data in addition to tags that facilitate identification/classification (such as enterprise,
reporting period, reporting currency, unit of measurement etc.)
3. Comprehensive definitions & accurate data tags allow preparation, validation, publication, exchange,
consumption; & analysis of business information of all kinds.
Regulatory Compliance describes the goal that organizations aspire to achieve in their efforts to ensure
that they are aware of and take steps to comply with relevant laws, policies, and regulations. Below are 2
types of software which have both negative and positive aspects:
S. N. Particulars Accounting & Tax Compliance Software Only Tax Compliance Software
1 Ease of software Less - As this is integrated system More - As this is used only for one
operation of accounting & tax compliance, single purpose so it is less
everything connected with other complicated and bound to be easy.
and making changes at one place
may affect other aspects also.
2 Features and Less - Since this system is not an More - Since this is an exclusive
facilities exclusive system for tax designed system for tax
compliance, it may have limited compliance, more features &
features for tax compliance. facilities shall exist here.
3 Time and efforts Less - Since this is an integrated More - Since this is separate
required system, time required to transfer software, data from accounting
data to compliance software is software need to put. This may
zero. take extra time and efforts.
4 Accuracy More - As this is an integrated Less - There are two separate
system and hence accounting data system, reconciliation with
and tax compliance data shall accounting data is needed,
always be same, ensuring more possibility of mismatch of data is
accuracy in data. always there.
5 Cost More - If tax compliance feature is Less - Since this is specific purpose
not available in accounting system, software, there shall be less
getting it customized may require complications and the cost also
good amount of money. shall be less.
Charts of Differences
Achieving program/data
Security improvement
independency
•In a DBMS, data does •DBMS allows multiple
not resides in users to access same
applications but data data resources which
base program & data could lead to risk to an
are independent of enterprise if not
each other . controlled.
2. Computational Power:
• If the processing is distributed amongst computer systems, the computational power of
the application increases.
3. Reliability:
• It refers to the ability of a network to recover from any kind of error like connection
failure, loss of data etc.
4. User Communication:
• Network allows users to communicate using email, newsgroup, video conferencing etc.
5. Nature of information:
• There are situations where information must be distributed geographically.
• Accounting information of various customers could be distributed across various
branches but to make consolidated Balance Sheet at the year- end, it needs networking
to access information from all its branches.
Code to Remember: A. - S. L. I. C. K.
Increased the ability
For storing all financial
to capture, store, Absence
Absenceofof Inadequate
InadequateSecurity
Security
records centrally
analyze and process controls
controls functionalities
functionalities
•Absence
•Absence oror •Inappropriate
•Inappropriate
inadequate
inadequate IS IS
control
control technology
technology
For information integrity, reliability framework
framework and
and also
also implementations
implementations oror
and validity for timely flow of lack
lack
oror
weak
weakgeneral
general inadequate
inadequatesecurity
security
accurate information throughout the controls
controlsand
and
IS IS functionality
functionality
inin
organization. controls.
controls. technologies
technologies
implemented
implemented
Lack
Lackofofmgmt.
mgmt. Implementation
Implementation
understanding
understanding complexities
complexities
•Lack
•Lackofof
management
management •Complexities
•Complexitiesofof
Classification of information system understanding
understanding ofof
ISIS implementation
implementation ofof
controls risks
risks
and
andrelated
related controls
controls
inin
controls
controls distributed
distributed
computing
computing
environments
environments and
and
extended
extended enterprises
enterprises
Objectives of controls
▪ These controls prevent errors, ▪ These controls are designed to ▪ It is desirable to correct
omissions, or security incidents detect errors, omissions or errors, omissions, or
from occurring. malicious acts that occur and incidents once they have
▪ Examples: sometimes we came report the occurrence. been detected. This includes
across some security checks ▪ Detective controls include correction of data-entry
where passwords should not monitoring and analysis to errors, to identifying and
include name, data entry that uncover activities or events that removing unauthorized users
should alphabetically word in case exceed authorized limits or or software from systems or
of numeric field etc. violate known patterns in data. networks, to recovery from
▪ Control can be implemented in ▪ A scenario: A detective control incidents etc.
both manual and computerized may identify account numbers of ▪ These corrective processes
environment. inactive accounts or accounts that also should be subject to
▪ Examples: Segregation of duties; have been flagged for monitoring preventive and detective
Access control; Vaccination of suspicious activities. controls, because they
against diseases; Documentation ▪ Cash counts; Bank reconciliation; represent another
etc. Review of payroll reports; opportunity for errors,
Compare transactions on reports omissions, or falsification.
to source documents, Hash totals, ▪ Example: A Business
Past-due accounts report etc. Continuity Plan (BCP);
Backup procedure etc.
iv Physical Access
▪ These controls aimed at ▪ These are the controls relating to ▪ These are Controls
controls relating to
controlling IT environment such physical security of the tangible logical access to information
as power, air-conditioning, IS resources and intangible e Controls
resources such as operating
Uninterrupted Power Supply resources stored on tangible systems controls, software
(UPS), smoke detection, fire- media. boundary controls etc.
extinguishers etc. ▪ Examples of physical access ▪ Logical access controls are
controls: Security guards, door implemented to ensure that
alarms, restricted entry to secure access to systems, data &
areas, visitor logged access, programs is restricted to
CCTV monitoring etc. authorized user.
Password
User Netwok Mobile
Password use management
controlling
registration Seggregation system
Unattended User
Privilege Call Back Monitor System
user identification &
Users
Management Services authentication
equipment
Review of Network
Duress alarm to Clock
user access connection
safeguard users Synchronization
rights Controls
Enforced
Access Token Event Logging
Path
Security of
Terminal Sensitive
network system isolation
services
time out
Access
Firewall
Control
Log-in
Encryption
procedures
Control List
Quality Assurance
Management
Controls
Programming Operation
Mgmt. Controls Planning Control Design Coding Testing and
Maintenance
Data Resource
Quality Access Definition Update
Management Controls Controls Controls Controls
Controls
Concurrency Existence/Back
Controls up Controls
Quality Assurance
Quality of Trend of
Management Cost factor Project driven
Software improvement
Controls
Safety critical
system
Input Validation of
Data Code
Controls Controls
Batch Controls Data Input
Control
Controls over
Subversive threats
Application
Processing Processor Real Memory Virtual Memory
Software
Controls Controls Controls Controls
Controls
Output
Batch Output Batch Report Online output
Controls Inference Controls
Controls Design Controls Controls
Computers are used extensively to process data and to provide information for decision-making. Since
computers play a large part in assisting us to process data and to make decisions, it is significant that
their use is in controlled manner.
COST OF INCORRECT
COST OF DATA LOSS DECISION MAKING
COST RELATED
Maintenance of Privacy
Controlled evolution of
computer Use
Tools of IS Audit
Audit Trail & controls framework (Nature of IS resources – 2nd classification type)
Meaning of Database -
A Database Model is a type of data model that determines the logical structure of a database and
fundamentally determines in which manner data can be stored, organized & manipulated.
Database model-
Below are 4 types of models related to database:
Database models
The term refers to such massively large data sets Data warehouse is a concept starting with
that conventional database tools do not have extract data from one or more of the
the processing power to analyze them. Storing organization’s databases and load it into the data
and analyzing that much data is beyond the warehouse (which is itself another database) for
power of traditional database-management storage and analysis. Below is the process flow-
tools. Hence there is requirement of developing • This stage involves extracting the data from
such tools that are able to collect, store and various sources such as ERP systems used,
analysis. databases etc.
• Data so extracted is placed in temporary area
Benefit of big data processing- called Staging Area where it is transformed like
• Ability to process Big Data brings in multiple sorting, filtering etc.
benefits. • Involves loading of transformed data into a
• Improved customer service data warehouse which itself is another
• Better operational efficiency database for storage & analysis.
Data Mining Approaches while designing a data warehouse
• Data Mining is the process of analyzing data
to find out unknown trends, patterns, and Bottom-Up Approach Top-Down Approach
associations to make decision. It is Starts by creating small Suggests that we
accomplished through automated means data warehouses, called should start by creating
against extremely large data sets. data marts, to solve an enterprise-wide data
specific business problems. warehouse
• Example of data mining→Analysis of sales of As these data marts are Specific business needs
created, they can be are identified, create
a month by a super market store about the combined into a larger data smaller data marts from
product which is sold most. warehouse. the data warehouse.
• Below are the steps involved in data mining- Advantages of Data Warehouse (U.C.- D.A.T.)
▪ Data Integration
▪ Data Selection Heading Descriptions
▪ Data Cleaning
▪ Data Transformation Understanding Process of developing a data
▪ Data Mining the data warehouse requires an entity to
▪ Pattern Evaluation & Knowledge Presentation better understand collected data.
▪ Decisions / Use of Discovered Knowledge Consistency Once all data is identified as
of Data consistent, an entity can easily
report consistent statistics.
Data Data warehouse provides a
centralization centralized view of all data which is
collected across business.
Analysis of Data warehouse provides a
Information centralized view of all data which is
collected across business.
Trend analysis Having data warehouse, snapshots
of data can be taken over time.
Thus creates a historical record.
Benefits of E-commerce
Disadvantage of E-commerce
Food &
Cost of Internet insoect Security
Legal Issues Fraud Fear
components Connection related Concerns
Items
Components of E-commerce
Components of E-commerce
Denial of
Infrastructure Attack from
service
hackers
Contract
Hidden Cost
Repudiation
Privacy and
Absence of Loss or theft security
Audit trail of data
Below are the controls need to be implemented while doing an e-commerce transaction-
Sellers / Buyers / •Proper framework in place to ensure success of business and needs to
Merchants put controls on price, catalogue, discount schemes etc
Network Service
• They need to ensure availability and security of network
Providers
Technology Service •Includes cloud computing back- ends, applications backends and
Providers like. They are also prone to risk of availability and security
Logistics Service •Logistics service providers are the ones who are finally
Providers responsible for timely product deliveries
But sometimes it is observed that “though” controls are in place and yet “threats” happens. In this
case following steps to be taken in order to minimize the risk of failure of controls-
Viruses:
- Privacy Policies In India, RBI has been Hackers:
Frequency and nature of - Information security releasing these
standards from time to Passwords
education programs Shipping and billing time. Regular software
policies updates
-Refund policies Sensitive data
Consumer Protection
Factories Act, 1948
Act, 1986
Digital Payments
Disadvantages-
1. Difficult for a Non-technical person:
• Payment through internet mode is difficult for non-
technical persons such as farmers, workers etc.
2. Over-spending:
• With digital payment mode, one has an access to
all his/her money that can result in overspending.
3. Theft risk:
• Hackers can hack the servers of the bank or the E-
Wallet a customer is using.
4. Increased business costs:
• Costs incurred in procuring & maintaining
sophisticated payment-security technologies.
Computing Technologies
Virtualization:
Virtualization means to create a virtual version of a device or resource such as a server, storage device,
network or even an operating system where the framework divides resource into one or more execution
environment.
Grid computing:
Grid Computing is a computer network in which each computer’s resources are shared with every other
computer in the system. In the ideal grid computing system, every resource is shared, turning a computer
network into a powerful supercomputer.
Code to Remember: U.R. - V.R. - C.A.M Computation: Computing cycles provided by the
1. Underutilized Resources usage. processors of machines on grid, where processors can
2. Resource Balancing. vary in speed, architecture & other factors.
3. Virtual Resources. Storage: A grid providing an integrated view of data
storage is sometimes called a Data Grid. Each machine
4. Reliability. on grid usually provides some storage for grid use
5. CPU Capacity. Communications: Communications within the grid are
6. Access to resources. important for sending jobs and their required data to
7. Management. points within the grid.
Software and Licenses: License management software
keeps track of how many concurrent copies of the
software are being used and prevents more than that
number from executing at any given time.
Special equipment, capacities, architectures & policies:
Platforms on grid may have different architectures,
operating systems, devices, capacities, & equipment
Cloud computing:
“The Cloud” refers to applications, services, and data storage on the Internet. Cloud computing is the use of
these services by individuals and organization. The best example of cloud computing is Google Apps, where
it can be opened on any web browser and application can be installed. Cloud computing is both, a
combination of software and hardware-based computing resources delivered as a networked service. This
model of IT enabled services enables anytime access to a shared pool of applications and resources.
Code to Remember: G –
Code to Remember: F.R.A.M.E.S. Code to Remember:
M.P. – M.O.R.E - Globalize workforce D.R.I.N.K.
• Movement of workload - Flexibility improvement 1. Difficult in Interoperability.
• Pay per use - Reduce spending on 2. Restriction on availability.
• Multi-tenancy technology infrastructure 3. Internet connection absence.
• On-Demand - Accessibility 4. No control on resources.
- Monitoring of projects 5. Knocking of security
• Resiliency (लचीला) measures.
- Economies of scale.
• Elasticity and scalability - Streamline business processes.
Mobile computing:
A technology that allows transmission of data, via a computer, without having to be connected to a fixed
physical link. Mobile voice communication is widely established throughout the world and has had a very rapid
increase in the number of subscribers to the various cellular networks over the last few years. An extension of
this technology is the ability to send and receive data across these cellular networks.
Mobile Communication
Mobile Hardware
Mobile Software
Definition- Definition-
It is a system of interrelated computing devices, Ability to use memory, knowledge, experience,
mechanical and digital machines, objects, understanding, reasoning, imagination and
animals or people that are provided with unique judgment to solve problems and adapt to new
identifiers and the ability to transfer data over a situations”. The ability described above when
network. exhibited by machines is called as Artificial
intelligence (AI).
Some Definitions under IoT:
Application of AI-
- Wearables - Smart City ◼ Games playing
- Smart Grids - Industrial IoT ◼ Online assistants
- Connected Car - Connected health ◼ Theorems of mathematics.
- Smart Retails - Smart supply chain ◼ Medical diagnosis, in cancer research.
Predicting the chances of an individual getting
ill by a disease.
Risks of IoT: ◼ Art
◼ Drones and self-driving cars
Impact on Business
Obsolescence of devices
Risks associated with AI-
Analytics & Data storage
Security ◼ AI relies heavily of data it gets.
Autonomy, Privacy & control ◼ AI (robots) carries a security threat
De-standardization ◼ These machines shall not have capability of
Impact on environmental resources thinking out of box
Block Chain
Blockchain is shared, peer-to-peer & decentralized open ledger of transactions system with no trusted third
parties in between. A blockchain generally uses a chain of blocks, with each block representing the digital
information stored in public database
1. • Communication methods
Transaction initiated. - Financial Services
2. Transaction broadcasted. shall be developed.
- Healthcare • Data analytics procedures
3. Validation of transactions.
- Government shall be developed to identify
4. Transaction represented
online as a block. - Travel Industry & obtain relevant data.
5. Block added to the block - Economic Forecast • Both internal and external
chain. Auditors shall be engaged in
Risks of Blockchain development.
6. Block is added to existing
1. Different risk magnitude. • Monitoring techniques shall
2. Compromise with data. be used to perform ongoing
3. Absence of central monitoring. evaluations.
4. Overload of information.
Remittances
Collecting
Collections
Clearing
Banks accept Advances granted Remittances Collections instruments on
deposits in various by banks take involve transfer of involve collecting behalf of
forms such as term various forms such funds from one customers of
deposits, savings as overdrafts, proceeds on
place to another. behalf of bank. The
bank deposits, discounting of bills, Eg demand drafts, instruments
current account term loans, etc. customer. They
Mail transfer, can lodge various payable locally
deposits, recurring
Electronic Fund are collected
deposit etc. instruments such
Transfer. through clearing
as cheques, drafts
house mechanism
Guarantees
CBS risks
Compliance Risk
•is exposure to legal penalties, financial penalty and
material loss an organization faces when it fails to act in
accordance with industry laws and regulations.
Treasury Process
Below are 3 major categories of treasury operations:
The dealers are primarily Responsibilities also includes One of the developments in
responsible to check for producing the financial results, the back office has been the
counter-party credit Limits, analysis and budget forecasts advent (arrival) of Straight-
eligibility, and other for the treasury business unit, Through Processing (STP), also
requirements of the Bank input into the regulatory called ‘hands-off’ or exception
before entering into the deal reporting. processing.
with the customers.
Dealers must ensure that all Responsible for monitoring of Critical operation is FOBO
risk/credit limits are available counter-party, country, dealer (Front Office/Back Office)
before entering into a deal. and market-related limits that reconciliation to ensure
have been set and approved. completeness and accuracy of
trades/ deals done for the day.
Money Laundering
Money Laundering is the process by which the proceeds of the crime and the true ownership of those
proceeds are concealed or made opaque (अस्पष्ट /Not clear) so that the proceeds appear to come from a
legitimate source.
Meaning
Money Laundering is the process by which the proceeds of the crime and the true ownership of those
proceeds are concealed or made opaque (अस्पष्ट /Not clear) so that the proceeds appear to come from a
legitimate source.
Stages
Placement:
First stage involves the placement of proceeds derived from illegal activities, the movement of proceeds
from scene of the crime to a place, or into a form, less suspicious and more convenient for the criminal.
Layering:
This involves the separation of proceeds from illegal source using complex transactions designed to
obscure the audit trail and hide the proceeds. Layering involves sending the money through various
financial transactions to change its form and make it difficult to follow.
Integration:
Integration involves conversion of illegal proceeds into apparently legitimate business earnings through
normal financial or commercial operations.
Sensitive Personal Data Reasonable Security Practices and Procedures and Sensitive
Information (SPDI) Personal Data or Information Rules 2011 formed under section 43A
of the Information Technology Act 2000 define a data protection
framework for the processing of digital data by Body Corporate.
• One of the largest stakeholders of SPDI are include banks
apart from insurance companies, financial institutions,
hospitals, educational institutions, etc.
• Every bank should develop, communicate and host the
privacy policy of the bank.
• The policy should include all key aspects of how they deal
with the personal information collected by the bank.
Heads Description
Meaning Banking Regulation Act,1949 is legislation in India that regulates all banking firms in
India. The Act gives the Reserve Bank of India (RBI) the power:
1. To license banks,
2. Regulation over shareholding and voting rights of shareholders.
3. Supervise the appointment of the boards and management
4. Regulate the operations of banks & laying down instructions for audits
5. Issue directives in interests of public good & on banking policy.
6. Imposing penalties.
Negotiable • Negotiable instrument Act→
instrument Act• cheque includes electronic image of truncated cheque and a cheque in the electronic
form. A cheque in the electronic form has been defined as “A mirror image” of a
paper cheque. The definition of a cheque in electronic form contemplates digital
signature with or without biometric signature and asymmetric crypto system.
Thank you for purchasing EIS summary notes for May 2022 examinations. It is
our endeavor to provide you all with good quality notes for examinations and helps
you in clearing the exams with flying colors.
Your assistance in completing this form is greatly appreciated. Your honest feedback
will help us to serve you better and enable us to work on improving our contents.
Kindly follow the below links in order to get connected with us-