BNS hosting like to express warm congratulations to one of their valued client Mr Chinkee Tan for winning the 20th Golden Dove Awards.
Author: admin
BNS to Attend TechVenture 2011 Event
BNS President Mr Wilson L. Chua is attending the TechVenture 2011 event in Marina Bay Sands Singapore. One of the featured speakers among a list of luminaries is Eduardo Severin, one of the founders of Facebook.
TECHVENTURE 2011
Now in its pivotal 15th year, TECHVENTURE is set to welcome the most seminal speakers of their respective fields. Be informed and inspired by their vital ideas and leading perspectives.
TECHVENTURE 2010
Philippine Data Center
BNSHosting now offers support for hosting on a per rack basis. This is specially suited for large applications developers that need their servers to be hosted in a Philippine Data center on a per rack, half rack or quarter rack basis. Each rack can support 42U (20 2U servers)
Each full rack in our Philippine data center offers :
- Dedicated Firewall with VPN server
- Up to 64 IP address per full rack mount rentals
- Dedicated 24port Gigabit switch
- 15 amp power supply
BNSHosting is a favored location by applications developers that are looking for Philippine data centers that provide seamless interconnectivity among the Philippines various carriers. BNSHosting boast of connectivity either directly or thru our various peering agreements to all of the Philippines’ premier telephone/carriers- PLDT, Digitel, Globe, Bayantel, Eastern Telecoms to name but a few.
BNSHosting is the only Philippine Data Center that is hooked up to a utility line with 3 separate feeder source. In addition, BNShosting facility is backed up with two 50KVA diesel generators for emergencies.
Our philippine data center is monitored by our team on a 24×7 basis using industry standard SNMP protocol and Solar Winds’ Orion Monitoring system. We can be reached by phone (PH, SG, US numbers), email or Live Chat on our website.
DTI Privacy Rules
From: http://www.scribd.com/doc/60963054/DTI-Department-Administrative-Order-Number-8-Prescribing-Guidelines-for-the-Protection-of-Personal-Data-in-Information-and-Communications-System-in Section 4. General principles for the protection of personal data 4.1 Personal data must be: 4.1.1 Collected for specified and legitimate purposes determined before collecting personal data and are later processed in a way compatible with those purposes; 4.1.2 Processed accurately, fairly and lawfully; 4.1.3 Accurate, and, where necessary for the processing of personal data, kept up to date; inaccurate or incomplete data must be rectified, supplemented, destroyed or their further processing must be restricted. 4.1.4 Identical, adequate and not excessive in relation to the purposes for which they are collected and processed; 4.1.5 Kept in a form, which permits identification of data subjects for, no longer than is necessary for the purposes for which the data were collected and processed. 4.2 Criteria for lawful processing of personal data. - Personal data processing is permitted only if not prescribed otherwise by law, and at least one of the following conditions exists: 4.2.1 The data subject has given his or her unambiguous consent; 4.2.2 The personal data processing results from contractual obligations of the data subject; 4.2.3 The data processing is necessary to a data controller for the performance of his or her lawful obligations but in such cases, the processing shall be permitted only to fulfill the intention of the parties; or 4.2.4 The data processing is necessary to protect vitally important interests of the data subject, including life and health. 4.3 Disclosure of Personal Data to Data processor 4.3.1 A data controller may entrust personal data processing to a personal data processor provided a written contract is entered into between them; 4.3.2 A personal data processor may process personal data entrusted to him or her only within the scope determined in the contract and in accordance with the purposes provided for therein; 4.3.3 Prior to commencing personal data processing, a personal data processor shall perform safety measures determined by the data controller for the protection of the system in accordance with the requirements in this“Guidelines” and the E-Commerce Law. 4.4 Storage of data - Personal data may be stored and used only for as long as it is necessary to achieve the purpose for which it was processed. Unless otherwise stipulated in acts on individual types of personal data, personal data shall either be deleted from a personal data or blocked once the purpose from the preceding paragraph has been achieved. 4.5 Rights of the data subject- The data subject is entitled- 4.5.1 To be informed by any data controller whether personal data of which that individual is the data subject are being processed by or on behalf of that data controller. 4.5.1.1 If that is the case, to be given by the data controller a description of: 4.5.1.1.1 The personal data of which that individual is the data subject, 4.5.1.1.2 The purposes for which they are being or are to be processed, and 4.5.1.1.3 The recipients or classes of recipients to whom they are or may be disclosed. 4.5.2 To be notified - 4.5.2.1 The information constituting any personal data of which that individual is the data subject, and 4.5.2.2 Any information available to the data controller as to the source of those data, and 4.5.2.3 Where the processing by automatic means of personal data of which that individual is the data subject for the purpose of evaluating matters relating to him such as, for example, his performances at work, his credit worthiness, his reliability or his conduct, has constituted or is likely to constitute the sole basis for any decision significantly affecting him, to be informed by the data controller of the logic involved in that decision-making. 4.6 Rights to information - A data subject also has the right to request the following information: 4.6.1 The designation, or name and surname, and address of the data controller; 4.6.2 The purpose, scope and method of the personal data processing; 4.6.3 The date when the personal data concerning the data subject was last rectified; 4.6.4 The source from which the personal data were obtained unless the disclosure of such information is prohibited by law; and 4.6.5 The processing methods utilized for the automated processing systems, concerning the application of which individual automated decisions are taken. 4.7 Data subject’s right of access to his or her personal data. A data subject has the right, within a period of thirty(30) days from the date of submission of the relevant request, to receive from the data controller or data processor the information specified in the preceding Section in writing. 4.8 Data subject’s right to request rectification, destruction of his personal data or restriction of further processing of his personal data. 4.8.1 A data subject has the right to request that his or her personal data be supplemented or rectified, as well as that their processing be suspended or that the data be destroyed if the personal data are incomplete,outdated, false, unlawfully obtained or are no longer necessary for the purposes for which they were collected. If the data subject is able to substantiate that the personal data included in the personal data processing system are incomplete, outdated, false, unlawfully obtained or no longer necessary for the purposes for which they were collected, the data controller has an obligation to rectify this inaccuracy or violation without delay and notify third parties who have previously received the processed data of such.a) If information has been retracted, a data controller shall ensure the accessibility of both the new and the retracted information, and recipients thereof receive that the information mentioned simultaneously. 4.9 Right to object. - A data subject has the right to object (in writing, orally or in any other form) to the processing of his or her personal data if such will be used for commercial purposes
Top 10 Influential Blogs
BNS Hosting is proud to be a sponsor of The Philippines Top 10 Influential Blogs.
These are blogs that started anytime from April 1, 2010 to the present. These blogs are gradually gaining a considerable amount of readership, following, influence and fascinating the reader in various ways. The bloggers behind them established the blog for various reasons such as expression of thoughts, sharing of knowledge and insight, building a movement, events reporting or coverage, and some for profit.
eCommerce Workshop Pictures
-
eCommerce Workshop Participant
- Ms Janette Toral with DTI Pangasinan Director Peter Mangabat
- eCommerce Workshop with Ms Janette Toral
BNS Gains ITIL RCV 3.0 Certified Professional
Mr Wilson L. Chua, president of BNSHosting recently got 100% score on his ITIL RCV 3.0 Exam. With this certification, BNS hopes to improve the process around the implementation of new services and updates in a smooth fashion that is aligned with our clients’ business objectives.
eCommerce Workshop on expanding Online business
Bitstop Inc and Digital Filipino delivers a power-packed workshop aimed at delivering both the theory and the step by step guides on setting up your online webstore that comes complete with payment gateway and shipping solution. This seminar is targetted at micro, small and medium sized businesses that are looking to increase their clients without investing in additional branches or taking up space in malls.
The seminar will be at the BFAR Auditiorium, Bonuan Binloc, Dagupan City, on May 26, 2011 from 9am to 5pm. Interested participants are urged to sign up here.
Agenda Inlcudes:
- eCommerce Fundamentals, Law, Strategy
- Advantages and business models on the web
- Guidelines for Merchants
- Mobile Commerce
- Internet Branding and Advertising
- Internet Payment
- Practicum: Setting up your own webstore.
RootCon Call for Patrons and Sponsors
ROOTCON: 5th Philippine Hacker Conference and Information Security Gathering
Get your Ninja gears ready, polish your tools and show off that Wi-Fu and Ninja skills to a bigger ROOTCON event which will be held on September 9 and 10, 2011 at Cebu Parklane International Hotel, Cebu City, Philippines. This city, flushed with foreign investors, business process outsourcing opportunities and other tech companies. ROOTCON 5 will be within reach to our InfoSec enthusiasts, white / black hats, programmers, network engineers, system administrators, network security analysts, security auditors, and other technology geeks from Luzon, Visayas and Mindanao areas.
A religiously organized CON will run for 2 days with loads of topics, activities, Kung-Fu and Ninja Skills contests; not to mention, we also have WiFi Shootout, Project-X, Hacker Jeopardy, Raffle Draws, Job Fair and many more. Registration for the early bird will start on May 1 and ends on June 30, 2011. Watch out for our great deals of hotel reservation, travel info and other tips.
For more information and updates subscribe to our Google mailing list(https://groups.google.com/group/rootcon) or email us at info@rootcon.org. This is a nationwide event. Let the CON treats begin!!!!
Contact Details:ec@rootcon.orgwww.rootcon.org
Thanks.
Sincerely yours,
Ederlindo “Ederts” Cojuangco II
Co-Founder of www.rootcon.org
Online Community Manager of www.ditona.com
ederlindo@gmail.com, ec@rootcon.org, info@ditona.com
Cebu City, Philippines