Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/rankings/
INSIGHTS

Telecom Companies in the Philippines

Telecom Companies in the Philippines
In recent years, telecom companies are moving to provide value added service over cloud, to help resolve local staffing issues, as well as cybercrime prevention and anti-bullying legislations. “The services telecom companies provide include auditing Internet traffic for future reference or forensic purposes, which can
In recent years, telecom companies are moving to provide value added service over cloud, to help resolve local staffing issues, as well as cybercrime prevention and anti-bullying legislations. “The services telecom companies provide include auditing Internet traffic for future reference or forensic purposes, which can be archived and used for legal evidence in case of any dispute,” said Charlie Lamb, CEO of e-Netdata.

A phenomenon has become evident over the years, where companies are over staffing their businesses hoping to achieve high job performance, only to find job efficiency is lacking. This may be due to the small percentage of households with broadband access, resulting in employees taking advantage of the broadband in the workplace for their personal use. Network monitoring over cloud services in instances like these can allow owners to observe which employees are working efficiently, and which can be let go in the unfortunate case of downsizing. The benefit of these services is that business owners can monitor their employees remotely, perhaps in the comfort of their own home, or when they are away on business trips.

The Cybercrime Prevention Act of 2012, aiming to address cybercrime in the Philippines, was passed in 2014. For business owners, if cybercrime were traced back to their enterprises, they would be held accountable for the crime if they were not able to provide evidence of the actual culprit. According to Lamb, there were incidents where lawsuits have occurred because businesses were not able to identify the person responsible for the cybercrime, and were forced to take the blame for the offense, which has created disputes. Therefore, it is essential to have network monitoring programs to not only protect themselves, but also to assist authorities in tracing the crime back to the original offender.

Similarly, the Anti-Bullying Act of 2013, protects children by prohibiting acts such as cyber-bullying, inflicting physical harm to the child, and slanderous statements or accusations which causes the victim undue emotional distress. In many cases of cyber-bullying, the act is performed during school hours, on school computers. This is an opportunistic market for telecom companies to provide their services, in order for schools to be able to monitor and flag down filtered key words that may correspond to cyber-bullying.

However, merely the implementation of network monitoring is not enough to catch culprits. The simple notion of using another user's log in information to commit cybercrime is a crucial flaw. By integrating cyber security systems with physical security, the total solution can further enhance the protection of businesses of identity theft by use of surveillance monitoring. Business owners are noticing the importance of network monitoring as well as physical security, as they can be fined up to approximately USD$200 thousand depending on the crime committed on their premises if unable to identify the offender.
Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: