From: http://www.scribd.com/doc/60963054/DTI-Department-Administrative-Order-Number-8-Prescribing-Guidelines-for-the-Protection-of-Personal-Data-in-Information-and-Communications-System-in Section 4. General principles for the protection of personal data 4.1 Personal data must be: 4.1.1 Collected for specified and legitimate purposes determined before collecting personal data and are later processed in a way compatible with those purposes; 4.1.2 Processed accurately, fairly and lawfully; 4.1.3 Accurate, and, where necessary for the processing of personal data, kept up to date; inaccurate or incomplete data must be rectified, supplemented, destroyed or their further processing must be restricted. 4.1.4 Identical, adequate and not excessive in relation to the purposes for which they are collected and processed; 4.1.5 Kept in a form, which permits identification of data subjects for, no longer than is necessary for the purposes for which the data were collected and processed. 4.2 Criteria for lawful processing of personal data. - Personal data processing is permitted only if not prescribed otherwise by law, and at least one of the following conditions exists: 4.2.1 The data subject has given his or her unambiguous consent; 4.2.2 The personal data processing results from contractual obligations of the data subject; 4.2.3 The data processing is necessary to a data controller for the performance of his or her lawful obligations but in such cases, the processing shall be permitted only to fulfill the intention of the parties; or 4.2.4 The data processing is necessary to protect vitally important interests of the data subject, including life and health. 4.3 Disclosure of Personal Data to Data processor 4.3.1 A data controller may entrust personal data processing to a personal data processor provided a written contract is entered into between them; 4.3.2 A personal data processor may process personal data entrusted to him or her only within the scope determined in the contract and in accordance with the purposes provided for therein; 4.3.3 Prior to commencing personal data processing, a personal data processor shall perform safety measures determined by the data controller for the protection of the system in accordance with the requirements in this“Guidelines” and the E-Commerce Law. 4.4 Storage of data - Personal data may be stored and used only for as long as it is necessary to achieve the purpose for which it was processed. Unless otherwise stipulated in acts on individual types of personal data, personal data shall either be deleted from a personal data or blocked once the purpose from the preceding paragraph has been achieved. 4.5 Rights of the data subject- The data subject is entitled- 4.5.1 To be informed by any data controller whether personal data of which that individual is the data subject are being processed by or on behalf of that data controller. 4.5.1.1 If that is the case, to be given by the data controller a description of: 4.5.1.1.1 The personal data of which that individual is the data subject, 4.5.1.1.2 The purposes for which they are being or are to be processed, and 4.5.1.1.3 The recipients or classes of recipients to whom they are or may be disclosed. 4.5.2 To be notified - 4.5.2.1 The information constituting any personal data of which that individual is the data subject, and 4.5.2.2 Any information available to the data controller as to the source of those data, and 4.5.2.3 Where the processing by automatic means of personal data of which that individual is the data subject for the purpose of evaluating matters relating to him such as, for example, his performances at work, his credit worthiness, his reliability or his conduct, has constituted or is likely to constitute the sole basis for any decision significantly affecting him, to be informed by the data controller of the logic involved in that decision-making. 4.6 Rights to information - A data subject also has the right to request the following information: 4.6.1 The designation, or name and surname, and address of the data controller; 4.6.2 The purpose, scope and method of the personal data processing; 4.6.3 The date when the personal data concerning the data subject was last rectified; 4.6.4 The source from which the personal data were obtained unless the disclosure of such information is prohibited by law; and 4.6.5 The processing methods utilized for the automated processing systems, concerning the application of which individual automated decisions are taken. 4.7 Data subject’s right of access to his or her personal data. A data subject has the right, within a period of thirty(30) days from the date of submission of the relevant request, to receive from the data controller or data processor the information specified in the preceding Section in writing. 4.8 Data subject’s right to request rectification, destruction of his personal data or restriction of further processing of his personal data. 4.8.1 A data subject has the right to request that his or her personal data be supplemented or rectified, as well as that their processing be suspended or that the data be destroyed if the personal data are incomplete,outdated, false, unlawfully obtained or are no longer necessary for the purposes for which they were collected. If the data subject is able to substantiate that the personal data included in the personal data processing system are incomplete, outdated, false, unlawfully obtained or no longer necessary for the purposes for which they were collected, the data controller has an obligation to rectify this inaccuracy or violation without delay and notify third parties who have previously received the processed data of such.a) If information has been retracted, a data controller shall ensure the accessibility of both the new and the retracted information, and recipients thereof receive that the information mentioned simultaneously. 4.9 Right to object. - A data subject has the right to object (in writing, orally or in any other form) to the processing of his or her personal data if such will be used for commercial purposes
Top 10 Influential Blogs
.gif)
BNS Hosting is proud to be a sponsor of The Philippines Top 10 Influential Blogs.
These are blogs that started anytime from April 1, 2010 to the present. These blogs are gradually gaining a considerable amount of readership, following, influence and fascinating the reader in various ways. The bloggers behind them established the blog for various reasons such as expression of thoughts, sharing of knowledge and insight, building a movement, events reporting or coverage, and some for profit.
eCommerce Workshop Pictures
-

eCommerce Workshop Participant

- Ms Janette Toral with DTI Pangasinan Director Peter Mangabat

- eCommerce Workshop with Ms Janette Toral
BNS Gains ITIL RCV 3.0 Certified Professional
Mr Wilson L. Chua, president of BNSHosting recently got 100% score on his ITIL RCV 3.0 Exam. With this certification, BNS hopes to improve the process around the implementation of new services and updates in a smooth fashion that is aligned with our clients’ business objectives.
eCommerce Workshop on expanding Online business
Bitstop Inc and Digital Filipino delivers a power-packed workshop aimed at delivering both the theory and the step by step guides on setting up your online webstore that comes complete with payment gateway and shipping solution. This seminar is targetted at micro, small and medium sized businesses that are looking to increase their clients without investing in additional branches or taking up space in malls.
The seminar will be at the BFAR Auditiorium, Bonuan Binloc, Dagupan City, on May 26, 2011 from 9am to 5pm. Interested participants are urged to sign up here.
Agenda Inlcudes:
- eCommerce Fundamentals, Law, Strategy
- Advantages and business models on the web
- Guidelines for Merchants
- Mobile Commerce
- Internet Branding and Advertising
- Internet Payment
- Practicum: Setting up your own webstore.
RootCon Call for Patrons and Sponsors
ROOTCON: 5th Philippine Hacker Conference and Information Security Gathering
Get your Ninja gears ready, polish your tools and show off that Wi-Fu and Ninja skills to a bigger ROOTCON event which will be held on September 9 and 10, 2011 at Cebu Parklane International Hotel, Cebu City, Philippines. This city, flushed with foreign investors, business process outsourcing opportunities and other tech companies. ROOTCON 5 will be within reach to our InfoSec enthusiasts, white / black hats, programmers, network engineers, system administrators, network security analysts, security auditors, and other technology geeks from Luzon, Visayas and Mindanao areas.
A religiously organized CON will run for 2 days with loads of topics, activities, Kung-Fu and Ninja Skills contests; not to mention, we also have WiFi Shootout, Project-X, Hacker Jeopardy, Raffle Draws, Job Fair and many more. Registration for the early bird will start on May 1 and ends on June 30, 2011. Watch out for our great deals of hotel reservation, travel info and other tips.
For more information and updates subscribe to our Google mailing list(https://groups.google.com/group/rootcon) or email us at info@rootcon.org. This is a nationwide event. Let the CON treats begin!!!!
Contact Details:ec@rootcon.orgwww.rootcon.org
Thanks.
Sincerely yours,
Ederlindo “Ederts” Cojuangco II
Co-Founder of www.rootcon.org
Online Community Manager of www.ditona.com
ederlindo@gmail.com, ec@rootcon.org, info@ditona.com
Cebu City, Philippines
Google PR ranking Algorithm Changed
Google has announced that they made a major change in their ranking algorithm:
“We launched a pretty big algorithmic improvement to our ranking […] This update is designed to reduce rankings for low-quality sites?sites which are low-value add for users, copy content from other websites or sites that are just not very useful.
At the same time, it will provide better rankings for high-quality sites?sites with original content and information such as research, in-depth reports, thoughtful analysis and so on.”
This is an addition to the scraper spam update that Google released earlier this month.
This is a noticeable update that affects about 12% of all queries and the search result pages can change a lot:
“We can’t make a major improvement without affecting rankings for many sites. It has to be that some sites will go up and some will go down. […] It is important for high-quality sites to be rewarded, and that’s exactly what this change does.”
Free Queueing System

BNShosting is opening the beta version of our queueing system to the public for testing. The project was led by Mark Gutierrez and by team members from Cagayan State University students.
Please feel free to let us know what improvements can be done to it. Visit this to download the free beta http://www.queue-systems.com/
What Websites can do for your Business
- Generating Leads and referrals
- Selling Products Online (and globally)
- Lower operational costs (compared to physical storefront)
Secondary Goals for your website
Secondary goals support the primary ones and produce less tangible benefits, but are important just the same. Good examples of secondary goals are:
- Building up Credibility
- Sustaining Current Customers and increase customer service
- Recruiting Affiliates
- What actions you want your visitors to perform?
- What are the secondary tasks that you want your website to do?
- Will existing customers be using your site?
