SPI Final Examination: Cybercrime Law in the Philippines 2012 PDF

Summary

This SPI final exam document covers cybercrime preventions and law in the Philippines, focusing on Republic Act No. 10175 (Cybercrime Prevention Act of 2012). Key provisions, offenses, and preventative measures are detailed in the document. It outlines important legal frameworks and definitions related to cybercrime.

Full Transcript

SPI FINAL EXAMINATION CYBERCRIME LAW IN THE CYBERCRIME PREVENTIONS PHILIPPINES AND CYBERCRIME LAW Republic Act No.10175 or Cyber Crim...

SPI FINAL EXAMINATION CYBERCRIME LAW IN THE CYBERCRIME PREVENTIONS PHILIPPINES AND CYBERCRIME LAW Republic Act No.10175 or Cyber Crime PROTECT PRIVACY IN CYBERSPACE Prevention Act of 2012. - This Act was signed by the President of the ▪Do not attempt open emails that look Philippines President Benigno Aquino on suspicious or uncommon, particularly if they September 12th of 2012 relate to your email, social media, money services, or utility accounts. Delete these The key provisions of the Cybercrime messages. Prevention Act of 2012 ▪Turn on automatic updates, keep your ▪ A. Offenses against Confidentiality, computer’s operating system, and security Integrity and Availability of software up to date. computer data & systems (CIA) ▪ Illegal access / interception ▪ Be particularly cautious and openeyed if an ▪ Data / System Interference offer demands you act in real-time, sounds too ▪ Misuse of Devices smart to be true, or asks for personal ▪ Cyber-Squatting information ▪ B. Computer-related Offenses ▪“Oversharing” of social media data ends up in ▪Computer-related Identity Theft varied risks, together with home break-ins by ▪Computer-related Fraud criminals who see that you simply are on ▪Computer-related Forgery vacation. ▪ C. Content-related Offenses ▪Blocking cookies makes websites a harder time ▪ Cybersex tracking the last time you visited, what ▪ Online Child Abuse / Child Pornog username you use, and whether or not you should be signed - in. ▪ Illegal Access: Access to a computer or any application without permission. ▪Many websites are now giving you the option to use your Google login to access their site. ▪ Illegal Interception: Interception of any non- While convenient, linking accounts will public communication of computer data to, produce a lot of risks. from, or within a computer system by an unauthorized person. ▪. A firewall is also used in protecting your computer from unwanted network traffic is ▪ Data Interference: Unauthorized tampering important. with, destroying, deleting, or deteriorating computer data, electronic documents, or ▪.Use passwords eight characters or more with electronic data messages, as well as the mixed types of characters. introduction or transmission of viruses. ▪.In improving privacy, attempt employing a browser such as Tor (The Onion Router) that The key provisions of the Cybercrime routes your information processing through a Prevention Act of 2012 VPN or Virtual non-public Network. ▪ System Interference: Unauthorized IT IS THE POLICY OF THE STATE TO: interference with the operation of a computer or computer network, including the introduction or 1. Protect and safeguard the confidentiality, transmission of viruses, by inputting, integrity, and availability of data, computer and transmitting, damaging, deleting, deteriorating, communications systems, networks, and altering, or suppressing computer data or databases; and programs, electronic data messages, or by 2. Adopt mechanisms to effectively prevent and deleting, deteriorating, altering, or suppressing combat cyber offenses by facilitating their them. detection, investigation, and prosecution at both domestic and international levels. (Section 2, ▪Misuse of devices: Unauthorized use, R.A. No. 10175) possession, production, sale, procurement, importation, distribution, or otherwise making available of gadgets, computer programs, or SANTIAGO, ERYN LESLIE D. 1 other materials developed or adapted for Different Cybercrimes committing any of the acts listed in Republic Act 10175. U 1. Hacking 2. Malware ▪Cybersquatting: Acquisition of a domain 3. Piracy name in bad faith on the internet to profit, 4. Spam deceive, harm reputation, and prevent others 5. Phishing from registering it. 6. Identity Thef and Identity Fraud 7. Cyber pornography Computer related Forgery: Unauthorized 8. Copyright Infringement input, alteration, or deletion of computer data 9. Denial of Service that results in inauthentic data with the intent that it be considered or acted on for legal History of Cybercrimes: purposes as if it were authentic, regardless of whether the data is directly readable and intelligible; ▪ Computer-related Fraud: Unauthorized access to, alteration of, or deletion of computer data or programs, or interference with the operation of a computer system, with the purpose to cause damage. ▪ Computer-related Identity Theft: ▪ In the year 1820, Joseph-Marie Jacquard, a Unauthorized acquisition, use, abuse, transfer, textile manufacturer in France possession, change, or deletion of an individual’s identifying information, whether ▪ Traditional employment and livelihood were natural or legal. being threatened. ▪ Cybersex: For favor or consideration, willful ▪ Committed acts of sabotage to discourage engagement, maintenance, control, or operation, Jacquard from further use of the new directly or indirectly, of any lascivious technology. This is the first recorded presentation of sexual organs or sexual activity cybercrime. (III, S.,2011) via a computer system. ▪ Child Pornography: Unlawful or banned activities conducted through a computer system, as defined and punished by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009. ▪May 3, 1978, the Web witnessed the birth of ▪ Libel Acts of libel that are illegal or forbidden the first spam e-mail. under Article 355 of the Revised Penal Code, as amended, and are committed using a computer ▪A marketer named Gary Thuerk, from the system or any other similar means that may be Digital Equipment Corporation. created in the future ▪Introduced his message to 400 of the 2600 people on ARPAnet, the DARPA-funded spam called "The first Internet." (Quigley, R., & By. ,2010) CYBERCRIME - denotes criminal activity where a computer or a network is the source, tool, target, or crime place. (Bashar Matameh et al., n.d). It involves an Information Technology infrastructure, including illegal access, data interference, systems interference, misuse of devices, ▪In the year 1982, Rich Skrenta, an only 15- forgery, and electronic fraud. (Rouse, M. n.d). year-old student, wrote the Elk Cloner virus. SANTIAGO, 2 ERYN LESLIE D. That virus is capable of infecting the Apple II 9. Preventive measures of social engineering- computer boot sector. The process of the Elk Social engineering is concerned with a type of Cloner virus is on every 50th boot, and the virus cyberattacks where hackers focus on tricks and would display a short poem. non-tech strategies rather than using core tech The first virus to affect Apple approaches or tools to trap the users. computers.(Cluley, G., Says, D., et al., 2020) 10. Office People Having Access to Data of Top 10 challenges in cyber security faced their Organizations- Those insider threats are in 2021 underestimated they have grown up by 47 percent in the past 2 years and successfully 1. Third Parties Can Unlawfully Misuse the inviting cybercriminals to nourish their Potential of 5G Network- In 5G network the fraudulent activities well current generation uses their gadgets more efficiently. Cybercrime and Security issues in the Philippines 2. An Increasing Rate of Mobile Malware- Mobile malware is harmful software that can intentionally target the operating systems of mobiles and then, disturb their performances. 3. Artificial Intelligence: AI is Somewhere Controlling Cybersecurity Systems- In using those Artificial Intelligent tools passwords and biometric logins are modified frequently by other participants of the supply chain. 4. The Growing Popularity of IoT Devices- The usage of Internet-of-Things devices is During the pandemic, reported cybercrime cases in the trending nowadays because of their robust Philippines. reaction-time and the lesser cost they invite in processing the merits of the cloud technology. 5. Ransomware Attacks are Targeting the Critical Business Aspects- Cybercriminals send malware or other viruses to your phones or the cellular networks you use currently. 6.No Control Over Phishing and Spear- Phishing Attacks- Spear-phishing attacks is a sub-part of phishing and is its more sophisticated version. Online fraudulent send malicious emails, and they are sent to well- researched victims (such victims are analyzed Why do people commit cybercrime? well by the cyber attackers on the grounds of mental and emotional strengths). ▪curiosity 7. Growth of Hacktivism- Hacktivism is a ▪fame-seeking combination of words Hack N Activism this is ▪financial gain done with the purpose of breaking into ▪personal reasons someone’s computer and steal that information that supports political or social agendas in the INTELLECTUAL PROPERTY wrong way. ▪ Intellectual property (IP) refers to creations of 8.Dronejacking is a New Wave Disturbing the mind, such as inventions; literary and Cyber Experts- Dronejacking is a way through artistic works; designs; and symbols, names and which cybercriminals are using a toy-like drone images used in commerce. and easily taking control over personal information. ▪ IP is protected by law which enable people to earn recognition or financial benefit from what they invent or crea SANTIAGO, ERYN LESLIE D. 3 STATUTORY CLASSES OF REGISTRABLE UTILITY MODEL PATENT- NOT PROTECTED IN UTILITY MODEL LIMITATION OF PATENT LEGAL REQUIREMENTS FIRST-TO-FILE RULE DIFFERENT INTELLECTUAL PROPERTY RIGHTS WHAT KIND OF PROTECTION DOES A WHAT CAN BE PATENTED? UTILITY MODEL (UM) OFFER? WHAT ARE THE MAIN DIFFERENCES NOT PATENTED BETWEEN UM AND PATENTS? WHAT IS A UTILITY MODEL (UM)? WHAT IS AN INDUSTRIAL DESIGN? SANTIAGO, 4 ERYN LESLIE D. WHAT CONDITION MUST BE MET TO OBTAIN INDUSTRIAL DESIGN PROTECTION? SANTIAGO, ERYN LESLIE D. 5 SANTIAGO, 6 ERYN LESLIE D.

Use Quizgecko on...
Browser
Browser