How we work
Our aim is to deliver the facts with precision and context. We believe in getting not only both sides, but “all” sides. The best stories are multi-sourced. Facts are thoroughly checked. Issues are balanced with diverse views and sources.
Working with sources
Anonymous sources are a last resort. In the public interest, however, anonymous sourcing can be a vital tool to exposing hidden truths while protecting those who may be harmed for reporting them.
The use of anonymous or confidential sources in a story must be approved by the Editor. Reporters must be able to characterize the source’s accessibility to the information and the source’s credibility, and will be expected to disclose the source’s identity to editors.
Care should be taken when using terms with sources such as “off the record,” “not for attribution” and “background.” Different people can have different understandings of these terms. Reporters should be specific with sources, and they should clearly explain how the source believes the information will be characterized.
Weight should be given to whether the source’s information could or should be substantiated by other sources. We will ask ourselves whether the source’s information serves a personal agenda that is above the greater public interest.
When an anonymous source is used, a reason should be cited in the story for protecting the source’s identity (fear of job loss, fear for safety, etc.).
Anonymous sourcing used in narrative projects must be based on interviews with multiple sources with direct knowledge of the details.
Relationships with sources are important and we will try to avoid phrasing that could identify a confidential source. Our reporters and editors should reach understandings with sources about who and how many people will have knowledge of the disclosed confidential information.
An agreement to protect a source creates an agreement with both the reporter and the source. This agreement should be based on the understanding that the source is honest and trusted at the time of disclosure of the respective information. We will tell the source that if he/she is dishonest with us, the promise of identity protection will be negated.
The words of our sources and the people we cover must never be altered. Quote marks are intended to bracket the true voices and exact words of people.
If a reporter or editor is concerned that ungrammatical or badly worded quotes may expose the source to embarrassment or ridicule they can paraphrase the source.
Plagiarism and originality
Attribution is crucial and proper credit is necessary if we can’t independently verify the information. Copying any content from another source without attribution is unacceptable.
As soon as we discover that a writer is not honest, skilled, savvy or energetic enough to do the work he has agreed to do, we will immediately end our working relationship with them and reserve the right to not pay them for this “work”. Information, quotes or text from another publication must be attributed.
The presentation of bylines, taglines and datelines should accurately disclose the author and the origin of reporting.
Bylines convey who is the main responsible for writing and reporting. The dateline should accurately reflect where most of the reporting originated and where the reporter physically gathered the information.
In some cases, taglines or bylines may indicate whether the lead writer compiled reporting that originated elsewhere.
Photographs shall not be altered, only traditional adjustments such as cropping, burning, contrast and saturation adjustments are acceptable.
A photograph used for illustration purposes should be obvious as such to the reader. Readers should understand that we may be arranging portraits for interpretive photography.
Photo captions must explain the picture’s context.
Approval of composite images should come from a consensus of parties, including design and graphics editors and the respective editor. If there is concern from any of the team members regarding the content of a composite image, it may be reasonable to find another visual solution.
The origin of the photo should be labeled as provided by staff, freelancers or marketing sources.
Third party content review
Our stories will not be shown to people outside the newsroom prior to publication. It is occasionally allowed for a source to review portions of stories for accuracy. These exceptions should be approved by the editor.
We have to avoid the perceptions that any portion of a story does not reflect the truth accurately.
Fictional or composite characters may only be used as a literary tool, as for example in satire, and in consultation with the editor.
With approval from the editor a fictional name, or pseudonym, can be used to describe a real person when public identification could bring harm to that person. Our readers should be informed either in the story or an editor’s note about the application of fictional names or pseudonyms.
We allow news subjects time to respond and react to issues, events and allegations against them and we should try everything possible to reach them. We should accurately characterize their response or lack of response. We will not describe anyone as refusing to return our phone calls if he or she had too little time to respond. We describe how we tried to reach the subjects of stories.
We avoid profanity and obscenity.
However, occasionally graphic or language is essential to the context of a story. The editor or must approve such use of language.
Conflict of interest
If and when an editorial employee or a freelancer has a personal connection to a story or potential story that connection should be disclosed to the respective editor.
Editorial team members should not engage in activities that, either openly or discreetly, bring advantages or special favors to themselves, their families or friends.
Editorial team members should avoid conducting activities that could create the appearance of a conflict of interest such as financial gains by utilizing information gathered, either themselves or their friends or family members. Editorial team members shall not engage in business transactions they cover.
Benefiting from influence
Working for southeastasiaglobe.com can not be used to request a special price, preferential treatment or any other benefits, even such as seating at a restaurant or hotel rooms, events or discounts for any services.
If a conflict arises regarding a discount involving an industry covered by a reporter, an editor or the management team should be consulted.
Receiving gifts or services
Journalists should not accept gifts from news sources or newsmakers.
Hotel vouchers, discounted or free travel, meals, entertainment or any products offered to the company as a whole can only be accepted if done via commercial deals such as barter agreements. The company may then distribute such offerings to the team as incentives but no journalist can at any time accept such offers for her or his personal use. If offered such gifts, editorial employees must politely decline. If employees receive unsolicited gifts they must be handed to the respective management team member.
This does not include press materials that a journalist or reviewer receives and that are required for the reporting of a story – for example books. Once reviewed, these will become the property of the publisher.
Media events at various attractions, including theme parks and other recreational and entertainment venues, are off limits. Media event coverage should not be used as an opportunity for family outings.
Fact checking Policy
We expect our reporters and editors to be precise with words, headlines, and website URLs. They understand that the written words must be highly trustworthy and act responsibly and must verify the information they gather, including names and positions and factual statements and accounts. Our reporters and editors conduct their own fact checking using their own judgment based on our ethical standards.
Mistakes happen. How we deal with errors in our journalism is important to maintaining our integrity and your and our sources’ trust. When publishing an error, we will correct it.
Please email firstname.lastname@example.org to alert our team of any mistakes. Factual errors will be corrected, and we will mention the correction at the bottom of the article.
As an author – if in doubt about whether a correction or clarification is needed, it is generally best to consult with an editor. The information in a correction should be verified by the reporter, photographer or editor who made the error prior to publication.
What, why and how we treat your personal data
We, the Operators of this Website, provide it as a public service to our users.
We are committed to protecting the privacy needs of children. We do not intentionally collect information from minors, and we do not target this website or any of its contents to children.
Links to third party websites
Types of information we collect
Non-personal information is data about usage and service operation that is not directly associated with a specific personal identity. We may collect and analyze non-personal (anonymised) information to evaluate how visitors use our websites.
We may gather aggregate information, which refers to information your computer automatically provides to us and that cannot be tied back to you as a specific individual. Examples include referral data (the web sites you visited just before and just after our site), the pages that were viewed, time spent at our website, and Internet Protocol (IP) addresses. For example, when you request a page from one of our sites, our servers log your IP address to create aggregate reports on user demographics and traffic patterns and for purposes of system administration.
Every time you request or download a file from this website, we may store data about these events and your IP address in a log file. We may use this information to analyze trends, administer the web site, track users’ movements, and gather broad demographic information for aggregate use or for other business purposes.
Our site may use a feature of your browser to set a “cookie” on your computer. Cookies are small packets of information that a website stores on your computer. Our website can then read the cookies whenever you visit southeastasiaglobe.com.
Most browser software can be set up to deal with cookies. You may modify your browser preferences to provide you with choices relating to cookies. You have the choice to accept all cookies, to be notified when a cookie is set or to reject all cookies. If you choose to reject cookies, some of the functions and conveniences of our web site may not work properly, and you may be unable to use some of our services that require registration in order to participate; or you will have to re-register or login each time you visit our site. Most browsers offer instructions on how to reset the browser to reject cookies in the “Help” section of the toolbar. We will not link non-personal information from cookies to personally identifiable information without your permission.
Our site may use web beacons to collect non-personal information about your use of our website and the websites of selected partners, your use of special promotions or newsletters, and other activities. The information collected by web beacons allows us to statistically monitor how many people are using our website or our partners’ and sponsors’ sites; how many people open our emails; and for what purposes these actions are being taken. Our web beacons are not used to track your activity outside of our website or those of our partners. We do not link non-personal information from beacons to personally identifiable information without your permission.
Personal information is associated with your name or personal identity. We use such information to better understand your needs and interests and to provide you with better services and tailored information. On some of the our web pages, you may be able to request information, subscribe to mailing lists, participate in online discussions, collaborate on documents, provide feedback, submit information into registries, register for events, apply for membership, or join committees or working groups. The types of personal information you provide to us on these pages may include name, address, phone number, e-mail address, user IDs, passwords, billing information, or credit card and other payment information.
Information you provide on our membership applications is used to create a member profile, and some information may be shared withing other of our representatives and organizations. For example, payment information will be shared with our accounting department. Member user names may be provided to other members to encourage and facilitate collaboration, research, and the free exchange of information among our members. We prohibit members from using member contact information to send unsolicited commercial correspondence. Members may be automatically added to our mailing lists. From time to time, member information may be shared with event organizers and/or other organizations that provide additional benefits to our members. By providing us with your personal information on the membership application, you expressly consent to our storing, processing, and distributing your information for these purposes.
How we use your data
We may use non-personal data that is aggregated for reporting about our website usability, performance, and effectiveness. It may be used to improve the experience, usability, and content of the site.
We may use personal information to provide services that support the activities of our members and their collaboration on journalism or journalism-related projects. When accessing our members-only pages, your personal user information may be tracked in order to support collaboration, ensure authorized access, and enable communication between our members.
Credit card information may be collected to facilitate membership applications and to becoming a member; if you purchase a product or service from our website, such information will not be kept longer than necessary for providing the services requested. Credit card numbers are used only for processing payment and are not used for any other purposes. Payment processing services may be provided by a third-party payment service, and an external management company may provide support for our financial activities. We may share your personal information with our partners only to facilitate these transactions.
Length of use / storage of your data
We only use and store your data for the length of your membership, or until you explicitly ask us to not use your data anymore.
We do not sell, rent, or lease any individual’s personal information or lists of email addresses to anyone for marketing purposes, and we take all commercially reasonable steps to maintain the security of this information. However, we reserve the right to supply any such information to any organization into which we as a commercial organization may merge in the future, or to which we may make any transfer in order to enable a third party to continue part or all of our mission. However, such mission must be related to publishing and to the original cause to which you have signed up.
We may maintain publicly accessible archives for the majority of our activities. For example, posting an email to any of our public mail lists or participating in one of our discussion and pitch forums, subscribing to one of our newsletters or registering for one of our public meetings may result in your email address becoming part of the publicly accessible archives.
On some sites, anonymous users are allowed to post content and/or participate in forum discussions. In such a case, since no user name can be associated with such a user, the IP address number of a user is used as an identifier. When posting content or messages to our websites anonymously, your IP address may be revealed to the public.
If you are a registered member of one of our websites or email lists, you should be aware that some items of your personal information may be visible to other members and to the public. Our member databases may retain information about your name, e-mail address, company affiliation (if an organizational member), and such other personal address and identifying data as you choose to supply to us. That data may be visible to other members or to the public. Your name, e-mail address, and other information you may supply also may be associated in some of our publicly accessible records withing various committees, working groups, and similar activities that you join and which are part of our mission, in various places, including: (i) the permanently-posted attendance and membership records of those activities; (ii) documents generated by the activity, which may be permanently archived either by us or by others; and, (iii) along with message content, in the permanent archives of our e-mail lists, which also may be public.
Please remember that any information (including personal information) that you disclose in public areas of our web site, such as forums, message boards, and news groups, becomes public information that others may collect, circulate, and use. Because we cannot and do not control the acts of others, you should exercise caution when deciding to disclose information about yourself or others in public forums.
The EU’s Data Protection Regulation (GDPR)
The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA). It also addresses the export of personal data outside the EU and EEA areas. The GDPR came into effect on 25 May 2018.
The GDPR aims primarily to give control to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. The regulation applies to an enterprise located anywhere that is processing the personal information of data subjects inside the EEA.
In accordance with this regulation, we have put in place appropriate technical and organisational measures to implement the data protection principles. Business processes that handle your personal data are designed and built with consideration of stringent data protection principles, provide safeguards to protect data and use the highest-possible privacy settings by default, so that your data is not available publicly without your explicit, informed consent. No personal data may be processed unless we have received an unambiguous and individualized affirmation of consent from our users or members. You have the right to revoke such consent at any time.
You have the right to request a copy of the data collected in a common format, and the right to have your data erased under certain circumstances.
We agree to report any data breaches within 72 hours if they have an adverse effect on user privacy.
If you do not want your personal information collected and used by the publisher, please do not visit our website or apply for membership of any of our websites or email lists.
Access to and accuracy of member data
We are committed to keeping the personal information of our members accurate. All the information you have submitted to us can be verified and changed. In order to do this, please email us a request. We are working on providing members with online access to their own personal profiles, enabling them to update or delete information at any time. To protect your privacy and security, we also may take reasonable steps to verify identity, such as a user ID and password, before granting access to modify personal profile data. Certain areas of our websites may limit access to specific individuals through the use of passwords or other personal identifiers.
We make every effort to protect personal information by users of our websites, including using firewalls and other security measures on our servers. No server, however, is 100% secure, and you should take this into account when submitting personal or confidential information about yourself on any web site. Much of the personal information is used in conjunction with member services such as collaboration and discussion, so some types of personal information such as your name, company affiliation, and email address will be visible to other members and possibly to the public. We assume no liability for the interception, alteration, or misuse of the information you provide. You alone are responsible for maintaining the secrecy of your personal information. Please use care when you access this web site and provide personal information.
From time to time we may email you electronic newsletters, announcements, surveys or other information. If you prefer not to receive any or all of these communications, you may opt out by following the directions provided within the electronic newsletters and announcements.