ChanRobles Virtual law Library




PHILIPPINE LAWS, STATUTES & CODES

A collection of Philippine laws, statutes and codes not included or cited in the main indices of the Chan Robles Virtual Law Library.


Home > Chan Robles Virtual Law Library > Philippine Laws, Statutes & Codes > :



google search for chanrobles.comSearch for www.chanrobles.com



:

EXECUTIVE ORDERS

PLEASE CLICK HERE FOR THE LATEST ➔ PHILIPPINE LAWS, STATUTES & CODES












EXECUTIVE ORDER NO. 265

EXECUTIVE ORDER NO. 265 - APPROVING AND ADOPTING THE GOVERNMENT INFORMATION SYSTEMS PLAN (GISP) AS FRAMEWORK AND GUIDE FOR ALL COMPUTERIZATION EFFORTS IN GOVERNMENT

WHEREAS, the government is committed to carry out, in pursuance of “Angat Pinoy 2004”, or the Medium-Term Philippine Development Plan, 1999-2004, wide-ranging administrative reforms to enhance government efficiency and effectiveness in government operations and in the delivery of basic services to the public; 

WHEREAS, these reforms are being pursued particularly in fiscal and financial management, procurement, education and manpower development, personnel welfare, organizational effectiveness, and service delivery;

WHEREAS, the wider use and application of information and communications technology offer tremendous opportunities for government to ensure the success of these reforms;  

WHEREAS, the National Information Technology Council (NITC), the policy advisory body on information and communications technology in the country, has formulated, in close consultation with concerned government agencies, the private sector, local government units, academe, and members of Congress, and accordingly endorsed a government information systems plan that will serve as blueprint for the computerization of vital government operations and key front-line services for more effective governance;

WHEREAS, the NITC and the Electronic Commerce Promotion Council, created pursuant to Executive Order 468, dated 23 February 1998, have been merged into the Information Technology and Electronic Commerce Council (ITECC);  

NOW, THEREFORE, I, JOSEPH EJERCITO ESTRADA, President of the Philippines, by virtue of the powers vested in me by law, do hereby order as follows:

Section 1. Approval of the GISP. — The Government Information System Plan (GISP), also to be known as “Philippine Government Online”, hereto attached, is hereby approved and adopted as framework and guide for the computerization of key frontline and common services and operations of the government to enhance overall governance and improve the efficiency and effectiveness of the bureaucracy.  

Sec. 2. GISP Implementation. — To ensure the full and effective implementation of the GISP, all government agencies and instrumentalities, including local government units, shall align their respective computerization projects with the priorities identified in the GISP. The ITECC shall prepare a consolidated annual program of expenditures for government computerization, which shall become part of the President’s Annual Expenditure Program for submission to Congress.

Sec. 3. Implementing Rules and Regulations. — ITECC shall issue such guidelines as may be necessary to implement this Executive Order.

Sec. 4. Repealing Clause. — All orders, directives, issuances, resolutions, rules and regulations or parts thereof that are inconsistent with the provisions of this Executive Order are hereby repealed or modified accordingly.  

Sec. 5. Effectivity. — This Executive Order shall take effect immediately.

DONE in the City of Manila, this 12th day of July, in the year of our Lord, Two Thousand.

ATTACHMENT

Philippine Government Online
Government Information Systems Plans
Foreword

In my keynote speech during the Knowledge Economy Conference held on May 8, 2000, I specifically mentioned that I want to see information and communications technology (ICT) more widely and effectively used in government, to give the public better access to information and to deliver government services more efficiently and promptly.

Philippine Government Online is therefore a very apt name for this Government Information Systems Plan (GISP) as it means bringing government closer to our people. The GISP envisions the Philippines as a country where every citizen anywhere in the archipelago or in any part of the world, as well as our foreign friends and business partners, can easily access and avail of government information and services.

All this is now possible if we harness the full potentials of ICT and the Internet. We look at ICT, not only as a productivity tool, but more importantly, as a development strategy for economic growth and global competitiveness. In fact, it is an important component of the Medium-Term Philippine Development Plan (MTPDP), or “Angat Pinoy 2004.” The specific plans for the attainment of economic growth and social equity as outlined in the MTPDP—whether in social reform, industry, infrastructure, governance and macroeconomic development—underline the importance of ICT in achieving our development objectives and targets for the next four years.

In line with those objectives, the GISP details the policies, the infrastructure, strategies, technology solutions, and financing options that must be put in place and set in motion for us to realize our vision of a “Philippine Government Online.” It also provides the implementation framework and key milestones that will guide the different line departments and agencies, the Department of Budget and Management and other oversight agencies, as well as the Cabinet and Congress in the planning and allocation of budgetary appropriations for priority ICT programs and projects of the government.

The realization of our vision of Philippine Government Online will only be possible with the support of everybody. I, therefore, enjoin the cooperation of the leaders and members of Congress, the Judiciary, all executive departments, local government units, and the private sector to make us realize this vision.

JOSEPH EJERCITO ESTRADA
President

Republic of the Philippines
June 2000

PHILIPPINE GOVERNMENT ONLINE!

This is not just a buzzword. It is both the vision and strategy adopted by the government in reforming governance today through the application of information and communications technology (ICT). And the Government Information Systems Plan (GISP) is the framework and master plan to make this happen.

Consistent with the country’s development objectives as contained in the Medium-Term Philippine Development Plan, or “Angat Pinoy 2004,” the GISP envisions an electronic bureaucracy that is widely and readily accessible to its constituency — the Filipino people.

It is a master plan that sets the enabling policy and institutional infrastructure and environment, as well as the direction, priorities and benchmarks for computerization of key government operations and activities over the next five to ten years. It is a plan to fully harness the potentials of ICT for good governance and promote transparency and accountability in government operations and transactions.

The GISP was formulated in consultation with various stakeholders — government agencies, the private sector, civil society, media, the academe, and other critical players in governance and the information and communications technology community.

The National Information Technology Council (NITC) wishes to acknowledge and express its sincerest thanks to all those who have contributed their time and energy to ensure the completion of this Plan. Without their valuable inputs support and encouragement, the completion of this Plan would not have been possible. We hope that this will translate into concrete results for the realization of the GISP’s goal and objectives.

At the same time, we enjoin all those in government and the private sector to work together in ensuring the realization of PHILIPPINE GOVERNMENT ONLINE!

(SGD.) DR. FILEMON A. URIARTE, JR.

Secretary
Department of Science and Technology
Chairman
National Information Technology Council

(SGD.) DR. FELIPE M. MEDALLA
Secretary
National Economic and Development Authority
Co-Chairman
National Information Technology Council

(SGD.) JAIME AUGUSTO ZOBEL DE AYALA II
President and CEO
Ayala Corporation
Co-Chairman
National Information Technology Council

EXECUTIVE ORDER NO. _____
APPROVING AND ADOPTING THE GOVERNMENT INFORMATION SYSTEMS PLAN (GISP) AS FRAMEWORK AND GUIDE FOR ALL COMPUTERIZATION EFFORTS IN GOVERNMENT

WHEREAS, the government is committed to carry out, in pursuance of “Angat Pinoy 2004” or the “Medium-Term Philippine Development Plan, 199-2004,” wide-ranging administrative reforms to enhance government efficiency and effectiveness in government operations and in the delivery of basic services to the public;

WHEREAS, these reforms are being pursued particularly in fiscal and financial management, procurement, education and manpower development, personnel welfare, organizational effectiveness, and service delivery;

WHEREAS, the wider use and application of information and communications technology (ICT) offer tremendous opportunities for government to ensure the success of these reforms;

WHEREAS, the National Information Technology Council (NITC), the policy advisory body on information and communications technology (ICT) in the country, has formulated, in close consultation with the other agencies of government, the private sector, local government units, academe, members of Congress, and accordingly endorsed a government information systems plan that will serve as blueprint for the computerization of vital government operations and key frontline services for more effective governance;

NOW, THEREFORE, I, JOSEPH EJERCITO ESTRADA, President of the Philippines, by virtue of the powers vested in me by law, do hereby order as follows:

Section 1. Approval of the GISP. — The Government Information Systems Plan (GISP), also to be known as “Philippine Government Online,” attached hereto, is hereby approved and adopted as framework and guide for the computerization of key frontline and common services and operations of the government to enhance overall governance and improve efficiency and effectiveness in the bureaucracy.

Sec. 2. GISP Implementation. — To ensure the full and effective implementation of the GISP, all government agencies and instrumentalities, including local government units, shall align their respective computerization projects with the priorities identified in the GISP. For this purpose, the National Information Technology Council (NITC) shall issue such guidelines as may be necessary to implement this Executive Order. The NITC shall prepare a consolidated annual program of expenditures for government computerization, which shall become part of the President’s annual Expenditure Program for submission to Congress.

Sec. 3. Repealing Clause. — All orders, directives, issuances, resolutions, rules and regulations or parts thereof that are inconsistent with the provisions of this Executive Order are hereby repealed or modified accordingly.

Sec. 4. Effectivity. — This Executive Order shall take effect immediately.

Done in the city of __________ this _______ day of _________, in the year _______.

By the President:

RONALDO B. ZAMORA
Executive Secretary

Abbreviations and Acronyms

AFIRM Automated Fingerprint Image Reporting and Match
AFP Armed Forces of the Philippines
AFPMC AFP Medical Center
ANSI     American National Standards Institute
ASEAN Association of Southeast Asian Nations
ATM     Automated Teller Machines
BC   Bureau of Corrections
BFAR   Bureau of Fisheries and Aquatic Resources
BFP Bureau of Fire Protection
BI    Bureau of Immigration
BIR Bureau of Internal Revenue
BJMP   Bureau of Jail Management and Penology
BL Bureau of Lands
BLGF  Bureau of Local Government Finance
BOC   Bureau of Customs
BOI Board of Investments
BOO    Build Own-and-Operate
BOT     Build Operate-and-Transfer
BPHRE Bureau of Post-Harvest for Research and Extension
BSP   Bangko Sentral ng Pilipinas
BTR     Bureau of Treasury
C&C     Computing and Communication
CA  Court of Appeals
CADD Computer-Aided Drafting and Design
CANPASS Canadian version of INSPASS
CD-R    Recordable Compact Disks
CHED   Commission on Higher Education
CHR    Commission on Human Rights
CIO     Chief Information Officer
CMTS  Cellular Mobile Telephone Services
COA  Commission on Audit
COMELEC Commission on Election
COTS Commercial On The Shelf Software
CRS Civil Registry System
CSC Civil Service Commission
CSLP Commission on the Settlement of Land Problems
DA    Department of Agriculture
DAR  Department of Agrarian Reform
DBM  Department of Budget and Management
DDB   Dangerous Drugs Board
DECS Department of Education, Culture and Sports
DENR Department of Environment and Natural Resources
DFA Department of Foreign Affairs
DILG Department of the Interior and Local Government
DISP Department Information Systems Plan
DND  Department of National Defense
DOF Department of Finance
DOH  Department of Health
DOJ   Department of Justice
DOLE Department of Labor and Employment
DOST Department of Science and Technology
DOT   Department of Tourism
DOTC Department of Transportation and Communications
DPWH Department of Public Works and Highway
DSS    Decision Support Systems
DSWD Department of Social Welfare and Development
DTI   Department of Trade and Industry
EAPS Examination Application Processing System
EBT   Electronic Benefits Transfer
E-Commerce Electronic Commerce
EDF   Economic Development Foundation
EDI   Electronic Data Interface
EDM Electronic Data Management
EIS   Executive Information Systems
EPS  Electronic Procurement System
FDDI Fiber Distributed Data Interface
FINLINK Financial Information Systems Project
FIRB Fiscal Incentive Review Board
FMIS Financial Management Information System
FTP  File Transfer Protocol
GAA General Appropriation Act
GCMCC Government Corporate Monitoring Coordinating Council
GHRMIS Government Human Resource Management Information System
GIS Government Information System
GISP  Government Information Systems Plan
GMIS Government Manpower Management Information System
GOCC   Government Owned and/or Controlled Corporations
GPAIS  Government Physical Assets Information System
GPS  Global Positioning Systems
GRMIS Government Records Management IS
GSIS Government Service Insurance System
HLURB Housing and Land Use Regulatory Board
HRIS Human Resource Information System
HTML Hypertext Markup Language
HUDCC Housing and Urban Development Coordinating Council
IAFIS Integrated Automated Fingerprint Identification System
IC Integrated Circuit
ICC     Integrated Circuit Card
ICT Information and Communications Technology
IEC Information Education and Communication
INSPASS Immigration and Naturalization Service’s (INS) Passenger
Accelerated Service System (PASS)
IP Internet Protocol
IRA Internal Revenue Allotments
IRM Information Resource Management
IRMO Information Resource Management Office
IRMP Information Resource Management Program
IS Information Systems
ISO International Standards Organization
ISP Internet Service Provider
ISSP Information Systems Strategic Plan
IT Information Technology
ITFP Information Technology Foundation in the Philippines
IT21 National Information Technology Plan for the 21st Century
ITMDP IT Manpower Development Program
ITR Income Tax Return
JOBNET Job Market/Matching System
LAN Local Area Network
LBP Land Bank of the Philippines
LCP Lung Center of the Philippines
LEDAC Legislative Executive Development Advisory Council
LGU Local Government Unit
LRA Land Registration Authority
LTO Land Transportation Office
MIS Management Information System
MNLF IP Moro National Liberation Front Integration Program
Mobile IP
or L2TP Special tunneling protocols for VPN
MSC Multimedia Super Corridor
MTEF Medium Term Expenditure Framework
MTEP Medium Term Expenditure Plan
NAMRIA National Mapping and Resource Information Authority
NAPC National Anti-Poverty Commission
NAPOLCOM National Police Commission
NBI National Bureau of Investigation
NCC National Computer Center
NCCA National Commission on Culture and the Arts
NCI National Computer Institute
NCIC 2000 National Crime Information Center 2000
NCIP National Commission on Indigenous People
NCIS National Crime Information System
NCR National Capital Region
NCWDP National Council for the Welfare and Disabled Persons
NEDA National Economic and Development Authority
NFA National Food Authority
NHI National Historical Institute
NHMFC National Home Mortgage and Finance Corporation
NIN National Information Network
NITC National Information Technology Council
NITP2000 National Information Technology Plan 2000
NKTI National Kidney Transplant Institute
NLAM Network Layer Address Management
NM National Museum
NSCB National Statistical Coordination Board
NSO National Statistics Office
NTA National Tobacco Administration
NTC National Telecommunications Commission
NYC National Youth Commission
OCR Optical Character Reader
ODA Official Development Assistance
OES Office of the Executive Secretary
OIRM Office of Information Resource Management
OMA Office of Muslim Affairs
OP Office of the President
OP-EIS Office of the President Executive Information System
PAGASA Philippine Atmospheric, Geophysical and Astronomical Services
PC Personal Computer
PCASTRD Philippine Council on Advance Science and Technology Research
and Development
PCHRD Philippine Council for Health Research and Development
PCIC Philippine Crop Insurance Corporation
PCMC Philippine Children’s Medical Center
PCUP Presidential Commission for the Urban Poor
PCS Philippine Computer Society
PDA Personal Digital Assistant
PDF Portable Document Format
PEAC Prequalification, Evaluation and Awards Committee
PETEF Philippine Electronics and Telecommunications Federation
PGH Philippine General Hospital
PHC Philippine Heart Center
PHIC Philippine Health Insurance Corporation
PHILVOCS Philippine Institute of Volcanology and Seismology
PII Philippine Information Infrastructure
PISO Philippine Internet Service Organization
PLA (Office of the) President Legal Adviser
PLDT Philippine Long Distance and Telecommunications Company
PMA Philippine Military Academy
PMS Presidential Management Staff
PNP Philippine National Police
POPCOM Commission on Population
PSA Philippine Software Association
PSC Philippine Sports Commission
PSTN Public Switched Telephone Network
R&D Research and Development
RA Republic Act
RAM Random Access Memory
RDBMS Relational Database Management System
RIARC Regional Integrated Agricultural Research Center
RMAO Records Management and Archives Office
ROS Research Outreach Station
RTC Regional Trial Court
S&T Science and Technology
SEC Security Exchange Commission
SISN Statistical Information Systems Network
SSS Social Security System
SUC State Universities and Colleges
TCP/IP Transmission Control Protocol/Internet Protocol
TESDA Technical Education and Skills Development Authority
TIGERS Telecommunications, Industry Government, Education, Research
and Development, Services
UP University of the Philippines
VMMC Veterans Memorial Medical Center
VPN Virtual Private Networks
WAN Wide Area Network
WAP Wireless Application Protocol
WORM Write Once Read Many
WWW World Wide Web
xDSL Digital Subscriber Line

Chapter 1
ICT Developments and Challenges

The success stories of many Asian countries may be attributed in large part to their adoption of policies and strategies that focused on the use and exploitation of information and communications technology (ICT). These include: strong government commitment and support for ICT development in the form of policy incentives; increasing levels of investment in ICT research and development projects;eralized and accelerated investments in key infrastructure and telecommunications facilities; increasing manpower development and skills training, particularly in engineering and ICT.

A. ICT Facilities in the Philippines

Telecommunications

The liberalization of the telecommunications industry opened the doors for more players in the sector, which resulted in a dramatic rise in the country’s telecommunications facilities and services.

Starting 1992, cellular mobile telephone services (CMTS) were offered by public carriers with approved franchises on either regional or national coverage. In 1997, the cellular phone density was at 18.78 phones per 1,000 persons, or about 53 users for every cell phone.

Figures 1-1 and 1-2 show that about 5.4 million land-based telephone lines were installed from 1993 to 1997 with the implementation of the Service Area Scheme of the DOTC’s Basic Telephone Program. Telephone density increased nearly 10 times from 1992 to 1998.


Liberalization brought more players in the telecommunications industry, and greatly increased the number of telecommunications facilities and services in the Philippines.

Figure 1.1 — Telephone Lines Installed in the Philippines, 1990-1998 and

Figure 1.2  — Telephone Density in the Philippines, 1990-1998

Three new alternative backbone networks are now being built to meet the increasing demand of the public for faster, more efficient, and more modern telecommunications facilities: the National Digital Transmission Network, a fiber optic network to run from La Union through Western Visayas to Davao City; the Domestic Fiber Optic Network which will provide nationwide digital coverage, and a network that will ink Manila and Cebu.

Through the Municipal Telephone Program, the government as of September 1997, had put up 867 Public Calling Offices (PCOs) in municipalities nationwide, on top of the 427 set up by the private sector. Still, about 700 municipalities had no telephones as of 1998.

In August 1997, the Mabuhay Philippines Satellite Corporation launched the first satellite communications link connecting Metro Manila hub stations with all regions in the country. A second satellite is being built by the Philippine Aguila Satellite Inc., a consortium of private telecommunications operators.


Personal Computers Market

The personal computers market increased tremendously with average annual sales estimated at 350,000 units. About 20% of total sales is bought for home use, the rest for office and business use (Velasco, UAP/CRC 1999).

The number of PC users and internet service providers and subscribers grew tremendously in recent years.

Internet Service Providers

From 19 in 1995, Internet service providers rose to about 160 in 1997. Other services using the Internet also expanded.

Some new services using the Internet

The Internet aXess card launched by WebQuest which provides telephone services over the Internet;

The first Philippine Internet Exchange (PhiX) established by PLDT, interconnects Infocom, Iphil, Mozcom, Virtualink and Worldtel which allows service providers to exchange local Internet traffic within the Philippines without having to connect to the host servers overseas.


As of end 1997, Internet subscribers numbered 50,000 to 75,000 while an additional 150,000 to 225,000 nonsubscribers have access to the Internet through schools, offices, and cyber cafes (Velasco, UAP/CRC 1999).

Software Service Providers

A UNIDO study (1997) showed that local software providers are small, with very limited capital and capacity to develop products that will satisfy government’s sophisticated requirements. Government needs to address this through policies and strategies that will stimulate capital formation and encourage partnerships between local software and solution providers and government. The situation also calls for a government study on the possibility and implications of opening up the procurement of huge ICT projects to global competition.

Local software providers are mostly small and unable to satisfy government’s sophisticated ICT requirements.

B. International Comparisons

Asian ICT Facilities

Despite improvements in telecommunications, the Philippines falls behind its Asia-Pacific neighbors. Based on data from OECD’s 1999 World Development Indicators, the Philippines ranks second from the bottom in terms of ICT facilities among Asian countries, only better than Indonesia (Figs. 1-3, 1-4 and 1-5). Hong Kong and Singapore had ICT facilities comparable to those of Japan and the United States, which are the world leaders. Malaysia, South Korea and Thailand are likewise gaining more ground in improving their ICT facilities.

The Philippine falls behind its Asian neighbors in terms of ICT facilities.

Figure 1.3 — Distribution of Mobile Phones per 1,000 People in Selected Countries and

Figure 1.4 — Distribution of Personal Computer per 1,000 People in Selected Countries

Figure 1.5 — Distribution of Internet Hosts per 10,000 People in Selected Countries, July 1998

ICT Market

The Asian ICT markets grew at an average of 20.44% from 1987, to 1994, outstripping the growth in the region’s gross domestic product (Fig. 1.6). The Philippine ICT market is growing at a pace more than twice its GDP growth. The rapid growth in the ICT market in the region resulted in its increasing share in the world market from 1.7% to 2.8% during the period.

As in the rest of Asia, ICT market growth in the Philippines outstripped the country’s GDP growth. But compared to the other Asian countries, the ratio of ICT market size to GDP in the Philippines is still small.

Figure 1.6 — Compound Annual Growth (CAGR) of IT Market and GDP (in %) 1987-1994

Key ICT Initiatives in Asian countries

Malaysia’s 2020 Vision and Multimedia Super Corridor launched in August 1996

South Korea’s program to build an information highway between 1996 and 2010

Telecommunications and information industries as among the top ten priority industries in Singapore’s Manufacturing 2000

The Philippines IT21 and provision of tax holidays and other incentives to locators in IT parks, a few of which have already been proclaimed: the Eastwood Cyber Park in Quezon City; the Northgate Cyber Zone in Alabang; and the Fort Bonifacio-Silicon Alley IT Park in Fort Bonifacio, near Makati City. The first Software Development Park has also been established at the Subic Economic Zone. And the Ayala Group has announced the proposed development of an IT park in Cebu.

The Science Park an Teletech Park in Singapore

The Technet and Industrial Technology Centre in Hong Kong

Kuli High Tech Park in Malaysia

Hong Kong’s plans to develop a HK$13 billion high-technology business park called the “Cyberport” in a bid to attract investments from information services companies. Hong Kong aims to position itself as a major hub for electronic commerce and information technology.

Singapore One, a high-speed, broad band network aimed at delivering interactive multimedia content to homes, offices and schools. Singapore plans to build its own version of Silicon Valley where high-technology educational institutes, research and development firms, and venture capitalists will be encouraged to set up shop.


Contributing to this expansion are the successive multi-annual plans and information highway projects of these countries, including the development of science and technology parks and industrial estates with an ICT focus. Side by side with the initiatives of Thailand, Malaysia, South Korea, Hong Kong and Singapore, the Philippines has adopted a national ICT plan for the 21st century and gives ICT projects high priority in its investment plans.

It would be noted however, that with ICT penetration ratio (market size as a percentage of GDP) as benchmark, the Philippines (with a ratio of 0.5) falls way behind such Asian countries as Hong Kong (1.2), Malaysia (1.3), Singapore (1.9), and Korea (1.6). The Philippines is at par with Thailand (0.6, China (0.5) and India (0.5), but slightly better than Indonesia (0.4).

Figure 1.7 — ICT Penetration Rate in Selected Asian Countries (% of GDP)

Government Computerization Initiatives in Selected Asian Countries

Strong government leadership and extensive private sector participation pushed government computerization efforts in some Asian countries.

Computerization efforts in the public sector or some Asian countries were anchored on strong government leadership and action as well as intensive and extensive private sector participation. For example:

Singapore’s public sector computerization was a key component of its National Information Technology Plan of 1980, which enunciated a national policy on ICT. One of the objectives of the plan was to computerize the ministries and departments of government to improve productivity and stimulate the computerization of the entire country. The program was implemented with strong central direction carried out through the Committee on National Computerization. The committee, made up of members from government agencies with intensive involvement in ICT and the academe, was the top-level policymaking body for information technology in the government.

Malaysia embarked on an aggressive ICT development strategy in an effort to be globally competitive. It established the MSC, which features among other things, the development of Electronic Government as one of its flagship applications. This program is intended to improve government’s internal operations and services to the public. The operationalization of the Electronic Governance program is seen as the catalyst to the development of the Multimedia Super Corridor and the influx of investments in the sector.


C. ICT Developments in the Philippine Government

Government Computerization Initiatives

Computerization in the Philippine government pre-dates similar efforts by our Asian neighbors, having started as early as 1969 with the so called “evangelization” on the fundamental uses of computers by then Executive Secretary Alejandro Melchor. On 12 June 1971, the National Computer Center (NCC) was established through Executive Order 322. The NCC assumed a pioneering role in the establishment of computerization capacities in the government. Its interventions were direct and total and included systems conceptualization, design and development, implementation, and manpower training. Its role has since expanded to being the government’s regulatory arm in the areas of ICT training certification and procurement and service provider to ICT resource management for the public sector.

Government computerization in the Philippines started early but proceeded slowly.

While the Philippine government was an early starter, its development speed was so slow it was overtaken by the faster government ICT development programs of other Asian nations.

Nevertheless, there has been tremendous effort to catch up. In 1994, government adopted the National Information Technology Plan 2000 or NITP2000 and created the National Information Technology Council as the central policy body on ICT matters in the country. The council was also tasked with coordinating the NITP2000’s implementation. For the first time, government developed a comprehensive plan and mapped out strategies for the development of the ICT industry as well as the development of ICT in the public sector. In February 1998, government launched IT21, which outlines the country’s action agenda for ICT for the 21st century. One of the plan’s goals is for government to harness the use of ICT in improving its overall capacity and efficiency and thus enable local and national governments to be strategic partners in development. The plan promotes best practice ICT in governance and encourages the outsourcing of government ICT projects to stimulate industry growth.

Government had to take big strides to make up for lost time in ICT development: adoption of NITP2000, launching of the ICT action agenda IT21, formulation of the Philippine Information Infrastructure, development of IT parks, and signing of the E-Commerce Law.

The government formulated the Philippine Information Infrastructure (PII), which will provide the telecommunications systems and facility services, value-added network and communications services, and information or content management and applications services. The setting up of the RPWEB through Administrative Order No. 332 provided the needed impetus for the realization of the PII. The RPWEB will serve as the country’s Intranet o achieve interconnectivity and greater efficiencies in electronic information and data interchange among government, academe, and the industry and business sectors.

A most significant development is the recent signing of the E-Commerce Law. The Law, which defines the Philippine government’s policies on electronic transactions and provides the legal framework for the country’s participation in e-commerce, opens vast opportunities for global trade and economic growth.

Three ICT parks offering competitive financial and tax incentives for ICT business are now being developed in three strategic sites: the Eastwood Cyber Park in Quezon City; the Northgate Cyber Zone in Alabang; and the Fort Bonifacio-Silicon Alley IT Park in Fort Bonifacio, Taguig. The first Software Development Park has been set up at the Subic Economic Zone, and the Ayala Group is planning to develop an ICT park in Cebu.

Figure 1.8 — Percentage of Total Microcomputers Installed in National Government Agencies by Processor Type

Information Systems Applications

Most national government offices have automated their clerical functions using word processing and spreadsheets. But while there are a number of transaction processing system in key government agencies, these systems have limited scope and functionality, are seldom integrated with related system in other government agencies, and in general, fail to provide timely and accurate decision-making support.

Actual ICT usage in government is still very limited and does not provide substantial inputs to decision-making functions.

Moreover, the actual level of ICT usage or the number of applications in use vary across agencies. There is also limited usage of administrative systems and even more limited usage of executive management systems.

Networking Facilities

Because data communications facilities hardly exist, “stand-alone” applications are the prevailing mode. A few operate on local area networks. There is minimal use of workgroup applications and decision-support systems, which generally add value to ICT application because they facilitate communication and information sharing, and could potentially improve the efficiency and efficacy of government agencies. There are no indications of mission-critical systems fully operating on enterprise-wide networks or linked with other information systems of other agencies. Sharing of database or communication network has not been vigorously explored or adopted.

Due to the lack of advanced data communications facilities, most ICT systems in government are not networked. This impedes information sharing and linkaging which could have greatly improved efficiency and effectiveness of government agencies.

Part of the problem could be the compartmentalized nature of Philippine government offices. Information sharing among government agencies is not encouraged, and ICT planning and procurement are done in isolation, thus preventing the setting up of needed integrated application systems that cut across different agencies.

As of 1999, there were only twelve 12 wide area networks [WANs] in various stages of development in the government. The DOF now has four of these networks; DOF, three. The DA, DOLE, DTI and NEDA have one each, and the last is found in the constitutional commissions. A total of 58 agencies are connected through these installations while others employ the Internet for data transfer and communications. Only 130 offices have local area networks [LANs].

Only a small percentage of existing government ICT facilities can meet future computing and communication requirements; hence, the need for massive upgrading and installation of servers and client machines.

Data communication facilities are unavailable in many locations. Even reliable voice communication services are nonexistent in some remote parts of the country. Some municipalities and barangays do not have reliable and continuous electric power yet. In many areas, Internet access can be obtained only by connecting to regional urban centers like Naga in Southern Luzon, Iloilo and Cebu in the Visayas, and Davao and Cagayan de Oro in Mindanao.

Support Infrastructure and Technological Knowhow

ICT expertise and knowhow are a vital component of the support infrastructure. Developing and maintaining computerized information and communication systems require a large pool of competent ICT professionals for systems beyond office productivity and clerical applications. But we are experiencing another brain drain in this field, as Filipino ICT professionals get attracted to the high-paying ICT jobs overseas. The situation is aggravated by the comparatively low salaries and limited career opportunities that government offers.

Brain drain depletes the country’s pool of competent ICT professionals.

ICT Standards in Government

At present, most government agencies are essentially left to themselves to establish or adopt available ICT industry standards. While most internationally recognized standards for hardware, software, and data communication protocols and equipment can be adopted readily or with certain modifications, the establishment of data and application standards is equally important. Having common data and application standards in government is essential for compatibility, for sharing databases, and minimizing redundancy and inaccuracies in common and/or integrated applications.

Common ICT standards must be adopted and enforced for all government organizations to ensure interoperability and compatibility.

The challenge, therefore, is to ensure interoperability and compatibility among the different information and communication systems of government. The immediate task is to formulate, disseminate and enforce a common set of ICT standards for all government organizations.

ICT Manpower in Government

The 1997 NCC survey on the level of computerization in government showed that only 1.5% or 4,120 of the total 282,888 employees in respondent agencies comprise the ICT manpower complement, and about half of these are data encoders and computer operators. The others are programmers, systems analysts, and managers/administrators.

Only a very small percentage of government personnel use or know how to use computer systems for analytical and management purposes.

But the bulk of government personnel do not use computers. Their number vary in proportion among the different departments. Ironically, some departments with extensive public goods production and delivery services have very small proportions of their people using computers, such as DOH (30%), DENR (20%), DOLE (29%), and DSWD (6%).

These data indicate the need for massive training and change management in government agencies to retool the existing manpower tool being tapped for ICT functions. Since the current remuneration package for government personnel is relatively low compared to the prevailing market rates, agencies find its difficult to recruit and maintain a qualified ICT personnel.

It is also imperative that agency heads be educated on ICT to raise their appreciation level of the importance of ICT in improving complied processes and for policy formulation and administration.

The variety in the size and nature of the ICT staff in different government organizations (e.g., some are bureaus, some are divisions, while others do not exist as formal structures) also partly accounts for the varying levels of computerization efforts in government.

Computerization in LGUs

The 1997 NCC survey showed that all of the 42 provinces and 32 cities that responded have at least one microcomputer. There are neither mid-range computers nor mainframes among these local government units (LGUs). The most common applications or information systems at the local level are the payroll system and civil registration systems. Seventeen provinces and 22 cities are connected to the Internet. Computers and information systems at the local level are basically used to automate some clerical tasks and to computerize the data they collect from its clientele. Databases are not yet used to generate critical inputs for policy and planning processes at these levels.

The extent of computerization in LGUs goes only as far as the use of microcomputers, and mostly for clerical tasks.

Only about 6% of the total 81,678 government personnel in the surveyed local government units use computers, and even a smaller proportion (2.3%) had training on information technology. Less than 1% or only 259 employees comprise the ICT personnel at the local level.

Government Investments in ICT

Government spending in ICT is generally on the rise, although not fast enough. Annual current operating expenses for ICT projects or activities are estimated at P650 million. The 1999 budget provided P1.5 billion for ICT activities.

The government is now spending more and more for ICT, but the amount is still not enough for the magnitude of the ICT improvements required.

The government in the past six years has acquired more than P7 billion worth of ICT assets. The implementation of the various information systems plans of agencies endorsed by NCC will require funding of about P23 billion over the next six years.

The current level of investments is still very limited in relation to the magnitude of information technology required to improve government services and institutional efficiencies. These limited investments contributed to the widening information technology gap in the government.

D. Institutional and Policy Issues

An entire range of government institutions influences the dynamics of ICT development in government. A clear, coherent and well-delineated institutional setup for ICT, therefore, is a prerequisite to sound ICT policy formulation and implementation.

Sound ICT policy formulation and implementation require a clear institutional setup for ICT.

There are a number of government agencies and bodies whose functions or activities relate to or affect ICT development and management in government.

These agencies include the National Information Technology Council (NITC); the Department of Science and Technology (DOST); the Department of Budget and Management (DBM); the Department of Transportation and Communications (DOTC); the Department of Trade and Industry (DTI)-Board of Investments (BOI); the National Economic and Development Authority (NEDA); the National Computer Center (NCC); the National Telecommunications Commission; the Commission on Audit (COA); the Civil Service Commission (CSC).

At the policy level, the National Information Technology Council (NITC) was established in 1994 by Executive Order 190 (amended by EO 469 in 1998, and EO 125 in 1999) as the overall policymaking and coordinating body for the development of ICT in the country.

There are a number of government agencies involved in ICT development and management. The overall policymaking and coordinating body is the National Information Technology Council.

The NITC has cabinet-level representation, and NITC decisions are brought directly to the highest levels of policy and decision-making in government, but problems continue to persist. These problems include the following:

1. Inability of the principal members to participate in most meetings of the council and the tendency of sending representatives who would often have no sufficient authority or mandate to commit the agency on key issues, thus delaying action thereon;

2. Lack of a mechanism to ensure consistency of decisions at the Cabinet/NITC level, at the oversight agency level, and at the executive/project execution level;

3. Lack of a full-time technical secretariat to perform substantive functions/activities for the council such as the (a) preparation of technical/background papers for the use of the council members for a more informed discussion of issues; (b) conduct of needed follow up on council decisions; and (c) coordination, at the technical and program level, of the various ICT efforts, particularly in government.

Other related issues are:

1. Need for representation in the NITC of other key ICT players or sectors, which include the banking sector, ICT professionals, represented by the Philippine Computer Society; the software developers and producers, represented by the Philippine Software Association; and the computer manufacturers and distributors, represented by the Computer Manufacturers, Dealers and Distributors Association of the Philippines (COMDDAP) and the IT Association of the Philippines ITAP). Related to this is the issue of whether oversight constitutional bodies like COA and the CSC should also be represented in the NITC.

2. Need to generate specific action ideas and specific projects from members, particularly those from the private sector, that would clearly define their contribution as council members toward achieving the NITC’s goals and objectives; and

3. Need to address key issues, especially those that continue to hamper the more rapid growth and wider application of ICT in the country (e.g., high telecommunications cost and limited access in many areas of the country; limited bandwidth for faster access to electronic databases and the Internet; interconnection and convergence issues)

Other policy gaps occur mainly because the scope of functions of oversight agencies has not been clearly defined and functional relationships have not been clearly delineated. Classifying ICT resources for funding and procurement, for example, should be resolved whether it is a NCC responsibility or part of the auditing functions of COA. Clearly such function is not within the purview of auditing.

The functions and relationships of the various agencies have not been clearly delineated, and this has caused some policy gaps. Some of the gaps have been addressed by EO 125, but certain challenges remain, such as the need to articulate the ICT vision in the public sector, the need to establish ICT priorities, and the need to formulate standards, benchmarks and guidelines for GISP implementation.

Some gaps have been addressed to a large extent by the issuance of EO 125, which clarified and strengthened the NITC and NCC and delineated their respective functions. The effectiveness of these new arrangements in addressing existing weaknesses and gaps in policies, particularly those concerned with public sector ICT development, remains to be seen. Institutional and policy issues pose major challenges for further reform, as follows:

1. Government must clearly articulate the vision of ICT development in the public sector, and its role in achieving socioeconomic development goals and in pursuing more efficient, effective, and responsive governance.

2. Government must define and establish ICT development priorities, particularly those relating to financing and investment. In doing so, it must resolve funding problems for existing ISP projects not included in the GISP versus GISP projects, especially in the light of limited resources.

3. There is a need to formulate technology, security, interoperability, functionality and other relevant standards and benchmarks, as well as guidelines, for the implementation of the GISP.

4. A comprehensive procurement policy for the GISP needs to be formulated to address a wide array of issues and concerns which include the following:

a. A comprehensive procurement policy for ICT resources and services should be formulated. Such policy, which should adhere to the principle of relegating to the private sector the production and provision of goods and services, should simplify procedures for procurement and contracting/outsourcing of services.

b. The government needs to define an outsourcing policy that will ensure that it gets the best service for the least value. Toward this end, government should identify policies that stimulate competition, upgrade the capacities of local industry, and explore the potential of opening the government ICT market to international players.

5. Finally, government needs to establish clear rules, regulations and guidelines for the sharing among government agencies of ICT resources to improve utilization efficiency.

E. Network Infrastructure and Telecommunications Issues

The telecommunications and network infrastructure—consisting of basic telephone lines and networking equipment like servers, routers, hubs, modems and computers—must be available, accessible, affordable, reliable, and of good quality. The presence of these features is crucial to the implementation of an electronic governance (and electronic commerce) strategy.

Government must create a policy environment that will ensure a level-playing field, clear and transparent rules, public-private collaboration, and enough ICT institutional autonomy.

For government, business and industry, as well as for the public, telecommunications are essential to the rapid growth of ICT. Hence, government must provide the necessary policy environment that will ensure the following:

1. Level-playing field for all players to allow credible competition to flourish;

2. Transparent and clear rules to encourage innovation and therefore satisfy consumer demands on quality, affordability, and product variety;

3. Workable public-private sector scheme to encourage private investments to flow, thus enhancing the quality of services; and

4. Legislated institutional reforms that will allow the regulatory body to have sufficient autonomy, free from any political interference, in the exercise of its functions.

F. Financing Issues

The key issues related to the financing of ICT projects in government are:

Financing needs must be addressed — to formulate a clear budget policy and framework, to sustain resource allocation, and to generate and mobilize ODA and other resources for ICT.

1. Need for a clear budget policy and framework. There is at present no clearly articulated budget policy for ICT in government. Hence, individual agency budget requests submitted to DBM and Congress on a yearly basis are evaluated independently of each other with no integrating ICT budget plan or framework. The need for an ICT budget framework is especially necessary in view of the numerous contending priorities of the National Government for budgetary appropriation. This budget policy will help guide the agencies, the DBM, Cabinet and Congress in allocating and prioritizing budget requests for ICT development in government.

2. Need to sustain the allocation of resources. There is clearly a need to sustain support to government ICT efforts to ensure the continued viability of these projects. Such support will give a clear signal of the government’s commitment to the continued development of ICT. More importantly, it will give a certain degree of permanence to the cash flow for ICT contracts, most of which are multi-year in gestation and multi-year in delivery. As a result of the government’s allocation, private business may be encouraged to go into the ICT industry, and hopefully at least match the government’s level of expenditure, thereby creating some degree of multiplier effect. A government funding commitment will also allow a more rational prioritization of projects as identified in the Implementation Program of GISP.

3. Need to mobilize Official Development Assistance (ODA) and other resources. The government should actively pursue creative ways to generate the needed resources for government ICT projects. This may include the synchronization of the allocation of ODA and other resources for ICT projects in government. Likewise, it should develop mechanisms for tapping new sources of funding for local government computerization activities to further spread out the benefits of ICT to the regions and communities.

G. Government Development Objectives and Governance Reform Initiatives

The government is in the midst of an administrative reform program to enhance overall government efficiency and effectiveness, while ensuring wider and speedier public access to government information and services. Reforms are being pursued particularly in government procurement, financial management, manpower development and personnel welfare, organizational effectiveness, and service delivery.  

Administrative reforms being undertaken by government hold important implications for ICT: GISP mechanisms should take into consideration government’s reorganization and decentralization measures, support its poverty alleviation program, and help empower LGUs for assuming their devolved functions.

The implications of these bold reforms for ICT in government are tremendous.

1. There may be significant formal organizational changes in the executive branch if the reorganization law is passed. As such, the identification of the GISP building blocks should include only systems that are either the fundamental functions of government or those that are clearly valid and should not be abolished nor substantially altered because they fall within the principles and parameters established under the reengineering plans. The first GISP priority systems and building blocks should include the fundamental functions of the government and the steering functions of government in the sectors. Government production and service delivery functions should be supported by ICT that will continue to be useful in the event of privatization or devolution.

2. There are indications for wider decentralization of national government functions and activities. This means that government will delegate more power, authority, responsibility and accountability to their lower units, particularly in the field offices. This is consistent with the government’s thrust of poverty eradication and serves as a potentially effective way of bringing government closer to the people. Information technology makes possible a sound decentralization with strong oversight management control and monitoring. The GISP should be able to support this effort by establishing the networking requirements between central and local activities of the government.

3. Poverty eradication entails not just the provision of huge funds for the poor but anchoring such programs on a sound knowledge of the character and extent of poverty in the country. The poverty program of government should therefore be supported by a system of generating, organizing, and processing information useful in the following:

3.1 providing convenient and speedy access to government services and information on opportunities for the poor both in urban and rural areas.

3.2 providing government policymakers and implementors adequate, up-to-date, and accurate information on the status of the poor for sound and responsive policy formulation and for the design of specific interventions.

The government poverty program should include an ICT-based feedback mechanism for the provision of timely and accurate information on the status and specific needs of urban and rural poor communities for the application of more responsive policy interventions.

4. Reform initiatives in government housekeeping functions require the development of information systems that provide standards for agency level systems and a sound consolidation and monitoring facility at the oversight level.

5. With the government thrust to continue empowering local government units within the principles advocated in the devolution program, there is a need to speed up the building of LGU capacity to effectively assume increasing responsibilities. One of the fundamental requirements to improve LGU capacity is the provision of information systems support for core business and regulatory functions, particularly in the areas of regulation and revenue generation.

The foregoing reforms provide inputs in the identification of the priority strategic information systems cutting across institutions and sectors, which will be a key feature of the public ICT framework plan.

H. Public Sector Absorptive Capacity for Electronic Governance

The absorptive capacity for electronic governance in the country has been growing over the past five to six years. This is expected to accelerate further with the passage of Republic Act 8792, or the Electronic Commerce Law, and as larger segments of the population gain wider access to ICT and telecommunications. At the same time, the adoption of a government ICT policy framework for a sustained and more coherent approach, as well as a positive change in the mindsets of policy and decision makers toward ICT use and investment, are expected to further accelerate public sector absorptive capacity for electronic governance.

Adoption of a government ICT development framework will speed up the expansion of the Philippines’ absorptive capacity for electronic governance.

Computerization efforts in government are generally characterized by a lack of an integrating framework and common platform. Moreover, computerization efforts are mainly limited to office automation and clerical operations, with very few executive decision support and mission-critical systems in place or being developed. For the most part, the latter systems are stand-alone and have very limited application within the agency, much less connectivity with other systems within the same organization or outside. A key challenge is the development of interagency networks that will allow seamless information exchange and resource sharing among agencies that have related functions and those that work for the same sectors.

Chapter 2
Vision and Development Framework

A. Vision

Consistent with the national vision and objectives set forth in the Medium-Term Philippine Development Plan or Angat Pinoy 2004, government shall harness the full potentials of information and communications technology (ICT) to ensure wider public access to information and the faster and more efficient delivery of government services to the public.

The goal is for every Filipino citizen and foreign investor anywhere in the world to have online access to government information and services.

Once the Philippine government goes online, Filipino citizens anywhere in the country and in other shores, as well as current and potential foreign investors anywhere in the world, will have electronic access to government information and services.

To realize this vision, the following shall be the specific goals to guide the implementation of the GISP:

Within five years after approval of the GISP, the government shall have put in place the enabling environment, the policies, and the appropriate institutional structures to allow the full and unhampered implementation of the GISP. Government agencies shall have engineered pertinent business processes and embarked on the automation of their frontline services and housekeeping systems. Given this enabling environment, the private sector shall have built up its capacity and put up the organization and investments required to respond adequately to the challenge of providing quality ICT services to the government.

Within the first decade of the 21st century, every Filipino, every organization, and every foreign investor and visitor, shall have online access to government information and services in their homes, in community or municipal centers, in foreign posts, in public libraries and kiosks, and in government offices.

Within the first decade of the 21st century, the application of information technology in government operations shall have improved governance with the following key indicators of success:

Faster and simpler processing of licenses, permits, and certifications;

Expanded and more convenient access to more and better quality information and services;

Efficient planning, generation, and management of government resources, in the process adding value to every taxpayer’s peso, reducing waste, and eliminating opportunities for graft and corruption; and

Highly developed and more responsive public sector organizations with better-informed decision-making, highly transparent and accountable operations, and goal-driven instead of task-driven government employees.

B. Goals and Objectives

The GISP seeks to realize a system of governance that will lead to:

An electronic bureaucracy will link government institutions to the public and private sector institutions.

Faster and better delivery of public goods and services;
Greater transparency in government operations;
Increased capacities of public sector organizations; and
Proactive participation of citizens in governance.

These are in support of the broader national development goals as follows:

A globally competitive economy;
Accelerated development of human resources and eradication of poverty;
Equitable spatial distribution of development, economic activity, and population;
Sustainable development of natural resources;
Improved peace and order; and
More effective governance.

These shall be realized through the establishment of an electronic bureaucracy that will link government institutions with one another, with the public, and with private sector institutions.

1. Information Systems Solutions

Government shall harness ICT in developing solutions the directly address and support the country’s development goals.

1.1 Globally Competitive Economy

Objective

Key objectives include more efficient operation of markets and improved management of social services.

To promote the efficient operation of markets, particularly in the following areas:

Providing information on business opportunities, credit and technical assistance, sources of materials and information, and linkages;

Developing sound economic policies and strategies, and monitoring and assessing their performance;

Formulating and enforcing appropriate rules and regulation; and

Promoting electronic commerce.

1.2 Accelerated Development of Human Resources and Eradication of Poverty

Objective

To improve the management of social services, particularly in the following areas:

Upgrading information support so that government can better formulate, implement, and assess policies in education, health, welfare, and labor policy, as well as plan and mange poverty eradication programs more effectively;

Achieving faster, more efficient, and more responsive social services particularly to the poor, the elderly, the handicapped, the disadvantaged, and victims of disasters; and

Facilitate access to information on public services, employment and livelihood opportunities, health and welfare services, credit and assistance, and distance education and training.

1.3 More Equitable Spatial Distribution of Economic Development, Economic Activity and Population

Objective

To decentralize decision-making, production and delivery of public services, and enforcement of regulations across the country thereby allowing proximate, equal, and convenient access by citizens and organizations.

1.4 Sustainable Development of Natural Resources

Objective

To promote sustainable use of the country’s natural resources, particularly in the following areas:

Improving the system of gathering, processing, storage, and retrieval of information on the country’s natural resources; and

Upgrading government’s capacity to manage the ownership and utilization of those resources.

1.5 Improved Peace and Order

Objective

To build on and support the implementation of the National Crime Information System (NCIS), focusing on systems that enhance government’s capacity to prevent crimes, track down criminals, monitor criminality, and administer justice.

1.6 More Effective Governance

Objective

To improve agency capacity for administration, particularly in the following areas:

Managing public sector physical, financial, and human resources;

Promoting transparency and public accountability and reducing graft and corruption;

Creating customer feedback mechanisms;

Improving coordination between and among agencies and employees;

Upgrading the quality and speed of managerial decision-making; and

Establishing of an environment conducive to continuous education and advancement of public sector organizations.

2. Technologies

Government shall promote the design, development, and adoption of cost-effective technologies.

2.1 ICT Infrastructure

Objective

To establish the appropriate infrastructure, in particular the telecommunication networks, hardware and software, and information systems and procedures in accordance with the following electronic government principles:

Easy access — Geographically proximate access to information and services by the public and the provision of online query/guide;

Reengineered processes — Shorter processing time, “less paper” requirements, nonrepetitive processes and input requirements, simpler compliance and evaluation procedures;

Networked systems — Local, regional, interagency and public-private networking of related systems and processes;

One-stop/nonstop shops or windows — For permits, licenses, business and other frontline transactions and services;

Customer-driven service — Systems that can evolve and keep up with the changing requirements of government customers;

Privacy protection and security — Protection of the right to privacy and institution of measures to ensure security of access to and processing of information at all levels; and

Compliance with laws and standards — Compliance by all systems, procedures, input and output requirements with the provisions of pertinent laws, government policies, rules, and regulations, and adaptability of the system to the changing legal parameters of government.

2.2 Interconnectivity

Objective

To adopt interconnectivity solutions, plans, strategies, and systems that will successfully interconnect the various government agencies with one another and with the public. To this end, the following shall be established:

Solutions, plans, strategies and systems will be interconnected to benefit the public.

Electronic collaborative support systems operations that share basic resources, equipment, and other ICT facilities;

Intergovernmental sharing of databases and exchange of information to eliminate duplication of functions and redundancies, and ensure responsiveness in reporting, coordination, cooperation, monitoring and service delivery, among other functions; and

Interoperable electronic messaging and communication system for government agencies.

2.3 Adoption of Best Practices

Objective

To identify pilot projects or strategic initiatives that will lead to the adoption and widespread use of electronic governance technologies and principles in government.

3. Enabling Environment

To ensure the smooth and speedy implementation of all programs and projects, the appropriate enabling environment in the government, private sector, and ICT industry will be promoted and supported.

3.1 Policies and Institutions

Objective

To put in place the necessary policies, standards, guidelines, rules and procedures that will speed up establishment of the necessary information systems to ensure their high quality.

To reengineer the organizational setup and clearly define the roles, functions, authorities, and accountabilities at oversight and agency levels in relation to the various aspects of implementation, and provide the needed resources.

3.2 Industry Capacity

Objective

To promote the growth of the local ICT industry, improve its capacity to provide quality services in the development, implementation and maintenance of the various information systems networks to be put in place. This will be pursued through adoption of:

To develop the Philippine ICT industry, there is need to provide quality services through the information systems.

A set of criteria for private sector participation;

Procurement policies that allow partnerships, tie-ups, and consolidation of efforts and resources of participating companies and organizations;

Competition policies that ensure a level playing field between big and small enterprises; and

Policies that encourage innovation and creation of new products that respond to the unique requirements of government.

C. Development Framework

The government shall implement the GISP in three phases, as follows:

PHASE 1: Setting Up the Enabling Environment

Formulate and adopt, within five years after GISP approval, policies to establish funding; streamline procurement; provide incentives and guidelines for private sector investment and participation; establish technology standards and benchmarks to ensure interoperability, networkability, and security; and set up systems functionality standards and guidelines that will improve public services, promote efficiency, effectiveness and transparency in government operations, and upgrade public sector management capacities.

Improve and strengthen, within five years of GISP implementation, existing institutional structures and capacities, including those of the NITC, NCC, DBM, COA, DILG, CSC and implementing agencies and local government units. Such capacity building effort will include, among others, a proper definition and delineation of roles, authority, and accountability, training of users and ICT people in the government, conduct of advocacy and culture change programs, infusion of adequate financial, material and other resources.

Generate the necessary investments from the private sector, government, and other funding institutions in accordance with the scheduled implementation of the various GISP information systems projects.

Phase 2: Building the GISP information infrastructure

In five years of GISP implementation, the needed information and communications technology should be in place.

Develop, within five years of the GISP implementation, the necessary information and communications technology infrastructure.

Adopt guidelines on hardware and software platforms in all participating government agencies to ensure compatibility, interoperability, and sharing of applications and to achieve savings through economies of scale.

Set up shared nationwide telecommunications infrastructure for use by all government agencies. A shared facility will not only reduce total cost to the government, but also allow smaller and/or less sophisticated agencies to benefit from networking and interconnection.

Accelerate implementation of the Philippine Information Infrastructure (PII) and RPWEB and promote e-commerce and Internet technologies to improve public access to government and make government transactions easier, more convenient and more transparent.

Identify and prioritize the various systems networks and anchor projects within each systems network.

Identify, design, and establish crucial databases and data warehouses to improve the following; enforcement of regulations; provision of vital information on markets, opportunities, sourcing of raw materials and production inputs, and assistance; managerial decision-making; and policy formulation and assessment.

Establish priority strategies for GISP project implementation in accordance with resource availability and learning capacities of implementing agencies and their publics.

Reengineer the various mission-critical and public sector management business processes and develop clear definitions of the functional specifications and technological requirements of the systems network and its building blocks.

Review and reengineer business processes to do away with redundancies, duplication, and red tape and to prepare them for automation.

Review and reengineer housekeeping processes and establish common functional and workflow standards across the bureaucracy.

Clearly define the functional specifications of the various building blocks comprising the information systems network.

Design, install, and operate the various systems network.

Program the installation of the various applications in accordance with the learning and absorptive capacities of the participating government agencies, like transaction processing applications in the first phase, executive decision support systems in the second, and expert systems in the third.

Phase 3: Sustaining the GISP

To sustain the GISP, responsibilities have to be defined, and mechanisms for continuing development established.

Clearly define ownership and management responsibilities, authorities, and accountabilities for each information system.

Develop benchmarks and indicators for evaluating overall and individual project performance.

Establish a mechanism for continuing learning and development of the various participating institutions.

Chapter 3
Strategies and Solutions

This two-part chapter presents the detailed GISP strategies and solutions towards the realization of Philippine Government Online. Part 1, Government Information Systems, describes the methodology used in the identification of the various information systems, the criteria used in the identification process, the presentation format, and the identified information systems. Part 2, Strategies and Technology Solutions, consists of the identified information systems gaps in government and their corresponding technology solutions, and the indicative system configuration of the technology solutions. 

Discussed in detail in this chapter are the interrelationships of various groups of information systems, major databases, technology solutions, online services, and users that are covered under the GISP.

The group on Information Systems and Major Databases consists of the Public Sector, Sectoral, and LGU Mission-Critical Information Systems. These systems comprise the individual information systems of oversight and line agencies whose data requirements and processing requisites cut across various other government agencies. Users and operators of information systems are found all over the country.

Users and operators of information systems and major databases are found all over the country.

The group on Technology Solutions is composed of the various infrastructure technologies that the GISP shall employ. Among these are data warehousing technologies that will be used to store and manage the government’s data on human resources, finance, trade, tourism and industry, health, and other very large government databases culled from various distributed databases housed in individual agency data sources. Also included in this group are electronic document technologies for managing data on human resources, government records and archives, and other document-related activities of the government; and spatial technologies for statistical information, agriculture and agrarian reform data, and public order and safety.

The group on Public Services Information System represents the single access window government portal for both government users and the general public. It provides government users with secured Internet connection via Virtual Private Networks (VPN) to access transactional systems and data dedicated for government use by the Office of the President, staff personnel of the executive, legislative and judicial branches of government, including local government units (LGUs). The general public uses the public Internet connection to access data for public dissemination, and to engage in electronic transactions such as issuances of permits, licenses, registrations, and other regulatory requirements of the government from the public.

“Philippine Government Online” as a strategy and development framework for electronic governance is depicted in the diagram below.

Part 1. Government Information Systems

Information systems comprise the “building blocks” of the GISP. The identification of these systems requires that programs and projects developed under this plan are high-leverage ICT developments that will generate optimal socioeconomic impact for the least amount of resource inputs. The integration of agency information systems that will seamlessly cut across departmental boundaries to comprise a sectoral information system will highly benefit the industry and private sector enterprises. Moreover, such an integrated system will provide the common man with transparent access to information culled from various government agencies.

Information systems serve as the building blocks of the GISP or ‘Philippine Government Online.’

A. General System Categories

Government information systems for priority development and deployment during the plan period shall comprise the building blocks of Philippine Government Online. These information systems are classified into four general categories, as follows:

1.0 Mission-Critical Frontline Services Information Systems. These are basically transactional, customer-driven business processes designed to:

1.1 Provide direct public access to government services like land and civil registration, passports and visa approval, and business and professionals licensing;

1.2 Reduce the processing and approval time of government transactions with the public;

1.3 Electronically organize and store vital data/information for easy retrieval or updating, processing, and sharing with government monitoring or statistical agencies; and

1.4 Ensure greater transparency, accountability, and integrity of government operations and transactions.

2.0 Oversight and Common Application Systems. These are information systems designed to support mission-critical government oversight functions such as development planning, fiscal and financial management and operations, auditing, personnel administration and management, and assets and supplies management and procurement.

The systems will allow the integration and networking of information and databases across agencies and thus facilitate information and resource sharing, and enhance coordination of related government oversight functions for planning and decision-making.

3.0 Sectoral Information Systems. These are sector-specific information systems that cut across various departments/agencies catering to the same sectors of the economy or society. These pertain to agriculture, trade, industry, health care, education, and manpower training, labor and employment, and other social services.

4.0 Local Government Information Systems. These are common mission-critical business processes, which include revenue administration and business licensing operations of LGUs. These common mission-critical LGU systems, which lend themselves to the use of Geographic Information System (GIS) technology, shall be electronically linked to oversight systems allowing data aggregation and integration to facilitate program monitoring and policy formulation.

The specific mission-critical LGU information systems for LGUs that are identified for priority development will include LGU Business Licensing, LGU Real Estate Tax Mapping and Revenue Collection, and Financial Management.

B. Database and Information Systems Architecture

To guide information systems development activities over the plan period, the systems content structure will consist of the following elements:

1. Objectives, which articulate the desired end results that the information system intends to achieve, particularly in the areas of improved information quality, efficiency, access, transparency and accountability, integrity, coordination and data sharing, among others.

2. Description of Overall Functionality, which describes general functions of the system, how the system or its components will interact with users and operators in terms of accessing information and inputting information; also describes the general functional relationships between institutional operating units and among business processes.

3. Geographical Dispersal, which indicates the geographical location and scope of the users and operators of the system.

4. Participating Agencies, which itemizes all agencies with business processes and databases connected to the system or forming part of the system.

5. Business Processes, Database and Owners, which present a tabulation of the groups of homogeneous and individual business processes together with their possible application systems, and major databases, each serving as a building block of the information system.

6. Systems Architecture, which depicts in graphical format the system’s business processes and data flows.

7. Information Architecture, which depicts in graphical format the relationship of the various databases within the system.

8. Technology Architecture, which depicts in graphical format the physical technology configuration of the system.

C. Priority Information Systems

Following are the priority information systems proposed for development in accordance with the schedules presented in Chapter 5, Implementation and Financing Strategy.

(Note: For a more detailed discussion of each of the proposed priority systems, as well as system, technical and functional architecture of each, please refer to the Technical Annex of this Plan.)

1.0 Mission-Critical Frontline Database and Information Systems

1.1 Public Services Information System (PSIS)

The public Services Information System (PSIS) provides a one-stop access window and user-friendly guide to the range of government services, information, and regulation useful to the general public and specific organizations and interest groups. The system integrates under a one-access facility all frontline services and regulatory activities of government agencies, government-owned and/or controlled corporations, local government units, and private banks and institutions offering public services and information.

These include Customs and Internal Revenue Services, Civil Registration and Census Enumeration, Vehicle Registration and Drivers Licensing, Professional Regulation and Licensure, Passports and Visa Processing and Authorization, Land Registration and Titling, Business Permits and Registration, and Voters Registration. To integrate all of these frontline services and make them accessible to the public, public kiosks and community telecenters will be set up in central public places, community centers, schools, and municipal halls, with private-sector support. A Philippine government portal, to serve as a one-stop Internet gateway for government, will be developed, incorporating all the features of an information kiosk on the Internet.

To be developed is a Philippine government portal which will function like an information kiosk in the Internet.  

1.2 Justice Public Order and Safety Database and Information System (Expanded National Crime Information System — NCIS)

One of the most important elements in crime management and prevention is the availability of data that will form the basis for intelligence work, gathering of evidence, covert and overt operations, and at a higher level, the development of better crime management and crime prevention policies, programs, strategies, and techniques.

The Justice, Public Order and Safety Database and Information System is a system that supports and enhances the existing Crime Information System. It provides electronic linkages from six agencies to 23 different agencies of government involved directly or indirectly with matters related to criminality.

The fundamental component of the system is the module found in the police station, which records complaints, arrests, searches, and intelligence work. The system likewise includes a networked facility for logistics management within the entire police organization, thus providing information on supplies, equipment, accountabilities, maintenance and status, acquisitions and organizational distribution, and other related data that will improve resource management and utilization.

2.0 Oversight and, Common Application Systems

2.1 Office of the President Executive Information System (malacañang.gov.ph)

The Office of the President Executive Information System (OPEIS) provides the President, the Executive Secretary, the head of the Presidential Management Staff with a multimedia information support facility that facilitates top-level executive management, reporting, and monitoring system for the entire bureaucracy.

With teleconferencing, the President can hold virtual meetings not just with Cabinet members but also with agency heads at the provincial level.

The teleconferencing facility allows the President to conduct virtual meetings with Cabinet members and agency heads down to the provincial level. The facility also accommodates teleconferencing requirements within and among agencies, thus lessening travels to and from Manila, and speeding up the exchange of information and decision-making.

The Cabinet reporting system provides departments and agencies with the facility to report to the President, and ad-hoc communications with the President or the Executive Secretary can be electronically transmitted.

The President’s Web site will contain information on the activities, accomplishments and messages of the President, among others.

2.2 Government Procurement System (Electronic Procurement System)

The Government Procurement System (EPS), which has been initiated by the Department of Budget and Management, is an Internet-based electronic procurement system to rationalize and speed up the procurement process in government. It specifically aims to: (1) improve efficiencies in the procurement system of the government; (2) promote speedy procurement of quality and properly valued equipment and commodities; (3) ensure the integrity of the public-sector procurement process; and (4) widen information and choice on products and prices available to government agencies.

The system features, among others, a supplier and product selection and accreditation; product publication; electronic ordering; negotiation for bulk purchases; centralized/decentralized procurement; monitoring and auditing; and, industry development and research.

2.3 Government Human Resource Management Database and Information System

The system builds on and enhances the existing Government Manpower Information System (GMIS) of the DBM, and related systems at the CSC and GSIS. It provides electronic control of agency plantilla of personnel updated to the budget year authorized positions.

The CSC electronic copy of the plantilla enables counter-checks against the same form accomplished by agencies filled up with incumbents, and the GSIS electronic copy of the same plantilla is useful in updating membership data.

The basic component of the entire system is the agency human resource management information module, which contains all personnel records and transactions. Data from the agency modules can be accessed by DBM and CSC and consolidated into macro statistics useful in policy formulation and analysis, personal services budget formulation and evaluation, and other oversight decision-making activities.

2.4 Government Physical Assets Management Database and Information System

The system provides an agency module that maintains a record of each physical asset from its acquisition to its maintenance, rehabilitation, and disposal. Infrastructure agencies responsible for the construction and maintenance of key government infrastructure facilities will operate separate information systems with functional features that will enable them to develop inventories and track maintenance and expenditures; and, at the oversight level, the DBM will maintain a comprehensive physical assets database with information on budgets, expenditures, revenues, inventories, maintenance and utilization, deployment and distribution, etc., coming from the agency modules. The database allows government policymakers to generate physical assets statistics useful in making budgetary and physical assets management policies, rules, regulations, and strategies, plan investments, acquisitions, utilization and deployment, maintenance, and disposal of physical assets.

2.5 Government Integrated Financial Management Database and Information System
With the database and information system in place, it is possible to analyze the entire government financial system.

The system provides a standardized agency financial management information system to be installed in individual departments and agencies; synchronizes cash management among the Bureau of Treasury, Department of Budget and Management, and accredited banks; allows strong monitoring and control of agency cash flows, cash balances in the banks, government cash program and government cash levels in the Treasury; enables agencies to track and monitor budgetary status, performance and year-end results, including complete information on budget balances and accounts payables; facilitates synchronization of planning, investment programming, budgeting, and performance assessment; provides for migration and deeper application into accrual accounting where assets and liabilities are woven into the entire financial management process and in the accounting processes; and consolidates LGU financial data into the national government financial data, thus making possible analysis of the entire government financial system.

2.6 Statistical Database and Information System

The Statistical Database and Information System has the following overall functional features: statistical databases in departments and agencies with statistical functions as well as agencies whose transaction operations or regulatory functions result in the generation of statistics; centralized point of contact with respect to public acquisition of statistics, through the NSO statistical Web site that is connected to the Public Information Services System. This will allow public access to statistics and provide guidance on the acquisition of more comp statistical information. It will also provide linkage with the Land Use and Environment Management Information System providing geographical information on various statistical data as may be required by the users.

2.7 Government Integrated Records Management Database and Information System

The system features a government records management Web site that will provide directories of government legal and legislative issuances, documents, and other records of public significance and use, guide on the location and accessing of records from various government agencies, and publication of recent legal and legislative issuances, notices and other vital public information. The Records Management and Archives Office (RMAO) will be the key point of access for all government records and will operate the web site; and the National Library will be electronically linked with other public libraries for exchange of library information and for providing public information on a wider range of library resources. Departments and agencies will link their respective records management system and provide a computer-aided system of archiving, library maintenance, and public access.

3.0 Sectoral Information System

3.1 Agriculture and Agrarian Reform Database and Information System

The sectoral information system will make participating government agencies more efficient in enforcing regulations and providing frontline services in agriculture and agrarian reform.

The Agriculture and Agrarian Reform Database and Information System will generate, consolidate and analyze massive amounts of data, from 24 participating government entities covering 35 business processes. This will lead to better sector analysis, better informed policy and program formulation and implementation assessment, and more focused identification of projects and services. It will also allow easy and proximate public access to information on agriculture, trade and business opportunities, technologies, markets and market linkages, sources of inputs, as well as services provided by government agencies, banks, and private-sector organizations on agriculture and agrarian reform.

The system will facilitate electronic submission of pertinent applications for permits, licenses or certifications for applicable regulatory activities. It will thus make participating agencies more efficient, particularly in the enforcement of regulations and provision of frontline services, through computer-aided retrieval and processing of information.

3.2 Education and Manpower Development Database and Information System

Studies are now being conducted to decentralize basic education and improve capacities for program and resource management at the school level. This will enable DECS to more effectively oversee and assess the performance of the various institutions, and strengthen government’s capacity to supervise and effectively enforce regulation and standards over higher education institutions.

The Education and Manpower Development Database and Information System will support these thrusts through the networking of the databases of public and private academic, research and cultural institutions. This will allow oversight agencies like DECS and CHED to collect and process massive and comprehensive data useful in improving education policy, plans, programs, supervision and monitoring process; provide for an automated school management systems within each public school to strengthen the monitoring facility of the DECS; and allow electronic processing of the issuance of accreditation and permits.

3.3 Trade, Industry and Tourism Information System

An enormous amount of data will be generated and processed, and the end result will be an improved program and better policies in trade, industry and tourism.

The system will generate, share and process massive amounts and various categories of data into analytical information useful in strategic industry planning, monitoring and analysis, policy formulation, and assessment. It allows the key departments, DTI and DOT, to access several related information from related agencies that will improve appreciation and analysis of industry in a way that promotes better, more focused, and more strategic program development and policy formulation.

The system will facilitate electronic transaction processing of certain public services, such as: generation by the public of industry statistics and industry research data; access to information and guidelines on technical assistance, rules, regulations and procedures; and electronic submission of applications for certifications/registrations. Such transaction processing supported by major databases allows individuals to submit applications anywhere in the country. Online query and guide are among the key features of this electronic frontline service facility.

3.4 Land and Environment Database and Information System

The functions of other sectors are considerably improved with the proper use of quality geographical information. For example, health planning can be more focused and monitoring can be more effective if adequate geographical statistics, profiling and analyses of disease prevalence, malnutrition incidence, and morbidity/mortality can be linked with relevant geographical information, for example on population and income, and environment. Criminality can be better understood if geographical information on historical trends of specific crime incidence can be linked with economic and social demography which may give correlation useful in crime management and prevention.

This Land and Environment Database and Information System will lead to better planning, implementation management, monitoring, and assessment of mission-critical sectoral programs and projects through sharing of geographical information.

3.5 Health Care Database and Information System

Hospital management will be computer-aided to facilitate operation transactions and other related data useful in health policy formulation, planning and assessment.

The DOH is also concerned with attaining better efficiency and effectiveness in enforcing health regulations. With limited manpower and geographical presence in relation to the extensive nationwide prevalence of health institutions, people, and services, the task of regulating should be supported by proper technologies that will store and update background information, easily retrieve it, assist transaction evaluation and processing, and improve supervision and monitoring.

The system will provide computer-aided hospital management operations that will facilitate recording of various hospital operation transactions and other related data; connect to the DOH for reporting purposes to provide a central repository of health data and statistics useful in health policy formulation, and program planning and assessment.

The system allows DOH to establish linkages with the DOST, academic institutions, and private health institutions here and abroad to share health research data and to establish tele-medical information services among local and international medical institutions.

3.6 Welfare, Security, Employment, Housing and Community Services Information System

The system connects the databases of 36 government departments, various local government units and several private sector and agencies to support 46 government business processes. This sharing facility allows extensive analysis of the social welfare sector in its many dimensions. The system allows more focused targeting and configuration of various housing programs by linking population and housing statistics, poverty, demography, and local housing and income statistics.

The system provides several major databases at the DSWD for the entire welfare sector and for its social welfare operations; at the Housing and Land Use Regulatory Board, which will be the main repository of housing information; and at the Department of Labor and Employment for labor and employment information. The DSWD and DOLE may access the social security statistics of GSIS, SSS, and private-sector institutions to formulate social security policy.

4.0 Local Government Information Systems

4.1 LGU Revenue Management System

The information systems will facilitate data storage and retrieval, consolidate and analyze business-licensing activities of LGUs, and measure local economic activity.

The system provides a stand-alone computer facility to local government units whose revenue management systems are not yet automated. The system provides for data storage and retrieval facility to keep track of taxpaying individuals and establishments, computer-aided evaluation of tax return computations, and amounts to be paid. The system is capable of storing historical data of establishments and payments history, allowing monitoring of taxpayer behavior and thus supporting intelligence and individual establishment monitoring work.

The system links with oversight modules in the DILG, DBM and DOF for purposes of consolidating and analyzing macro-level information on the revenue performance of LGUs.

4.2 LGU Business Regulation System

The system provides a stand-alone facility for LGUs that do not yet have computerized business regulation system. The system provides for a database retrieval and decision support facility for evaluating applications for business permits and for recording approvals, disapprovals, suspensions or extensions. It also stores data on establishment records, thus facilitating information retrieval useful in the evaluation process.

The system links with oversight modules in DILG, DBM, and DOF for purposes of consolidating and analyzing at macro levels the overall business-licensing activities of LGUs, covering receipts, business establishment statistics, measuring local economic activity and other related statistics useful in policy formulation planning.

Part 2. Strategies and Technology Solutions

A two-step approach was employed to identify the technologies that became the basis of the GISP Technology Strategies. First, the identified IS gaps were analyzed to determine which of the technologies studied in Annex C offer solutions that address most of the gaps. Next, a second group of technologies was identified which provides the most opportunities to improve the current state of transaction and information processing in government.

Information Systems Gaps and Corresponding Solutions

The analysis of identified IS gaps versus technologies is summarized in the following table.

The table identifies four technologies that offer the most solutions to the identified gaps. Depicted in columns with the most number of dots, these are Internet technologies, which address 15 gaps, Data Warehousing and Distributed Databases, each addressing 10 gaps, and Virtual Private Networks, with the ability to offer solutions for seven gaps. Brief discussions of how these four technologies help solve the identified gaps follow, but more comprehensive definitions, possible applications, considerations and prognoses of these and other scanned technologies may be found in Annex C.

Four technologies — Internet-based, data warehousing, distributed databases, and VPN — will help solve identified information systems gaps.

Internet-based Technologies, as expected, offer the most solutions for addressing the identified IS gaps. First of all, the adoption of Internet protocols like TCP/IP ensures interoperability and compatibility of ICT equipment, regardless of manufacturer and size. Government websites will allow the general public access to government data, including information on job openings.

The use of Intranets in government, as a further example, will address the proliferation of stand-alone applications and PCs by providing access to central resources. Existing PCs can be used as client stations running nothing more than browsers, thereby postponing their upgrading or replacement.

The pervasiveness of the Internet can also be used to advantage by government in linking regional offices, provincial offices, and LGUs to NCR-based systems, thereby providing these remote offices with similar functionality as the central offices, and possibly reducing the time it would take to collect and disseminate information. The Internet can provide a continuing and inexpensive means for government agencies to disseminate and share information among themselves and with the public. Moreover, VOIP and videoconferencing technologies make it possible to use the links for more than just data, allowing possible reductions in travel expenses and time spent away from work.

Finally, used in conjunction with online learning technology, the Internet offers an opportunity to address the massive training needs of government, including the need to educate key decision-makers through its ability to deliver on-demand asynchronous training modules nationwide.

Data Warehousing, including Executive Information Systems and Decision Support Systems, offer the capability of harnessing transactional data from multiple sources to allow analysis and information-based decision-making. As such, it can make use of existing ICT infrastructure since existing stand-alone applications can be used to feed data into the warehouse while current stand-alone PCs may be used to access and analyze data from the warehouse.

When installed, the data warehouse servers will provide the capability to store and process voluminous integrated and historical data, something currently missing in the government’s ICT resources. Through the Internet, these data warehouses may be made available not just to government central offices, but to field offices, LGUs and even the general public.

Finally, the very nature, cost and implementation requirements of data warehouses will force the issue of information sharing within government and hopefully reduce duplication of ICT efforts.

Distributed Databases. The devolution of functions and the nationwide operation of government make distributed database technology ideal for integrated government applications. Harnessed properly, it provides the solution for the proliferation of stand-alone applications in government, and allows existing systems, particularly hardware, to be retained with some modifications.

The ability of distributed databases to allow data to be physically kept locally while providing logical integration is ideal for central office-field offices set up in most agencies, allowing data to be accessed wherever it is located. The support for local data entry, processing, and storage of information will also alleviate delays in transmitting data from the field. Distributed databases will facilitate sharing of information across departments and agencies, thereby reducing the need for duplication of data and applications.

VPN (Virtual Private Network) Technology is the practical answer to the need for connectivity in government. Instead of using expensive, and sometimes unavailable, dedicated leased lines to implement wide-area networks, VPN allows the use of comparatively inexpensive shared infrastructure such as the Internet and phone system. In addition to reducing costs, VPN also makes it possible to implement connections immediately in areas where Internet service is available.

VPN will support field office to central office connections, links between agencies, and even public access. It will provide the infrastructure for addressing the issues of data sharing, stand-alone applications, and proliferation of stand-alone PCs. For example, even notebook PCs used in the field can access the agency’s Intranet and databases through a dial-up connection to a local Internet Service Provider.

Finally, because only a single connection to the Internet is required for each site, VPN will provide a single standard for wide area network communications and help reduce the duplications of network infrastructures in government.

Aside from these four technologies, five other technologies deserve further consideration, as they offer unique opportunities to improve government operations: Electronic Commerce, Electronic Document Management, Geographical Information Systems, Online Learning, and Wireless/Mobile Computing.

That’s not all. There are five other technologies that may go a long way in improving government operations: e-commerce, electronic document management, geographical information systems, online learning, and mobile computing.

Electronic Commerce. E-commerce, particularly over the Internet, is the wave of the future. Practically all big corporations worldwide are looking at e-commerce technology to improve themselves and remain competitive in the future. Government should seriously look into re-engineering its existing processes and procedures to take advantage of the speed, efficiency, and transparency of e-commerce and its applications. Possible applications in government include a centralized electronic procurement system, electronic declarations and payments of taxes and duties, electronic bidding, and electronic registration of businesses.

Electronic Document Management. Government records, now in poor state, can be stored and accessed in electronic form so they can be kept longer, maintained at less cost, and made accessible to a greater number of people. Since most documents today are produced using computers, it will be relatively straightforward to implement a prospective (i.e., applicable to all documents from a certain date forward) electronic official document repository. It is also technically feasible to convert existing documents in paper form, but it will take time and money.

GIS and Remote Sensing and Related Spatial Technologies. More than 80 percent of planning, decision-making and operations in government are related to or affected by location, people, things, and events. Geographical information, that is, maps with associated attribute databases, is therefore essential to effective and efficient governance. Geographical Information System (GIS) technology enables the geographical integration of disparate databases of government agencies. Through location, such as an address, or reference to a street, land parcel, district, barangay, town/city, province, region, or through geographical position or technical description of objects in space, it is possible to link government databases about a geographic area together. Spatial analysis, not possible before with all the types of sorting and manipulation done on databases, is quick and easy in a GIS. There is continuing acquisition and creation of geographically referenced information in government. However, the base maps, with which to relate or overlay these new data sets are very old and doubtful accuracy. There is need to supply all users with common digital updated base maps with which to relate their databases for their applications.

Online Learning Techniques. Such techniques will not only help address government’s massive training and retraining requirements, but more importantly, can be used to improve the deteriorating quality of education and training in the country. At the very least, placement of course materials on CDs and the Web that can be accessed by teachers and students nationwide will help in standardizing instruction. On the other extreme, Web-based asynchronous distance education/training modules will facilitate massive nationwide training efforts for teachers, government workers, and even professionals in need of continuing education.

What is exciting is that these online techniques may improve the often lamented state of education and training in the country.

Wireless/Mobile Computing. This offers the unique opportunity to bring the benefits of a computerized government to the remote areas of the country where people in greater need of government assistance reside. Extension and field workers in health, agriculture, social welfare, and livelihood will be more effective if they had the capability to access computing resources and applicable databases while doing their work. This technology will become more important in the future, after the needed government databases and networking has been set up, and when, hopefully, the cost of mobile equipment has gone down.

With these technologies as underpinnings, the following technology strategies and solutions are adopted for GISP implementation.

1. Ensure full and early implementation of the RPWeb initiative.

Given the importance of Internet-based technologies, it is important to, as soon as possible, achieve a “critical mass” of government agencies connected to and using the Internet. The Internet will serve as the means of communication and information dissemination in government, including:

Publication and dissemination of government e-mail and Web site directories;

Provision of monetary and manpower support for the setting up, not just of static agency homepages, but agency Intranets and Extranets; and

Changes in legislation and policy to support Internet-based communication from, to and within government.

2. Use VPN technology in the RPWeb as the nationwide WAN of government.

Since most government agencies will eventually be connected to the Internet because of the RPWeb initiative, VPN technology should be employed to quickly and effectively implement a nationwide network connecting all these agencies. This can be achieved simply by installing VPN access routers in all sites connected to the Internet, defining and implementing an encryption strategy, and upgrading leased line connections of agencies to their ISPs to meet increased data traffic.

With VPN technology, all or most government agencies can be connected through a nationwide network.

A two-level encryption strategy will be adopted where the first level supports the need of some agencies for a purely internal network and the second level allows a common VPN for agencies needing to share data with one another.

Dial-up users will be provided authentication portals with two connections to the Internet, a normal connection, and another employing encryption using a VPN router. The user accesses the portal via its public Web site, and once authenticated, is allowed to send and receive messages through the VPN link.

Since all connections are local (i.e., leased line to local ISP, local call to ISP) total communication costs will be substantially reduced. Furthermore, the connections can be made to carry more data through VOIP and videoconferencing over internal protocol technologies, thereby allowing increased communication and coordination between field and central offices.

3. Adopt the Web-based client-server model for government applications.

The Web-based strategy safeguards ICT investments from equipment obsolescence, lowers training costs, and reduces the need for mainframes and other centralized systems.

Given the growing pervasiveness of the Internet and the Web, Web-based applications will be the preferred mode in building software applications and work at Web-enabling the critical applications that already exist.

This strategy protects ICT investments against obsolescence and is based on standards. For example, existing PCs can continue to be used as client workstations by making them run browser software. Existing database servers need not necessarily be upgraded, but may be made to support more users through dedicated Web servers that handle so-called “middle layer” functions. The model inherently supports scalability of systems in that processing load can be readily and transparently distributed across multiple servers. Once implemented, servers and clients may be upgraded or replaced independently of each other, thereby allowing system replacement costs to be spread out over several years.

This approach also reduces training requirements for government because it provides a standard, easy-to-use, graphical user interface that is identical for local and remote users. Moreover, the Web-based client-server model has built-in facilities for accessing data from multiple sources over a network, and can be readily used for e-commerce applications in government.

Finally, because the model is essentially a distributed processing system, government will be able to take advantage of the lower acquisition and operating costs of PCs and smaller computers by reducing the need for powerful centralized systems like mainframes. The government can then initially standardize on the following platforms:

MS Windows-based PCs as clients, since about 90 percent of all PCs worldwide run on the MS Windows platform and PCs can be used both as Internet clients running browser software or as office automation stations;

Windows NT-based LAN or departmental servers to complement the Window-based PC workstations and sharing of common resources like printers, Internet connection, etc.;

Unix-based servers, as these are still the most common open system platforms because of reliability, functionality and portability. Their proven processing power scalability, from small systems supporting several users to very large configurations supporting hundreds, match government’s very wide range of processing requirements.  

4. Provide a single point of entry for accessing public government Web sites.

When all government agencies start to put up public Web sites, it will actually become harder for the public to look for information that they need, which may actually be on a Web site but cannot be located by users. For this reason, a single point of entry for users with links to all public government Web sites will be adopted. The site will also contain a search engine to allow users to quickly locate the sites that may contain the information requested.

This strategy will also be useful in enhancing security for government systems. If the Web site mirrors all public homepages, there will be no need to provide general public access to Web servers of the individual departments and agencies, thereby allowing these servers and their links to the Internet to be used exclusively for encrypted interagency and intra-agency data traffic.

5. Design integrated systems based on distributed databases and/or data warehouses.

The use of distributed database and/or data warehouse technologies will be adopted.

Distributed database technology supports many different processing schemes applicable to government operations. This will allow integrated and more sophisticated systems in agencies with field offices to access local and remote database tables within an application. Logically linking fully distributed databases will enable sharing and integration of information across related agencies. Database mirroring, on the other hand, not only supports sharing of data between offices but also provides additional data security with a duplicate copy.

Data warehousing, with its ability to accept data from multiple sources for use in analytical processing without changing the existing operational database, can be used to integrate data from different departments without the risk of jeopardizing their existing computer systems and data. It is particularly useful when the agencies providing the data use different database management system platforms, and may, therefore, be unable to take full advantage of distributed database options.

6. Set up an electronic document repository to improve handling of government records.

With most government offices already using PCs to produce documents, reports, and other records, the efficiency, cost, and reliability of storing and disseminating these records will be greatly improved through a document management system.

A document management system will greatly improve storage and dissemination of government records.

Instead of printing out multiple copies of these documents, having them published in the official gazette, and keeping them in archives where future access is nearly impossible, agencies are required to periodically submit electronic copies of all newly generated official documents to a central electronic repository. The repository will employ CD-R jukeboxes to securely store all the files and provide a facility where all government documents from a certain date forward can be accessed.

Not only will this result in lower costs over the long term (optical disk storage is cheaper than paper), it will also improve access to government records through automatic indexing, text-searching capability, and remote access through the Internet.

Some existing documents will merit conversion to electronic form through repurposing, and subsequently be made available at the repository. Certain key government offices (e.g., OP, Congress, CSC, PNP, DECS, CHED) will set up their own document management system due to their nature of work and volume of documents processed.

7. Install and maintain security mechanisms in all systems.

To guard against hackers, unauthorized users, viruses, and other hazards of the trade, a security infrastructure will be created.

The connection of government systems to the Internet will expose them to hackers, unauthorized users, viruses and other risks. To address this concern, a security infrastructure will be put in place. A combination of technology, policies, legislated laws, and enforcement procedures will comprise this security infrastructure.

The use of tested security technologies and best security practices in implementing the GISP will be the overriding priority of the plan. Security beyond the standard firewalls will be adopted and deployed to protect systems with valuable data. The public web server must remain “outside” the agency’s firewall. Secure encryption techniques will be employed on all VPN links. Systems will be designed to reject “crackable” passwords, and strictly implement password aging. For e-commerce applications and government business transactions, authentication devices like smart cards, client membership procedures like membership enlistment, and enforcement mechanisms like user Certification Authority will be strictly implemented in combination with standard identification systems and procedures.

8. Adopt/formulate and apply Open System standards government-wide.

Throughout the world, corporations and countries have decided to standardize as a strategy to reduce costs, improve quality, and ensure compatibility and interoperability of systems. Initially confined to manufacturing, strategic standardization has proved to be such a sound practice that many countries and international organizations have created offices solely for formulating and promoting standards. In addition to the popular International Standards Organization (ISO) and American National Standards Institute (ANSI), countries like Australia, Canada, Singapore and even Malaysia have either set up or are newly setting up standards bodies. The NCC will adopt, formulate, and monitor the application of standards throughout government.

In the Philippine government, the strict application of continuously updated ICT standards will help in the successful implementation of ICT projects by simplifying the specification and procurement process, reducing costs through economies of scale, minimizing obsolescence, and ensuring the interoperability of systems. Standards can apply not just to hardware, software, and networks, but to data, procedures, security mechanisms, and systems administration as well.

The Philippines will adopt the following internationally accepted standards to speed up the process of standardization in the country:

ANSI POSIX and ISO 9945 — for operating systems
ANSI C and ANSI 2 HTML — for the C language and Java applets
ISO/IEC 9075 — for SQL
ISO/IEC 9579 for remote database access
ISO 8802.3 — for CSMA/CD (Ethernet) Local Area Networking
ISO 8613 — Office Document Architecture (ODA)
ISO/IEC 8880 — Multi-protocol information exchange
ANSI X3.211 — for WORM optical disks
US DOD Trusted Computer System Evaluation Criteria
5200.28-STD (Orange Book) — for establishing levels of system security

In addition, the following international standards will also be adopted, without prejudice to the possibility of local adaptation:

ANSI/IEEE 1008 — for software unit testing
FIPS PUB 113 — computer data authentication
ISO/IEC DIS 10745, ISO/IEC DIS 11586 — for security
ISO/IEC 10164 — for security audit trail
ISO 6523 — identification of organization codes

Finally, the government will adopt as its standard de facto industry standards and practices such as the use of Windows-based PCs as workstations and Unix based servers. Other de facto standards include:

TCP/IP suite of protocols (including FTP, SNMP and SMTP) widely used in the Internet for networking government systems
10/100Base-T for ordinary workstation LAN connections
Switched 100Base-TX for higher speed LAN connections for servers
1.44 MB 3.5” floppy disks for media exchange
650 MB 5.25” compact disks for optical storage

9. Use packaged application software whenever available.

The use of packaged application software will be encouraged, particularly those systems that pertain to accounting, finance and human resources. Better progress on ICT utilization can be achieved by using packaged applications. Among the common information systems identified in the GISP susceptible to packaged application software are those of the LGU-based systems, the OP-EIS, the Integrated Records Management Systems, and the transactional components of the Human Resource, Physical Assets, and Integrated Financial Management Systems.

10. Outsource to the private sector.

The private sector will be tapped in implementing and operating GISP-identified information systems.

Government will never have sufficient manpower, both in terms of quantity and quality, to implement and operate all GISP-identified information systems. Outsourcing will be encouraged to efficiently and effectively implement the GISP, such as contract programming, turnkey development, BOO, BOT, and other similar outsourcing schemes.

Outsourcing as a government strategy is consistent with the recommendations of IT21 and actually benefits government in two ways. Not only will government be able to implement its systems, but it will also stimulate the local ICT service industry which will hopefully gain enough expertise and experience to become globally competitive.

Indicative System Configurations

The matrix on the next page identifies information systems and the appropriate technology solutions.

For purposes of simplifying cost estimation, all servers were assumed to be one of three types: large, medium or small.

Large servers are intended to house the consolidated databases and data warehouses (300 gigabytes to terabyte range) and support hundreds of simultaneous users.

Medium servers can support up to 100 gigabytes of data and 50 simultaneous users if used as database servers. Reconfigured to have less disk storage but more processors and higher memory, the same equipment can support hundreds of users as a heavy-duty Web server.

Small servers are meant for data-processing applications involving up to 20 simultaneous users and 20 gigabytes of data. These servers can also be used as medium-size Web servers.

LAN-based systems are built around Windows NT-based departmental servers with 128 MB memory and 12 GB of disk storage. In addition to being used as LAN servers, the same equipment will serve as small Web servers or as firewalls.

PCs are based on the Microsoft Windows platform and would ideally have a LAN card or an internal modem to allow connection to the government Virtual Private Network.

To implement the envisioned government VPN over the Internet, VPN Access Routers will have to be procured. These routers must have hardware-based encryption capability not only to achieve better performance, but also to lower the risk of unauthorized key distribution. The access router will have two serial ports — one for a possible leased line connection to the ISP, and a second port with auto-dialup capability to serve as a backup, or to enable connection to the ISP in case only dial-up access is available.

Detailed indicative specifications of database servers, departmental servers, PCs and VPN Access Routers are found in Annex C.

Table 3.1 — Information Systems Hardware Requirements

Chapter 4
Institutional and Policy Framework

For GISP to succeed, appropriate institutional arrangements and policies have to be adopted.

A key factor to ensure the successful implementation of the Government Information Systems Plan (GISP) is the adoption of appropriate institutional arrangements that clearly define the roles, functions, and responsibilities, as well as relationships of various stakeholders. There shall also be the need to adopt corresponding policies that will guide the operation of government institutions and the activities of the private sector in the implementation of the GISP. For this purpose, the following institutional arrangements and policies shall be adopted:

A. High-Level Policy Advocacy and Championship for the GISP

Policy advocacy and championship of the GISP shall be carried out at the highest levels, with the President and the members of the Cabinet, the leaders and members of both houses of Congress, the Judiciary, and the chief executives of the local government units (LGUs) as chief GISP advocates and champions.

B. Institutional Roles and Arrangements

The institutional framework for the implementation of the GISP will be in accordance with the following fundamental criteria:

1. Seamless integration of policy, program, and technical implementation and management of the GISP.

2. Policy management of the GISP will be carried out at the highest institutional levels to ensure highest levels of authority, responsibility and accountability in the administration of policies and implementing activities. The head of such policy level body shall effectively be the champion for the GISP.

3. Clear commitments of budgetary support and financing from all stakeholders, including the Department of Budget and Management and Congress.

Based on these criteria the following formal institutional arrangements, and definition of roles of the various agencies shall be adopted:

Overall Management of GISP Implementation

National Information Technology Council (NITC)

Crucial to the implementation of GISP is the role of the NITC, which has varied functions.

The NITC will be the central policymaking and coordinating body for the implementation of the GISP. In particular, the NITC shall perform the following functions:

1. Approve and endorse to the President, through the DBM, a Consolidated Annual Government Computerization Expenditure Program based on the thrusts and priorities in the GISP, for incorporation in the President’s Annual Expenditure Budget and Sources of Financing to be submitted to Congress.

2. Recommend to the President policies and implementing mechanisms for the provision of incentives for the wider participation of the private sector in the implementation and financing of the GISP.

3. Approve and coordinate the implementation of all policies, rules and regulations for the implementation of the GISP.

4. Exercise policy, technical and administrative supervision over the NCC with respect to all matters on GISP implementation management.

5. Initiate a study on the feasibility of establishing or authorizing an institution, or licensing of a private sector firm, to serve as certification authority (CA) and/or the necessary public key infrastructure (PKI), or any other mechanism for user identification, verification, and authentication to ensure the integrity, security, and legitimacy of all government online transactions.

7. Recommend needed legislation on cyber security and appropriate penalties for violators.

National Computer Center (NCC)

Pursuant to Executive Order No. 125, dated July 19, 1999, the NCC will be the technical arm of the NITC in the overall management and coordination of the GISP. It will report to the NITC chairman who shall exercise policy and technical supervision over its operations. The NCC will have the following functions relative to the implementation of the GISP.

1. Facilitate the implementation and periodic updating of the government information systems plan (GISP);

2. Issue technical advisories to accelerate the conversion of government processes, databases, documents, transactions into electronic format;

3. In coordination with, and/or with the assistance of private sector groups or organizations, conduct the benchmarking of new technologies for possible application in government;

The host of activities include coordinating, reviewing, monitoring, and organizing sectoral and industry desks.

4. Issue technical advisories on ICT and IS standards and benchmarks in pursuance of the GISP;

5. In coordination with the agencies concerned, and with assistance from the private sector, review and recommend measures to update or improve operational policies, programs and guidelines on the preparation of agency information systems strategic plans (ISSPs), which shall serve as building blocks to the GISP;

6. Review, for endorsement to the DBM, and with the assistance of private sector groups and experts from academe, agency ISSPs to ensure that these are consistent with the GISP objectives and priorities;

7. Assist the agencies in the preparation of agency project proposals, terms of reference, technical and functional specifications, and requests for proposals (RFPs) prior to release to prospective bidders;

8. Monitor and evaluate the progress of GISP/ISSP implementation and submit, through the NITC a report to the President and Congress, on the performance of agencies, and on recommendations to fast-track or enhance GISP implementation.

9. Develop and maintain the Philippine Government Portal;

10. Recommend to the NITC legislative bills on ICT policies and issues that have to be addressed, such as computer security, electronic commerce in government, privacy rights of individuals and companies;

11. Coordinate with the National Security Council (NSC), the National Bureau of Investigation (NBI), and other agencies and private sector organizations or firms in establishing a national electronic security and antifraud task force emergency response team;

12. Organize NCC desks to provide direct staff support to industry task forces or panels responsible for coordinating oversight and development functions in pursuance of the GISP.

13. Perform such other related functions as may be assigned by the NITC.

Roles and Functions of other Agencies Performing GISP Oversight and Related Functions

1. Department of Science and Technology (DOST)

The agencies have their functions clearly delineated. NEDA will encourage private sector investment in GISP.

The DOST will manage an ICT Innovation and Development Fund to be created as part of the General Appropriations Act to fund R&D projects for information systems application and standards development, as well as innovation in support of government operations. Both the private sector and the government agencies can avail of these funds, the guidelines for which will be issued by the DOST in coordination with the NITC, DBM, NEDA and the Department of Trade and Industry (DTI).  

2. Department of Budget and Management (DBM)

The DBM will develop and adopt a solutions-based procurement and budgeting system for information and communications technology. It will likewise institute a modernization of the staffing, position classification and compensation system for information technology human resources in the government.

3. National Economic and Development Authority (NEDA)

The NEDA will promote private sector investment in the implementation of the GISP. In particular, it will review and undertake the improvement of the build-operate-transfer (BOT) law and related laws governing private sector participation and investment in government ICT projects with a view to provide incentives and facilitate the processing of such investments.

The NEDA will likewise ensure that the implementation of the GISP supports the priorities, goals and objectives of Angat Pinoy 2004 or the Medium-Term Philippine Development Plan.

4. Department of Trade and Industry (DTI)

The DTI, as lead agency in the promotion and coordination of electronic commerce activities in the Philippines, pursuant to Republic Act No. 8792, otherwise known as the “Electronic Act of 2000”, shall be responsible coordinating and negotiating with foreign governments and intergovernmental organizations on all matters related to e-commerce and ICT. It will further ensure, in consultation with the NITC, that the Philippines is represented in the development of international standards and recommendations affecting ICT.

The DTI shall further consult with the NITC on key policy issues and Philippine Government positions on ICT-related matters taken up in international fora.

5. Department of Transportation and Communications (DOTC)

The DOTC will: (a) monitor developments in convergent technologies and advise the NITC on the effective application of these technologies in the implementation of the GISP; (b) assist the NITC establish appropriate telecommunications networking technologies and facilities for government and its various agencies for seamless information exchange and resource sharing across government, as well as ensure wider public access to government services; and (c) recommend to the NITC, the Cabinet, and to Congress policies or needed legislation to fast-track electronic commerce and electronic governance through an efficient and cost-effective telecommunications network in the country.

Government Departments, Agencies, LGUs, Instrumentalities, and the Private Sector as Active Partners in the Implementation of the GISP

All government departments, agencies, local government units, and other institutions and instrumentalities, including the local government units (LGUs), as well as the private sector, will be active partners in implementing the GISP.

1. Alignment of Department and Agency Information Systems Strategic Plans (ISSPs) with the GISP

The heads of departments and agencies, as well as local governments, will ensure that the their Information Systems Strategic Plans (ISSPs) are aligned with the strategies and priorities in the GISP, and the overall development plans and programs of government as provided in IT21 and Angat Pinoy 2004. In the design of the agency or LGU ISSP, the heads concerned will put in place a process for the optimal utilization of existing and planned ICT resources and solutions. This process will include a periodic monitoring and assessment, through the NITC and the NCC of ongoing ICT projects and activities pursuant to the priorities, strategies and objectives of the GISP.

2. Performance and Results-Based Management

The department/agency/LGU head will establish goals for improving the efficiency and effectiveness of department operations and, when appropriate, the delivery of services to the public through the effective use of information and communications technology. He will:

Prepare an annual report starting on the first year of GISP implementation, to be submitted to NITC and included in the executive department’s budget submission to the DBM/Congress, on the progress in achieving ISSP goals.

Ensure that performance measurements are prescribed for ICT used by or to be acquired for the executive department to assess how well ICT supports the programs of the executive departments and the returns on or benefits realized from ICT investments.

Where comparable processes and organizations in the public or private sectors exist, quantitatively benchmark agency process performance against such processes in terms of cost, speed, productivity, and quality of outputs and outcomes.

Analyze the missions of the executive department and, based on the analysis, revise its mission-related processes and administrative processes when appropriate before making significant investments in information technology in support of those missions.

Ensure that performance on the GISP implementation is part of the key results areas of the department offices, bureaus and attached agencies.

Ensure that the information security policies, procedures, and practices of the department are adequate and consistent with and in pursuance of the objectives of the GISP.

3. Agency Authority to Procure ICT Resources and Services

The authority of the department/agency/LGU head to procure ICT resources will include the following:

To acquire ICT resources, including solutions, for the requirements of the department/agency/LGU as authorized by law;

To enter into contracts that provides for multiagency acquisition of ICT resources in accordance with guidelines.

The government, through the DBM Secretary, will enter into a multiagency contract for procurement of commercial items of ICT resources, including software and services, that requires each executive department/agency/LGU covered by the contract, when procuring such items, either to procure the items under that contract or to justify an alternative procurement scheme for the same type of items or services.

Procurement of Information and Communications Technology (ICT) Resources and Professional Services

The DBM, in close consultation with the NITC, the NEDA, Commission on Audit (COA), the implementing agencies, and local governments, will undertake a continuing review of procedures on the procurement of ICT resources, including professional services, with the view of instituting reforms in procedures and policies, taking into account the fast-paced developments in the ICT sector and the quick obsolescence of technology and ICT resources. The reforms will aim to facilitate the economical and efficient acquisition of ICT resources and services in government.

Medium-Term Public Investment Program

The GISP will form part of the Medium-Term Public Investment Program (MTPIP) of the government and will be aligned with the programs identified in the Plan. Specifically, a separate section will be devoted to government business process reengineering through use of ICT and better information resource management. A corresponding medium-term expenditure program will be prepared, which will be translated into the Consolidated Annual Government Computerization Expenditure Program. The NEDA will be responsible for ensuring that the updated “Medium-Term Philippine Development Plan of government, or Angat Pinoy 2004, shall incorporate the strategies and programs in the GISP.

The GISP will be part of Angat Pinoy 2004, the government’s blueprint for economic progress.

Use of the Annual Budget Process

The DBM will develop, as part of the annual budget process, a mechanism for analyzing, tracking, and evaluating the risks and results of all major capital investments made by an executive department for information systems. The process will cover the life of each system and shall include explicit criteria for analyzing the projected and actual costs, benefits, and risks associated with the investments. At the same time that the President submits the budget for a fiscal year to Congress, the DBM will submit to Congress a report on improvements achieved as a result of major capital investments made by executive departments in information systems and how the benefits relate to the accomplishment of the goals of the executive departments.

Information Technology Standards

The NITC will oversee the development and implementation by the NCC of standards and technology guidelines and benchmarks in the case and application of ICT in government. Such standards will be prepared jointly with the DOST-ASTI-PCASTRD, DOTC, DBM, NEDA, and DTI. These ICT standards will be observed in the procurement of ICT resources and services.

Designation Of Executive Agents For ICT Acquisitions

The DBM Secretary will designate as executive agents for government-wide acquisitions of information and information technology.

Use of Best Practices in ICT Acquisitions

The DBM Secretary will encourage heads of the executive departments to develop and use best practices in the acquisition of information technology.

Solutions-Based Budget Plans

Department ICT budgets will be solutions-based, to include all components (hardware, software, network, content/data, training/organization, application, procedures) and make an information system fully operational. Although components may be procured separately, the necessary components for an information system to be fully operational after a period of development should be budgeted together. The DBM Secretary, in consultation with the NITC, then issues guidelines on solutions-based ICT Solutions Planning and Budgeting.

Outsourcing of ICT Professional Services

As a general rule, government will outsource ICT services instead of building a whole human resource infrastructure for ICT development within the government. The NITC, in coordination with the NEDA and DBM, will issue rules and regulations and standards on the outsourcing of ICT services.

Leasing and Lease-to-Own Arrangements

Leasing and lease-to-own arrangements will be made an acceptable mode of procurement for information and communications technology. In some cases, this will be the preferred mode of acquisition so that agencies which need to upgrade servers and other computer equipment on the third or so years may do so when necessary without further authorization, provided they have been planned for. Leasing will also ease up the government’s cash flow requirements for GISP implementation.

BOT Scheme for Procurement/Outsourcing of ICT Resources/ICT Solutions/Services

Private sector participation in the establishment of government database infrastructure is incorporated in the BOT law. A separate handbook on implementing rules and regulations concerning this will be issued by NITC in coordination with NEDA.

Guidance for Multi-Agency Investments

The NITC in coordination with NEDA, DBM and DOF will issue guidelines for undertaking efficiently and effectively interagency and government-wide investments in ICT to improve the accomplishment of missions that are common to executive departments.

Periodic Reviews

The NITC and DBM will carry out, through the budget process, periodic reviews of selected information resources management activities of the executive agencies. This is in order to ascertain the efficiency and effectiveness of information technology in improving the performance of the executive departments and the accomplishment of the missions of the executive departments.

Enforcement of Accountability

The DBM Secretary, in consultation with NITC, may take any authorized action that is considered appropriate, including an action involving the budgetary process or appropriations, to enforce accountability of the head of an executive department for information resources management and for the investments made by the executive department in information technology.

Actions that can be taken by the DBM Secretary in the case of an executive department may include:

1. Recommending a reduction or an increase in any amount for information resources that the head of the executive department proposes for the budget submitted to Congress;

2. Using other authorized administrative controls over appropriations to restrict the availability of funds for information resources; and

3. Designating for the executive department an executive agent to contract with private sector sources for the performance of information resources management or the acquisition of information technology.

Private Sector Participation

The participation of the private sector will be a key factor in the success of GISP.

The active and direct participation of the private sector in the implementation of the GISP will be a key strategy in GISP implementation. Among the areas for private sector participation are:

Advice and assistance to the NITC-NCC in the development of ICT standards and benchmarks for government;

Assistance to the NCC/agencies concerned in the development/review and finalization of project terms of reference (TOR), technical and functional specifications, and requests for proposals (RFPs);

Development of and supply of application software for common applications for national government agencies and local government units;

BOT/BOO/BTO for large revenue generation and other systems, where the returns on investment are clear or where there are obvious benefits in the implementation of the systems but the agencies are constrained by cash flow requirements of the project;

Supply of hardware and software through leasing or lease-to-own arrangements;

Supply of maintenance and technical support, training and change management services and system integration services;

Database buildup for major systems with large volume of data for conversion from paper to digital form;

Data acquisition, such as inventory types of data collection that form part of the database infrastructure of major systems;

Provision of communication systems for data and voice, and related infrastructure; and

Supply of technical ICT personnel on short-term or long-term basis for agency-defined work and outputs.

The following policies and actions will be adopted to encourage private sector participation in the implementation of the GISP:

1. Formulation of clearer implementing rules and regulations on the BOT/BTO/BOO law for ICT projects;

2. Articulation of the policy of outsourcing system development and other ICT services as an alternative to in-house development or development-by-administration arrangements;

3. Development of performance-based service contracting procedures that clearly define the performance specifications and deliverables for the acquisition of ICT products and services.

4. Provision of incentives on intellectual property rights for systems that can be used by many agencies;

5. Development of clearer user and system specifications available to those offering services or products; and

6. Implementation of pilot projects for private sector participation to be funded from an ICT Innovation and Development Fund to be administered by the Secretary of Science and Technology.

Intellectual Property Rights

The Government will comply with the International Convention of Intellectual Property Rights in the implementation of the GISP. This means that license agreements to use commercial on-the-shelf software (COSS) will be honored if the licensing agreements are standardized for worldwide distribution.

Likewise, locally produced application software where the agencies merely purchased license to use will not be required to provide source codes; however, suppliers must provide warranties on the software as well as software maintenance when required.

In the procurement of system development services, which are quoted at full development cost, the supplier will be required to provide all the source codes developed. However, the agency is encouraged to continue working with the supplier to improve the product for the agency’s use and if the product is also useful to other agencies, the two parties may enter into an agreement for the commercial dissemination of the product.

All intellectual property that is pre-identified by ICT suppliers during the negotiation or bidding for services will be honored by the agency if, in its opinion, there is no need to own the source code and if the price of the application software is reasonable.

Under GISP, all intellectual property pre-identified by ICT suppliers will be honored.

The NCC will continue to ensure that government agencies use only licensed copies of software in all their ICT applications. It will designate an executive agent to negotiate for the supply of standard software that could be used throughout the bureaucracy.

The Department of Trade and Industry will issue rules and regulations covering intellectual property rights in the implementation of the GISP.

Information Systems Project Development

1. Incremental Approach to Information Systems Development

Some of the information systems identified in the GISP are comp systems in terms of development and implementation. There is a high degree of risk in completing the systems on time, on budget and in the quality desired. To reduce this risk, the incremental approach to system development and acquisition of technology will be standard practice in the implementation of the GISP. This means that agencies will divide large systems into modular and scalable parts, which can then be integrated into existing ones, and can likewise be integrated with modules to be developed in the future.

Information and communications technology will also be acquired through the incremental approach. This is to ensure that government will benefit from technological developments introduced in the marketplace and will not be saddled with obsolete technology.

The DBM will ensure that an ICT investment proposed by an agency is a complete system that can be made to work and improve a government business process within a period of 18 months from release of the budget. The practice of requesting funds for equipment outlay without a corresponding plan and budget for other components of an information system shall be discontinued.

2. ICT Project Development Templates

As a matter of policy and practice, the DBM shall provide funding for complete projects, which have gone through the project preparation and development process. The release of appropriations shall be to fund information systems, not only information technology. There will be rhyme and reason in the allocation of funds for information technology and this will be driven by content development and/or system development activities.

The DBM in coordination with NCC will develop a manual with templates on Standards for Information Systems Project Development. DBM as well as agency staff shall be provided training on the use of the manual.

3. External Consultants for ICT Project Preparation

Risks for contracting parties, especially for comp systems, will be reduced.

Information technology is changing at a rapid pace and if the procurement process takes a long time, the IS project may be overtaken by events such that projects are further delayed by the need to repeat the procurement. The government will, to the extent possible, reduce risks for contracting parties, particularly for comp systems. As a matter of standard practice, an external consultant’s service will be procured to assist the agency in defining the specifications of the project in a clear way that will allow performance-based and results-based service contracting in the development and delivery of systems. Systems shall be designed not to exceed a maximum of 18 months and the award of contract should not exceed three months from issue of the bid documents. This is to reduce risks for the contracting parties.

4. In-House ICT Services

Departments will retain and develop a core staff of ICT professionals for in-house development. The in-house projects will be limited in scope so that it can be completed in one fiscal year. There is the very real risk of turnover of ICT staff, which is known to be a principal cause of delay and noncompletion of many in-house IS project development initiatives. Even for in-house development, staff will be trained to follow a project development approach that clearly defines the final outcome of the system development effort and includes a quality assurance plan. For in-house efforts, the head of the OIRM will ensure that all the elements needed for implementation are available as planned.

Selection and Hiring of ICT Experts and Consulting Services

Present government guidelines on the procurement of consulting services will be improved.

Many government ICT projects were not completed by contractors, some resulting in legal cases, because of the lack of clear specifications of performance, the quality requirements, and the rule on lowest complying bid. More often than not, lowest bidders complain when not awarded the contract because of allegations that they met the minimum requirements described in the Project Terms of Reference.

A continuing review of existing government guidelines on the procurement of consulting services will be made, especially with respect to their application to ICT services. In particular, the guidelines will be improved to include the following:

1. The procedures for the outsourcing of application system development services, which should provide for the completion of the application software based on the user specifications.

2. Guidelines to help agencies go into performance-based service contracting, where payments are based on agreed upon performance standards for the contracted ICT services. Quality requirements shall be made part of the bid terms of reference.

In the absence of an in-house capability, agencies will be encouraged to procure the services of qualified individuals and companies, duly accredited by the NCC, and approved by the NITC, using a simplified process not requiring bidding. The PEAC will be constituted to be able to assess quickly the capability of institutional consultants for ICT services. The NCC, in consultation with the agencies and departments concerned, particularly NEDA, DBM, and COA, will formulate a prequalification procedure and enrollment system for prequalified ICT consultants and their areas of expertise to simplify the search by agencies for qualified consultants.

Interoperability, Interconnectivity Among and Across Systems and Databases

Interoperability and interconnectivity can be accomplished by using open ICT standards and data standards that are published and known to users and the ICT professionals involved. It can also be accomplished through the development and adoption of ICT standards in government. The Internet is also a good means of accomplishing this through web browsers.  

As a matter of policy, the executive agencies will ensure that within their organizations, they adopt technology that is open and can be interfaced with other systems.

The department shall use the internal budget process to control the acquisition of technology that does not conform with this policy. All ICT plans, whether implemented by contractors in foreign-assisted projects, grant or otherwise or regular agency funds should conform to the approved Information Technology Architecture designed to meet the business needs of the department. Grant projects involving ICT will be aligned with the approved Department ICT Architecture. Waivers will be requested for nonconforming projects, which should be approved only if the criteria for issuing waivers are based on DBM guidelines on the matter.

Data Standards

Data standards will be developed to facilitate data sharing and information exchange among agencies, and to promote efficiency of information systems, subject to privacy rights of individuals.

All departments will participate in Inter-Agency Working Groups to be created for GISP implementation, which will work on developing data and other standards for the GISP. The NCC, with recommendations from the CIO Forum and approval of NITC, will issue and enforce ICT Standards for the whole government.

The NCC will oversee the development and implementation of data standards and guidelines, by the various departments and agencies. For this purpose NCC will coordinate with the National Statistical Coordination Board (NSCB), and other data-producing agencies whose information products are widely used by government agencies and the public.

Every department will have its own internal data standards, to be approved by NITC and applied to all bureaus, attached agencies, and regional offices under its supervision and control. GOCCs will ensure that their systems also use OPEN Technology and they use relevant data standards of the department.

Public Access to Government Information

As a matter of policy, the government will make government information created or generated in the GISP accessible to the public to empower them to proactively participate in nation building, subject however to national security requirements where certain information and transactions cannot be made public.

As initial steps, basic information that provide public guidance and improve public access to government services and transactions will be made available through the Internet in two languages: English and Filipino. This will be part of the RPWEB Program of the Government in Year 2000. The NCC will be responsible for monitoring the implementation of this program.

Public requests for data that have been created in digital form and are not considered classified information shall be provided in digital form at cost of reproduction or reasonable fees. The proceeds of such operations shall be used for the maintenance and updating of databases.

Public access policies shall be covered under a proposed Freedom of Information Act clarifying the Constitutional policy on access to government information, particularly in an environment where information and data are in digital form and are accessible through the Internet.

A policy study shall be required on the pricing of information assets of the government when made to the public, particularly when ICT Projects are carried out under the BOT law.

Other Policy Areas for Further Study and Formulation

1. Computer Security

There is a need to protect the system from hacking, and other illegal and destructive entries.

As the government becomes more and more dependent on ICT for most of its information processing and management requirements, it must develop the necessary institutions, policies, legal framework and other related security measures to secure its systems and networks from hacking and other illegal and destructive entry into the government systems. This will be ensured through legislation where the law shall have penal provisions governing illegal acts on government online sites.

The government will determine the feasibility of establishing physical and virtual security infrastructures for government computers and network systems. The NITC will undertake a study on the economics, as well as various options, of either establishing or authorizing a government institution, or a private firm or organization that will clearly establish the integrity, security and legitimacy of government electronic information and transactions.

2. Privacy

As more databases are built involving individuals who provide information to the government, and as data standards are adopted by the agencies that will enable the systematic sharing of information and matching of records of individuals, the government will address issues concerning the privacy of individuals as provided in the Constitution. Policies will be issued by Congress to guard privacy of persons through a Privacy Act.

3. Electronic Commerce

Electronic commerce laws will address the use of this technology in legal matters and work towards acceptance of electronic data as evidence in the courts. Likewise, e-commerce laws will resolve such issues as the use of electronic signature authentication systems and electronic documents to guide the judiciary in cases involving electronic transactions of government with the public. Legislation may also cover general nongovernmental transactions.

The E-Commerce Bill which provides the legal basis and policy framework for the conduct of electronic transactions in the country, has been passed by Congress, and recently signed into law by the President.

4. Government Reengineering

ICT programs of government must go hand in hand with business process reengineering. The GISP supports business objectives and processes of government. Computerized Information Systems can result in the following:

Zapping of clerical functions that need the use of typewriters and calculators, resulting in the reduction of the workloads of clerical personnel;

Increase of available time for developmental work and better quality plans and decisions due to better information support:

Reduction or removal of redundancies in the collection and processing of information among agencies and within agencies, reducing paperwork and workload of existing staff;

Simplification and streamlining of procedures allowing the quicker completion of transactions with the public:

New jobs and tools for knowledge-based and ICT work; and

Reduction of messengerial and related functions and activities, such as travels and face-to-face meetings.

The implementation of the GISP will be synchronized with and in support of the Government reengineering program of government.

5. Government Performance and Review

The benefits from computerization and better management of the information resources of government have to be determined through periodic assessment of performance of agencies. As business processes are improved, these will be reported to the public and in Congress to keep the GISP implementation on track.

One of the key result areas of departments will be the implementation of an IRM Program in their respective organizations. The management of government information resources will be given the attention it deserves. Government information will be considered a national resource that must be managed. Heads of agencies will be made responsible for the management of their departmental information resources aligned with the management of funds, people, and equipment resources required to do their jobs. 
The GISP will be consistent with and supportive of the current efforts in developing a performance monitoring and evaluation system in government.

6. Standards and Technology

There is need for government agencies to develop, maintain and upgrade standards for products and services on information and communications technology including their innovations. The NITC will direct the conduct of a study on the desirability and feasibility of establishing a National Institute of Standards and Technology which will be responsible for the development of quality and technical standards on ICT products and services.

Implementing Guidelines, Rules and Regulations

The NITC shall promulgate guidelines, rules and regulations to implement the GISP.

Finally, the NITC, as the highest policy body on ICT matters, shall promulgate the necessary guidelines, rules and regulations to implement the GISP and realize the vision of an electronic bureaucracy, or “Philippine Government Online”. For this purpose, the NITC will enjoin the support and cooperation of Congress, the Judiciary, the Constitutional bodies/commissions, local government units, and government-owned and controlled corporations, and all other agencies and instrumentalities of government, to pave the way for the successful implementation of the GISP and the realization of its objectives. For this purpose, the NITC will work out with the agencies and authorities concerned, including the private sector, the necessary resources required, including manpower, to ensure the timely execution of priority GISP activities and projects.

Chapter 5
Implementation and Financing Strategy

Without funds, the GISP cannot be implemented. So the government must identify, source, and program these.

Success in implementing the GISP hinges on sound organization and programming of implementation activities and resources within an indicative time-frame. For the GISP to be implemented effectively, the government must also properly identify source and program the necessary funds. Very crucial here is the timing of the release of funds for the completion of critical activities.

The GISP will be implemented in accordance with the following implementation and financing strategy.

A. Implementation Strategy

Activities will be organized according to the following major phases:

Phase 1 — Setting Up the Environment, which involves putting in place the appropriate institutional and policy mechanisms, as well as the generation of private sector investments and approval of the medium-term budgetary commitments for the GISP.

Phase 2 — Building the GISP Infrastructure, which will entail the required government networking infrastructure, including the reengineering of the various business processes within the identified building blocks for “Philippine Government Online,” the building up of the priority databases, and the design, installation and operation of the various systems networks.

Phase 3 — Sustaining the GISP, which involves the stabilization of the systems that have been implemented, clearly defining the ownership and the continuing operational relationships of the various participants, and the installation of a system of indicators and benchmarks with which to evaluate and monitor the continuing performance of the entire GISP effort.

Table 5.1 — Implementation Schedule

C. Implementation Scenarios

The scenarios are for a five-year period. With each year, gains are expected in training, technology and rollout of the information systems.

Based on the above implementation schedule, the expected achievement scenarios of the GISP are as follows:

End of Year 1 Scenarios

Inclusion of the GISP in the key results areas and performance reviews of the department secretaries;

Alignment of approved and ongoing development of sector and sectoral information systems and databases with GISP priorities;

Development of prototype systems for the following:

1. Government Electronic Procurement System
2. Government Human Resource Management Information System
3. Government Integrated Financial Management Information System
4. Government Integrated Records Management Information System

Standardization of data formats and conversion into electronic file of the following major databases for the design and development of the Government Integrated Records Management Information System —

Government Financial Records and Transactions
Government Records Database
Malacañang Records Database
Agency Records Databases

5. Public Services Information System — Ongoing integration under one access facility of all frontline services and regulatory activities of government agencies, owned and controlled corporations, LGUs and private banks and institutions offering public services and information

6. Public Order, Safety and Justice Information System in coordination with the development of the National Crime Information System

7. Office of the President Executive Information System — Integration of existing data from stand-alone applications fed into the data warehouse.

8. Trade, Industry and Tourism Information System — Start of networking of databases and coordination of data sharing among all participating agencies

9. Agriculture and Agrarian Reform Information System — On-going design and development of shareable databases of participating agencies; establishment of linkages of DA and DAR Central Offices with their respective regional and field offices and LGUs; establishment of linkages between the DA and the DTI with respect to agricultural trade, as well as among DA and DAR and the SUCs, DOST agencies and other academic and research institutions

10. Land and Environment/Land Use Information System — Generation and digital conversion of base maps and sharing of base maps by NAMRIA with other departments and agencies to help these agencies start mapping activities.

11. Statistical Information Systems Network side by side with the Civil Registry System (CRS) Improvement Project of the NSO-Building on National Statistics Database (Vital Statistics, Demographic Statistics, Household Statistics and Sectoral Statistics); ongoing integration of all government statistical databases

12. Health Information System — Firming up of the Health Accounts System including standardization and codification of data and data specifications; computerization of health regulation and linkage with public and private hospitals

13. Welfare, Security, Employment, Housing and Community Services Information System — Process reengineering, computerization, and networking of DSWD frontline business processes; networking of DSWD with other welfare, employment, housing, and community services institutions for holistic data on the social welfare sector; upgrading of the information systems of the DOLE, particularly the provision of information on employment and computerization of business processes involved in regulation

14. Education and Manpower Development Information System — Completion of the Education Accounts System, drawing up of the functional specifications and reengineering of the business processes of DECS, CHED and TESDA; development of the initial databases

15. LGU Business Regulation System (Developed in a continuing effort until all LGUs are covered) — Development and testing of prototype information systems and pilot implementation in selected LGUs

16. LGU Revenue Management System (Developed in a continuing effort until all LGUs are covered) — Development and testing of prototype information systems and pilot implementation in selected LGUs

Institution/Organization

NITC-NCC as GISP Coordinator/Implementor

The Civil Service Commission (CSC) — draws up a program to address the human resources needs of the GISP

The DBM (in coordination with agencies concerned) — draws up and recommends improved and simplified systems and procedures on procurement, accounting and auditing of GISP-related expenditures.

Technology

Connection of all government agencies to the Internet and the Web

Pervasive use of e-mail in sending reports from field offices or overseas offices to the central offices

Web homepages set up by all executive departments to allow electronic publishing

Pilot data warehouse set up in the area of trade, business registration

More active use of e-commerce in government securities auction and trading at the BTr

Full-scale implementation of e-commerce at the BOC, particularly electronic submission of required forms and documents like import declarations

Development and testing of Government Procurement System based on e-commerce technology

Conversion of official documents into electronic forms initiated in all government agencies for the implementation of electronic document management

Intensive use of GIS applications by the DOTC, DOH, DENR, DA, DAR, DPWH, DOT, NSO, HUDCC, DOLE, LRA, and DOST for the development of the Land Use Information System

Ongoing preparation and training for the extensive use of computer-aided drafting and design (CADD) at least at the DPWH and LGUs for urban planning and zoning.

End of Year 2 Scenarios

Process

Office of the President Executive Information System operational at the Executive Secretary’s Office

Final rollout/operationalization of the Government Electronic Procurement System

Start of development of Government Physical Assets Management Information System

Legislation passed supporting the GISP implementation covering priority ICT funding, organizational strengthening, procurement reform and performance review for years 3, 4, and 5.

Institution/Organization

Ongoing CSC reorientation and retraining program for government ICT personnel to be more responsive to the human resource needs of the GISP

Unit for government ICT solutions established
Technology

All Central Offices of the executive departments connected via intranet

All Central Offices of the executive departments connected through VPNs

Homepages set up by all other government entities/agencies and highly urbanized LGUs

Ongoing data warehousing pilot projects in the area of trade, business registration, LTO, public order and security, and other sectoral information systems data warehouses, as well as in the area of budgeting, government manpower, government physical assets, and other public sector management systems data warehouses. 

Ongoing conversion of government official documents into electronic files for electronic document management

Continuous maintenance and upgrading of all government homepages

Government Procurement System installed based on e-commerce

Widespread use of GIS applications by the DND, DILG, COMELEC

End of Year 3 Scenarios
Process

Rollout of the Public Services Information System (3)

Continuous development of the LGU Information System

Pilot implementation of new policies and procedures in the procurement of ICT solutions

Continuing development and installation of building block systems in sectoral information systems networks and public sector management information systems networks

Technology

Upgrading and maintenance of all ICT technological innovations and undertakings

DECS pilot project launched utilizing on-line learning through videoconferencing for teachers’ nationwide training

Regional offices of the executive departments connected to the VPN

LGUs in urban centers and with ISPs connected to the VPN

Central offices of the executive departments connected through extranets for more efficient implementation of the Government Electronic Procurement System.

Rollout of the following systems:

Land and Environment Information System

Welfare, Social Security, Employment, Housing and Community Service Information System

Government Physical Assets Management System

Government Integrated Financial Management Information System (16)

Statistical Information System

LGU Business Regulation System (For remote LGUs)

LGU Revenue Management System (For remote LGUs)

Years 4 and 5 Scenarios
Process

Rollout of the following information systems:

Public Sector

a. Government Human Resource Management Information System (4)
b. Government Integrated Records Management Information System (5)

Sectoral

c. Education and Manpower Development Information System (6)
d. Agriculture and Agrarian Reform Information System (7)
e. Public Order, Safety and Justice Information System (8
f. Health Information System (9)
g. Trade, Industry and Tourism Information System (10)

LGU Common Mission-Critical System

h. LGU Business Regulation System (only for highly urbanized areas) (11)
i. LGU Revenue Management System (only for highly urbanized areas (12)

Continuous monitoring, evaluation, enhancement and continuing maintenance of all information systems in place.

Hardware and software facilities upgraded.

Continuous learning and development of all participating agencies/institutions

Office of the President Executive Information System replicated in all executive departments

Technology

Biometrics technology implemented in conjunction with the development of Phase II of the National Crime Information Systems

National ID System utilizing token-type authentication system in place

Distributed databases evident in government line agencies

Government executives into wireless/mobile computing

D. Financing Strategy

One key guiding principle of any economic program is the judicious and optimal use of public resources. This principle will apply as well in the implementation of the GISP; hence, the need to identify appropriate financing options and strategies for its implementation, given the limited resources of government.

1. Financing Framework and Options

Suitable alternatives will allow the public and private sectors to finance GISP projects. Such financing options are important in view of government’s limited resources.

The financing strategy provides financing alternatives that allow public and private sector financing of GISP projects. In particular, the financing strategy of GISP (1) fosters the appropriate perspective or, viewpoint on ICT-related expenditures on policy makers, and (2) provides a more rational way of considering funding options that are not just driven by cost considerations or fund availability but based on a firm grasp of how government services are envisioned to be delivered.

Conceptual Framework for Viewing ICT Expenditures

The financing strategy for GISP essentially revolves around the concept of spending for public goods and for private goods. In the past, ICT-related budgets or expenses have been largely viewed as being no different from spending on typewriters. Hence, funding for ICT has been lumped with normal everyday considerations. Unfortunately, funding decisions of this nature just pass through the simple question of whether there is enough money to buy it this year or next.

The thrust of GISP’s financing strategy is to get the government’s resource allocation managers to liken ICT spending to expenditures based on welfare theory. GISP tries to get policymakers to understand the basic difference between ICT projects that need to be funded by government and those that can realistically be sourced from the private sector.

“Public” ICT Goods

In this case, GISP defines public goods as those systems and projects the scope of which cuts across several departments or agencies. These systems or projects require extensive interface among several agencies and require access, consolidation or validation of databases of other agencies. Such a definition fits projects pertaining to the Sectoral Information Systems Networks and the LGU Common Mission-Critical Information Systems.

If one looks closely at the type of government services under this definition, it will be seen that these are basically “public goods,” i. e, “available for consumption by all members of a social group once it is provided. If one individual purchases a unit of this good, there is no feasible way to exclude nonpurchasers from enjoying the services provided by this unit.”

Examples of public goods pertaining to the Sectoral Information Systems Networks are health, social welfare, security and community services.

The above definition then makes a compelling argument for this type of ICT-driven services to be funded by government (through appropriation).

Examples of ‘public’ ICT goods are health and social welfare services. ‘Private’ ICT goods include internal document tracking systems.

“Private” ICT Goods

In the same manner, private ICT goods are defined as systems or projects that comprise the support functions of government as it does its internal housekeeping in order to serve the public better. These types of systems, which may or may not be networked, can usually run on a stand-alone basis in one agency. Its database is mostly in-house generated and mostly for in-house use also. Examples of these are internal document tracking system and personal administration systems, which are mainly under the category of the Public Sector Management Information Systems.

Also falling under this category are projects under the Public Services Information Systems. Note that there may be some overlap in definition with respect to frontline business processes under the Sectoral Information System Network and the Public Services Information Systems, but this will be refined later when deciding on funding alternatives.

Again, considering that nonpurchasers can be excluded from the provision of private ICT services and assuming that these types of services can be provided more cheaply and readily by the private sector, then there are sufficient incentives to ask the private sector to come in.

Fine distinctions in the types of information systems will pave the way for funding options.

In a way, the above contradiction between what are “public” and what are “private” types of information systems defines the parameters where private sector participation is encouraged under GISP. This dichotomy is by no means exact or rigid — basically it will have to follow that policymakers will define as core ICT government services or not. This dichotomy will also be challenged later when we discuss the issues on managing private sector partnerships in relation to ICT. What is important to note is that these distinctions open up a lot of funding options and free the present cash reserves of government for user in other projects. 

Guidelines for Establishing Financing Options for Information Systems in the GISP

The choice of funding is further guided by the following:

1. “Public” ICT Goods

a. Priority systems in the GISP are to be funded under the General Appropriations Act. In particular, the provision of frontline service delivery processes of mainstream government agencies shall be given priority under the national budget.

b. If the national budget is unable to accommodate the same, then efforts shall be exerted to fund the project under some form of a deferred government expenditure or borrowing, especially if the project or technology being requested is considered a base technology that will make other applications possible. An example of a base technology is data warehousing. In this case, funding the project through the issuance of special series treasury bills or treasury bonds (T-bills/T-bonds) will be considered.

c. Public ICT projects that are income generating will, to the extent possible, be funded by ODA loans. Implementing agencies will undertake some form of cost: recovery charging schemes that will ensure payment of the loan from such proceeds.

d. Public ICT projects that are not revenue generating and cannot be funded by the national budget nor by special series T-bills/bonds will be given priority for ODA grants that are not tied up to particular projects.

e. Second-priority income-generating ICT systems that do not qualify for ODA loans, but which nonetheless have well-established cash flows being generated for a couple of years, will be packaged for securitization. The funds raised via this method will be used to upgrade the same systems, with whatever excess allocated for use by other income-generating systems.

f. Systems that support essentially government functions that are potentially income generating (or higher-income generating), although still without clear and established cash flows, will to the extent possible be financed under a Build-Operate-and-Transfer (BOT). Only through investments in ICT will the said system truly reach its maximum income potential and, of course, for serving the public better. A BOT instead of a Build-Own-and-Operate (BOO) scheme is preferred because control over the said function will eventually revert to government after being funded by the private sector.

g. LGU projects that cannot be funded under provincial, city or municipal budgets will be accommodated under some form of LGU indebtedness like municipal bonds. If the proposed LGU project is income generating, then it may be packaged for funding through bank loans.

2. “Private” ICT Goods

a. Noncore government service delivery functions that are probably best handled by the private sector, and which have well-defined histories of strong cash flows, may be financed through securitization of the said cash flows, thus providing the optimum way of funding further system upgrades or funding-similar services.

Some service delivery functions are best done by the private sector.

b. Noncore government service delivery functions that are best handled by the private sector, but which still do not have clear and established cash flows, may be financed under a BOO scheme, thus permitting government to be immediately divested of the task and the fund responsibility to provide said service.

c. Areas where the private sector has well-defined competence, especially those where it has garnered ISO 9000 certifications, will, to the extent possible, be outsourced via long-term contracts. Candidates for outsourcing are areas that require the long-term commitment and continuous investment of capital and resources. 

Table 5.2 — Financing Alternatives for “Public” ICT Goods

Table 5.3 — Financing Alternatives for “Private” ICT Goods

2. Financing GISP Through the National Budget Process

There are many ways to fund GISP projects: as a budget percentage, through a share in ODA funds, via the budget call, and by self-funding among GOCCs and LGUs.

The following government funding for GISP projects will be adopted:

a. As a Percentage of Total Budget

An amount equivalent to 1.0% of the annual national budget over the medium-term will be allocated to the funding of priority GISP projects to be bankrolled by the government.

This amount may be provided for, allocated among and/or sourced from the General Appropriations Act through the following:

a.1 Articulation either in the general or special provisions of the use of a portion of mandatory reserves (if any) for ICT expenditures. For example, if the mandatory reserve is 1% of the total budget, the general provisions may be explicitly worded to say that the said reserves may be released provided that 1/10 of the 1% is allocated to ICT. This means that P650 million may be made available for ICT from the year 2000 budget.

a.2 Realignment of funds, which can be authorized provided that the same is used for ICT only.

a.3 Articulation in the agency special provisions or in the general provisions of the General Appropriations Act on the use of income, to the effect that a certain percent of the income of a department or departments arising from a computerized public service can be used to upgrade or acquire new technology for said service.

b. Through a Portion of the ODA

Lobbying with donor or lending governments will be pursued to benefit ICT. Loans or grants emanating from Official Development Assistance (ODA) can be structured to provide for at least a 10% investment in ICT. This means that based on the programmed P25.6 Billion ODA disbursement in year 2000, an additional P2.56 Billion can be tapped for ICT.

c. Through the Budget Call

In the Budget Call, greater emphasis will be given to ICT projects. For example, the DBCC may state that it is prepared to consider department ICT budgets up to 2% of total agency budget proposals. Or the DBCC may say that projects falling under Phase I of the GISP will be automatically funded.

d. Alternatives for GOCCs and LGUs

GISP projects of GOCCs and LGUs will be funded from their own financial resources. Funding from the national budget will consider the public nature of the services being automated, the importance of such services nationwide, and the funding limitations of the proponent agencies.

Estimate of How Much Can Be Made Available from the Year 2000 General Appropriations Act

Overall, based on the national budget for 2000, an estimate of what can be potentially made available for ICT for the current year alone is as follows:

FROM:

1.0% of the National Budget P6.50
Use of 1/10%, assuming Reserves = 1% 0.65
1% of yearly realignments
estimated at 20%/year 1.30
10% of programmed ODA 2.56
———
Total P11.01 billion

The above estimate does not include those coming from a percentage of a department’s income from computerized public services, as may be authorized under the Special Provisions of the GAA. Also, the estimate does not yet include possible private sector counterpart investments as a result of government’s expenditures on ICT.

3. GISP Five-Year Investment Requirements

Table 5.4 provides the indicative costs for the implementation of priority GISP development activities and projects over a five-year horizon.

The cost estimates were determined by considering the following factors: (1) current cost of technology, (2) number of business processes supported, (3) number of agencies involved, and (4) estimated number of users.

Before any systems development activity begins, it is necessary to define first the functions and technical specifications for the development of the priority information systems and databases, the initial networking requirements at the policy and program implementation levels, and the database design and strategy. This first step involves extensive studies and consultations with various stakeholders, including key solution providers, technology experts, users and system owners, policymakers and planners, Congress, and the public as a whole. The major outputs of this phase are the (1) Technical and Functional Specifications (TFS) and (2) Requests for Proposals (RFPs), which should undergo rigid review and consultations.  

After the initial project scoping and planning, systems development activities are to commence beginning Year 1. The key computing and network infrastructure should be in place within the first two years, hence the high funding requirement for years 1 and 2, of about P10.2 billion and P3.3 billion pesos, respectively. Rollout of individual systems range between years 3 to 5.

Enter: the Public Services Information System, the ICT version of ‘a one-stop shopping center.’

The first major type of information system is the Public Services Information System, providing frontline services with its one-stop virtual access point and gateway for all major government-to-business and government-to-general public transactions.

The next major group of information systems in the development pipeline are seven common oversight systems. These are intended to support business processes that are common to all government agencies. Each system will be developed once, with provisions for enhancements or modifications at the agency level. The resulting application can be deployed to every government agency.

There are also seven sectoral information systems to be developed and deployed to the agencies within the sector. The three top information system in terms of cost are sectoral systems, namely those involving land use, public order and safety, and education and manpower development. This is due to the substantial investment requirement for implementing GIS, data warehousing and distributed database technologies. These systems also support basic and vital public services, and necessitate the deployment of ICT resources down to the local institutions, specially LGUs, but also including state universities and colleges (in the case of the education sector).

The two mission-critical application systems for local government units aim to enhance their revenue generating capabilities and enhanced service delivery by streamlining business licensing and permitting processes.

Hardware Cost Estimates

The estimated P21.161 billion total investment includes the cost of major ICT equipment, namely personal computers/workstations and servers, estimated at P2.816 billion. The estimated number of computers and servers required were multiplied by the respective unit cost per hardware type based on prevailing market prices.

Type No. Unit Cost Total
(MPesos)

PCs 35.836 70,000 2.508
Small servers 25 1,000,000 28
Medium servers 36 5,000,000 180
Large servers 10 10,000,000 100
Total 2,816

Estimation Methodology

Various methods, combinations of proxy information and factors were used to arrive at the cost estimates. For the purpose of estimation, the technologies were classified into two major types of major technology cost drivers and other technologies.

Major Technology Cost Drivers

(Illegible portion copied from the Department of Justice files)

Other Technologies

The rest of the technologies identified are generally acquired as services whose costs are characterized as recurring monthly expenses (e.g., Internet connection, VPN and wireless computing). Scale factors are used as multipliers to take into account the cost of other technologies and are based on increasing scales of operations as indicated by the number of institutional users and the number of agencies involved.

Total Cost of Ownership Breakdown

One of the key assumptions used in the GISP cost estimation process involves the concept of total cost of ownership (TCO) of an information system. The following percentage values were used to arrive at indicative total cost of ownership figures:

Cost Component % to Total

Software 17%
Hardware 14%
Professional Services 46%
Administrative costs 23%
TOTAL 100%

It was assumed that software makes up 17% of the total cost of ownership. The starting point for most estimates was to determine the cost of software associated with each technology. The resulting figure was then divided by 17% to get the estimated total cost for ownership of the information system using the technology.

The percentage figures were derived from average TCO of ERM/ERP applications data published in Extract of Meta Group Survey >ERM Solutions and Their Value<, a document posted on the SAP web site (see www.sap.com/service/pdf.tco.pdf).

It is worth nothing that the independently derived computer hardware cost (P2.816 billion) is 13.31% of the total GISP investment requirement of P21.161 billion. This is consistent with and provides initial validation of the 14% Meta Group Survey figure for hardware.

The following table presents an overview of each technology and the corresponding cost estimation procedure used.

Table 5.4 — GISP Investment Estimates

Annex A-1 — Ongoing Government ICT Projects

(Illegible portion copied from the Department of Justice files)

Annex A-2 — Government ICT Projects in the Pipeline

(Illegible portion copied from the Department of Justice files)

Annex B
Technology Assessment Capsules

A. Biometrics

B. CADD — Computer-Aided Drafting and Design

C. Data Warehousing/Data Mining/Decision Support Systems/Executive Information System

D. Distributed Databases

E. Electronic Commerce

F. Electronic Document Management

G. GIS — Geographic Information Systems

H. Internet technologies includes Intranets/Extranets/VPN/Internet Telephony/Videoconferencing over IP

I. Online Learning

J. Remote Sensing

K. Token-Type Authentication Systems

L. Virtual Private Networks (VPN)

M. Wireless/Mobile Computing

A. BIOMETRICS

Description

Biometrics is an automated method of recognizing a person based on physiological or behavioral characteristics such as fingerprints, speech (voice), face, retina, iris, handwritten signature, hand geometry, and wrist veins. Biometrics addresses the need for authentication, the process of identifying an individual, replacing or augmenting verification based on a username and password.

Biometrics can be used in identification mode wherein it identifies a person from the entire enrolled population by searching a database for a match. It can also be used in verification mode wherein it authenticates a person’s claimed identity from his/her previously enrolled pattern. Biometrics offers some unique advantages because identification is based on a person’s intrinsic part. Tokens, such as smart cards, magnetic stripe cards, physical keys may be lost, stolen, duplicated, or left at home. Passwords may be forgotten, shared, or observed.  

Applications

In the Philippines, biometrics would most likely find first application in providing verification and authentication for financial transactions (bank loans and social security claims) and limiting access to high-security areas like military establishments and sensitive government buildings. The United States — the US government in particular — currently uses or has proposed to use biometrics in the following ways at the federal, state, local, and foreign office levels.

Electronic and Physical Access Control. One use is to provide robust authentication for access to computer systems that hold sensitive information used by the military services, intelligence agencies, and other security-critical federal organizations. Physical access control to restricted areas is another key application. There are many law enforcement applications, mostly for fingerprint recognition, at the Federal, State, and local levels. Other law enforcement applications include home incarceration and physical access control in jails and prisons.

Fraud Prevention and Detection. One of the most extensive applications of biometrics in the U.S. is for entitlements. Fraud in entitlement programs is estimated by the General Accounting Office at over $10 billion per year. Pilot programs in several states have demonstrated dramatic savings by requiring biometric authentication for applicants for entitlement benefits.

Commercial. There are also significant commercial applications of biometrics, principally in financial transactions like use of Automated Teller Machines (ATMs), credit or debit cards, banking by phone and through the Internet, and buying and selling securities by phone or through the Internet. Biometrics is also being considered to reduce or prevent fraud in the use of cellular telephones, which is estimated to have reached over $1 billion a year, and phone credit cards. There are also commercial applications for computer access control access to web site servers, access through fireworks and physical access control to protect sensitive information.

Current Applications

The following are some specific applications of biometrics in other countries:

Immigration and Naturalization To provide prompt admission for frequent
Service’s (INS) Passenger travelers to the US by allowing
Accelerated Service System them to bypass the personal interview/
(INSPASS) inspection part of the entry
process. It uses hand geometry to
verify the identity of the traveler at an
automated inspection station. Current
installations: John F. Kennedy
Airport in New York and Newark
International Airport in New Jersey.

CANPASS The Canadian version of INSPASS, it
uses a fingerprint biometric, rather
than hand geometry, for traveler
verification. The goal of CANPASS is to
ease the transfer of goods and people
between the US and Canada. Currently
in use at the Vancouver
International Airport.

Automated Fingerprint Image Installed in 1991 in Los Angeles
Reporting and Match (AFIRM) County, California, AFIRM was
needed to reduce fraudulent and
duplicate welfare benefits. The
fingerprints of new applicants for welfare
benefits are checked against a
central database of prior claimants.

Within the first 6 months of use, the
county saved $5.4 million dollars, and
the savings have been growing ever
since. The system has been so
successful that San Francisco, Alameda
County, and Contra Costa County
have installed AFIRM and check new
claimants’ fingerprints against existing
recipients in these locales.

The Colombian Legislature The Colombian Legislature uses hand
geometry units to confirm the identity
of the members of its two
assemblies immediately prior to a
vote. The voting has been conducted
this way since 1992.

Several federal, state, and local government agencies have purchased biometric systems. The Defense Advanced Research Projects Agency, Drug Enforcement Agency, Department of Defense, Department of Energy, Department of Public Safety, Department of State, Federal Bureau of Investigation, Federal Reserve Bank, Hill Air Force Base, the Pentagon, and the US Mint have approximately 250 biometric devices with 13,000 enrolled users for access control applications.  

The following are some planned applications of biometrics in the US:

California, Colorado, Florida, and Efforts are underway to establish
Texas Departments of Motor biometric-based screening of drivers.

Vehicles California records thumbprints
digitally in its database. Colorado and
Texas record fingerprint images on
their drivers’ licenses. Florida is
considering this idea. The goal is to
eliminate license tampering or taking.

Government Accounting Office’s Inspired by the success of the AFIRM
Electronic Benefits Transfer program in Los Angeles County the
(EBT) Task Force US Government plans to disburse
Federal Government benefits (e.g.,
retirement, social security, welfare)
electronically through ATMs and
point-of-sale terminals. It is estimated
that $110 billion in Government benefits
could be transferred onto and
debited from access cards in this
way. Initial plans are to implement
fingerprint identification at the benefits
enrollment phase. Fingerprint
identification in the benefit
disbursement phase is also
under consideration to eliminate potential
extensive losses from the abuse of
lost or stolen cards.

FBI’s Integrated Automated IAFIS is designed to electronically
Fingerprint Identification System replace the hopelessly outdated,
(IAFIS) mostly manual fingerprint identification
system that required
paper-based fingerprint cards, postal
submissions of the cards, and labor-
intensive searches, IAFIS world
replace paper-based fingerprints with
electronic ones. Requests could be
submitted and fingerprints could be
searched electronically. The goal is
to reduce response time to a requesting
agency from the current 10 weeks
to 24 hours.

National Crime Information Biometric information, such as those
Center 2000 (NCIC 2000) contained in the signature, face, and
fingerprint, will be used in an automated
system. Patrol cars will have
the capability to capture fingerprints
and eventually relay the information
to local, state, and/or Federal Automated
Fingerprint Identification
Systems (AFISs). The goal is to have
the new and improved system fully
operational by the fall of 1999.

1.3 Considerations

The system is expensive. It is not only the initial cost of the sensor or the matching software that is involved. Often, the life-cycle support cost of providing system administration support and an enrollment operator add a lot to the initial cost of the hardware.

1.4 Prognosis

Biometrics technology has not attained enough maturity to merit definite inclusion in the GISP. According to the Biometrics Consortium, the only available information on biometric devices is often just a sales brochure. The performance claims in the sales brochure may not hold true for a given device in a given application. For example, a device that measured 0.3% equal-error rate in a lab was found in the field to have a false-rejection rate of approximately 25% (at an unknown false-acceptance rate). While a change in this device’s threshold between the lab and field tests might explain the difference, it is more likely that the 0.3% equal-error rate was measured under unrealistic conditions. Establishment of an independent evaluation center to test the maturity, reliability and repeatability of a biometric device was expected by the end of 1996.

While the reliability of biometrics as a means of authentication is increasing as the technology matures, its price remain., prohibitive. Substantial investments are required to set up, operate, and maintain the necessary technological infrastructure. Most, if not all, components would have to be sourced abroad. Respectedly, the major cost after initial investment would be in maintenance and technical support from other countries, particularly the US.

However, given the rapid development in information technology, it is not inconceivable that within the 5 year timeframe of the GISP, sufficient progress in biometric technology could occur to make it a viable option for implementing, say, a national crime information system, or even an election system.

B. CADD — Computer-Aided Drafting and Design

Definition

CADD refers to the use of a computer graphics system to create, modify, manipulate, and display drawings and diagrams. CADD assists engineers, architects, and designers in the same way word processors assist secretaries and the general population. Drawings, designs and diagrams stored as CADD files are more easily accessed and modified compared to paper blueprints. When used for mapping, CADD systems treat map sheets or drawings as separate entities with little or no continuity across map sheets. While some CADD systems may contain limited database management capabilities, they seldom have map registration or map projection transformation capabilities.

Applications

CADD has promising applications in the following areas of government:

Public Works and Utilities (DPWH)
Urban Planning and Zoning (LGUs)
Storage and Retrieval of Architectural Plans (LGUs)
Industrial and Product Designs (Design Center)
Storage and Retrieval of Engineering Plans and Drawings (IPO)

Considerations

The use of CADD technology for the storage and retrieval of plans, drawings, and designs will entail modernization of the equipment and staff skills of the agencies or local government units to be affected. This will require capital expenditure without any immediate tangible benefits, as it will take a while before a sufficient inventory of drawings in electronic form becomes available.

Prognosis

The technology is proven and mature, but the lack of immediate tangible benefits does not make this a high priority for government. Nonetheless, it may be considered an investment for the future.

C. Data Warehousing/Data Mining/Decision Support Systems/Executive Information Systems

Description

These technologies collectively provide automated tools for data analysis in support of decision-making. They include technologies and IT facilities to store and gather data from individual transaction databases into massive databases and systems to extract, analyze and present data into forms that are meaningful to decision makers.

Data warehouses are large data repositories purposely designed and organized to allow analytical processing directly performed by users. They allow more “data-based” decision-making through the use of analytical models based on historical data. The use of data warehousing as decision support systems or executive information systems, has been receiving a lot of attention because it avoids the need to unite all systems into one processing system in order to get a consolidated enterprise-wide picture. Instead, the data warehousing concept precisely is built on the collection of data from multiple processing systems, organized through metadata which include data summaries that are easier to index and search.

Data mining goes beyond changing or enhancing data presentation for decision-making. Its main purpose is to discover previously unknown relationships among data items such as possible cause-and-effect relationships. It uses automated tools to look for hidden patterns among data sets. Statistical techniques have long been developed precisely to look for correlations and dependencies from datasets. Conceptually, however, data mining technology is different in that it is designed to have access to massive electronic databases and data warehouses. Several data mining applications are now commercially available. However, this field can still considered a complicated, diverse technology in its infancy.  

The value of these data warehouses is greatly enhanced by integrating them with the Internet so they can be easily accessed from any location, at any time. This way, government workers out in the field or assigned to regional offices can use their browsers to access the data warehouse through their agency’s intranet.

Applications

Generically, data warehouses have been used in the automated prediction of trends and behaviors, and the automated discovery of previously unknown patterns. Given this, data warehousing and EIS/DSS can be employed in the following areas in government:

Economic modeling and analysis
Financial/Fiscal modeling and analysis
Agricultural sector modeling and analysis
Domestic and International Trade modeling and analysis
Employment data analysis and practically any area of governance where analysis of massive historical data is applicable.

Considerations

Among the major considerations in the applicability of this technology are the following:

Cost. Data Warehouses require huge data storage — at least in the hundreds of gigabytes, and overtime, in terabytes. The hardware resources needed to store and process this amount of data can be considerable. For example, a 1.2 terabyte disk storage system costs almost $1 million each.

Sharing of data. Data warehouses will require collection of related data from different sources within government. It will certainly put to test the ability and willingness of agencies to share data with one another.

Long-term implementation. Because of the need for sufficient data to have accumulated before a data warehouse becomes useful, there will necessarily be a long “gestation” period — counted in years — before any benefits can be derived. If the project is to become successful, there must be a firm commitment to see the data warehouse project through its lengthy implementation.

Choice of subject/topic. Because of these three considerations, there is a need to choose the subject or topic of the data warehouse to be implemented very carefully. It must be focused on a critical function of government to make it worth the investment cost and long-term effort.

Prognosis

The cost and high chances of failure may indicate that data warehousing should be given a relatively low priority. However, the clear lack of information-based decision-making in government suggests that, at the very least, one or two pilot warehouses addressing key areas should be set up. Government cannot afford to keep postponing this, as the long implementation requirement means that it will take five to ten years before any benefits accrue.

D. DISTRIBUTED DATABASES

Description

Relational database technology now makes it possible to build applications where the database tables may physically reside in different hardware. Stored procedures and ODBC allow programs running on one machine to access a database that resides in another machine. Two-phase commit mechanisms with automatic transaction rollback provide support for online mirroring of databases, i.e. simultaneously maintaining two identical copies of the database while ensuring integrity. Most database management systems also support database updates from transaction logs, a feature that can be used to automate offline mirroring of databases.

Applications

Distributed databases allow greater fibility in designing and building integrated applications that cross geographical and bureaucratic boundaries. For example, access to remote databases via ODBC and/or stored procedures can be employed to allow consolidation of information that comes from servers of different agencies. Similarly, mirroring techniques can be employed to support centralized repositories of consolidated data from the field, even as local subsets of the data exist on field computers to support distributed transaction processing.

Considerations

Practically all the major commercially available database management systems support distributed processing techniques. And systems have actually been built and operated successfully employing this technology. Building-distributed database applications in government would entail:

More powerful, and therefore more expensive, database management system software;

Special expertise to design the database, and build more sophisticated applications;

Planning and coordination to ensure the availability and integrity of the data; and

Increased networking among government offices to allow sharing of databases.

Prognosis

Given the devolved, decentralized nature of operations, government-distributed database technology is a must in building efficient integrated information systems. The only major obstacles are the higher cost (due to more expensive software and increased networking) and limited manpower (for the expertise in planning, building and in coordination). These can be solved with careful resource allocation and private sector involvement.

E. Electronic Commerce

Description

Electronic Commerce is the use of computers and telecommunications networks to facilitate business transactions like the buying and selling of products, services, and information. E-commerce can be generally classified into two types: business-to-consumer and business-to-business. While e-commerce has existed since the early 1970’s through technologies like EDI and data encryption, it caught wide public attention only recently as several e-commerce sites sprung up in the Web. E-commerce over the Internet allows the promotion, buying, and selling of goods and information that cut through geographical and/or political boundaries. Perhaps the best example of successful e-commerce over the Internet is the popular Amazon.com, which allows users to search for and order books, gifts, CDs, and videos online. 

Applications

E-commerce technology can improve governance through its application in at least the following areas:

Government procurement/divestment. The whole process of procurement — from pre-qualification of suppliers, to consolidation of requests from agencies, to bidding and monitoring of status and delivery — lends itself well to the application of e-commerce. Similarly, auctions and bids such as those for privatization of government assets and confiscated smuggled goods have a lot of successful precedents on the Web.

Government Securities Auction and Trading. The Philippine Bureau of Treasury has pioneered in the use of e-commerce in the Philippines through its electronic auction and electronic trading facilities for government securities. These facilities employ the proprietary networks of Bridge and Reuters. The PBT recently introduced an Internet-based facility for the public to buy Treasury Bills through its Small Investor Program agents. Together with the DOF it is looking into the establishment of an Internet-based bond exchange.

Document/form submission. One way to improve the efficiency of government transactions with the public is through electronic submission of required forms and documents. A pilot project at the Bureau of Customs showed how processes can be improved and the delays minimized through the electronic submission of import declarations. With the growing number of Philippine companies connected to the Internet, there are many government services that can benefit from the application of this technology.

Considerations

The growth of e-commerce in the Philippines would depend on two things:

Security and authentication. Because e-commerce involves transfer of money, goods and/or services, security of transactions and authentication of transacting parties are essential. One way of achieving this in a “closed system” (i.e. where there is a limited, identified set of participants) is to set up a Virtual Private Network with encryption among the transacting parties. This approach may be resorted to in doing e-commerce with, for example, registered brokers/dealers, top taxpayers, and banks. It will not apply, however, to an “open system” where the general public is involved. It would be prudent for government to limit its e-commerce applications to closed systems in the meantime.

Lack of legal infrastructure. To protect transacting parties, and ensure compliance with rules and collection of appropriate taxes, the existing legal infrastructure would have to be revised. In the US, for example, there are laws (e.g. the Mail/Telephone Order Rule, and the Fair Credit Billing Act) which effectively safeguard the rights of transacting parties in e-commerce. Similar laws and the appropriate mechanisms for implementing them would have to be introduced here.

Prognosis

Security and authentication problems and lack of legal infrastructure make it difficult to pursue e-commerce for the general public. However, there are local precedents for the successful implementations of limited e-commerce (e.g. closed system) such as the auction and trading of government securities, where the parties involved may come up with their own contracts and operating covenants to ensure the enforceability and legality of their transactions. Given these, the government should look into more of these opportunities, not only for improving efficiency in at least some aspects of its operations, but as a way of “testing the waters” for more ambitious e-commerce applications in the future when the security and legal issues shall have been resolved.

F. Electronic Document Management

Description

With the spectacular growth of the web and other IT trends, repurposing of already published materials will be a sunshine industry. “Repurposing” is a catch-all term for conversion of a broad range of different publishing types and components:

Printed Documents. Electronic documents make up the smallest fraction of the total mass of published materials today. Converting these into electronic files will take either of two forms:

Scanning to a bitmap image for indexing, or

Capturing the content via Optical Character Readers (OCR) and converting it into a format that can be selected using cut-and-paste or cut-and-copy features available in most software applications.

Digital Documents. Files that are already in electronic form can be converted to other formats in a number of ways. Many are already being taken apart and recomposed in Hypertext Markup Language (HTML) for uploading to the Web. Many others are being converted to PDF (Adobe) format because it retains the integrity of the source document much better, with all elements including fonts, typography, layout, and vector graphics intact.

Photos and other Bitmap Graphics. Bitmap graphics that are large in storage size and saved in a broad range of file types are being compressed and converted to more universal formats — .tif, .gif, and .jpg — primarily for accessing in HTML documents. PDF conversion of documents incorporating bitmap images offers very dramatic compression ratios of 50:1 (or even considerably smaller).

Vector Graphics. Maps, logos, and fonts are normally vector graphics that are small in size and perfectly scalable for viewing and printing. Since HTML cannot handle vector graphics, they need to be converted to bitmaps before conversion to .gif or .jpg formats. Documents in such format as PDF are also available for viewing on the Web and with vector graphics compressed to about 4:1 ratio.

Two standards have emerged for cross-platform document file formats: HTML and PDF:

HTML. Documents marked up in the simple page description HTML can display in a variety of computer environments such as Unix, DOS, Windows, NT, and Macintosh. Yet balanced against the broad compatibility of this format are two factors: 1) the cost — in time and money — of converting documents from other document formats into HTML; and 2) the author’s lack of fine control over character fonts and page layout.

A new software category, called portable document applications, attempts to provide the best balance of all factors. It combines the compatibility of HTML with the page layout quality of desktop publishing applications, font quality of the Postscript language compact file size of compressed image formats, and simple interface designed for typical, nonprogrammer computer operators. The leading application in this category is the Acrobat suite of tools from Adobe Systems Inc.

PDF. Short for Portable Document Format, a file format developed by Adobe Systems. PDF captures formatting information from a variety of desktop publishing applications, making it possible to send formatted documents and have them appear on the recipient’s monitor or printer as they appear on paper. To view a file in PDF format, the Adobe Acrobat Reader is needed. It is a free application distributed by Adobe Systems.

There are two Acrobat components to consider the proprietary PDF file format and the suite of software tools (for browsing and editing to manipulate documents) stored in this file format. The two are used interchangeably but in fact they are distinct; PDF is the name of the file format and Acrobat is the suite of software tools. The Acrobat PDF file format is based on the Postscript language, also developed by Adobe. Like Postscript, Acrobat is vector rather than bitmap based. Vector file formats describe fonts, images and other page elements as a series of mathematical descriptions and relations. Character fonts are encoded as mathematical descriptions of lines, shapes and distances between sets of points. As an oversimplified example, the character “V” is fundamentally three points: the top left, top right, and bottom middle where the two lines intersect.

Applications

Government can find use for this technology in two ways. First, a central repository of official documents in electronic form can be set up to store and provide access to all future government public documents. Since practically all government offices already use PCs to generate their memos, orders, rulings and other documents, a central document repository can be achieved prospectively. All that is needed would be to set up a large server, perhaps at the National Archives, to where all government agencies would be required to submit electronic copies of all their official documents.

Second, the government should consider converting all existing documents into electronic form to save on storage space, make them easily accessible, and preserve their integrity. This is a much more comp and costly exercise because of the volume of documents or conversion.

Considerations

Creating, storing, and disseminating documents in digital form offers substantial advantages over traditional print publishing for a variety of reasons:

Capability to communicate beyond the printed word. Digital publishing allows addition of motion, sound, forms, interactivity and linking to a document.

Distribution Costs. Printing documents first from a central source then distributing them on paper requires careful anticipation of demand with costly consequences. Distributing documents electronically offers the recipient the option to print it as needed and secures access to documents with passwords and digital signatures. A CD-ROM, for example, can hold text for up to the equivalent of 1700 lbs. of paper. If the cost of printing, postage, of storage and preservation are added, the savings would be immense.

Search and Retrieval. Paper files can only be filed by one index field. Access requires training, and refiling is prone to errors. Statistics show that 7.5 percent of paper documents get lost completely. In contrast, digital documents can have any number of keywords attached and access is controllable through password protection. Hyperlinking between documents speeds up access to related information. If sufficient processing power is available, “brute force” searching through voluminous text is also possible.

On the other hand, there are negative factors to consider, such as:

Cost. Prospectively, the cost is minimal, mainly covering central document repository and end-user license for the software tools (HTML or Internet browsers and the Adobe Acrobat Reader for viewing PDFs are free and downloadable from the World Wide Web). This pales against the potential cost savings from reduced demand for paper documents, document transport, and handling charges. However, converting old documents to electronic would be quite expensive, and government may very well limit its scope.

Security and “Turf.” Some agencies treat their data and information as proprietary secrets and do not look favorably on sharing of information. This mindset will have to be changed to one of transparency and service orientation.

Prognosis

Converting the same document into other information products from essentially the same source material means less publishing and document-related cost. From a cost/benefit standpoint, repurposing or electronically converting and disseminating existing documents means that agencies can reuse existing information resources to accomplish newly defined communication objectives. New distribution channels can be exploited. Budgets can be spread over a broad range of applications. For instance, the production costs of promotional CD-ROMs can be amortized to include the cost of and uploading the same materials to the Internet, and producing brochures and internal IEC (information, education, and communication) materials.  acCTIS

G. Geographic Information System (GIS)

Description

A Geographical Information System (GIS) is an information technology application for the conversion, integration, management manipulation and analysis, query, deployment, and use of geographically referenced information. What differentiates a GIS from an MIS application is the use of maps with related attributes describing features on the map. It is a very powerful visualization and analysis tool that helps uncover spatial relationships not possible in the traditional sorts and other manipulation of databases (i.e. attributes of map features). In the new paradigm, GIS is really part of the MIS of an organization which handles all sorts of information, including spatial information.

The other spatial technologies provide information inputs (content) to the GIS. In addition, transaction-based information gathering can be integrated to the GIS provided each record is geographically referenced.

The strength of the GIS for government information systems is its geographic integration capability. Thorough GIS, it is possible to immediately link and visualize most government databases that could not be linked before, through geography or location.

Applications

National and local governments worldwide, including a few in the Philippines, have utilized GIS technology for productive uses in the following applications.

Base Mapping and Thematic Mapping
Integrated Land Information Systems
Environment Monitoring and Resource Management
Precision Agriculture
Population and other Censuses
Elections Management and Monitoring/Reporting
Epidemiological/Health Studies
Facilities Management
Infrastructure Planning, Construction Management and Monitoring
Disaster Preparedness Planning and Damage Assessment
Public Safety/Public Order/Defense Applications
Transportation and Traffic Management
Land Use Planning and Zoning Administration
Tourism Planning and Tourism Services Information Systems
Promotion of Economic Development
Environmental Impact Analysis
Real Property Estate Valuation. Tax Assessment, and Marketing
Teaching Geography and other applications

Consideration

Infrastructure — Most systems run on PCs and/or Unix Servers. System peripherals like digitizers, plotters, scanners, printers are widely available. There are many commercially available software (GIS, Image Processing, Digital Photogrammetry and cartography; the price ranges from free to desktop systems to the expensive high end professional systems. The Philippines is the only country among the original ASEAN without a ground receiving station for remote sensing data, thus it currently depends on acquisition services of remote sensing data service providers.

Data — Local implementation of GIS is hampered by the lack of or poor quality of digital basemaps or cartographic database. The development of this database is a priority element in the full development of GIS applications in the country. Data standards are not in place. This is necessary for the sharing of geographic information among agencies and the local government units. Many agencies of government have started to build their digital spatial databases that have turned out to be of poor quality. There must be a policy on investments in the buildup of digital databases to ensure that these investments do not go to waste.

Data Sources — The national government is the largest producer, collector of geographic information. To date much of these information are on paper. They are spread out in the bureaucracy and some of these data sets have in fact been digitized more than once by several groups. It is necessary to pinpoint to owner of the data who will be responsible for their conversion to digital forms. Data is the most expensive component of GIS and its integrated development must be planned well.

Orthophotos and OrthoImageries — More modern implementations of GIS now use orthophotos and orthoimages. The advantage of using orthophotos/orthoimages is that the utilization of GIS is decentralized and really put in the hands of users. Feature extraction, for instance, can be now in the hands of, say, the land use planner, the forester, the assessor, the road planner, etc. instead of the GIS specialist or GIS data analyst. Orthophotos and orthoimages are geographically rectified photos and imageries with known accuracies throughout the orthophoto/imagery dataset.

Implementation — The process of setting up a GIS requires careful planning and implementation, including:

Identification of users and their functional and information requirements
Assessment of existing systems and examination of data and data sources
Definition of spatial data sets and database design
Determination of software and hardware requirements
System pilot study to finalize estimates and system specifications
Collection of necessary data for input
Acquisition, installation and testing of hardware and software
Application System Development
Staff Training
System Implementation
Data Conversion

Prognosis

GIS and other spatial technologies are proven, mature and cost-effective technologies that have yielded benefits to users worldwide. These technologies are continually evolving, becoming more user-friendly and easier to use than before. All GIS technologies will be Internet-enabled, enabling producers to supply GIS Maps/Information to users via the WWW.

It is not simply a matter of government adopting the spatial technologies. Successful GIS implementations in national government involved careful planning and the adoption of necessary policies on data standards, data sharing, manpower development that may be organization wide in approach.

H. Internet Technologies
(include Intranets/Extranets/VPN/Internet Telephone/Video-Conferencing Over Ip)

Description

Started in 1969 as the US Department of Defense network, the internet has grown into a global network of hundreds of thousands of computers and has spawned a number of widely successful technologies that government can harness. In addition to the use of the TCP/IP standard to allow interconnection of a wide variety of computers, the growth of the Internet, particularly in this decade, has resulted in the emergence of:

WWW. The World Wide Web (WWW) is a vast collection of inter-connected pages of information stored in Internet-connected computers. It allows quick access to various information (text, pictures, video, sound clips, electronic files, etc.) through browser software like Netscape or Internet Explorer. Web pages typically contain links to other web pages located in remote servers. It is this interconnection of pages that gave rise to the term WWW.

Intranets, Extranets. Intranets are corporate networks that use internet protocols and technologies — notably electronic mail, file transfers, the WWW, and browsers — to improve information distribution, communication, and productivity within the organization. Extranets are secure networks employing WWW technology to allow communication among transacting companies. Extranets are normally implemented by providing limited secure access to the intranets of participating corporations. Java, a new programming language, has emerged as the language of choice for intranets and extranets.

Virtual Private Networks (VPN) over Internet. VPN technology refers to hardware and software employing a tunneling protocol such as TP2, which allows corporate networks that would normally require private WAN links to use the Internet to securely transmit data to remote offices. Use of VPN substantially reduces corporate communications costs as leased lines, and long distance calls are effectively replaced by relatively cheaper local internet connections.

VOIP and Videoconferencing over IP. The convergence of the telecommunications and computer technologies has resulted in the ability to transmit data, voice, sound, images, and video simultaneously over the same physical infrastructure. In practice, this has made available products that allow telephony and videoconferencing via existing connections to the Internet. While the use of these technologies normally requires bandwidths (128 Kbps minimum) higher than presently available in most government agencies, the possibility of employing them in the near future to improve communication between field and central offices of government agencies and between government units deserves serious consideration.

Applications

These Internet-based technologies have countless possible applications in government. Among the more obvious ones are:

E-mail. Electronic mail, the most commonly used application on the Internet, has proved to be a great productivity tool, enabling fast, low-cost communication among people. Companies that have adopted e-mail in the “corporate culture” have substantially lowered telephone and facsimile costs. The facility is particularly useful for overseas or field staff. Reports, in the form of electronic documents and spreadsheets, can be submitted faster and more efficiently by simply sending them as e-mail attachments.

Electronic Publishing through Government web pages. Pursuant to the objectives of the RPWeb initiative, government institutions should set up homepages on the web that will help promote information dissemination and transparency. In some cases, such as the CCPAP bulletin of projects, homepages are more efficient and practical than printed materials. They could also be used for recruitment by including employment opportunities in the agency.

Agency intranets/extranets. Instead of merely providing static information for public consumption, agency homepages could be set up as intranets or extranets or both, providing informational and transactional support for mobile workers, field staff, and clients of the agency.

Government VPN. The absence or inadequacy of communication links between field offices and central offices, among different government agencies, and between LGUs and national government agencies can be immediately addressed through the RPWeb and the use of VPN technology. All agencies connected to the Internet would automatically be connected with all other agencies and field offices similarly connected. In some cases, this facility can even replace existing leased line connections and reduce costs.

Regional videoconferencing centers. The money government spends each year on local travel could be reduced with videoconferencing. Strategically located videoconferencing centers could lessen travel expenses and improve coordination with field personnel as the frequency of interaction between central and field office personnel can be increased.

Information Kiosks. Government can harness electronic publishing to set up information kiosks that could serve as extensions of the web pages of certain agencies. Strategically located web-based Information Kiosks will be helpful in disseminating a wide variety of information to the public, among them tourist attractions, customs duties and taxation, business registration.

Considerations

In employing internet technologies in re-engineering government, the following should be taken into account:

Cost. Some of the applications described above, particularly videoconferencing centers and distance education facility, require substantial capital and recurring expenditure. For example, a videoconferencing center would need about P5 million in equipment and at least P60,000 a month for its connection. Setting it up in all 14 regions would need an initial capital outlay of P70 million and a yearly connection cost of P10 million on top of administrative expenses like staff salaries and office space.

Security and authentication. An inherent factor in the use of the Internet for business and official transactions is the susceptibility of systems to hackers. Improperly secured systems are prone to unauthorized access and possible data tampering. Appropriate use of encryption, firewalls, password controls and aging, user authentication, and other security standards is a must.

Manpower. Government may find it difficult to recruit and retain the IT personnel needed to set up, maintain and operate these proposed Internet-based systems. Contracting them to private operators appears to be a better option.

Training and change management. Even if the setting up, operation, and maintenance of Internet-based applications are outsourced, there will still be need for a massive training and change management exercise to ensure that government workers actually make productive use of the available technology and infrastructure.

Prognosis

The proposed systems will definitely improve governance in a variety of ways like lower costs, enhanced communication and coordination within government, and better information dissemination. Not only is Internet technology widely available. It is becoming more and more affordable. What government lacks in technical manpower, local IT companies can readily provide through outsourcing schemes. And there are viable technological solutions to security and authentication problems.

The real obstacles are lack of funds and the need for massive retraining and change management of the bureaucracy. The former is partially addressed by the RPWeb initiative which aims to require each government agency to set aside funds to connect to the Internet, and by inviting the private sector to set up some of the needed infrastructure on a BOO scheme. The latter would require appropriate policies and sustained implementation over several years.

I. Online Learning

Description

Over the years, various systems and technologies have been employed to facilitate learning. The computer, in particular, has been used to automate and improve some aspects of the learning process through drill-and-test programs, computer-based testing, multimedia modules and other CAI/CAL applications. Correspondence, radio, and television allow the delivery of instruction and course materials over long distances. Today, the Internet provides new opportunities for pursuing the same objectives primarily because of its wide geographic coverage and multimedia capabilities.

Online learning refers to the use of information technology in the delivery of instruction. Online learning may be asynchronous — where the recipient of instruction is able to access and go through the materials at any time and at his own pace — or interactive — where there is a scheduled two-way interaction between teacher and student. Web-based courses and CAI modules on CD-ROM are the best examples of asynchronous online learning, while web-based courses with two-way videoconferencing for scheduled classes is the common form of interactive online learning.

Applications

Worldwide, online learning technologies have been primary used in corporate training. Considering government’s perennial need for training and retraining, and its involvement in tertiary and technical education through the SUCs and TESDA, online learning can be employed in at least two areas:

Distance education. Internet-based technologies can be used to provide the infrastructure for massive training via distance education, whether it is purely asynchronous delivery of materials via web pages, or combined asynchronous delivery and two-way teacher-student interaction via videoconferencing. This can reduce the cost of nationwide training, as participants need not travel to attend training or education programs but can stay in their places of work provided Internet access is available. Regional and provincial government offices, and elementary and high school teachers in the provinces would benefit from distance education infrastructure.

CAL modules. The production of CAL modules in selected areas will improve training and education for Filipinos. In addition to CAL modules in mathematics and the sciences to raise the quality of basic education, training modules may also be produced for use of government workers in the promotion of tourism, agriculture, and livelihood. 

Considerations

In determining whether or not government should vigorously pursue online learning technologies, the following should be considered:

Cost. The infrastructure needed to implement online learning can be very costly if a two-way interaction is to be supported. While the Internet has brought down capital costs from what they were in the past, there will still be need for high-bandwidth links and videoconferencing equipment, potentially running into the millions of pesos per site. There will also be a need to set up some kind of “production facility” for the course materials. Finally, PCs would have to be made available in all schools and connected to the Internet.

Courseware development. The appropriate courseware — course “materials that will be practical and effective in the new medium — will have to be produced. This in itself will be a huge undertaking, and the success of the project will depend largely on the success of the courseware development.

“Culture.” A shift in values and “culture” will have to be managed. Many government workers consider being sent to Manila for training as a “reward.” Similarly, those in central offices see travelling to the field offices to conduct training as one of the “perks” of public office. Another “cultural” issue is the perception that most Filipinos prefer structured classroom-style approach in training and may not benefit as much from unstructured training delivered through computer-based modules or the Internet.

Prognosis

Online learning technologies offer a unique opportunity not just to address government’s need for massive training and retraining, but to improve productivity and efficiency. It can reduce travel costs and staff time spent away from work, maximize use of available expertise, and help ensure standardized delivery of instruction.

But it is imperative that people in government truly appreciate that online learning is a long-term investment where no immediate benefits may arise until a “critical mass” is reached. Government should probably either consider this together with videoconferencing centers as joint projects (to spread the capital expenditure and recurring costs) or leave the setting up of the infrastructure to the private sector.

J. Remote Sensing

Definition

Remote sensing in the technique of obtaining information about objects through the analysis of date collected by special instruments that are not in physical contact with the objects of investigation. As such, remote sensing can be regarded as “reconnaissance from a distance,” “teledetection,” or a form of the common adage “look but don’t touch.” Remote sensing thus differs from in situ sensing, where the instruments are immersed in, or physically touch, the objects being measured. A common example of an in situ instrument is the soil thermometer.

Traditionally, the energy collected and measured in remote sensing has been electromagnetic radiation, including visible light and invisible thermal infrared (heat) energy, which is reflected or emitted in varying degrees by all natural and synthetic objects. The scope of remote sensing has been recently broadened to include acoustical or sound energy, which is propagated under water. With the inclusion of these two different forms of energy, the human eye and ear are examples of remote sensing data collection devices.

Applications

Remote sensing technologies have been used by other governments in the following areas of application:

Environmental monitoring and control
Agriculture
Disaster Planning and Recovery

Considerations

The use of remote sensing is extremely expensive and requires high-tech infrastructure that the Philippines does not yet possess. However, there have been a number of limited applications using lasers for pollution monitoring started locally.

Prognosis

Remote sensing is a technology that will be very important for the Philippines in the future. The government should continue to support projects in this area to develop local expertise and infrastructure in this technology.

K. Token Type Authentication Systems

Description

Token-based — as opposed to biometric — authentication measures use objects distinct from the person-holder or bearer such as smart cards, magnetic stripe cards or physical keys and locks for identification and verification.

Smart Card. A small electronic device about the size of a credit card that contains electronic memory and possibly an embedded integrated circuit. Smart cards containing an IC are sometimes called Integrated Circuit Cards (ICCs) and can be used to store personal records and digital cash, or generate network IDs.

Token. In security systems, a small device the size of a credit cards that displays a constantly changing ID code. A user first enters a password and then the card displays an ID that can be used to log into a network. Typically, the IDs change every five minutes or so, thereby preventing hackers from cracking the system.

Applications

This technology has been employed by countries like Spain to provide a secure and tamper-proof Social Security identification card. It can also be employed in a “closed” e-commerce system to authenticate eligible users.

Consideration

Use of this technology is likely to encounter political opposition as it relates to the adoption of a national ID system — which is what this technology is good for.

Prognosis

Smart card technology is definitely mature, available, and affordable. Credit card companies are, in fact, already using it. It should find use in a National ID System once government is able to overcome opposition. On a limited scale, the government can consider using electronic tokens in securing any e-commerce application it may pursue.

L. Virtual Private Networks (VPN)

Description

VPN is networking technology that uses public or shared telecom facilities to connect nodes. VPN appears as if users are connected directly to their private network, but it actually uses a public network infrastructure to make the connection.

Traditional VPNs are provided in the form of broadband packet-switched services such as Frame Relay or X.25. With the Internet increasingly becoming a viable (reliable and cost-effective) network service infrastructure, it is possible to run VPN services over the internet. While traditional VPNs are proven technologies for linking LANs, they do not easily accommodate individual users whose only access to the outside world is through their PC, a modem, and the public switched telephone network (PSTN). Dial or Internet-based VPNs are more easily accessed by these users.

For Internet-based VPNs, securing data communications is particularly important. Several systems that use the Internet as the medium for transporting data employ data encryption and other data security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted and viewed in its original readable form.

Remote access to VPNs is one of the fastest growing areas of the networking industry. Driven by the boom in inexpensive Internet access and by the increasing use of remote access to corporate networks, dial-up access to corporate networks over the public IP-based infrastructure makes access to network resources less expensive, more efficient, and more secure for organizations. As switching solutions are introduced to alleviate Internet backbone congestion, the Internet is becoming more viable as a low-cost medium for remote network access.

Three important technologies may be considered in using VPNs for providing remote access via Internet: tunneling, network security, and network management.

Tunneling — Tunneling technology enables one network to send its data via another network’s connection. Tunneling works by encapsulating a network protocol within packets carried by the second network. For example, Microsoft’s PPTP technology enables organizations to use the Internet to transmit data across a VPN by embedding its own network protocol within the TCP/IP packets carried by the Internet.

Security — Network security allows remote dial-up connectivity while protecting corporate information from inadvertent or unauthorized access or eavesdropping. For most VPN services implemented with Layer 2 tunneling, the tunnel is terminated at the customer premise. This presents potential security issues for customers by having their computer systems within reach of both unauthorized users and viruses via their Internet connection.

In some network designs, tunnels are terminated behind customer firewalls. Certain types of IP tunneling require customers to connect directly to the Internet, which could pose a security risk to the customer. To protect their networks from unauthorized users, many corporate customers erect firewalls behind their Internet routers. This restricts access from the Internet to resources such as the corporate Web server. When using IP tunneling, the device terminating the tunnels either needs to be in front of the firewall, allowing access from the Internet to a device that has access to secure, corporate resources, or behind the firewall. If the device is behind the firewall, the firewall must be open to allow tunneled packets through to the devices that will unwrap them. There are ways around this. However, they make the process of configuring the firewall comp. Also, not all firewalls can effectively handle traffic that isn’t terminated in the firewall.

Network Management and Administration — Two key needs in managing a Dial VPN are Network Layer Address Management (NLAM) and tunnel management. Tunnel management refers to the external software application used to set up tunnels to maintain subscriber information, and to perform subscriber-level billing and accounting. All implementations are expected to have the usual network management functionality such as performance monitoring.

Applications

Service providers offer VPN or intranet service for agencies that prefer to outsource remote access service. An intranet uses Web-based technology to connect an organization’s distributed LANs, field offices, mobile users, and telecommuters to essentially the same services or applications found in a typical network such as:

Internal e-mail
Company-provided (and controlled) Web access
Internal database access
Intranet Web serving and publishing

For agencies looking to provide remote access to internal users over a wide geographical area, providers can offer “external” VPN or extranet service: This adds controlled, secure connections between the agency’s users and its field offices within and/or outside the country, institutional partners, other government agencies and the private sector for:

Electronic commerce
Sharing of proprietary or confidential data
Institutional support.

Considerations

Many of the standards that VPN services will be based on are still under development. This is important since focusing on a complete, standards-based solution will ensure that investments in outsourced networking services meet the availability, security, performance, and cost requirements of agency-clients. It is expected that the service provider who delivers a complete, standards-based solution will ultimately dominate. The following is an initial list of desirable features that could be used to evaluate VPN services from a user perspective:

Supports both Layer 2 and Layer 3 tunneling.

Is scalable, specifically with equipment and network management, as well as network architecture.

Prevents breaches, either directly or indirectly, through its accommodation of external security devices.

Subscribers, typically corporations and ISPs, and individual users are authenticated to the network.

Authenticated users are authorized to use the various services of the VPN.

Provides system level security to its subscribers.

The configuration of network elements (e.g., remote access concentrators, gateways, switches, routers) is as simple and straightforward to use as possible.

Provides the full suite of functionality necessary for managing a network: network design, network simulation and validation, network visualization, and network operations tools.

Requires no modifications or upgrades to subscriber customer premise equipment, or to remote client software.

No addressing changes are needed. Non-globally unique or over-lapping IP addresses are allowed.

The ISP is locally interconnected to other ISPs and has points of presence in most of the localities in which the agency maintains offices.

Cost will depend on what components of the VPN are outsourced and what are maintained in-house. As more networks are outsourced to an ISP, the nature of the cost changes from capital outlay in the initial acquisition of facilities to a user fee-type charging that are more financially manageable.

Per site, the cost of an appropriately configured VPN access router could run to P80,000 minimum for initial equipment, plus a leased line connection to an ISP at P40,000 per month. Field workers can use dial-up access to a local ISP (estimated at P1,000 per month). Additional cost considerations include firewall equipment and software and possible LAN restructuring.

Prognosis

Dial VPN is a service that is beginning to be an industry of its own but is still in its infancy. Because of the anticipated demand due to the savings in the cost of corporate communication, carriers and service providers are expected to come up with the necessary infrastructure and develop innovative service packages that give an organization the option to replace an existing in-house data communication system.

Price differentiation among the service providers would be mainly due to variations in service quality, specifically regarding the guaranteed service level (speed and reliability of access and minimized downtime). However, VPN over Internet definitely offers the possibility of reducing costs over traditional private WANs as local connections to local ISPs are definitely cheaper than long-distance leased lines or dial-up access. 

In further discussing the viability of VPN, it is important to note a few of the trends, some of which are already taking place:

Whole Network Outsourcing. Agencies, particularly those with little or no existing network infrastructure, could seriously consider outsourcing their remote access infrastructure. In the future, some agencies might even choose to outsource their entire network integrators and service providers with demonstrated expertise in full support of network infrastructures. In this model, the customer owns its data and its hosts. The network facilities are managed completely by the service provider. in the United States, integrators such as Perot Systems already provide this type of service.

Alternative VPN Access Types. Most Dial VPN systems offered today are based on switched connectivity to the Dial VPN. While most connections to corporate intranets or the Internet are initiated via the PSTN with ISDN or analog modem calls, other means of access including cable modems and DSL (Digital Subscriber Line) present intriguing possibilities and new challenges for service providers.

New Protocols — Today, special tunneling protocols such as Mobile IP or L2TP are required for VPN functionality. Emerging standards like IPSEC and IP Version 6 enable secure, encrypted encapsulation and tunneling for user data. Since agencies are expected to be extremely sensitive about the privacy of their data over the public network, more highly integrated VPN techniques will, no doubt, be popular.

M. Wireless/Mobile Computing

Description

Wireless networking increases the access of users to computing and communication services, which at present is largely provided through wired networks. Wireless communication technology will serve as the impetus for pervasive computing. Wireless devices come in four categories: smart phones, personal digital assistants (PDAs), e-mail only devices, and set-top boxes:

Smart Phones. Smart phones are perceived to be the solution for gadget clutter that results in the ever-growing need for communicating in many ways. Smart phones come in two basic types: corded desk phones and wireless devices. Both provide standard voice communications and connect to the Internet to send and receive e-mail and browse the Web. Some have built-in personal information managers. There are at least 12 products on the market, made by Nokia, Alcatel, and Samsung, among others.

PDAs. Short for personal digital assistant, a PDA is a handheld device that combines computing, telephone/fax, and networking features. Typically a PDA is a cellular phone, fax transmitter, and personal information organizer rolled into one. Unlike portable computers, most PDAs are pen-based, using a stylus rather than a keyboard for input. This requires the incorporation of handwriting recognition technology. Some PDAs can also react to voice input by using voice recognition technologies.

E-mail-Only Devices. E-mail only devices allow users to write, send, and check e-mail without using a desktop computer. The general process is simple: turn the device on, type the e-mail message, plug the unit into a phone jack and an internal modem automatically connects to a local ISP.

Set-top Boxes. Television and entertainment service providers are beginning to build and integrate Internet applications into their products. Software developers are responding by developing applications that synchronize standard television programming and related Web-based data. There are at least 11 products available, among them, WebTV from Philips and WebTV Plus from Sony Electronics.

Applications

The benefits of wireless computing to private individuals and corporations also apply to government in enhancing and enabling cost-effective person-to-person, intra-agency, and inter-agency communication. Government executives who need to travel frequently and field staff will certainly benefit from the communication facilities that wireless computing offers.

Considerations

Standardization. The Wireless Application Protocol (WAP) is the de-facto word standard for the presentation and delivery of wireless information and telephony services on mobile phones and other wireless terminals. Handset manufacturers representing 90 percent of the world market across all technologies have committed to shipping WAP-enabled devices. Carriers representing more than 100 million subscribers worldwide have joined WAP Forum This commitment will provide tens of millions of WAP browser-enabled products to consumers by the end of 2000. WAP allows carriers to strengthen their service offerings by providing subscribers with the information they want and need while on the move. Infrastructure vendors will deliver the supporting network equipment. Application developers and content providers delivering the value-added services are contributing to the WAP specification.

The WAP, specification addresses these issues by using the best of existing standards, and developing new extensions where needed. It enables industry participants to develop solutions that are interface independent, device independent, and fully interoperable. One of WAP’s basic principles is to leverage on the standards of the existing Internet computing and communications model. As such, it is expected to make extensive use and enhance essentially the same Internet infrastructure. Enhancements could come in the form of installation of computers assuming the role of WAP gateways between Web servers and the client. The basic model, however, remains the same as the existing WWW model. 

Value-Added Services. While WAP promises a solid, backward-compatible framework for the development and growth of wireless computing, it has thus far provided a forum for establishing wireless standards for basic telephony and web-based services like browsing Web content and e-mail, which are essentially for individual users. The next logical step is to address providing value-added data and communication services such as remote network management, broadcast services, multimedia capabilities, and corporate database access.

Prognosis

With the network infrastructure largely provided by the private sector, government is seen essentially as a major user of wireless computing services. Under this scenario, government communication costs would come mainly in the form of service subscriptions, contracts, and license fees that agencies will pay for the flow of information and applications, like annuity-based or pay-per-use type of fees similar to the current phone-use or Internet access payment schemes.

However, the high cost of these novel equipment makes it impractical at this time to implement wireless or mobile computing in government on a wide scale.

Annex C
Indicative Hardware System Specification

1. LARGE DATABASE SERVER

Four 64-bit processors (minimum) with on-chip cache
Symmetrical multiprocessing field-expandable to at least 8 processors
2 gigabyte RAM (minimum)
350 GB disk storage with RAID 5 capability
High capacity (4 GB Min.) tape drive
100 mbps ethernet port
Unlimited User Operating System

2. MEDIUM DATABASE SERVER

Two 64-bit processors (minimum) with on-chip cache
Symmetrical multiprocessing field-expandable to at least 4 processors
1 gigabyte RAM (minimum)
120 GB disk storage with RAID 5 capability
High capacity (4 GB min.) tape drive
100 mbps ethernet port
Unlimited User Operating System

3. SMALL DATABASE SERVER

64-bit processor (minimum) with on-chip cache
Symmetrical Multiprocessing capability to at least 2 processors
512 megabyte RAM (minimum)
40 GB disk storage with RAID 5 capability
High capacity (4 GB min.) tape drive
100 mbps ethernet port
Unlimited User Operating System

4. DEPARTMENTAL SERVER/FIREWALL

450 MHz. Pentium III processor(or better) with on-chip cache
Upgradeable to dual processor configuration
128 megabyte RAM (minimum)
12 GB SCSI disk storage
1.44 MB floppy disk drive
High capacity tape drive
10/100 mbps ethernet port (dual for firewall use)
Unlimited User Windows NT Server Operating System

5. PERSONAL COMPUTERS

400 MHz. Pentium-class processor (or better)
64 megabyte RAM (minimum)
6.3 GB IDE hard disk drive
1.44 MB floppy disk drive
10/100 mbps ethernet port
56Kbps internal modem (for remote use)
8 MB AGP video card
14” SVGA monitor with 1024 x 768 resolution
2-button mouse
Latest version of MS-Windows and MS-Office

6. MISCELLANEOUS COMPUTING EQUIPMENT

VPN Access Router
2 serial ports (sync/async)
10/100 Mbps Ethernet port
Hardware-based encryption
32 megabyte DRAM
4 megabyte flash memory
1.2 terabyte External RAID System
Printers (mix of laser, inkjet and dot matrix)
Videoconferencing equipment (PC-based)
Videoconferencing equipment (room-based)
CD jukebox (100 CDs)
CD jukebox (400 CDs)

National Information Technology Council (NITC)

CHAIRMAN: Dr. Filemon A. Uriarte, Jr., Secretary, Department of Science and Technology (DOST); CO-CHAIRMEN: Dr. Felipe M. Medalla, Secretary (Alternates: Mr. Raphael Perpetuo M. Lotilla, Deputy Director General, Mr. Daniel F. Pabellon, Director), National Economic and Development Authority (NEDA); Mr. Jaime Augusto Zobel de Ayala, President (Alternate: Mr. Mark Javier, Chief Information Officer), Ayala Corporation; MEMBERS: Mr. Manuel A. Roxas II, Secretary (Alternate: Ms. Toby Melissa Monsod, Assistant Secretary), Department of Trade and Industry (DTI); Mr. Andrew B. Gonzales, Secretary (Alternate: Mr. Ramon C. Bacani, Assistant Secretary), Department of Education, Culture and Sports (DECS); Dr. Benjamin E. Diokno, Secretary (Alternates: Ms. Cynthia G. Castel, Undersecretary, Ms. Amelita D. Castillo, Director, Mr. Eduardo Opida, Director), Department of Budget and Management (DBM); Dr. Ester A. Garcia, Chairman (Alternate: Dr. Hadja Roqaiya VR. Maglangit, Commissioner), Commission on Higher Education (CHED); Mr. Vicente C. Rivera, Secretary, Department of Transportation and Communication (DOTC), Mr. Edicio G. dela Torre, Director-General (Alternate: Ms. Mariflor R. Liwanag, OIC), Technical Education and Skills Development Authority (TESDA); Mr. Ramon V. Señeres, Director-General, National Computer Center (NCC); Mr. Carlito Puno, President (Alternates: Constancio Sia, Mr. Fabian Quitales), Coordinating Council for Private Education Association (COCPEA); Mr. William T. Torres, President (Alternate: Mr. Albert Velasco, Mr. Ally Reyes), Philippine Internet Service Organization (PISO); Mr. Augusto C. Lagman, President (Alternate: Dr. Ofelia M. Carague), Information Technology Foundation of the Philippines (ITFP); Mr. Ernesto Santiago, Executive Director (Alternate: Mr. Jacob Peña, President) Semiconductor Electronics Industry in the Philippines, Inc. (SEIPI); Ms. Ma. Corazon M. Akol, CY 1999, President, Atty. Rodolfo A. Salalima, CY 2000, President, Philippine Electronics and Telecommunications Federation (PETEF).

GISP Steering Committee

CHAIRMAN: Atty. Raphael Perpetuo M. Lotilla, Deputy Director-General, National Economic and Development Authority (NEDA); MEMBERS: Hon. Crisostomo F. Abanes, Undersecretary, Ms. Kathleen G. Heceta, Director, Ms. Emma E. Hizon, Director, Department of Transportation and Communication (DOTC); Ms. Amelita D. Castillo, Director, Mr. Francisco D. Lopez, Chief Management Specialist, Department of Budget and Management (DBM); Mr. Arcadio B. Cuenco, Jr., Director, Mr. Jose Rocha, Assistant Director, Commission on Audit (COA); Mr. Gerardo A. Doroja, Deputy Director, Department of Science and Technology- Science and Technology Information Institute (DOST-STII); Mr. Eubert F. Gutierrez, Director, Department of Interior and Local Government (DILG); Ms. Ma. Corazon M. Akol, 1999 President, Philippine Electronics and Telecommunications Federation (PETEF); Mr. Augusto C. Lagman, Information Technology Foundation of the Philippines (ITFP); Mr. Samuel A. Molines, OIC, Mr. Denis Villorente, Department of Science and Technology-Advanced Science and Technology Institute (DOST-ASTI); Ms. Consolacion C. Santos, Director, Civil Service Commission (CSC); Mr. William T. Torres, 1999 President, Philippine Internet Service Organization (PISO).

GISP Technical Working Group

CHAIRMAN: Mr; Daniel F. Pabellon, Director, National Economic and Development Authority (NEDA); MEMBERS: Ms. Julie S. Matias, Assistant Director, Civil Service Commission (CSC); Ms. Maria Elena M. Robosa, Chief, Department of Interior and Local Government (DILG); Mr. Gerardo A. Doroja, Deputy Director, Department of Science and Technology-Science and Technology Information Institute (DOST-STII); Ms. Vienna A. Diuco, Assistant Director, Mr. Mateo Montaño, Department of Budget and Management (DBM); Mr. Dennis S. Deveza, Information Technology Foundation of the Philippines (ITFP); Ms. Carmelita U. De Guzman, OIC-Director, Mr. Eugenio R.B. Inocentes III, Director, Atty. Fortunato R. Abrenilla, Director, Mr. Ruben S. Reinoso, Jr., Director, Mr. Virgilio V. Salentes, Assistant Director, Mr. Cipriano A. Ravanes, Jr., Chief EDS, Ms. Virginia B. Candor, Supervising EDS, National Economic and Development Authority (NEDA).

GISP-Technical and Administrative Support Group

CHAIRPERSON: Ms. Justina A. Adina, Acting Assistant Director, National Economic and Development Authority (NEDA); MEMBERS: Ms. Helen B. Barayuga, Information Technical Officer III, Civil Service Commission (CSC); Mr. Francisco D. Lopez, Chief Management Specialist, Department of Budget and Management (DBM); Ms. Corazon M. Mercado, Chief, Department of Interior and Local Government (DILG); Ms. Elnora T. Fernandez, Supervising Economic Development Specialist, Ms. Corazon P. Mamomo, Senior Economic Development Specialist, Ms. Marlene M. Tauro, Economic Development Specialist II; Mr. Jomanuel V. Cordova, Researcher, Mr. Richard D. Ballester, Researcher, National Economic and Development Authority (NEDA).

NITC Council Assistance System and Secretariat: CHAIRMAN: Dr. Ida F. Dalmacio, Department of Science and Technology-Philippine Council for Advanced Science and Technology Research and Development (DOST-PCASTRD); MEMBERS: Mr. Daniel F. Pabellon, Director, Ms. Justina A. Adina, Acting Assistant Director, Ms. Elnora T. Fernandez, Ms. Marlene M. Tauro, Ms. Cherie Mae Quillates, National Economic and Development Authority (NEDA); Mr. Gerardo S. Doroje, Deputy Director, Department of Science and Technology-Science and Technology Information Institute (DOST-STII); Mr. Johann Ong, Department of Science and Technology-Advanced Science and Technology Institute (DOST-ASTI); Ms. Juli Ana E. Sudario, Director, Ms. Ma. Lourdes P. Aquilizan, National Computer Center (NCC); Ms. Ernie M. Bacarra, Ms. Maridon O. Sahagun, Ms. Marie Christie B. Santos, DOST-PCASTRD.

Participants in Planning Workshops and Consultation Meetings Held on the GISP

Government: Commission on Audit (COA); Mr. Arcadio B. Cuenco, Jr.; Civil Service Commission (CSC); Mr. Jose Rocha; Ms. Helen B. Barayuga, Ms. Julie S. Matias, Ms. Consolacion C. Santos; Department of Agriculture (DA); Mr. Gener Y. Daluz; Department of Agrarian Reform (DAR); Ms. Ester L. Sicad; Department of Budget and Management (DBM); Ms. Vienna A. Diuco, Mr. Francisco D. Lopez, Ms. Fe Versoza-Ico; Department of Education, Culture, and Sports (DECS); Mr. Reuben De La Cruz, Mr. Deogracias Genito; Department of Foreign Affairs (DFA); Mr. Mario L. De Leon, Mr. Ramon Eclavea; Department of Interior and Local Government (DILG); Mr. Sim Estallo, Mr. Eubert F. Gutierrez, Ms. Corazon M. Mercado, Ms. Maria Elena M. Robosa; Department of Labor and Employment; Dir. Hector Morada; Department of National Defense (DND); Mr. Andy Navarro; Department of Energy (DOE); Mr. Avelino S. Redor, Mr. Jesus T. Tamang; Department of Health (DOH); Ms. Charity Tan; Department of Science and Technology (DOST); Mr. Peter Antonio B. Banzon, Ms. Ida F. Dalmacio, Mr. Gerardo Doroja, Ms. Donna Ruth Montalban, Ms. Maridon O. Sahagun, Ms. Marie Christie B. Santos, Mr. Dennis Villorente; Department of Tourism (DOT); Ms. Milagros Acoba; Department of Transportation and Communication (DOTC); Mr. Crisostomo F. Abanes, Mr. Vic Chauhan, Mr. Roberto A. Jingco; Department of Public Works and Highways (DPWH); Mr. Abelardo Barreto, Ms. Elizabeth E. Yap; Department of Social Welfare and Development (DSWD); Ms. Alma Infante, Mr. Delfin Pille; Department of Trade and Industry (DTI); Mr. Alfredo Torres; National Mapping and Resource Information Authority (NAMRIA); Mr. Raul Nilo, Ms. Teresita B. Roberto. Ms. Loma M. Sales, Mr. Ramon V. Señeres, Ms. Julie Ana Sudario, Ms. Cynthia A. Topacio (NCC); Office of the President, Mr. Jovencio S. Kintanar, National Economic and Development Authority (NEDA); Mr. Fortunato R. Abrenilla, Ms. Justina A. Adina, Ms. Virginia B. Candor, Ms. Carmelita U. De Guzman, Ms. Elnora T. Fernandez, Mr. Eugenio R.B. Inocentes III, Mr. Raphael Perpetuo M. Lotilla, Ms. Corazon P. Mamomo, Mr. Daniel F. Pabellon, Ms. Lelina A. Quilates, Ms. Romina V. Reyes, Mr. Ruben S. Reinoso, Jr., Mr. Virgilio V. Salentes, Ms. June Tan, Ms. Marlene M. Tauro.

Private Sector: Ms. Timmy D. Rivera (Bayantel UNA); Mr. Raymundo Del Val (HP Philippines); Mr. Augusto C. Lagman, Mr. Dennis Deveza, Mr. Glenn Sipin (Information Technology Foundation of the Philippines); Mr. Willy Gan (MOZCOM Phils.); Ms. Fe Ferriols (ORACLE Phils.); Mr. Nelson J. Celis (Philippine Computer Society); Ms. Janette Toral (Philippine Internet Commerce Society); Ms. Maria Corazon M. Akol, Mr. Oscar Villacorta (Philippine Electronics and Telecommunications Federation); Mr. William T. Torres, Mr. Albert S. Velasco (Philippine Internet Service Organization); Mr. Antonio P. De Roda (Philippines Software Association); Ms. Amelia Torrente (Quality Systems, Inc.); Ms. Cynthia Mamon (SunMicrosystems); Mr. Rizal Raul Reyes (TODAY).

Economic Development Foundation: Mr. Victor M. Taylor, President: Mr. Leoncio S. Marcelo, Vice President (Management and Information Technology Services); Ms. Vicenta A. Alinsug, Project Manager; Arnaldo Del Rosario, Francisca N. Dayrit, Emmanuel L. Benitez, Mr. Francisco D. Lopez, Lea Rosemary V.an, Teresa G. Bagulsi, Primo Tapia, Emmanuel Miraflores, Consultants; Salvador M. Enriquez, Jr., Adviser. 

Editorial and Design Assistance Group

Raya Media Services, Inc.: Mr. Virgilio F. Lacaba, President and General Manager, Mr. Roderick Toledo, Vice President; Ms. Cynthia Alberto Diaz and Mr. Amadis Ma. Guerrero, Editors: Ms. Elizabeth Lolarga, Associate Editor; Mr. Domingo S. Cortez, Design and Layout Artist; Mr. Frederico A. Savania, Layout Artist; Ms. Jocelyn C. Ladisla, Executive Assistant; Mr. Gerardo R. Anigan, Economics Adviser.


chan robles virtual law library
    Back to Main


Since 19.07.98.











































chanrobles.com





ChanRobles Legal Resources:

ChanRobles On-Line Bar Review

ChanRobles Internet Bar Review : www.chanroblesbar.com

ChanRobles MCLE On-line

ChanRobles Lawnet Inc. - ChanRobles MCLE On-line : www.chanroblesmcleonline.com