Privacy Policy

This privacy policy has been compiled to better serve those who are concerned with how their ‘Personally Identifiable Information’ (PII) is being used online. PII, as described in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.


What personal information do we collect from the people that visit our blog, website or app?
When ordering or registering on our site, as appropriate, you may be asked to enter your name, Posts, Comments or other details to help you with your experience.
When do we collect information?
We collect information from you when you register on our site or enter information on our site.


How do we use your information?

We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:

       To ask for ratings and reviews of services or products


How do we protect your information?
We do not use vulnerability scanning and/or scanning to PCI standards.
We only provide articles and information. We never ask for credit card numbers.

We do not use Malware Scanning.

Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology.
We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information.
All transactions are processed through a gateway provider and are not stored or processed on our servers.


Do we use ‘cookies’?
We do not use cookies for tracking purposes
You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies.
If you turn cookies off .


Third-party disclosure
We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.


Third-party links
We do not include or offer third-party products or services on our website.



Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users.

We have not enabled Google AdSense on our site but we may do so in the future.
We don’t do advertising or any of the like.


COPPA (Children Online Privacy Protection Act)

When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online.

We do not specifically market to children under the age of 13 years old.
Do we let third-parties, including ad networks or plug-ins collect PII from children under 13?


Fair Information Practices

The Fair Information Practices Principles form the backbone of privacy law in the United States and the concepts they include have played a significant role in the development of data protection laws around the globe. Understanding the Fair Information Practice Principles and how they should be implemented is critical to comply with the various privacy laws that protect personal information.

In order to be in line with Fair Information Practices we will take the following responsive action, should a data breach occur:
We will notify the users via in-site notification
       Within 7 business days
We also agree to the Individual Redress Principle which requires that individuals have the right to legally pursue enforceable rights against data collectors and processors who fail to adhere to the law. This principle requires not only that individuals have enforceable rights against data users, but also that individuals have recourse to courts or government agencies to investigate and/or prosecute non-compliance by data processors.



The CAN-SPAM Act is a law that sets the rules for commercial email, establishes requirements for commercial messages, gives recipients the right to have emails stopped from being sent to them, and spells out tough penalties for violations.

We collect your email address in order to:
To be in accordance with CANSPAM, we agree to the following:

If at any time you would like to unsubscribe from receiving future emails, you can email us at

and we will promptly remove you from ALL correspondence.


Contacting Us


If there are any questions regarding this privacy policy, you may contact us using the information below.

Cebu City, Cebu 6000

Last Edited on 2018-04-26

Git push before running!

Image result for git push before running meme

As Information Technology aims to better organize the structure of data and its manipulation in handling business organizations, comes the danger of data loss, and erroneous update when a disaster strikes and damages your company’s IT infrastructures. Continue reading “Git push before running!”

Applying ICT in the Business Envir

Remember Multiply?

It was a famous online social networking service just like Facebook and Friendster by then which could allow the users to post unlimited photos and videos online as well as create blog posts and embed YouTube videos and music, but eventually turned its major services into an online marketplace for something like e-shopping.

This is just a sample of how ICT has transformed the way day to day business is executed to capture the opportunities and advancements with emerging technologies as a driver of economics.

Continue reading “Applying ICT in the Business Envir”

WiFi, WiMAX, Bluetooth… wait, what?!

Image result for stone age and wifi
Our biggest dilemma.

I can still remember the time when we used to order fast food through landline and we would push each other as to who would take the call and order for everyone. That time also, where we had to work on a school project but there was only one computer that could cater all our activities, so everyone else either had to do something else, or not do anything at all.

This time though, location is no longer an issue through wireless connectivity. Continue reading “WiFi, WiMAX, Bluetooth… wait, what?!”

Have you ever heard of ICT4D?

It might sound like how we value our video games or movies nowadays, like 3D vs. 2D, but ICT4D is a totally different topic. In this blog post, we venture into the world of ICT and its application towards our community, how it greatly influences our current way of life, and how it affects the development of the poor and marginalized people and communities in this Information Age. Continue reading “Have you ever heard of ICT4D?”

The Advancement of Mobile Computing

Image result for young smartphone users

I cannot imagine spending my whole day without checking my notifications on my social networking account every now and then,” says almost every young individual around the globe.

I start my day checking on my phone. I also end it by checking again my phone. In between the day, may it be in school or at work, I frequently check it again and again. How come it has been this addicting?

Even before the advancement of social networking, people have already used mobile devices to communicate across people from different locations building relationships among people and increasing productivity at work. These technologies that allow transmission of data, voice and video via a computer or any other wireless enables device without having to be connected to a fixed physical link is what we refer to as: “Mobile Computing“. Continue reading “The Advancement of Mobile Computing”

Connecting People through Social Networking

Image result for using a computer clipartI can still remember the days when I first started getting hooked into Social Networking. It started during the last years of my grade school, but heightened during my high school years, and so on. At that time, using a personal computer meant only for school projects using word processing applications and a few entertainment purposes through offline games, but when internet connection started to get the attention of many, even those who were not tech-savvy, they too embraced the benefits of connecting people online through Social Networking. Continue reading “Connecting People through Social Networking”