I.T. Does Matter!



Imagine a world without technology, a computer that helps us in our office works and solutions, a cellphone that aids us in communicating with our loved ones even abroad, without Television and radio that entertains us every night, without a car that conveys us from places, and even without internet that almost everyone needs. The feeling is like dark age, a generation with a simple tool used in solving a complex problem. Thanks to Information technology, we did not have that kind of feeling.

Per definition from techtarget.com, “Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.” IT on what we have discussed is also interchangeable with Information System where it defines as the combination of hardware, software, network, procedures and the people.

In almost all aspect of our daily lives, we use IT tools, gadgets and devices. This paved way for us to become effective and efficient in our workplace and in personal doings. But does IT really matter? Yes IT does. For an organization, neglect of IT is like neglecting a gold in the mine, not maximizing the benefits and opportunities of it.


Despite the increasing trend of the outsourcing, keeping an in-house IT personnel and department is also necessary, this does not mean that the organization is outsourcing its IT services, they will dispose it. The IT department will keep and maintain the IT assets and services and will also translate business objectives and strategies into IT language and strategies also.

Business nowadays also are inclined with business ideas through disruptive technological campaigns, case and point is how Uber and Grab are marketed, in which they disrupt the normal idea of having to commute and public transport; also the case of Facebook to keeping updated and connected with your friends and relatives.


Not maximizing the benefits of IT will surely leave the organization with nothing, just like what happened with Kodak where they did not innovate and fully use the benefits of technology, thus they had overtaken by competitors who developed a digital cameras from analog cameras that use films.


On a more personal note, does IT matters to me? Yes IT does. IT helped me established good connections and relationships with people through social media. Keeping and staying connected with my loved ones is never been easier with the present technology also. When you’re alone, family, relatives and friends can instantly be reached upon virtually, sometimes keeping my sanity in a solitary moment.


Staying upbeat professionally has never been easier without the use of IT also. Collaboration tools made the life at work easier since us employees can collaborate on a project faster and easier. Computing tools such as MS Excel has also helped me compute data and information easily and also transform a raw data into a meaningful information such as from daily sales invoice of a distributor, to the top selling sku per month per customer etc.


In the end, as the technology grows, individuals and organizations must stay afloat in the flowing advancement of technology, to create, develop, maintain, check cycle of an innovation.




  1. https://www.forbes.com/sites/joeweinman/2013/05/17/mckinseys-view-on-whether-information-technology-matters/#17c17df17b40
  2. http://www.cio.com/article/2393834/cio-role/4-reasons-why-it-matters-more-than-ever.html
  3. https://en.wikipedia.org/wiki/Information_technology

Post Wisely


Social media is a very popular platform for Filipinos with 47 million active Facebook accounts in the Philippines (Rappler Brandrap), with 52% internet penetration both on mobile and broadband connections. According to vulcanpost.com, the top major reasons why us Filipinos use social media include to keep company, share new experience to friends and followers, have fun, meet new people and stay in touch with family and friends. Keeping connected with family and friends is what makes Filipinos unique, because of the strong family ties and close-knit relationship.


We often hear negative stories and commentaries on the use of social media such as identity theft, cyber bullying, spread of fake news and phishing of confidential and important data, but there are also good progress as to how others use social media for personal development and career growth. I bear witness as I myself, used this to my advantage.

LinkedIn, a professional social media platform is a good opportunity in growing my professional network. With this, I have known some of the industry leaders, key players and other individuals in the business arena. It has a feature where users can post blog or materials for everybody on their circle can read. I got some of the careers directions and inspirations from one of my network on LinkedIn; the idea that every employee is unique and that the resume is just the tip of an iceberg, the main meat is how an employee works and how they can work with different individuals in the company. LinkedIn as a professional media has increased my network of inspiring people; this is not just for employees who wants to seek job or career opportunities, but also to employees who wants to be inspired and motivated by the individual, key players, CEOs, Managers they all look up to.


Facebook, Instagram and forum sites on the other hand has helped me developed new friends, encourage to try something new, conquer fears, learn and explore a different perspective in life, and have a refreshed and renewed aspect. You can meet different people in walks of life that shares the same passion with you, ask help on something you still don’t know about. In the forum which I joined, we share information on Iloilo’s current and future development and well as discuss the history; with this I got to appreciate what Iloilo has to offer, and what made it is right now.

I, as a responsible social media user, pledge to commit the following:

  1. Not to post rant to someone else
  2. Refrain from sharing personal, family, and relationship problems
  3. Prevent making LinkedIn as Facebook type of social media
  4. Avoid using cellular phones over meal and/ or conversation
  5. Keep away from cyber bullying

At the end of the day, whatever we post in our social media accounts reflect our personality and aspirations in life. Remember that once you click post, there is no turning back, so post wisely.






Piracy is not your ONLY OPTION


With the rapidly increasing and sophistication of modern-day technologies, policing and auditing on the proper and legal use of copyrighted product and software has been hard to the owners and developers. This aided the so-called “pirates” (for this blog we define pirate as the person or individual who uses software without license), in cracking codes and using someone’s technological product without the owner’s permission of license. Software Piracy is a huge illegal business in the world with $52.2B Commercial Value of Unlicensed Software, with 39% Worldwide Piracy Rate, according to the study of Revulytics. With  this huge and increasing figures, is it really not worth it to pay for the license of the software? Or the  Individual/Company are just greedy enough not to pay for the license?

According to several studies of tech companies, the top reasons why people pirate software is that it costs much  vis-a-vis the price they are willing to pay and the perceived benefit, second is that it is not available to the country they currently lived in and lastly those software are hard to find and be bought. Is the reason that the software costs much will suffice of having it in a pirated version? For the sake of proper and just discussion, this reason is not justifiable and acceptable. The use of open and free software has been widely available for all. In the case of using Microsoft as office software, there are open and free software with the feel and touch of MS. For months now, I have been using WPS software in lieu of using MS since it costs much on me to buy even the basic software package. Those costly software packages usually have a smaller version in the case of open and free software.


The perceived value of having the licensed software is also not valid, why? Those software packages you usually install like MS do have a trial version of 30 days. Within this time, you can and should have known whether or not the software will answer your business/personal needs or not.

Think of using MS as an investment. You could not use it without having investment on it. Should the job require using MS, you can save up or loan to have the legal and licensed copy of it.


As previously discussed above, the proliferation and advancement of technology has evolved the use of it in business arena. Stopping piracy in theory and in practice is somehow impossible in the current age. People have its way to crack, decode and reuse algorithms and other ways to go about with the pirating and duplicating a copy of software; instead, there are ways that the software companies can use to minimize if not reduce the proliferation of the piracy.

  1. Bundling of Software Package


Laptops, cellular phones and other tools and gadgets should have pre-installed software package on it. Software companies can make a partnership with Original Equipment Manufacturers (OEM) for them to have a better approach on dealing with the piracy. This will also reduce the option of the consumers and users of using pirated software.

  1. Offer longer Trial Version


Trial version helps the customer enjoy the full benefit of the software legally. With this feature, customers can have a feel and understanding whether or not the software they are buying will suit their need. This version should require registration online so that information can be deduced by the software companies.

  1. Create limited Package Version

The limited package version will be offered to those users with limited financial capabilities. Software companies can offer limited package depending on the budget of the users; say for example MS, the limited version does not need to have the 3 basic MS Applications, they can offer MS Word only or MS Excel only same with MS PowerPoint to lessen the cost of buying it.

In conclusion, software piracy is a crime that involves all tech users around the world. Let us just remember that this is a copyrighted work of individual or of a company, they spent time, money, and effort in developing, creating and maintaining it. Using it illegally and without license will soon compel this companies not to innovate, develop and maintain software packages that soon, can also affect us.












Share If You Care

quote-the-key-to-success-in-any-organization-is-identifying-developing-and-empowering-the-craig-groeschel-141-70-89“The Key to success in any organization is identifying, developing, and empowering the right people” – Craig Groeschel

The quote from Craig Groeschel almost encompasses the gist of this blog, Knowledge Management. The concept of Knowledge Management in a nutshell is getting the right knowledge to the right employee of the organization at the right circumstance. Employees of the organization are the considered as the best asset which could not be measured in the financial statement. The contribution of the employees is tantamount to either the success of the failure of the organization.


A lot of benefit in implementing and using Knowledge Management Tools are beneficial to the company. Some of the tools are already considered as Knowledge Management yet, other organizations doesn’t have a knowledge and idea that what they are currently doing is already part of the KM.

In my previous organization which is Unilever RFM Ice Cream, a lot if benefits, KM has offered. As a Multinational Company with a fast paced working environment, quick response and action on urgent issues are required. Best Proven Practices (BPPs) are widely used in URIC where sharing is important. Each area needs to share at least 1 BPP each month that needs to be shared to all employees of the organization.  Some of the benefits of employing KM in workplace include:

  1. Faster Decision Making


Knowledge that has been documented, recorded and properly stored will have a big impact on day-to-day operations of the organization. All those best proven practices shall be reapplied should the same issue arises. Time is a very critical factor in the fast-paced environment of the organization, there should be no lost dead time. With Knowledge Management in practice, it’s easier and faster to respond to issues with the documented knowledge. Collaboration and team help is also being practiced through sharing of the knowledge on trade and on the operations.

  1. Avoiding Redundancy


Faster decision-making should not entail having a redundant operations in the organization; in implementing KM with URIC, redundancy is being avoided or at the very least minimized. Redundancy in the operation such as having the same mistake or using the same tool that has been proven ineffective will cost the company time and money. As a thumb rule, there should be no mistakes should take place in the organization as much as possible. This redundancy is being minimized by taking advantage of the existing experience and expertise of our colleague or someone from internal and external clients.

  1. Promotes Innovation and Creativity


Sharing of the best proven practices, as part of knowledge management is seemed to be effective in transferring ideas and knowledge from one employee to all. In URIC before, we have the Ice Cream Academy where employees with best proven practices shares what they did or what processes did they do that resulted in a better sales result. With this culture in mind of the employees, the spirit of competition and better innovation is always on top. This also has led to having extracted the creative juices of the employees in the organization.

During the implementation of the Knowledge Management System or we have the best proven practices, there are issues that some employees are having a thought of before sharing to all, this include:

  1. Knowledge hoarding


Tenured employees have the thought in mind that their competitive edge over other employees especially those new ones are reduced when they share what have they learned over the past years are to be shared to all. This is the classic traditional mindset of an employee in our organization.

  1. Individual work bias (I can work alone by my self)


Having a competitive mind of an employee especially millennial ones have this mindset that they can do it all alone without having been guided step by step by their colleagues. The bias for action also sometimes leads to stress of an employee when they do not ask for help to others.

  1. Not paid and no time to sharemaxresdefault1

The mindset of not being paid to share is the most classic and epic one. Employees are keen on not sharing their ideas and BPPs because they are not paid to do it, they are not paid to innovate, it’s not part of their job description and they do not have time to share. The epic line I also heard from them is “You work according to your salary”.

Knowledge according to Google is the information ans skills acquired through experience. We always hear the line knowledge is power where we are taught that if we have enough knowledge, we can use this to do intelligent and wise decisions and also not to be deceived by others. The classic view seems to be somehow not appropriate in the corporate setting, if the spirit of sharing is being fostered.

Sharing the knowledge in mind is empowering. This means that the when employees or a manager for that matter share their knowledge on doing things in the organization, they does not only share the knowledge they have in mind but they empower employees to make better decisions. We all know that employees are the best and important asset of an organization, thus empowering them is very crucial. Sharing knowledge has led to other organizations to be more successful with the people and the products they have.










B.I. is not always Bad


Business Intelligence refers to the technologies, applications, and practices for the collection, integration, analysis and presentation of business information. This will help the management and the key people to have a sound and better decision through a scientific and structured support and resources. Business Intelligence tools are those tools and applications that a company could use to further advance the decision-making process. Some may say that these are better tools since decisions will be based on the programs run by the computers, however, others may argue that humans still developed the program, thus it should be credited to them. For my part, we will be discussing the business intelligence which is programmed to run by computers and the better ways on how to effectively use it.

Business Intelligence (BI) Tools are useful and relevant to the day-to-day operations of the organizations should it be used effectively by the employees and those people who have given access to use it; however, not all employees are enjoying and effectively using the tools given to them. So the question is how can we encourage more effective use of the BI Tools?

1.Engagement with Employees


Employees and other people in the organization are the main users of the tools. Organization should engage them during the planning process and get their inputs on how and what functions, specifications and details they would want to include in the tools. Employees will give insight based on their experience, thus after developing the tools, they can own the program and they can maximize its use and benefits.

2.Reducing unnecessary data


Data overload may bomb employees upon using the tools organizations have provided. These large amount of data can discourage employees to further explore the tools thinking that it’s an extra work for them to process the data. Some of the data might be irrelevant to the nature of  the job. The key here is only those data and information appropriate to the work level of the employees should be accessed by them and not giving the whole data in the organization for them to process.

3.Keeping collaborative idea


Upon implementation of the BI tools, it is important that collaboration should also be employed in the workplace. No employees should be left hanging by other department should there are questions. Collaboration of ideas will help each employees to effectively use the tool since they feel the sense of ownership in the process.

4.Training staffs and keeping them trained


Using a tool for the first time without any test run and training for the user might cost a big trouble both for the company and the employee. For every new processes introduced, prior training must be accorded. This is to ensure that employees do know what to do and how to go about the new process. It will also minimize gaps on the opportunities lost due to employee inefficiency. Keeping them trained and informed is as good as prior training to keep them upbeat and updated.

Encouraging the employees is somehow one of the few phases  to have them use and explore the benefits and uses of the BI Tools. The next question is how do we make them continuously use the tools provided?

A classic theory on the carrot and stick approach may seem plausible. But which side are we on? Is a reward program more appropriate than a punitive program? Or the two programs are neither appropriate?


Incentive and punitive programs can either be appropriate and effective in ensuring that employees use the BI Tools, time will spell a big changes on the two. If employees are constantly be given with incentive, the essence of the work will just be secondary to incentive. If punishment will also be sustained for a long time, employees might lose interest in working with the organization. A good combination of punishment and incentive in the right time and in the right setting might be more successful.

Effective use of the BI Tools can lead to company’s efficiency, spotting opportunities in the market that will eventually result to the growth of the organization in the end. When the company grows, employees are eager to know if there is a merit or pay increase in their salaries. However, the usage of the BI Tools should not be equated to their pay increase. Usage of the tools without understanding and relating the information to the business need will not help. At the end of the day, employees must effectively and steadily use the BI tools at the same time process and relate the information given.





Check the Label| Online Buying

As a consumer, shopping can sometimes be a dreaded thing to do in ages due to an enormous number of goods and services, in a multitude of marketplace in your locality merged with a cluttered and crowded aisle in the grocery stores.


With the introduction of online shopping, shopping in your favorite mall with your favorite brands has changed a lot. Online shopping has initially evolved from the late 70’s TV Shopping where a particular product is being advertised on TV with promotional discounts and hot line flashed on-screen so that TV Viewers can directly buy those advertised item. Now online shopping has a different landscape, all you just need to have is a phone with internet and of course your money.

Shopping through the web has given consumers a bundle of convenience and inconvenience at once. Personally, as an online shopper, I have this certain criteria whether or not I will buy through the web or will personally visit the store. This include:

  • Price – one of the main consideration whether to go online or offline shopping. If an item costs much, I’d personally want to touch, feel. and scrutinize the product before purchasing. Should it cost just less without any additional costs I’d go for online shopping.
  • Time – this is one challenge both the seller and buyer must agreed upon before doing transaction. Any products that can be delivered after 15 days for me is unacceptable. Based upon the condition, if there is this one product that I really need ASAP, I go directly to the store. While if the product I want is not that urgent, I can wait for the lead time of at most 2 weeks or 14 days.
  • Brand/ Seller– a good brand and reputation of a seller means a lot for me as a buyer. I would be hesitant if the buyer is relatively new in the market. If the seller has a reputable name and brand, chances are, I might end up buying the product.
  • Reviews– online shopping has feedback and comments from its buyers. Usually, buyers give comments on an extreme position, either they are delighted or frustrated on the seller. This is also important to know the legitimacy of the seller since personal information will be given including the account details upon payment.
  • Return Policy – in the country, returning a merchandise or a good is allowed in the law. Online sellers that have a tedious and difficult policy on returning an item is a backlash to the seller. The ease of returning an item plays a vital role to the consumer whether to buy or not a particular item.

Given those criteria above, choosing an item to buy online id a different one. There are items I can easily buy online without hesitation, and there are those that needs a good check before purchase; my list of those items are below. (Note: I only purchase items directly from the legit seller’s website)

Items I can buy without hesitations:

  1. Airfare – through the help of internet, booking a ticket with my favorite airline company is now easy. I don’t need to personally visit a ticket agency just to buy it that will entail me transportation cost. I just buy it directly with the airline, and not through other third-party seller online.
  2. Shoes – no doubt I can buy it through online without questions asked. I have already a shoe size with me from my favorite brand and type of shoes. I just need to browse for the design and color before purchase.
  3. Book – This is one of the safest items to buy online. No big risks associated when buying online an there’s a lot of good books to choose from brand new to second-hand books.

Items with reservations before buying:

  1. Gadget – with the huge number of gadget users around the world, comes a great number of gadgets in the market being sold. Some may have the same specifications but with just different brand. The only risk I think when buying gadget online is the handling, at the same time the issues of the gadget itself which will only occur once I used and tried it.

  2. Toiletries – this for me is very personal, this speaks of hygiene and health. When someone I don’t  know sells me toiletries, I would have a second thought whether this is safe to use. I’ll be using it on my body, thus it might give me reaction to some ingredients on it, this is the thoughts on me.
  3. Voucher/ Coupon – at a first glance, we think that vouchers and coupons will save us money since this is a discounted of a regular price. This promotional items are sometimes being coupled with a regular item that we need to buy first before we can avail the voucher.

Items to never buy online:

  1. Food (Not Fast-food/restaurant delivery) – handling and processing of food is essential to the safety of its consumers. We can never tell how they handled and processed the food we order online. This is at great risk of food poisoning and other disease related to food. We might end up paying more to hospitals than buying food to our trusted store and restaurant. Risk of spoilage is also high since delivery from the seller usually require days.

  2. Jewelry – this item is an important one that I usually go to a legit local supplier than ordering online. Jewelries on the web may look gorgeous, but it differs when you actually have it wear and tried on. Jewelries are also prone to breakage on the course of the delivery.
  3. Appliances – same principle with gadget, appliances may look fine and well through the web, but the issues associated with it will just come out once it is plugged in and used.

Buying is a personal thing that suits what we need and what we want, thus we have certain criteria and standard in mind readily available before we purchase. At the end of the day, either we buy it personally in a neighborhood store or through online, it pays to read and ask. 🙂





Think Before You Click

Communication and technology have eased the lives of almost all humans around the world. With the fast changing landscape of communications and technology is the never ending desire of people to improve the technology with a more sophisticated and future-oriented functions.

Gadgets and office equipment had brought lots of advantages and comfort of doing a particular job compared to decades ago. Let’s discuss some of it like cellphone, computer, navigation ap


plications and GPS (Global Positioning System). Decades ago, cellular phones are non existing but telephone, where someone can just use it either in their house or office since communications runs through a wire. Laptop computers as we know now is a precedent of desktop computer which is bulky and sturdy to use around specially if your work is highly mobile. Navigation applications and GPS is also non-existing before thus there is somehow no other way to locate someone’s place and to keep track on the changes of a particular area in terms of landscape.


But does this technology had really brought opportunities for everyone? I believe YES. Below are the perceived advantages of the wireless technologies:

A Businessman Sits On A Beach Chair On The Beach Working On A Laptop Computer And Talking On The Phone With His Surfboard Sitting At His Feet; Tarifa Cadiz Andalusia Spain
  • Adaptability/ Mobility

Using wireless technologies helps businesses to do office, present product launches, attend to seminar in any part of the world as long as you are connected to the internet. Salesperson need not got to their office just to send daily reports, they just need to sync/ send it via internet in their mobile phones or laptop computers. Employees can still work from home should the office could not be used due to force majeure, because they have their laptop computers on-hand.

  • Productivity/ Quality Increases

Productivity of an employee is one of the most important metrics used to measure the performance of an employee; with the wireless technology, employee’s work have become easier. Making accurate decisions are on time when needed, and quality control and assurance are become easier to implement with the new technology developed through the use of computers.

  • Better Collaboration/ Synergy

Laptop computers coupled with wireless fidelity (WiFi) networks rises the collaboration of an employee. If before, working on a particular projects need that the employees should be at the office and connect through the office server just to collaborate on a work, now anywhere the world as long as they have laptop and wifi, they can just connect through their server and they can already start collaborating. Through the help of internet, many collaboration tools have been developed and it’s been easier to synergize ideas minimizing time spent and trails needed for the documents and projects to be developed.

The use of gadgets, software and hardware coupled with wireless network means there should be standards and ways of use to be implemented in order to maintain its core function and stability. Exploring internet entails risk that when visiting a particular website especially those that are not encrypted. This website can steal sensitive and confidential information about yourself, the company, and someone else.

Below are some safety guidelines to help users/ employees experience a hassle and stress free work:

  • Use Encryption in the network

Network encryption will minimize the risk of company being attacked by hackers by eaves dropping and decoding data you have sent through your wireless network. Network encryption must be a combination of alphabet and numeric numbers at the very least to ensure strong encryption. This should also be changed regularly. Laptop computers that are being provided by the company is also subject to encryption and should be change regularly.

  • Limit Usage and Access of the Network

Access of the network should not mean that everyone has it. Every employee in the organization should have different information to access depending on their position and function in the organization. Usage of the network should also be limited and monitored. Wireless network offers a lot of potential and risk also. Only company and work related websites must be accessed. Other social media websites should be banned as this ca hamper the productivity of an employee especially during work hours at the same time poses a great risk of phishing.

  • Install Firewall/ Anti-Virus Programs

With the proliferation of hacker attacks from malwares and viruses, the network are prone to theft and bug down, thus it is essential to install necessary firewall and anti-virus programs. A good firewall program may give hackers a hard time getting information on the computers, as well as anti virus that is used to prevent, detect, and remove malicious software from the computer that is forcefully installed through a website by deception.

While there are standards that every company is implementing in the use of its wireless network, the safe use of this comes greatly from its employees who are the main user. It always pay to think and check if the website is legit, to avoid necessary hassle in the near future, Think Before you Click!




Ready, Get Safe, Outsource!

Outsourcing is an arrangement in which one company contracts with another organization to provide services that could be provided by company employees (Reynolds, 2009). It is a strategy used by companies to cut and stabilize the costs of the programs and strategies they are not efficient in doing. Second is to improve the focus of the company by doing only those programs and strategies they are strong and inclined with, and lastly, to upgrade capabilities and services of the company through the outsourcing service provider which can perform a better business process over the client. With this definition and background, should an organization outsource its Information Technology Security?


Data breach as defined by TechTarget is an “incident in which sensitive, protected, or confidential data has potentially been viewed, stolen, or used by an individual unauthorized to do so”. In the Philippines, about 55M of highly sensitive information such as address, government ID numbers, fingerprints, birth date and contact number have been reportedly hacked from the site of the Commission on Elections, weeks before the slated 2016 National Elections

Security on the Information Technology of an organization is a vital component of an IT infrastructure, thus outsourcing it will do more benefits and advantages to the organization, somehow outweighing the disadvantages. There are however some of the checklist to be included before considering to outsource the IT Security; first is the company’s product portfolio include developing IT Security? Is the threat of IT breach detrimental to the operation of the company? Can the organization prevent cyber-attacks like hacking, spreading of virus and potentially unwanted programs from happening? If the answer in of the question is “No” then I recommend that the company should outsource its IT Security. However, outsourcing this entails issues the company should consider.

  1. Confidential Information of the Company is At Risk

This is by far the topmost issue an organization will face. Employing third party agency to do the IT Security means that some if not most of the sensitive and confidential information will and shall be made available for them; this might include strategic plans, competitive analysis and plans, pricing, marketing and production plans among others

  1. Inability to Control IT Security

While the third-party agency develops codes and programs for the security of IT, managers and organization must participate effectively to comprehend and fully understand the program and how the security works; the inability of the managers and organization to participate will pose great problem such as not knowing the work around in cases of problem.

  1. Loss of Flexibility

Every company’s goal is to increase profitability and to ensure sustained growth overtime. Hiring this independent contractor will leave the company unable to cope up with the increasing demand of better security for the IT resources.

The first issue stated above should be addressed well the management to mitigate its associated risks, if not the company might suffer and face bigger problems not previously seen on the radar. With this taking into consideration, I have listed some of the clauses and stipulations the company and the contractor should agree with on the non-disclosure agreement.

Some of the needed clause/stipulations are as follows:

  1. The contractor will treat all information as confidential, derived and obtained in the whole duration of the contract, which may come into possession of the contractor, it’s employee and other employees related to the contractor.
  2. All employees of the contractor, related to the main contract, will be required to agree to and sign a non-disclosure agreement when they enter the premises of the company or where they may see or have access to confidential personal and/or business information.
  3. The contract shall not sub-contract works, processes and procedures related to the agreed scope of the contract.

The responsibility of data protection lies on the hand of the company and the contractor will not be held liable for it per RA 10173, also known as the “Data Privacy Act of 2012”. Thus, it is important for the both parties to ensure and enter into the non-disclosure agreement.


  1. WWW.Cumbria.Gov.UK
  2. http://www.ManilaStandard.com

Left or Right?


“Every Accomplishment Starts with a Decision to Try” – Gail Devers. Life is a matter of choosing options and making decisions. From the moment we wake up, whether we nap for another minute or we pray to God that we have another day to live is a choice that we need to decide on.


Just like in every business accomplishments and milestones, there’s this point where managers asked themselves, should I do it or not? Should I venture on this project or should I scrap and start for a new one? In setting-up an Information System of the company, there are certain set of skills a manager must possess that I believe is instrumental for the system to take place efficiently and effectively.

What are those skills set?

First, to effectively participate in Information System decisions, a manager must be adaptive. In deciding the details of the IS, a manager’s plan must be flexible. Information System will provide business solutions to the pressing issues and concerns the company is facing, but there are always limitations on those solutions. A manager should always have a second card on his hand should the original plan in devising information system will not push through, otherwise, the company will start on laying again to the table the plans of the information system.

With the advent of technology, internet and evolution of man’s needs and wants, adaptability is a crucial skill in order to capture those opportunities at present. Case and point is the case of Friendster and Kodak where they did not innovate, as part of being adaptive to those opportunities present, thus decided to shrink their market and even shut down operation as in the case of Friendster.


Second skill is the power to collaborate and synergize ideas. In decision making, there are different strategies and plans being laid-out in the table from different departments of the company by different persons. This is an opportunity for a manager to seize the opportunity with the different ideas given. Others might take collaboration as an added effort and energy to the company, but if used well shall give optimum help.

A manager must ensure that the creative juice of the team will be extracted, and make us of it in the IS decision making. By the creative juice, I mean those ideas that will make them think outside of the box.

With the different ideas and the fast-changing landscape of technology and internet, how can a manager ensure that everything and every context, in deciding what Information Systems to employ, are all covered? Thus, the last skill of being organized and systematic.


Introducing systems in the organization will help the manager organize the many ideas. It will guide the manager on what to do should there are problems and it will have an easy monitoring as to where the project already is.

This skill sets may vary from one manager to another; at the end of the day they should use those skills that are prevalent and innate with them and develop those that are still need to be developed. Learning is a continuous process, once you stopped learning, you will never grow.



IT’s easier!

Technology is a major driver over the growth of a business or a company and a means of improving productivity and efficiency of an employee. Information Technology under a wide umbrella of Technology have been beneficial to humanity since its inception. Almost all humans in the world uses Information technology be it in their homes, work place, malls, churches among other places. But how really is Information Technology beneficial to me as a salesperson working in a corporate world?

Everyday, we are confronted with different communications, strategies and plans laid out by the company to ensure that goals will be met in the end. This is made easier through the use of the Information Technology devices. Communication such as daily sales update are being sent from the Head Office Support Group through email, by which we can go through how are we performing versus the target and we can also compare our performance against other salesperson or areas of the company.

Would you imagine sending a communication from Manila to Provincial Offices through snail mail? This might take 2-3 days without delays before you receive those. In the very competitive world of Fast Moving Consumer Goods Industry, time is of the essence. Reaction time for every strategies is needed in order to be successful. Considering the time frame, competitors could launch an attack against our brands, and we are able to know it, days after only, and the counter-attack to be made by the company might not be prudent.

Source: http://www.LinkedIn.com

Another importance of IT has offered is the flow of information. We are being offered training online/ webinar through company’s network and third party software. We have this weekly discussion which we share our best proven practices, and we share it via ZOOM, an third party application that let’s us present to different viewers in different locations. This became handy since employees are no longer required to go to Head or Regional Offices for seminars, having the company a cost-saving agenda.



Data acquisition also handy through the use of company’s information system. We have this IRS (Integrated Retail Solution for Business) System, an online IS where we are can get pertinent data from sales of a particular account, up to the sales of a specific brand and sku daily or monthly. With this data, we will just process it in order for us to get the tailored-fit information that we want and required.

In general, Information Technology offered a wide variety of good packages; however in every package, there is always something that we should be aware of. Technology comes with the risk of using it, those risks include breach of data, hacking, virus intrusion up to the risks associated with the acts of nature. This can harm the operation of a business once happened, and it is up to the company to be prepared and ready with the business continuity plan. Anticipating this associated risk will help the management and the company mitigate those risk from happening. As technology advances, risks and hazards also adapt, that’s why continuous improvement and study is always a must. 🙂


(Image Source: https://www.vecteezy.com/free-vector/gadget)