Podcast
Questions and Answers
According to the Cybercrime Prevention Act of 2012, which of the following is NOT included as a type of cybercrime?
According to the Cybercrime Prevention Act of 2012, which of the following is NOT included as a type of cybercrime?
- Computer-related offenses
- Content-related offenses
- Offenses against the confidentiality, integrity, and availability of computer data and systems
- Offenses related to copyright infringement (correct)
Which of the following scenarios would fall under the jurisdiction of the Cybercrime Prevention Act of 2012?
Which of the following scenarios would fall under the jurisdiction of the Cybercrime Prevention Act of 2012?
- A Filipino national commits a cybercrime in another country.
- A foreign national commits a cybercrime in the Philippines using a computer located in another country.
- A Filipino national commits a cybercrime in the Philippines but the victim resides in another country.
- All of the above. (correct)
What does CIA stand for in the context of cybercrime?
What does CIA stand for in the context of cybercrime?
- Cybersecurity, Intelligence, and Analytics
- Confidentiality, Integrity, and Availability (correct)
- Communication, Information, and Accessibility
- Communication, Integrity, and Access
Which of the following is NOT a communication technology cited in the definition of cybercrime in the Cybercrime Prevention Act of 2012?
Which of the following is NOT a communication technology cited in the definition of cybercrime in the Cybercrime Prevention Act of 2012?
According to the Cybercrime Prevention Act of 2012, a Filipino national who commits a cybercrime in another country can be charged with a violation of the Act.
According to the Cybercrime Prevention Act of 2012, a Filipino national who commits a cybercrime in another country can be charged with a violation of the Act.
Based on the text, which of the following statements is true regarding the jurisdiction of RA 10175?
Based on the text, which of the following statements is true regarding the jurisdiction of RA 10175?
What is the main purpose of the Cybercrime Prevention Act of 2012?
What is the main purpose of the Cybercrime Prevention Act of 2012?
Which of the following is an example of a computer-related offense, as defined in the Cybercrime Prevention Act of 2012?
Which of the following is an example of a computer-related offense, as defined in the Cybercrime Prevention Act of 2012?
What is the key difference between computer-related forgery and computer-related fraud, according to the text?
What is the key difference between computer-related forgery and computer-related fraud, according to the text?
Which of the following could be considered an example of computer-related forgery, as defined in the text?
Which of the following could be considered an example of computer-related forgery, as defined in the text?
What was Mike Rowe's apparent reason for giving away his website?
What was Mike Rowe's apparent reason for giving away his website?
What example is provided in the text to illustrate computer-related fraud?
What example is provided in the text to illustrate computer-related fraud?
What is the significance of the iSLU portal example in the context of the Cybercrime Prevention Act of 2012?
What is the significance of the iSLU portal example in the context of the Cybercrime Prevention Act of 2012?
What can be inferred about the potential consequences of committing computer-related fraud?
What can be inferred about the potential consequences of committing computer-related fraud?
Why is the Reddit thread mentioning Mike Rowe significant in the context of the content?
Why is the Reddit thread mentioning Mike Rowe significant in the context of the content?
Which of the following is NOT specifically mentioned as a type of computer-related offense in the Cybercrime Prevention Act of 2012?
Which of the following is NOT specifically mentioned as a type of computer-related offense in the Cybercrime Prevention Act of 2012?
Which of the following actions is NOT considered a prohibited act under the Data Privacy Act (R.A. 10173)?
Which of the following actions is NOT considered a prohibited act under the Data Privacy Act (R.A. 10173)?
What is the main characteristic of 'Improper disposal of (sensitive) personal information' as a prohibited act?
What is the main characteristic of 'Improper disposal of (sensitive) personal information' as a prohibited act?
What differentiates 'Unauthorized access or intentional breach' from 'Malicious disclosure' as prohibited acts under the Data Privacy Act?
What differentiates 'Unauthorized access or intentional breach' from 'Malicious disclosure' as prohibited acts under the Data Privacy Act?
Which of the following scenarios BEST exemplifies 'Processing of personal information and sensitive personal information for unauthorized purposes'?
Which of the following scenarios BEST exemplifies 'Processing of personal information and sensitive personal information for unauthorized purposes'?
Which of the following is NOT explicitly mentioned as a prohibited act under the Data Privacy Act (R.A. 10173) based on the provided text?
Which of the following is NOT explicitly mentioned as a prohibited act under the Data Privacy Act (R.A. 10173) based on the provided text?
Why is a handwritten signature not considered sensitive personal information?
Why is a handwritten signature not considered sensitive personal information?
Which of the following is considered personal information only when combined with other data?
Which of the following is considered personal information only when combined with other data?
What is the primary reason why birthdays are not considered sensitive personal information on their own?
What is the primary reason why birthdays are not considered sensitive personal information on their own?
When is it considered "unauthorized processing" of personal information?
When is it considered "unauthorized processing" of personal information?
Why could an IP address alone not be used to identify a person?
Why could an IP address alone not be used to identify a person?
What is the primary focus of the Data Privacy Act in relation to personal information?
What is the primary focus of the Data Privacy Act in relation to personal information?
How does the text define "sensitive personal information"?
How does the text define "sensitive personal information"?
What is considered "negligence" in accessing personal information?
What is considered "negligence" in accessing personal information?
Which of these rights does the content provided not explicitly describe?
Which of these rights does the content provided not explicitly describe?
Under what circumstances can an individual be denied the right to object to the processing of their personal data?
Under what circumstances can an individual be denied the right to object to the processing of their personal data?
Which right allows an individual to obtain a copy of their data being processed?
Which right allows an individual to obtain a copy of their data being processed?
What is the timeframe for informing an individual about the processing of their data?
What is the timeframe for informing an individual about the processing of their data?
What is the primary purpose of the right to rectification?
What is the primary purpose of the right to rectification?
In what situation does an individual have the right to withhold consent to the processing of their personal data?
In what situation does an individual have the right to withhold consent to the processing of their personal data?
What information is an individual entitled to receive when exercising their 'right to access'?
What information is an individual entitled to receive when exercising their 'right to access'?
What is the primary difference between the 'right to object' and the 'right to be informed'?
What is the primary difference between the 'right to object' and the 'right to be informed'?
What is the primary objective of the Data Privacy Act of 2012?
What is the primary objective of the Data Privacy Act of 2012?
Which of these is NOT a specific data processing activity regulated by the Data Privacy Act?
Which of these is NOT a specific data processing activity regulated by the Data Privacy Act?
Who is considered the 'Personal Information Controller' under the Data Privacy Act?
Who is considered the 'Personal Information Controller' under the Data Privacy Act?
What is the significance of 'Consent' under the Data Privacy Act?
What is the significance of 'Consent' under the Data Privacy Act?
Which scenario BEST describes a 'Breach' as defined in the Data Privacy Act?
Which scenario BEST describes a 'Breach' as defined in the Data Privacy Act?
What is the role of the 'Personal Information Processor' in the context of the Data Privacy Act?
What is the role of the 'Personal Information Processor' in the context of the Data Privacy Act?
Which of these elements must be included when obtaining consent for data processing under the Data Privacy Act?
Which of these elements must be included when obtaining consent for data processing under the Data Privacy Act?
Which statement BEST reflects the Data Privacy Act's aim regarding international standards for data protection?
Which statement BEST reflects the Data Privacy Act's aim regarding international standards for data protection?
Flashcards
Data Privacy Act
Data Privacy Act
A law protecting individual privacy while allowing data flow for innovation.
Personal Information Controller
Personal Information Controller
Entity deciding how to use personal data.
Personal Information Processor
Personal Information Processor
Individual/entity that processes data for a controller, not for their own needs.
Consent
Consent
Signup and view all the flashcards
Breach
Breach
Signup and view all the flashcards
Collection
Collection
Signup and view all the flashcards
Processing
Processing
Signup and view all the flashcards
International Standards for Data Protection
International Standards for Data Protection
Signup and view all the flashcards
Data/System Interference
Data/System Interference
Signup and view all the flashcards
MikeRoweSoft Incident
MikeRoweSoft Incident
Signup and view all the flashcards
Computer-Related Forgery
Computer-Related Forgery
Signup and view all the flashcards
Example of Forgery
Example of Forgery
Signup and view all the flashcards
Computer-Related Fraud
Computer-Related Fraud
Signup and view all the flashcards
Example of Fraud
Example of Fraud
Signup and view all the flashcards
Legal Classification
Legal Classification
Signup and view all the flashcards
Cybercrime Prevention Act of 2012
Cybercrime Prevention Act of 2012
Signup and view all the flashcards
Cybercrime
Cybercrime
Signup and view all the flashcards
CIA in Cybersecurity
CIA in Cybersecurity
Signup and view all the flashcards
Types of Cybercrimes
Types of Cybercrimes
Signup and view all the flashcards
Jurisdiction of RA 10175
Jurisdiction of RA 10175
Signup and view all the flashcards
Offenses against CIA
Offenses against CIA
Signup and view all the flashcards
Computer-related offenses
Computer-related offenses
Signup and view all the flashcards
Content-related offenses
Content-related offenses
Signup and view all the flashcards
Infringements of Copyright
Infringements of Copyright
Signup and view all the flashcards
Right to be Informed
Right to be Informed
Signup and view all the flashcards
Disclosure Timing
Disclosure Timing
Signup and view all the flashcards
Right to Object
Right to Object
Signup and view all the flashcards
Consent Withdrawal
Consent Withdrawal
Signup and view all the flashcards
Exceptions to Right to Object
Exceptions to Right to Object
Signup and view all the flashcards
Right to Access
Right to Access
Signup and view all the flashcards
Personal Information Controller (PIC)
Personal Information Controller (PIC)
Signup and view all the flashcards
Right to Rectification
Right to Rectification
Signup and view all the flashcards
Improper Disposal
Improper Disposal
Signup and view all the flashcards
Unauthorized Processing
Unauthorized Processing
Signup and view all the flashcards
Unauthorized Access
Unauthorized Access
Signup and view all the flashcards
Malicious Disclosure
Malicious Disclosure
Signup and view all the flashcards
Negligence in Data Management
Negligence in Data Management
Signup and view all the flashcards
Handwritten Signatures
Handwritten Signatures
Signup and view all the flashcards
Sensitive Personal Information
Sensitive Personal Information
Signup and view all the flashcards
Username Identification
Username Identification
Signup and view all the flashcards
IP Address Limitations
IP Address Limitations
Signup and view all the flashcards
Birthday as Personal Info
Birthday as Personal Info
Signup and view all the flashcards
Negligence in Data Access
Negligence in Data Access
Signup and view all the flashcards
Data Combination Importance
Data Combination Importance
Signup and view all the flashcards
Study Notes
Cybercrime Laws in the Philippines
- The Philippines has laws addressing cybercrime, including the Philippine E-Commerce Act of 2000 (Republic Act 8792) and the Cybercrime Prevention Act of 2012 (Republic Act 10175).
Brief Retrospective View
- The ILOVEYOU worm, created in 2000 by Onel De Guzman, caused significant damage across the globe, affecting U.S. officials and other institutions.
- This incident exposed the lack of pre-existing cybercrime laws in the Philippines.
The ILOVEYOU Worm
- Onel De Guzman created a worm that spread through email attachments.
- The worm activated a code that instructed recipients to forward the email to their contacts.
- The worm's spread significantly affected global email accounts.
- Estimated damages reached 10 billion USD.
Guide Questions
- Q 1.1: Onel De Guzman's actions were considered illegal because there were no pre-existing laws in the Philippines concerning cybercrimes at that time.
Philippine E-Commerce Act of 2000 (Republic Act 8792)
- This act recognized and regulated electronic commercial and non-commercial transactions and documents.
- The act is used in the Philippines to address harmful activities caused by individuals who misuse electronic devices.
- It also established penalties for the unlawful use of technology and internet data.
Important Provisions of R.A. 8792
- Chapter II, Section 6: Legal Recognition of Data Messages, established that data messages do not lose their validity simply because they're in electronic form .
- Chapter II, Section 7: Legal Recognition of Electronic Documents, established that electronic documents hold the same legal weight as printed documents.
Prohibited Acts: Hacking
- Hacking/Cracking involves unauthorized access, alteration, or destruction of computer systems.
- Any access done with the intention of corrupting, altering, stealing, or destroying data systems without the owner's consent is illegal.
Prohibited Acts: Piracy
- Piracy is the unauthorized copying, reproduction, storage, uploading, downloading, or broadcasting of protected material using telecommunication networks such as the internet, infringing intellectual property rights.
Penalties
- The minimum fine for cybercrimes is Php 100,000.00.
- The maximum fine is commensurate with the damage incurred.
- Mandatory imprisonment ranges from 6 months to 3 years.
Guide Questions: R.A. 8792 and R.A. 10175
- Connecting to an open WiFi network (with no password) without the owner's consent is illegal under RA 10175, even if there's no direct intent to harm.
Cybercrime Prevention Act of 2012 (R.A. 10175)
- R.A. 10175 is the comprehensive cybercrime law in the Philippines.
- The Act established sufficient powers to effectively prevent and combat cybercrime offences.
Important Definitions
- Personal Information Controller: The individual, corporation, or body deciding how personal data is handled.
- Personal Information Processor: The entity or person processing personal data for the controller.
Three Types of Cybercrimes
- Offenses Against Confidentiality, Integrity, and Availability (CIA) of computer data and systems
- Computer-related offenses
- Content-related offenses
Cybercrime Prevention Act of 2012 (R.A. 10175): Jurisdiction
- Any violation committed by a Filipino national, regardless of the place of commission, is punishable under this law.
- Criminal acts committed within or involving the Philippines using any computer system, wholly or partially situated in the country, are also punishable.
- If damage is caused to a natural or juridical person located in the Philippines due to a cybercrime, anyone responsible for the offense is liable.
Cybercrime Prevention Act of 2012 (R.A. 10175): Jurisdiction Explanation
- If a Filipino commits a crime anywhere in the world, Philippine law can pursue action against them.
- Any part of a cybercrime that takes place in the Philippines subjects it to the law and the law enforcers.
- If a person is a victim of a cybercrime within the Philippines, whoever perpetrated the crime can be held liable.
Cybercrime Prevention Act of 2012 (R.A. 10175): Illegal Access
- Unlawful access to any computer or part of a computer system is illegal without consent from the owner.
Cybercrime Prevention Act of 2012 (R.A. 10175): Data Interference
- Reckless alteration, damaging, deletion, or deterioration of data or programs is illegal.
Cybercrime Prevention Act of 2012 (R.A. 10175) :System Interference
- Reckless interference with a computer or network is illegal.
Example of Data/System Interference: Cryptojacking or Cryptomining Malware
- Software programs and malware that use a computer's resources for cryptocurrency mining without consent.
Example of Data/System Interference: Website Defacing
- Unauthorized modification of websites to include malicious content.
Cybercrime Prevention Act of 2012 (R.A. 10175): Misuse of Devices
- Unauthorized use, production, sale, procurement, distribution of devices, including passwords, for criminal purposes can result in legal action.
Example of Data/System Interference: Use of Skimming Devices/Keyloggers
- Devices used to collect personal information without consent, including credit/debit card details, passwords.
- Involving surveillance, a security breach in the process of taking people's accounts and information.
Cybercrime Prevention Act of 2012 (R.A. 10175): Cyber-Squatting
- Acquiring a domain name with bad faith to profit, mislead, or damage another's reputation.
Example of Data/System Interference: MikeRoweSoft
- Case where a student was legally challenged for using an existing trademark in his (website's domain name).
Cybercrime Prevention Act of 2012 (R.A. 10175): Computer-Related Forgery
- Creating inaccurate data in computer systems with the intent of misrepresentation.
Cybercrime Prevention Act of 2012 (R.A. 10175): Computer-Related Fraud
- Unauthorized actions affecting computer data or systems with the intent to cause a financial loss.
Example of Computer-Related Fraud
- Changing account balances or asking for prepaid loads with deceptive intent to defraud or steal money.
Cybercrime Prevention Act of 2012 (R.A. 10175): Computer-Related Identity Theft
- Acquiring or misusing another person's identifying information.
Example of Computer-Related Identity Theft
- Creating fake profiles for malicious intentions like fraud, theft, or harassment.
Cybercrime Prevention Act of 2012 (R.A. 10175): Cybersex
- Creating and/or engaging in the illegal transfer or recording of harmful/sexual activity using computer systems.
Guide Questions: R.A. 10175
- Consent-based recording of sexual activity is not considered cybersex.
- Sharing photos taken with consent does not violate the act.
Cybercrime Prevention Act of 2012 (R.A. 10175): Child Pornography
- Creating, distributing, or showcasing any content that depicts children engaging in sexual activity.
Guide Questions
- "Hentai" clips, unless explicitly featuring minors, are not considered a violation.
Cybercrime Prevention Act of 2012 (R.A. 10175): Online Libel
- Online libel involves making false, malicious statements or postings that harm another person's reputation.
Online Libel: Elements
- False accusation
- Published statement
- Specific person harmed
- Malicious intent
Guide Questions: R.A. 10175: Libel
- Liking/reacting to a post without actively making claims against a person is not a violation of online libel.
- Sharing a post that contains libel does not make the sharer liable.
- Comments such as "OO NGA!" or similar statements, without additional malicious intent, do not constitute a violation.
Data Privacy Act of 2012 (R.A. 10173)
- The act protects individuals' personal information with rules regarding collection and processing.
Important Principles
- Transparency: Data subjects have a right to understand how their data is being handled.
- Legitimate Purpose: Data collection must align with specific, explicit, and legal reasons.
- Proportionality: Data processing should be limited to essential information.
Processing Sensitive Personal Information
- Consent is needed.
- Processing is related to contract fulfillment.
- Processing supports compliance with legal obligations.
- Processing protects vital interests, such as health or safety.
Rights of the Data Subject
- Right to be informed
- Right to object
- Right to access
- Right to rectification
- Right to erasure or blocking
- Right to damages
- Right to data portability
- Right to file a complaint
Notable Cases and Questions
- Zulueta v. C.A. (1996): Highlighting that the right to privacy remains even within marriage.
- Hing v. Choachuy (2013): Surveillance cameras installed on property without consent can be considered a breach of privacy.
Reasonable Expectation of Privacy
- Situations where individuals expect their private area, like a bathroom or fitting room, or personal actions will remain private.
Punishable Acts (R.A. 9995)
- Unauthorized photographic or video recording of private areas or sexual activity.
- Copying, distribution, or publication of such recordings without consent. (Photo and Video Voyeurism Act of 2009)
Punishable Acts (R.A. 10173)
- Unauthorized processing, access, or disclosure of personal information.
- Improper storage, management or disposal of personal information.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.