Tag: Staff Onboard Reading

  • Employe Benefit Equipment of Portable Power Station User Guideline

    Employe Benefit Equipment of Portable Power Station User Guideline

    Please read carefully and understand every single words inside the paragraph before you use the portable power station.


    Disclaimer

    DDM Group shall not be held responsible or liable for any loss, theft, explosion, or damage caused by the portable power station, nor for any third-party liabilities arising from such incidents. Furthermore, DDM Group will not bear the cost of repair or delivery associated with fixing the portable power station. Users are solely responsible for the proper handling, maintenance, and security of the portable power station at all times.


    Portable Power Station Model Number

    The Portable Power Station Model Number will be provided to you together with the Portable Power Station. Make sure you go to its official website and read through the specifications before you bring it to production:

    1. BLUETTI EB3A Portable Power Station | 600W 268Wh

    The consequences of portable power station explosion

    The consequences of a portable power station explosion, such as one with a 600W inverter and 268Wh capacity, depend on several factors, including the battery type, the surrounding environment, and the cause of the explosion. Here’s a general overview:

    1. Magnitude:
    • The explosion of a lithium-ion battery, can release significant energy due to thermal runaway. This process involves rapid overheating, gas release, and potential ignition.
    • The magnitude of the explosion could cause fire, smoke, and debris, potentially damaging nearby objects and structures.
    1. Radius:
    • The immediate blast radius might be limited to a few meters, but the fire and heat generated could spread further, especially in a confined space like a residential apartment.
    • Toxic fumes from burning lithium-ion batteries can also pose health risks to individuals in the vicinity.
    1. Potential Consequences:
    • Property Damage: Nearby furniture, walls, and electronics could be damaged or destroyed.
    • Health Risks: Burns, inhalation of toxic fumes, and injuries from flying debris are possible.
    • Fire Spread: Inflammable materials in the apartment could ignite, leading to a larger fire.

    To mitigate risks, always follow safety guidelines, such as avoiding overcharging, keeping the device away from heat sources, and storing it in a well-ventilated area. If you suspect a battery issue, discontinue use immediately and consult the manufacturer. Let me know if you’d like more safety tips!


    User Guideline for the Portable Power Station

    Reading the user guide for a portable power station is essential to ensure safe, efficient, and effective usage of the device. The guide provides detailed reminders on

    1. Setup
    2. Operation
    3. Maintenance

    This guideline helps you avoid potential hazards like explosions, electrical malfunctions, or improper handling. It also highlights important safety precautions, such as where to place the device and how to charge it correctly to prevent overheating or damage. Byunderstanding the features, limitations, and troubleshooting steps detailed in the guide, you can maximize the lifespan and reliability of the portable power station while minimizing risks and inconveniences. It’s a valuable resource for anyone who wants to use their device confidently and responsibly.


    1. Explosive Risks of the Portable Power Station

    • Heat and Fire Hazards: Avoid exposing the power station to high temperatures, open flames, or prolonged direct sunlight.
    • Electrical Hazards: Never disassemble, modify, or mishandle the power station to prevent electrical risks.
    • Liquid Exposure: Keep the device away from water or other liquids to avoid short circuits or damage.


    2. Checking the Parts and Accessories of the Portable Power Station

    Before usage, inspect all components for completeness and condition:

    Parts

    • Power Station Body: Ensure the device has no visible damage.
    • Power Cord: Verify the cord is intact and operational.
    • Mobile App: Download and install the BLUETTI app for monitoring and smart control.
    • Ports and Interfaces: Ensure the device has all ports and Interfaces that are working properly with no defects.
    • LCD screen:Ensure the LCD screen is not broken and is in good state.

    3. Reminders During Charging

    Power Outage During Charging:

    Whenever there is a power outage during charging you need to the Power station status thus the if you were charging using the AC port it will stop charging,ensure the LCD screen shows that there in no input ,If you have a solar panel you should immediately switch to charging your power station via the solar panel. You can also disconnect non essential devices to preserve power and prioritize essential devices.

    How to Check Charging Status:

    • Monitor the charging progress using the power station’s display screen or the BLUETTI app.
    • Ensure the charging indicator is active to confirm proper operation.

    Any health status checking meter or device

    For advanced health status checking you can use this listed devices

    a). Multimeter (For Voltage & Current Checks)

    • Measures battery voltage (should be ~12.8V when fully charged).
    • Checks solar/car input voltage (should match specs).
    • Tests output consistency (AC/USB ports).

    b). Capacity Testers (For True Battery Health)

    • Devices like ZKETECH EBC-A20 or OPUS BT-C3100 can:
    • Measure actual remaining capacity (vs. rated 268Wh).
    • Detect battery degradation (if capacity drops below 80%).

    C. Infrared Thermometer (For Temperature Checks)

    • Ensures the battery isn’t overheating (>40°C / 104°F is risky).
    • Useful during fast charging or high-load usage.

    Unplug After Full Capacity:

    • Disconnect the power station once it reaches 100% to prevent overcharging or unnecessary wear on the battery.

    Do Not Output During Input:

    • Avoid charging external devices while recharging the power station to ensure safety and maintain charging efficiency.

    4. Usage as a Portable Power Supply

    • Determining Compatible Devices:
    • Check the wattage of your electronic devices and ensure their total consumption does not exceed the 600W output capacity.
    • (Give example on how long it will last if charging a mobile / router , table light and laptop at the same time for a 600W ,268Wh portable power station??)
    • Checking Electricity Flow:
    • Use the display screen or BLUETTI app1 to verify smooth power supply and proper charging.
    • Identifying Abnormal Situations:
    • Look out for error codes, unusual sounds, or overheating during use. Stop usage if such issues occur.
    • (Give Example??)
    • Handling Power Outage During Charging:
    • Charging will automatically resume when the power is restored; ensure the connection remains secure. (Please verify??)
    • Placement Guidelines:
    • Idle: Store the power station in a cool, dry place, away from moisture and direct sunlight. (Please suggest to put into a sealed box??)
    • Recharging: Place it on a stable, ventilated surface to prevent overheating.
    • Charging Other Devices: Ensure a flat and safe surface, away from flammable materials.
    • (When using or charging, put somewhere faraway from any living creature, or find something to hide it ??)

    5. Travel with the Portable Power Station

    • Fully charge the power station before traveling.
    • Use a protective case or cover for transportation to prevent physical damage.
    • Check travel regulations for carrying power stations, especially in air travel (e.g., airline restrictions on battery capacity).

    6. Sharing the Usage of the Portable Power Station

    In case you should share the Portable Power Station to others

    • You are not supposed to travel the Portable Power Station to non-DDM Staff home.
    • If anyone want to share the usage of the Portable Power Station , he/she should only stay in your home.
    • Check the electronic device of the borrower before he/she plug into the portable power station.

    Footnotes

    1. Only if you are using BLUETTI portable power station ↩︎
  • How to Enable 2FA in Facebook Personal Account

    How to Enable 2FA in Facebook Personal Account

    Facebook Personal Page

    Facebook Personal Page is one of the products under the umbrella of Meta, inc product fleet. While you can easily access your Facebook Personal Page by logging in via www.facebook.com, there are many interface from different products under Meta, inc. will drive you to the interface of Facebook Personal Page, including but not limit to :

    1. Facebook Ads Manager
    2. Meta Business Suite
    3. Facebook Business Page
    4. Instagram Business Page
    5. Meta For Developer
    6. Meta Account Center

    Infact , Facebook Personal Page is one managed under Meta Account. As long as you have created a new Facebook Personal Page, you will automatically have a Meta Account. Therefore, in your daily life conversation, Facebook Personal Page and Meta Account is used interchangeably. You can uniquely identity your Facebook Personal Page via the Facebook Profile Username.

    2FA

    Two-Factor Authentication (2FA) is a security process that requires two different forms of identification to access an account or system.

    1. 1st Form – Login and Password
    2. 2nd Form – One Time Password (OTP)

    When you enable the 2FA in your Facebook Personal Page, in fact you are doing so in your Meta Account.


    What Problem Patterns 2FA Solves

    Protection Against Phishing

    Even if someone tricks you into revealing your password through a phishing attack, they won’t be able to access your account without the second factor of authentication.

    Prevent Unauthorized Access

    If someone gains access to your password, 2FA acts as a barrier, preventing them from logging into your account without the second verification step

      Access to Specific Capabilities

      Certain features in product or service fleets under Meta , Inc. might only be available to verified accounts. For example , you are required to confirm your identity before you (i.e. Your Facebook Personal Page) can become the Meta Business Suite Admin role.

      Authentication

      Meta Products (e.g. Facebook Personal Page) will in the following scenario require you to authenicate yourself via 2FA even you have logged in the account:

      1. When you are going to modify the security setting.
      2. When you login your account via unusal device or geo location.

      If you fail to authenticate yourself, your account will be blocked.


      Prerequisite of Enabling 2FA in Facebook Personal Page

      Before you can enable the 2FA in your Facebook Personal Page, you should

      1. APP Google Authenticator installed in your Mobile Device(s). You can enable 2FA in as many as Mobile Device you want. For details, please refer to the article Google Authenticator.
      2. Make sure you have the Root access to the email that you used to register for your Facebook Personal Page.
      3. You got the login and password of your Facebook Personal Page on hand.
      4. Decide which Mobile Device you should use. After you have enabled the 2FA , from time to time the owner of the Mobile Device who installed the Google Authenticator would need to provide the 6-digit verification code to the requester. If the owner of the Mobile Device is also a busy boss, please make sure the request for the 6-digit verification code would not bother him. On the contrary, if it is the staff who owns the Mobile Device which installed the Google Authenticator, make sure the staff will hand over the 2FA authority when he/she leave the company.

      When to Enabe 2FA in Facebook Personal Page

      1. Before you want to share the Root Access (i.e. Login and Password) of your Facebook Personal Page account to others.
      2. Before you are going to install the Facebook (or any Meta’s related products) into your new Mobile Device
      3. Before you are going to login the Facebook Personal Page via a new laptop , or any laptop that you never used to login the account before.
      4. When you newly setup a Facebook Personal Page.
      5. When you are going to travel out of your country.

      Step By Step – Enabling 2FA

      1. Login www.facebook.com
      2. Meta Account Center
      3. Account settings
      4. Password and security
      5. Login & recovery
      6. Two-factor authentication
        • Choose an account to set up two-factor authentication.1
      1. Check your Email2
      2. Code = <<Security Code via Registering Email>>
      3. Password = <<Facebook Personal Page Password>>
      1. Choose your security method = Authentication app
      2. Next
      3. Open Google Authenticator APP by your mobile device
        • Scan a QR Code.3
      1. Get the 6-Digit One Time Code in Google Authenticator APP.
      1. Enter code4
      1. Code5
      1. Continue
      2. Password6
      3. Done

      1. Only if you have more than 1 Meta Account registered via the same Email Address ↩︎
      2. Check the Email you used to register for your Facebook Personal Page ↩︎
      3. Please copy and store the Key to a safe place only you can access. For example, your Zoho Vault account. ↩︎
      4. Please be reminded that each code will only be alive within 30 seconds. ↩︎
      5. Code will send to your registering email again (i.e. 2nd time) ↩︎
      6. Password of your Facebook Personal Page will be required again (i..e 2nd time) ↩︎
    1. Confirm Identity for your Facebook Personal Page

      Confirm Identity for your Facebook Personal Page

      Definition

      Facebook Personal Page

      Facebook Personal Page is one of the products under the umbrella of Meta, inc product fleet. While you can easily access your Facebook Personal Page by logging in via www.facebook.com, there are many interface from different products under Meta, inc. will drive you to the interface of Facebook Personal Page, including but not limit to :

      1. Facebook Ads Manager
      2. Meta Business Suite
      3. Facebook Business Page
      4. Instagram Business Page
      5. Meta For Developer
      6. Meta Account Center

      Infact , Facebook Personal Page is one managed under Meta Account. As long as you have created a new Facebook Personal Page, you will automatically have a Meta Account. Therefore, in your daily life conversation, Facebook Personal Page and Meta Account is used interchangeably. You can uniquely identity your Facebook Personal Page via the Facebook Profile Username.

      Confirm Identity

      While any one can create as many brand new Facebook Personal Page accounts as he/she wishes, the newly Facebook Personal Page is unlikely to survive very long due to the fact that the AI algo from Meta ,Inc. will periodically screen out and delete all the suspicious fake accounts in order to protect the authentic users.

      To Confirm Identity in Facebook Personal Page means everyone has to provide their legal identity documentation possessed in the real world to Facebook Personal Page such that the legal identity in the real world can be associated with a specific Facebook Personal Account.

      When you confirm the identity in your Facebook Personal Page, in fact you are doing so in your Meta Account.


      What Problem Patterns Confirm Identity Can Solves

      Security

      There are tens of thousands of Facebook Personal Page account is being hacked per month. There is very little that you can do if your account is being hacked even you reported the hacking activities to the Meta , Inc.

      Please understand that once your Facebook Personal Page is hacked, the suffered radius may bigger than you can imagine due to the fact that the digital assets that are managed by your Facebook Personal Page can also be affected (i.e. being blocked or hacked in worst case), including the Facebook Business Page under your management , as well as the Meta Business Suite if you are the Admin Role with Full Control, for eaxmple.

      By confirming the identity , It helps protect your account from unauthorized access and ensures that only you can control it. It is STRONGLY recommended you to do so immedately.

      Trust and Authenticity

      Verified accounts increase trust among friends, followers, and others, making it clear that you are a legitimate user.

      Account Recovery

      If you ever lose access to your account (which is quite often), either being triggered by unauthorized access or violation of community rules, having your identity confirmed makes it easier to recover.

      Prevent Impersonation

      It helps prevent others from creating fake accounts using your name and photos.

      Access to Specific Capabilities

      Certain features in product or service fleets under Meta , Inc. might only be available to verified accounts. For example , you are required to confirm your identity before you (i.e. Your Facebook Personal Page) can become the Meta Business Suite Admin role with Full Control.


      Prerequisite of Confirm Identity

      It is imperative that before you confirm the identity, please make sure:

      1. Amend the Meta Account Profile to align with the Legal Name shown in the Legal Document (i.e. National ID Card)
        • The Name shown in Meta Account Profile should 100% identical to the Legal Name shown in your Legal official documentation which you are going to upload.
        • If the Name you used in your existing Facebook Personal Page is a Alias or nickname, and you don’t want to show the Legal Name in this Facebook Personal Page, you should consider to create a new Facebook Personal Page (i.e. a New Meta Account) which can show the Legal Name.
        • The Profile picture shown in your existing Facebook Personal Page should be clear enough to the level that the Meta AI Algorithm can match the Profile picture with the image the Legal Document that you are going to upload.
      2. You have the Root Access of the email address that you used to register your Facebook Personal Page
      3. You have turned ON the 2FA function in your Facebook Personal Page. For details , please refer to article How to Enable 2FA in Facebook Personal Account

      When you should Confirm Identity

      1. Newly create a Facebook Personal Page
      2. Before becoming an Admin role with Full Control in Meta Business Suite1
      3. Create a Meta For Developer Account
      4. Every time after your account is locked and you have unlocked your account.

      Step by Step – Confirm Identity in Facebook Personal Page

      1. login www.facebook.com
      2. Identity Confirmation
      3. Identity confirmation
      4. Confirm your identity
      5. Get started
      6. Choose reason = Protect your account
      7. Upload your ID > Next
      1. Browse Photos > Next
      1. Choose type of ID to upload
      2. National ID card2
      3. Upload3Photo Requirements
        • Show all 4 corners
          • Make sure all 4 corners of the ID are visible in the photo.
        • Keep the ID flat
          • Use a flat surface to take the photo. Don’t take the photo at an angle.
        • Use a clear and focused image
          • Make sure the photo isn’t blurry, and avoid glare and shadows. Text and images on the photo must be clearly visible.
        • Use a dark background
          • White or light-colored backgrounds won’t be accepted.
        • Show all info on your ID
          • Photos that have been digitally modified to hide information won’t be accepted. You can still cover sensitive information physically, such as with stickers or tape.\
      4. Submit
      5. Finish4
      1. Wait for Review
      1. Your Identity information is Confirmed5
      1. Done

      Footnote


      1. Put it in another word, if you don’t need to become the Admin Role with Full Control in Meta Business Suite, you do not need to confirm identity. ↩︎
      2. If the confirm identity process is failed, you can try other documentation types (Passport | Driver’s license | Marriage certificate) one by one. ↩︎
      3. The information on your ID must be clearly visible in the photo, otherwise you might have to submit it again ↩︎
      4. Identity confirmation in progress. Meta usually review IDs within 48 hours. They will send you a notification when we have an update, or you can visit your identity confirmation settings. ↩︎
      5. Although it officially claimed that it should take 48 hours to process, you can check the result after 4 hours. ↩︎
    2. Employee Benefit in DDM Group

      Employee Benefit in DDM Group

      Introduction

      The principal of decising the degree of Employee Benefit (v20250110) provided to the employee in DDM Group is based on the contribution that the employee had been delivered to the Company.


      Employee Benefits

      Education


      Amazon Kindle Book Store A/c

      Amazon Kindle Book Store account is an Amazon A/c owned by DDM Group which can be regarded as a Book Library storing more than 50 purchased e-book since 2017 covering following topics:

      1. Relational Database
      2. Web Server
      3. WordPress
      4. SEO
      5. History
      6. Javascript Related
      7. Python
      8. Data Engineering
      9. Cloud Architect
      10. HTTP
      11. Graph Database
      12. Google Analytics
      13. Google Tag Manager
      14. Many others…

      Eligibility

      CapabilityEligibility
      Amazon e-Kindle Book Store A/c AccessImmedately after the onboarding procedures are completed
      Book Purchasing Request1.) One book every 3 months After probation period.

      While you (as an employee) are welcome to suggest a book purchase list , it is always recommended (as an employee) to read the books already on-shelf. While the existing books may not be the latest or updated one, you can always find the added-value of the latest technology by looking back to the history and development curve of this particular technology, due to the fact that the latest technology is always invented to solve the problems found in the previous version. Being familiar with both previous and latest technology version are imperative.

      As a virtuous citizen in DDM Group, please get use of the scarce resource by fully reading and comprehending the book as much as you can after you have purchased it book.

      If you are not sure whether the book is suitable for you, please download the sample book before you submit a book purchasing request.

      Rules of purchasing

      1. All books , no matter related to your professional or not, are welcome
      2. Maximum USD$70 per book.1
      3. Only the Book in Amazn e-Kindle version (i.e. physical paperback will not be considered)
      4. Kindly remind that do not read the book during office hours, unless othewised instructed.
      5. Do NOT purchase directly in Amazon Book Store by yourself. Always raise the request and let the account owner do the purchase for you.

      Online Course Certificate

      Nowsaday there are infinity number of online course published by renowned educational institutions are free of charge. In fact, anyone can learn any knowledge with very little or even no cost.

      There are some international online course published by accredited top-tier educational institution in the world, which are free of charge but still maintain its standand and quality as below:

      1. Edx
      2. Coursera
      3. AWS Skill Builder
      4. Neo4j Courses
      5. SEMRush Free online marketing courses
      6. Google Skillshop
      7. Meta Blueprint
      8. Many others.

      In fact , as long as you try to search in Google, you can find a myraid of free online courses for you to study. Only the sky is your limit.

      While we are not going to sponsor you for any paid online courses, the attendance or completion of the free online courses is one of the imperative factors of your career promotion or salary adjustment opportunity during the appraisal.

      However, if there is a strong reason you should seat into a paid online courses or public examation, for example, AWS Certified Cloud Partitioner, you can submit a sponsorship request and we will consider the level of sponsorship based on the following criteria:

      1. Past contribution you delivered to DDM Group
      2. Employement Period in DDM Group
      3. How the Certicate faciliates you to contribute to DDM Group after you have acquired the desgination.

      Again, please understand that in DDM Group the Certificate or designation is always prioritised below the actual capability that you can utilized in your daily tasks.


      Equipment and Infrastructure

      In order to facilitate you with a well-equipped and safety environment to perform your daily task, you can raise a suggestion if you need any kinds of sponsorship in following items:

      1. Internet Data Plan
      2. Microphone or Headset
      3. Keyword or Mouse
      4. Video Camera
      5. Router
      6. Electricity Power Bank
      7. Laptop
      8. Mobile Phone
      9. WiFi Amplifier
      10. SaaS
      11. Medical Support (employees and his/her financial dependent)

      Following factors affecting the sponsorship level of the items:

      1. Employment Period in DDM Group
      2. Past Contribution delivered to DDM Group
      3. Urgency
      4. Necessity 
      5. Return on Investment
      6. Frequency of Sponsorship request
      7. Financial Conditionl of DDM Group

      Sponsorship Type

      Sponsorship TypeDescription
      Full SponsorshipUnconditional full sponsorship pay upfront (or by instalment , if applicable)
      Partial SponsorshipUnconditional partial sponsorship pay upfront (or by instalment, if applicable)
      Fully Finance Pay Back1.) Finance upfront.
      2.) Contra off financed amount via future salary
      Fully Finance Work Back1.) Finance upfront
      2.) Settle the financed amount later on via over time work or any other kinds of mutually agreed contribution.
      Conditional Fully Sponsorship1.) Sponsorship pay upfront
      2.) Contra off the sponsored amount via future salary if the employee contract is terminated (no matter intentionally or unintentionally)

      These sponsorship shall be interpreted and enforced by DDM Group, which holds the final decision-making authority.

      How to apply the sponsorship

      Send an Email to your immedate supervisor and elaborate the reasons with following aspects:

      1. What item you request to sponsor
        • Item specification
        • Item Market Price (with reference)
      2. Suggested Sponsorship
        • Sponsorship Type
        • Sponsorship Amount
        • Payment Terms
      3. Reasons justifying your Request2
      4. When you can submit the justification or documentation after your purchase.

      As a virtuous citizen in DDM Group, please always understand the resource is scarce .You should always present documentation or justification after spending the sponsorship amount. Any abuse or misuse of the sponsorship amount will be regarded as a breach of agreement and may result in disciplinary action, including the termination of the sponsorship or employment contract and the requirement to repay the misused funds.


      Footnotes

      1. Books price exceed USD$70 is subject to further approval. ↩︎
      2. You can refer to the direction found in session Following factors affecting the sponsorship level of the items ↩︎
    3. Anti-Virus Software Installation

      Anti-Virus Software Installation

      Introduction

      The objective of installing anti-virus software on employee laptops is to ensure the security and integrity of company data and systems. By providing comprehensive protection against malware, viruses, and other malicious threats, anti-virus software helps prevent data breaches, system disruptions, and unauthorized access.

      Avast Anti-Virus

      Avast Anti-Virus is a comprehensive security solution designed to protect your devices from various online threats. We will adapt Avast in our Anti-Virus Software installation procedure.


      What Problem Pattern a Anti-Virus Software Solves

      1. Core Shields: Provides real-time protection against viruses, malware, and adware.
      2. Smart Scan: Scans your device for vulnerabilities, hidden threats, and suspicious files.
      3. CyberCapture: Automatically sends suspicious files to the cloud for analysis and provides a cure if needed.
      4. Behavior Shield: Alerts you if any of your apps start behaving suspiciously.
      5. File Shield: Scans files for threats when they are added or opened.
      6. Wi-Fi Network Security: Helps protect your home Wi-Fi network from intruders.
      7. Web Shield: Blocks malicious websites and phishing attempts.
      8. Automatic Updates: Keeps your virus definitions and software up to date

      Step By Step – Avast Installation

      If you have already installed any anti-virus software in your laptop, you can skip this step.


      1. Download
      2. Free download
      3. Avast Installer
      1. Install
      2. Continue 
      3. CONTINUE WITH FREE
      4. RUN FRIST SCAN

      Step By Step – Avast Configuration


      RUN SMART SCAN

      1. Avast > Status
      2. RUN SMART SCAN
      3. This computer is protected

      Virus Scans

      1. Avast > Protection
      2. Virus Scans
      3. Full Virus Scan1
      4. Scan history2
      5. Files tested / files infected → 3
      6. RESOLVE ALL
      7. DONE

      Core Shields

      1. Avast > Protection
      2. Core Shields
      PropertyDefault Value
      File ShieldEnabled
      Behavior ShieldEnabled
      Wed ShieldEnabled
      Mail ShieldEnabled

      Firewall

      1. Avast > Protection
      2. Firewall > ACTIVE
      3. Check and block any suspicious running program.4

      Network Inspector

      1. Avast > Protection
      2. Network Inspector
      3. <<Connected_Network>>5
      4. SCAN THIS NETWORK
      5. Raise out to your I.T Department if there is any issue found.
        • Example of issue in below:
      Network IssueSolution
      Weak WI-FI PasswordChange to a strong WI-FI Password
      Example of Network Issue

      Footnotes

      1. While the full scan takes time to run, you can leave the scanning in backend and carry out another task. ↩︎
      2. Go to tab “Scan History” after the Full Scan is completed. ↩︎
      3. Press “→” only if at least 1 file is infected. ↩︎
      4. If you have no idea about what program is suspicious, please cap screen and send to your I.T department. ↩︎
      5. You only need to scan the connected network. i.e. You DO NOT need to scan all the networks which can be detected by your device. ↩︎
    4. Non-Disclosure Agreement for Employee in DDM Group

      Non-Disclosure Agreement for Employee in DDM Group

      This Non-Disclosure Agreement (the “Agreement”) , version v20250108, is made and entered into as of the Submission Date of the Form, by and between Diamond Digital Marketing Group (“Disclosing Party”), and the Employee (“Receiving Party”).


      1. Definition of Confidential Information

      For purposes of this Agreement, “Confidential Information” includes all information or material that has or could have commercial value or other utility in the business in which Disclosing Party is engaged. Confidential Information also includes all information of which unauthorized disclosure could be detrimental to the interests of Disclosing Party, or its clients, vendors, or associated organization or individual, whether or not such information is identified as Confidential Information by Disclosing Party.

      2. Exclusions from Confidential Information

      Receiving Party’s obligations under this Agreement do not extend to information that is:

      • Publicly known at the time of disclosure or becomes publicly known through no fault of the Receiving Party;
      • Discovered or created by the Receiving Party before disclosure by Disclosing Party;
      • Learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party’s representatives; or
      • Disclosed by Receiving Party with Disclosing Party’s prior written approval.

      3. Obligations of Receiving Party

      Receiving Party shall hold and maintain the Confidential Information in strictest confidence for the sole and exclusive benefit of the Disclosing Party. Receiving Party shall carefully restrict access to Confidential Information to employees, contractors, and third parties as is reasonably required and shall require those persons to sign non-disclosure restrictions at least as protective as those in this Agreement. Receiving Party shall not, without the prior written approval of Disclosing Party, use for Receiving Party’s own benefit, publish, copy, or otherwise disclose to others, or permit the use by others for their benefit or to the detriment of Disclosing Party, any Confidential Information.

      4. Time Periods

      The nondisclosure provisions of this Agreement shall survive the termination of this Agreement and Receiving Party’s duty to hold Confidential Information in confidence shall remain in effect until the Confidential Information no longer qualifies as confidential or until Disclosing Party sends Receiving Party written notice releasing Receiving Party from this Agreement, whichever occurs first. These obligations extend even after the employee’s contract has ended, ensuring that the protection of Confidential Information continues beyond the duration of employment.

      6. Severability

      If a court finds any provision of this Agreement invalid or unenforceable, the remainder of this Agreement shall be interpreted so as best to effect the intent of the parties.

      7. Integration

      This Agreement expresses the complete understanding of the parties with respect to the subject matter and supersedes all prior proposals, agreements, representations, and understandings. This Agreement may not be amended except in writing signed by both parties.

      8. Waiver

      The failure to exercise any right provided in this Agreement shall not be a waiver of prior or subsequent rights.

      9. Mutual Agreement

      Both parties hereby agree to the terms and conditions outlined in this Agreement.



    5. Employees Code of Conduct in DDM Group

      Employees Code of Conduct in DDM Group

      Introduction

      At DDM Group, we are committed to maintaining the highest standards of integrity, professionalism, and ethical behavior in all of our business activities. Our Code of Conduct serves as a guide for all employees, outlining the principles and values that underpin our corporate culture and decision-making processes. By adhering to these guidelines, we ensure a respectful, fair, and compliant work environment that fosters trust and collaboration. This Code of Conduct (v20250108) applies to all employees, contractors, and stakeholders, and we expect everyone to embrace and uphold these standards in their daily actions and interactions.


      No Part-Time or Double Job During Office Hours

      Employees are expected to dedicate their full attention and effort to their responsibilities and duties during office hours. To ensure optimal performance and commitment, employees are not permitted to engage in part-time or double jobs during their designated working hours with the company. This policy is in place to prevent conflicts of interest, minimize distractions, and maintain a high level of productivity and focus within our organization.

      Any employee found to be working another job during office hours will be subject to disciplinary action, up to and including termination of employment. We encourage employees to discuss any potential conflicts with their manager and to seek approval before taking on additional employment outside of regular working hours.


      Non-Disclosure Agreement (NDA) Requirement

      We recognize the importance of safeguarding our confidential and proprietary information. To ensure the protection of sensitive data and maintain the integrity of the business operations of both DDM Group and our clients, all employees are required to sign a Non-Disclosure Agreement (NDA) upon commencement of their employment. This agreement outlines the obligations of employees to maintain the confidentiality of all information obtained during their tenure with the company. Employees must not disclose, share, or use any confidential information for personal gain or for the benefit of any third party, both during and after their employment with DDM Group. Compliance with this policy is mandatory, and any breach of the NDA will result in disciplinary action, up to and including termination of employment.


      Use of Generative AI Tools for Creativity

      We acknowledge the potential of generative AI tools to enhance creativity, productivity, and innovation within our organization. However, it is imperative to use these tools responsibly and ethically. The following guidelines are established to ensure proper use of generative AI tools:

      1. Accuracy and Verification: Employees must verify the accuracy of the content generated by AI tools and ensure it aligns with our company’s standards and values. Any factual information must be cross-checked for correctness.
      2. Originality and Plagiarism: Content generated by AI tools should be original and not infringe on the intellectual property rights of others. Employees must avoid plagiarism by ensuring proper attribution and avoiding the use of copyrighted material without permission.
      3. Transparency: Employees should be transparent about the use of AI tools in their work. This includes disclosing when AI-generated content is used and clearly distinguishing it from human-generated content.
      4. Ethical Use: AI tools should be used ethically and responsibly. Employees must avoid using AI tools to create or disseminate harmful, misleading, or inappropriate content.
      5. Human Oversight: Generative AI tools should complement, not replace, human judgment and creativity. Employees are responsible for reviewing and refining AI-generated content to ensure it meets quality standards and aligns with the company’s objectives.
      6. Compliance with Policies: The use of AI tools must comply with all applicable company policies, industry regulations, and legal requirements.

      Allowed Generative AI Used Cased

      1. Generative AI Is requested to apply as per Instruction
      2. Grammatical correction or rephrasing sentence / paragraph written or edited by human.
      3. Graphical Processing.
      4. Reference , Idea and directional framework of the Task.
      5. Query on the answer of anything.

      Prohibited Generative AI Used Case

      1. Comment after reading.
      2. Generative AI is explicitly prohibited as per instruction.
      3. Diretly copy and paste the answer directly from the Generative AI tools in no-brain and without any human comprehension or human modification.
      4. Task explicitly mentioned to use human creativity

      Failure to adhere to these guidelines may result in disciplinary action. By following these principles, we can leverage the capabilities of generative AI tools while maintaining the integrity and ethical standards of our organization.


      Code of Conduct for Remote Work

      We are committed to maintaining high standards of professionalism, productivity, and ethical behavior, even when working remotely. The following guidelines are designed to ensure a seamless and effective remote working environment for all employees.

      1. Punctuality and Attendance: Employees are expected to adhere to their scheduled working hours and be available during core business hours. They should attend virtual meetings and appointments on time, and promptly inform their managers of any deviations from their work schedule.

      Examples of scenario that should report to their supervisors

      1. Personal illness or injury.
      2. Medical appointment.
      3. Family emergency.
      4. Home emergency.
      5. Religious observances.
      6. Working equipments out of orders / being stolen / being damaged.
      7. Electricity outrage
      8. Internet connection inavailability
      9. Ad-hoc personal leave
      10. Public holidays of your country.

      Employees are required to promptly report to their supervisors in the event of any unforeseen circumstances that prevent them from fulfilling their work duties. In case anyone did not inform his/her supervisor in advance, and did not show up within 2 hours after his/her supervisor contacted him/her, a hearing session will be provided to him/her for self-dense afterwards. If the employee fails to provide strong reasons for their absence, the penalty may include disciplinary action, up to and including termination of the employment contract.


      1. Integrity: Employees must demonstrate integrity in all their remote work activities. This includes being honest about their work hours, accurately reporting their progress, and delivering high-quality work. Any form of dishonesty or unethical behavior is strictly prohibited.
      2. Professional Conduct: Employees should maintain the same level of professionalism as they would in the office. This includes dressing appropriately for video calls, using professional language, and treating colleagues with respect.
      3. Communication: Clear and consistent communication is crucial in a remote work setting. Employees should regularly check in with their managers, respond promptly to messages and emails, and participate actively in virtual meetings.
      4. Data Security: Employees must ensure the security of company data while working remotely. This includes using secure networks, encrypting sensitive information, and adhering to all company data protection policies.
      5. Work Environment: Employees should set up a dedicated, comfortable, and distraction-free workspace to facilitate productivity. They should ensure that their work environment complies with health and safety regulations.
      6. Accountability: Employees are responsible for managing their time effectively and meeting performance expectations. They should use productivity tools and techniques to stay organized and focused on their tasks.
      7. Work-Life Balance: While working from home offers flexibility, employees should establish clear boundaries between work and personal life to maintain a healthy balance. Taking regular breaks of reasonable duration and adhering to set working hours is encouraged and allowed. This approach helps prevent burnout, promotes mental well-being, and ensures that employees remain productive and focused during their working hours. It is important for employees to manage their time effectively and avoid letting work encroach on their personal life. Employees should also communicate with their supervisor to ensure alignment on work schedules and expectations.

      Conclusion

      The Code of Conduct at DDM Group embodies the values and principles that guide our actions and decisions. By adhering to these standards, we foster a respectful, ethical, and productive work environment. Each employee’s commitment to these guidelines is essential to maintaining the trust and integrity of our organization. We encourage all employees to uphold these standards in their daily interactions and to seek guidance when needed. Together, we can create a positive and supportive workplace that reflects our shared dedication to excellence and ethical behavior.



    6. VPN Installation

      VPN Installation

      Definition

      VPN

      A VPN (Virtual Private Network) is a technology that creates a secure and encrypted connection over a less secure network, such as the internet. VPNs are commonly used to protect privacy, ensure online security, and access restricted content.

      Imagine two fortified castles, each representing a VPS, located in different kingdoms. These castles are well-guarded and full of valuable treasures (your data). To communicate securely and share their treasures, they build a secret underground tunnel that spans the distance between them. This tunnel is heavily fortified, ensuring that no one outside the castles can detect its existence or tamper with the messages being passed through.

      The VPN acts as this hidden, secure tunnel, allowing the two castles (VPSs) to exchange information safely and privately, away from the prying eyes of bandits (hackers) and enemy spies (cyber threats). Inside the tunnel, the messages travel swiftly and securely, ensuring that the valuable data remains protected during the journey between the two fortresses.

      VPN Installer

      In normal daily conversation, the VPN is most likely referring to the VPN Installer – A Software or APP which you can install into your laptop or Mobile device such that you connect to the VPN Service Provider. Therefore, VPN Installer or VPN is used interchangeably, even though there are actually referring to different underlying objects.


      What Problem Patterns a VPN Solves

      Geo-Restrictions and Censorship


      Limitation of VPN


      Step By Step Guidelne – VPN Installation

      Windows

      Mac

      Android/iOS


      Step By Step Guideline – VPN Application


    Diamond Digital Marketing Group