Posts by eccinternational

ECCI is an innovative knowledge-based solutions provider. We partner with organizations and help them achieve performance excellence through our portfolio of process improvement consulting, organizational learning solutions, technology interventions for process automation and managed training services. Headquartered in the Philippines and sporting presence in 6 countries across South and South East Asia, ECCI caters to a wide array of customers across Asia, Europe and the Americas.

ISO 9001:2015 – Shifting Gears in the New Quality Management Standard

Moving from ISO 9001:2008 to ISO 9001:2015

ISO 9001 is a standard designed for organizations looking to optimize their operational excellence. It helps businesses and organizations to be more efficient and improve customer satisfaction. A new version of the standard, ISO 9001:2015, has just been launched, taking over the previous version.


ISO standards are reviewed every five years and revised if needed to ensure that it maintains its significance in today’s market place. This revision will also serve to bring ISO 9001 up to relevancy with regard to both challenges and opportunities that arise from changing technologies, globalization, and a reinforcement of a risk based approach, as well as structuring the standard to deal with future changes.

What are the Major Differences?

The new ISO 9001 standard aligns with high-level organizational structure, requiring all new ISO management system standards to be aligned on a high-level structure with a set of common requirements. Additionally, there is a greater emphasis on risk-based thinking as a basis for the management system, more focus on achieving value for the company and its customers, increased flexibility regarding use of documentation, and a more approachable structure for service businesses.

There are 10 clauses within the standard and here are the changes clause by clause:

Clause 1 is very similar to the 2008 version covering the scope of the standard and there has been very little change to this clause.

Clauses 2 and 3 cover normative references and term and definitions, both these clauses reference ISO 9000, Quality Management System – Fundamental and vocabulary which provides valuable guidance.

The remainder of the clauses includes some new key elements which need to be considered when implementing the new standard.

Clause 4: Context of the Organization

This is a new clause that in part addresses the depreciated concept of preventive action and in part establishes the context for the QMS.

Clause 5: Leadership

This clause places requirements on top management to demonstrate commitment to the QMS through taking accountability for the effectiveness of the QMS, establishing policies, objectives and promotion of continual improvement.

Clause 6: Planning

When planning the QMS, the organization will need to consider the external and internal issues along with needs and expectations of interested parties.

Clause 7: Support

The organization shall determine and provide the necessary resources to establish, implement, maintain and continually improve the QMS.

Clause 8:  Operation

This clause deals with the execution of the plans and processes that enables organization to meet their quality policy and quality objectives.

Clause 9:  Performance Evaluation

This clause sublimates all requirements for monitoring and measurement related to quality performance and effectiveness of their QMS.

Clause 10:  Improvement

The organization must determine the opportunities for improvement to continually improve the organization’s QMS.


Impact of the New Standard

ISO 9001:2015 is now taking off to replace ISO 9001:2008. Organizations who are already ISO 9001 certified should begin tracking their progress of the revision process and familiarize themselves with the various changes made. To maintain your certification to ISO 9001, you will need to upgrade your quality management system to the new edition of the standard and seek certification to it. You have a three-year transition period from the date of publication (September 2015) to move to the 2015 version. This means that, after the end of September 2018, a certificate to ISO 9001:2008 will no longer be valid.

According to the International Accreditation Forum (IAF), there are a number of recommended actions that organizations can take to successfully transition to the new requirements of ISO 9001:2015. These include:

  • Conduct a gap analysis

Identifying the gaps between current practices and the new requirements is the most effective way to evaluate the changes that are required in your current QMS.

  • Develop an implementation plan and timetable

A formal implementation plan and schedule will help your organization address the required changes within the anticipated three-year transition period.

  • Provide appropriate training for all parties

Ongoing education and training for all relevant personnel are critical to achieving the goals of your transition plan. More important, educated stakeholders are vital in ensuring ongoing compliance once the transition is complete.

  • Update existing QMS documentation

Clear and thorough documentation is essential to demonstrate compliance with the requirements of the revised standard and to help reduce the risk of nonconformities.

  • Involve your certification partner early in the process

An experienced certification body can provide invaluable assistance in the process of transitioning to the requirements of ISO 9001:2015. Its early involvement can help your organization save time and money.


In a nutshell, there are new areas that organization need contemplate in the implementation of the new standard, but it provides opportunity to review your current approach and modify it if necessary. This can help your business to grow, increase profitability and increase customer satisfaction. It is now a powerful business improvement tool for all sizes and types of organizations to help them remain irrepressible and achieve sustainable growth.


Confidence on the Cloud – A New Cloud Privacy Standard (ISO 27018)

The Cloud Today

The growing marketplace of cloud computing.

Cloud computing’s growth in use and popularity has been soaring at a great pace! According to Gartner (2013), the marketplace for cloud computing will grow ~20% to USD 131 billion in 2017 from USD 111 billion in 2012.

What’s more?

2016 will be a defining year for cloud as this cutting-edge technology will just get more sophisticated in the next few years.

The Cloud Landscape

Cloud computing started as an in-house infrastructure established by companies such as Microsoft, Google and Amazon to serve their individual business needs. This consists of a set of technologies and service models that focus on Internet-based use and delivery of IT applications, processing capability, storage and memory space.

But now it has evolved into a platform that most part of our daily life is dependent on. While public and private cloud offers one means to differentiate the infrastructure sharing options, SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service) have come to define the extent and level of control held by the cloud service provider (CSP) vs. the cloud user.

According to National Institute of Standards and Technology (NIST), the “cloud” is composed of five essential characteristics.

  1. the on-demand self-service which implies that a customer can order service via the web or some other method at any point in time, to become immediately available for his or her use.
  2. the broad network access, in the sense that services are available over the network and are accessed through standard mechanisms (mobile phone, tablet, laptop, etc.).
  3. Other characteristics are the rapid elasticity of the cloud capabilities and the fact that it is a measured service – means additional capacity remains available and accessible on an ‘as needed’ basis and customers are automatically billed for their consumption.
  4. Last but not least, resource pool, meaning the provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand.

The Confidence for Tomorrow – ISO 27018

The massive courses of data across cloud computing services are becoming ever more complex. Identifying and protecting personal data in those flows is becoming a daunting issue for many cloud service providers and cloud users. Given the substantial data protection risks, cloud computing measures need to be undertaken in order to mitigate their effect to the benefit of the cloud computing industry and its clients.

While there are several laws and regulations around it, a common benchmark or standard was lacking for some time. ISO 27018:2014 – Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors is the first set of international privacy controls launched.

Following and using the privacy controls foreseen in ISO 27018 offers greater assurance for service providers that they are doing the right thing and doing everything recommended to protect customers’ personal information. This mechanism also offers beneficial effect for both cloud providers and cloud users – if a consumer is buying cloud services, it can help them to identify the requirements for selecting a cloud provider and in defining contractual clauses and for cloud service provider, it can provide them with a unique selling proposition to potential clients because as more clients become familiar of the standard, the more that they will see it in their request proposal.

ISO 27018 has taken into account as a public policy from around the world as it integrates input from many regional regulators. A cloud service provider and it’s conformation to the standard makes the whole job of compliance to particular legislation in one country or region that much easier. The standard provides a common set of guidelines for the whole industry and adds needed protections to improve PII security and defiance in an increasingly cloud-based information environment.

ISO 27018 – Quick Overview

Key Elements of the Standard

ISO 27018 is a standard out forward by Internal Organization for Standardization (ISO) that seeks to create a common set of security categories and controls that can be implemented by a public cloud computing service provider acting as a data processor. In order to fulfill the standard, cloud service providers must understand the following key elements:

  1. Personally Identifiable Information (PII) instead of Personal Data

Scope of “personal data” is not only about the information that “can be used” or “linked” to a PII principal/ data subject, but “any information” relating to an identifiable natural person 

  1. Cloud Providers as Data Processors

In ISO/IEC 27018 the client is regarded as PII controller and the cloud service provider is the PII processor.

  1. Personal Data Protection Principles

The ISO/IEC 27018 contains a comprehensive set of controls regarding:

  • Information security policies
  • Organization of information security
  • Human resource security
  • Asset management
  • Asset control
  • Cryptography
  • Physical and environmental security
  • Operations and communications security
  • System acquisition, development and maintenance
  • Supplier relationships
  • Compliance
  • Information security aspects of business continuity management.

As the PII processor enables the cloud service client to comply with its regulatory obligations (data protection), through this controls, PII processor conforms to its own obligations, either legal or contractual.

  1. Accountability and Certification

Elements of the principle of accountability are incorporated into the standard, in particular the data breach notification, privacy by design, audits and certifications. In general, the standard may be seen as an instrument that assists the PII processor to comply with the principle of accountability requirements. Key to the demonstration of compliance in the context of the principle of accountability is third party certification. The cloud service provider that implements the new standard may ask for a conformity assessment, in order to be certified for complying with the standard.

In order to comply with the standard, participating cloud service providers must provide transparency in the following practices:

  • only process personal data in accordance with the customer’s instructions;
  • only process personal data for marketing or advertising purposes with the customer’s express consent;
  • be transparent around the use of sub-processors (which will include providing the names of, and any possible locations where the data may be processed by, any sub-processors);
  • ensure that staff who have access to personal data enter into confidentiality agreements and receive appropriate staff training;
  • make required disclosures to law enforcement authorities and/or regulators only when legally bound to do so;
  • assist cloud customers to comply when individuals assert their access rights; and
  • help cloud customers comply with their notification obligations in the event of a data breach.

Top 10 Things to Know about Cloud Security and ISO 27018

Way Forward

The current landscape for cloud security standard is best characterized as immature but emerging. ISO 27018 provides a transparent guidance for cloud service providers to establish privacy protection and allows businesses to make careful decisions about the cloud. But even with the present guidelines that ISO 27018 provides, it can also serve as reference point for standards’ future improvement. As the first international standard dedicated for cloud privacy, it initiated CSPs interchange of ideas on providing the best practice on data privacy and security.  ISO 27018 is an important step to protecting PII in the cloud, it emerges from previous ISO guidelines and it will continue to evolve along with cloud service providers’ technology to provide more secure services for the growth and success of businesses.

ECC International is a leading process improvement solutions provider in Southeast Asia, focused on process consulting, automation solutions and learning outsourcing services. We help companies achieve performance excellence by assisting them implement management systems and international standards/best practices across multiple domains and industries.

Our partnerships with nest-in-class technology companies help drive sustained excellence for our customers. As a solutions provider with instructional design capability and subject matter expertise in niche areas, we help organizations implement learning strategies and design learning content for improved performance.

APEX Global (The Academy for Professional Excellence) is the learning solutions arm of ECCI – the leading process improvement solutions provider in Southeast Asia.

Our sole aim is to promote performance excellence among professionals. We help our customers achieve greater success through effective, experiential and result – oriented training delivery.

Empowered with a strong pool of expert trainers and facilitators having expertise in a niche array of domains and a strong regional presence, we provide an extensive portfolio of excellent industry specific and functional programs coupled with high quality training materials to provide best –in – class services for professionals around.

We are a market leader when it comes to Information Security and Risk Management solutions (in the form of training, consulting and GRC solutions- in SE Asia.

To learn more about cloud security, ISO 27018 guidelines and requirements, correlation with existing standards such as ISO 27001 and EU Data Protection Laws, join us at the Confidence on the Cloud- Data Security Best Practices based on ISO 27018 training program.




Taking the next step with the new ITIL® Practitioner Qualification


Axelos, the ITIL course owner has announced the most significant evolution for ITIL – the new ITIL Practitioner qualification.

ITIL Practitioner is being developed in collaboration with Practitioners worldwide to help organizations and individuals increase the value they obtain from using ITIL by offering additional practical guidance to adopt and adapt the framework to support the business. It will be the next step after ITIL Foundation for professionals who have already learned the basics of IT Service Management (ITSM) and the business value of well-designed and delivered services. It will help guide them through the practical side of successfully applying the theory in the workplace.

A specific amount of credit points will be assigned to ITIL Practitioner that will count towards ITIL Expert the same way as Foundation, Intermediate and Managing Across the Lifecycle (MALC) do today.

thinkWhy was this introduced?

The demands organizations are putting on their IT teams and IT service providers have changed significantly in the recent years. In many cases, we have moved from “let’s keep everything as stable as possible” to “let’s be as agile as possible (and make sure we can recover instantly)”. The technological capabilities – such as those enabled by rapidly evolving cloud computing – and associated practices have made it possible to better answer those demands. The detailed ‘how’ of all of this depends, though – what works for a Bay Area start-up might not work for a large multinational enterprise, and the expectations from existing customers of 10+ years differ from those acquired yesterday. For ITSM professionals, there is an ever-growing demand for more practical guidance on how to design fit-for-purpose and fit-for-use services and supporting processes.

That is where ITIL and other philosophies, frameworks and methodologies – such as Lean, DevOps and Agile – need to intersect for the best results. There are no silver bullets – organizations need to wisely choose the best ways to address specific challenges. ITIL helps with this by providing the framework where good practice of the ‘how’ can be plugged into. Additional, practical guidance was needed to bring this to life.

Enter… ITIL Practitioner

Setting what is often (mistakenly!) considered to be the last ITIL lifecycle stage, almost a nice-to-have feature – Continual Service Improvement (CSI) – as the backbone of the new qualification, ITIL Practitioner brings what is one of the most under-used and under-valued parts of ITIL to the real world. It is CSI that helps organizations to focus on the improvements delivering most value and to make sure the services and the practices supporting these can keep up with the needs from the ever-changing organization, and continually improve.

ITIL Practitioner equips ITSM professionals with the tools to identify the improvement needs and priorities in their organization, to successfully start and run the improvement initiatives and to deliver the value expected. The qualification – and the guidance supporting it – brings together various parts of ITIL, adding more detail as required, and combines this with the practical ‘how to’. The good practice from ITSM professionals from around the world is distilled into concepts, models and capabilities, and complemented with tools and methods to place it in the context of a specific organization. This is ITIL Practitioner.

For more information, please check this ITIL Practitioner page.


Data Center Fun Facts

There’s no question that big data plays a huge role in the lives of millions of people as well as countless businesses.

As each year passes, data gets bigger and more storage facilities are built to handle the influx of information and keep it accessible and safe.

Just how big has big data become? How big do data centers have to be to handle that much data? Not surprisingly, with more of the world turning to electronic forms of storage and and ever-increasing amount of data, data centers are becoming a lot more efficient at handling information and compressing it.


50 Sensor Applications for a Smarter World

50 Sensor Applications for a Smarter World

Smart Cities

  • 01 Smart Parking

    Monitoring of parking spaces availability in the city.

  • 02 Structural health

    Monitoring of vibrations and material conditions in buildings, bridges and historical monuments.

  • 03 Noise Urban Maps

    Sound monitoring in bar areas and centric zones in real time.

  • 04 Smartphone Detection

    Detect iPhone and Android devices and in general any device which works with WiFi or Bluetooth interfaces.

  • 05 Eletromagnetic Field Levels

    Measurement of the energy radiated by cell stations and and WiFi routers.

  • 06 Traffic Congestion

    Monitoring of vehicles and pedestrian levels to optimize driving and walking routes.

  • 07 Smart Lighting

    Intelligent and weather adaptive lighting in street lights.

  • 08 Waste Management

    Detection of rubbish levels in containers to optimize the trash collection routes.

  • 09 Smart Roads

    Intelligent Highways with warning messages and diversions according to climate conditions and unexpected events like accidents or traffic jams.

See Related Articles


Smart Environment

  • 10 Forest Fire Detection

    Monitoring of combustion gases and preemptive fire conditions to define alert zones.

  • 11 Air Pollution

    Control of CO2 emissions of factories, pollution emitted by cars and toxic gases generated in farms.

  • 12 Snow Level Monitoring

    Snow level measurement to know in real time the quality of ski tracks and allow security corps avalanche prevention.

  • 13 Landslide and Avalanche Prevention

    Monitoring of soil moisture, vibrations and earth density to detect dangerous patterns in land conditions.

  • 14 Earthquake Early Detection

    Distributed control in specific places of tremors.

See Related Articles


Smart Water

  • 15 Potable water monitoring

    Monitor the quality of tap water in cities.

  • 16 Chemical leakage detection in rivers

    Detect leakages and wastes of factories in rivers.

  • 17 Swimming pool remote measurement

    Control remotely the swimming pool conditions.

  • 18 Pollution levels in the sea

    Control realtime leakages and wastes in the sea.

  • 19 Water Leakages

    Detection of liquid presence outside tanks and pressure variations along pipes.

  • 20 River Floods

    Monitoring of water level variations in rivers, dams and reservoirs.

See Related Articles


Smart Metering

  • 21 Smart Grid

    Energy consumption monitoring and management.

  • 22 Tank level

    Monitoring of water, oil and gas levels in storage tanks and cisterns.

  • 23 Photovoltaic Installations

    Monitoring and optimization of performance in solar energy plants.

  • 24 Water Flow

    Measurement of water pressure in water transportation systems.

  • 25 Silos Stock Calculation

    Measurement of emptiness level and weight of the goods.

See Related Articles


Security & Emergencies
  • 26 Perimeter Access Control

    Access control to restricted areas and detection of people in non-authorized areas.

  • 27 Liquid Presence

    Liquid detection in data centers, warehouses and sensitive building grounds to prevent break downs and corrosion.

  • 28 Radiation Levels

    Distributed measurement of radiation levels in nuclear power stations surroundings to generate leakage alerts.

  • 29 Explosive and Hazardous Gases

    Detection of gas levels and leakages in industrial environments, surroundings of chemical factories and inside mines.

See Related Articles



  • 30 Supply Chain Control

    Monitoring of storage conditions along the supply chain and product tracking for traceability purposes.

  • 31 NFC Payment

    Payment processing based in location or activity duration for public transport, gyms, theme parks, etc.

  • 32 Intelligent Shopping Applications

    Getting advices in the point of sale according to customer habits, preferences, presence of allergic components for them or expiring dates.

  • 33 Smart Product Management

    Control of rotation of products in shelves and warehouses to automate restocking processes.

See Related Articles



  • 34 Quality of Shipment Conditions

    Monitoring of vibrations, strokes, container openings or cold chain maintenance for insurance purposes.

  • 35 Item Location

    Search of individual items in big surfaces like warehouses or harbours.

  • 36 Storage Incompatibility Detection

    Warning emission on containers storing inflammable goods closed to others containing explosive material.

  • 37 Fleet Tracking

    Control of routes followed for delicate goods like medical drugs, jewels or dangerous merchandises.

See Related Articles


Industrial Control

  • 38 M2M Applications

    Machine auto-diagnosis and assets control.

  • 39 Indoor Air Quality

    Monitoring of toxic gas and oxygen levels inside chemical plants to ensure workers and goods safety.

  • 40 Temperature Monitoring

    Control of temperature inside industrial and medical fridges with sensitive merchandise.

  • 41 Ozone Presence

    Monitoring of ozone levels during the drying meat process in food factories.

  • 42 Indoor Location

    Asset indoor location by using active (ZigBee) and passive tags (RFID/NFC).

  • 43 Vehicle Auto-diagnosis

    Information collection from CanBus to send real time alarms to emergencies or provide advice to drivers.

See Related Articles


Smart Agriculture

  • 44 Wine Quality Enhancing

    Monitoring soil moisture and trunk diameter in vineyards to control the amount of sugar in grapes and grapevine health.

  • 45 Green Houses

    Control micro-climate conditions to maximize the production of fruits and vegetables and its quality.

  • 46 Golf Courses

    Selective irrigation in dry zones to reduce the water resources required in the green.

  • 47 Meteorological Station Network

    Study of weather conditions in fields to forecast ice formation, rain, drought, snow or wind changes.

  • 48 Compost

    Control of humidity and temperature levels in alfalfa, hay, straw, etc. to prevent fungus and other microbial contaminants.

See Related Articles


Smart Animal Farming

  • 49 Hydroponics

    Control the exact conditions of plants grown in water to get the highest efficiency crops.

  • 50 Offspring Care

    Control of growing conditions of the offspring in animal farms to ensure its survival and health.

  • 51 Animal Tracking

    Location and identification of animals grazing in open pastures or location in big stables.

  • 52 Toxic Gas Levels

    Study of ventilation and air quality in farms and detection of harmful gases from excrements.

See Related Articles


Domotic & Home Automation

  • 53 Energy and Water Use

    Energy and water supply consumption monitoring to obtain advice on how to save cost and resources.

  • 54 Remote Control Appliances

    Switching on and off remotely appliances to avoid accidents and save energy.

  • 55 Intrusion Detection Systems

    Detection of windows and doors openings and violations to prevent intruders.

  • 56 Art and Goods Preservation

    Monitoring of conditions inside museums and art warehouses.

See Related Articles



  • 57 Fall Detection

    Assistance for elderly or disabled people living independent.

  • 58 Medical Fridges

    Control of conditions inside freezers storing vaccines, medicines and organic elements.

  • 59 Sportsmen Care

    Vital signs monitoring in high performance centers and fields.

  • 60 Patients Surveillance

    Monitoring of conditions of patients inside hospitals and in old people’s home.

  • 61 Ultraviolet Radiation

    Measurement of UV sun rays to warn people not to be exposed in certain hours.

See Related Articles





Business continuity planning vital for disaster-prone Manila

Photo credit

A supermarket in Manila after the tropical Storm “Ondoy” ( Ketsana ), 26 September 2009

MANILA, 4 May: UNISDR joined forces with a leading university yesterday to urge Manila’s business community to reduce its disaster risk and to develop business continuity plans which take account of the capital city’s extreme exposure to earthquakes and typhoons. Disasters cost the country a record $615 million last year.

“Adopting business continuity plans is not a question of choice but a double imperative for the Philippines as earthquake and typhoon risks are very high and seriously threaten business assets and profits”, Margareta Wahlström, the UN Secretary-General’s Special Representative for Disaster Risk Reduction told more than 100 participants at a roundtable on business continuity planning (BCP) held in Ateneo Graduate School of Business in Manila.

“Corporations need to start thinking about what they can do to better protect their businesses against disasters as they are already paying a very high cost for not doing so,” warned Wahlström.

“The private sector plays an instrumental role in mitigating the collective risks we face as people”, said Father Jett Villarin, President of the Ateneo De Manila University, “and BCP should be also taught in business schools to sustain the dialogue and practice among business entities.”

According to a study by the Japanese International Cooperation Agency (JICA), “The Metro Manila Earthquake Impact Reduction Study”, a 7.2 magnitude earthquake in the West Valley Fault will damage 40 percent of the total number of residential buildings within Metropolitan Manila, which has 11.8 million inhabitants, and will cause approximately 34,000 deaths and 114,000 injuries. Moreover, fire spreading as a secondary effect of the earthquake will cause an additional 18,000 deaths.

The Philippine Institute of Volcanology and Seismology has noted that such an event happening is inevitable.

In 2011, disaster losses rose to 26 billion pesos (US$615 Million) in the Philippines exceeding the previous record of 14.5 Billion pesos in 2006.

Manila which accounts for more than 33 per cent of the GDP in the Philippines has been hit by 30 earthquakes since 1900. The Valley Fault System that runs north to south along the west and east edges of the Marikina Valley is thought to pose the greatest seismic threat to Metro Manila due to its close proximity.

Manila and the Philippines also suffer from more than 30 typhoons per year. Tropical Storm Ondoy and Typhoon Pepeng in 2009 have already caused substantial damages and losses, equivalent to about 2.7 percent of GDP. Climate change experts predict that typhoons, storms and flash floods will be even more frequent and severe in the future.

“In addition to these first hand risks, the Philippines is also exposed to other threats due to the interconnectedness of today’s disasters. A disaster happening in Japan or somewhere else in Asia can have also great repercussions in the Philippines affecting different manufacturing activities and employment sectors,” noted Wahlström.

The Great East Japan Earthquake in 2011, for example, resulted in a 10-25 percent decrease in the automobile production with a domino effect of a 10-20 percent reduction in the manufacturing of electrical components in the Philippines.

“Yet despite the magnitude of potential costs and loss of incomes, reducing disaster risk continues to be perceived as a lesser priority than fiscal stability, unemployment or inflation when it should be a priority as disasters continue to increase and inflict huge economic losses to businesses,” said the UN head for Disaster Risk reduction.

Senator Loren Legarda who is a UNISDR Regional Disaster Risk Reduction Champion took the opportunity of the visit by Wahlström to convene a high-level meeting of business leaders to convince them that robust business continuity planning was part of their corporate social responsibility. Those business leaders included Rhicke Jennings, President of the American Chamber of Commerce, Henry Limbonliong, Vice-President of the Filipino-Chinese Chamber of Commerce and M. Hans Sy of SM Prime Holdings.

According to a recent survey carried out by the Japanese government on the adoption of business continuity planning (BCP) by member countries of the Asia-Pacific Economic Cooperation (APEC), just after the APEC meeting last November in Honolulu, only nine out of the 40 Philippines companies which responded to the survey had a BCP in place while three others were in the process of developing one.

How to Influence Through Quality Management Skills

by Kevin Johnston, Demand Media

As a small-business owner, you can benefit from learning how quality management skills can influence managers, middle managers and your entire workforce to work toward improvements in the way you run your company. As you demonstrate top-notch skills, you gain influence based on your wisdom, judgment and knowledge. This influence can have a major impact on morale and productivity.

People Skills

Your ability to empathize with others lays the foundation for all of your other management skills. If you consistently demonstrate that you listen to people and strive to understand their concerns, you gain influence through the respect you earn. While you have the right to exercise power due to your position as the owner of the business, you gain wider influence by developing positive relationships with your employees.

Technical Skills

If you understand both the advanced and basic tasks of your business, you establish yourself as a person of influence in the company. Employees will know that you understand their job skills and the problems they must overcome, along with the determination it takes to do a quality job day in and day out.

Problem-Solving Abilities

When you solve problems, you gain influence. Your successful solutions demonstrate that you have earned your position as business owner through your management acumen. You establish yourself as a go-to person for your managers and their staff when problems arise. Your influence will spread as your decisions are implemented and employees see positive results.

High Expectations

Managers who structure high expectations into team and company goals can influence employees to reach for their best. Distinct, well-defined expectations help employees engage in a process that leads to stronger outcomes than those achieved under old authoritarian models built on threats and rewards. This allows you to lead employees in a positive direction and gain influence by involving them in creating ways to meet high expectations.

Rethinking Management Roles

To gain influence, learn to look at your role not as a boss but as a mentor. Employees will respond when they feel they are part of the process of creating quality in your business. The mentor approach allows you to persuade rather than cajole and lead rather than push.


Your ability to mediate disagreements among your staff can garner you a reputation as a wise leader. You must master the management skill of accepting two opposing positions as legitimate and seeing the positives in each opponent’s viewpoint. Finding a middle ground where those in a disagreement can agree on a compromise will expand your influence and improve your reputation.

Operational Skills

Maintain your influence by showing employees you keep the big picture in mind when addressing problems in a single area. You can show an ability to understand how myriad tasks fit together to make the whole business work. Employees will realize that their focus is part of the big picture but that you have to oversee the entire operation. This will solidify your influence at your business.

Conveying Vision

Perhaps the most influential management skill you can practice is the ability to get others excited about your vision. When you convince others that what you have imagined is possible, they will follow you and work hard to bring your vision to fruition.

About the Author

Kevin Johnston writes for Ameriprise Financial, the Rutgers University MBA Program and Evan Carmichael. He has written about business, marketing, finance, sales and investing for publications such as “The New York Daily News,” “Business Age” and “Nation’s Business.” He is an instructional designer with credits for companies such as ADP, Standard and Poor’s and Bank of America.