Social Media Policy

I. OBJECTIVES

  • Social Media Policy prescribes the standards of Customer Frontline Solutions (CFS) in relation to the use of online platforms of communication or social media to safeguard the Company’s interest and that of all its stakeholders.

II. SCOPE

  • This document will guide the directors, officers, and employees of the Company in their online Social Media usage in and out of the office.

III. Definition of Terms

  • 1.

    Confidential or Proprietary Information – shall include, but not limited to any and all trade secrets and any other information, methods, processes, formulae, systems, business, technical, marketing, computer and administrative records, including customer list, plans, software and other data developed, created, acquired or maintained by the company.

  • 2.

    Personal Information - pertains to documented information in the custody of and obtained by the company within the scope of the Company’s business objectives, such as but not limited to, name address, email address, email address, phone number, race, nationality, ethnicity, origin, color, religious or political belief or associations, age, sex, marital status, information on education, health, financial or employment history.

  • 3.

    Conflict of Interest – A situation where financial or business interest, professional, or other personal considerations or interests that may influence, jeopardize, or compromise or have the appearance, tendency, or propensity of influencing, jeopardizing or compromising the ability of Directors, Of ficers or Employees to effectively and impartially or objectively exercise independent judgement in the performance of their duties, responsibilities, or professional activities of the company.

  • 4.

    Social Media – Various online tools, applications, and sites where users are able to generate files, share content, join networks or promote advocacies, brands or causes.

IV. GENERAL GUIDELINES

  • A.

    CONFIDENTIALITY OF INFORMATION AND PROPER USE OF COMPANY PROPERTY

    • 1.

      It is incumbent upon the directors, officers, and employees to act responsibly with the information, privileges, and resources they are entrusted with.

    • 2.

      Confidentiality of proprietary information and personal information of directors, officers, and employees of the Company shall be safeguarded and maintained. Appropriate penalties shall be meted out in the event of unauthorized use or dissemination of proprietary and/or personal information. Company property, proprietary and/or personal information shall be protected against abuse, loss, or theft.

  • B.

    SOCIAL MEDIA USAGE

    • 1.

      The use of social media is subject to Company policies, such as those of corporate governance, information security and Code of Ethics.

    • 2.

      It is imperative to presume that every post, message, or exchange on social media is public. The manner presenting oneself on social media should be consistent with that in the corporate world, in one’s dealing with stakeholders.

    • 3.

      It is an encouraged practice to participate in various Company-Sponsored social media applications, sites and tools which are aimed to measure the rate of stakeholder engagement, improve brand perception and implement advisories/crisis response protocol.

    • 4.

      Unless authorized, comments are to be withheld on matters such as financial information, Company management changes or initiatives, lawsuits, shareholder affairs, human resource practices, and contracts with business partners, customers, suppliers and other stakeholders. Unless authorized, the director, officer or employee shall be liable on a personal capacity for any post made on social media. The Company’s official social media account operated by the IT Department should handle information dissemination through various media platforms, including social media.

    • 5.

      Posting sensitive information and trademarks of CFS is prohibited.

  • C.

    CYBERBULLYING RELATED OFFENSES – R.A. 10175

    • I.

      Offenses against the confidentiality, integrity and availability of computer data and systems:

      • Illegal Access. – The access to the whole or any part of a computer system without right.

      • Illegal Interception. – Interception to and from the computer data without permission

      • Data Interference. — The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

      • System Interference. — The intentional alteration or reckless hindering of a computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses

    • II.

      Misuse of Devices.

      The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:

      • A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or
      • A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.
      • Cyber-squatting. – The acquisition of a domain in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same, if such a domain name is:
        • (i)

          Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration:

        • (ii)

          Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and

        • (iii)

          Acquired without right or with intellectual property interests in it.

      • Computer-related Offenses:
        • (1)

          Computer-related Forgery. — The act of knowingly using computer data which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design.

        • (2)

          Computer-related Fraud. — The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.

        • (3)

          Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.

        • (4)

          Content-related Offenses:

          • Cybersex. — The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
          • Cyberlibel. — Public and malicious imputation of a crime, or of a vice or defect, real or imaginary or acts which would tend to dishonor a natural person or juridical person committed through a computer system or any other similar means which may be devised in the future.
V.

PENALTIES FOR CYBERCRIME RELATED OFFENSES

Any person found guilty of any of the punishable acts enumerated in this Act shall be punished with imprisonment of prision mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00) up to a maximum amount commensurate to the damage incurred or both. Penalty may be adjusted according to the gravity of the violation committed.

VI.

EFFECTIVITY

This policy shall take effect immediately upon approval.

This Policy was approved on February 19, 2021 by the Board of Directors.