Your SlideShare is downloading. ×
0
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Cybercrime law legality report
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cybercrime law legality report

231

Published on

legality

legality

Published in: Social Media
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
231
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
29
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. LAW LAW
  • 2. PHILIPPINE SETTINGS
  • 3. CYBERCRIME TYPES OF CYBER CRIME PENALTIES  Illegal access  Unauthorized access  (imprisonment of six (without right) to a computer system or application. years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred
  • 4.  Illegal interception Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system.  (imprisonment of six years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred
  • 5.  Data Interference Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses.  SAME AS ABOVE
  • 6.  System Interference Unauthorized hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, and including the introduction or transmission of viruses.  SAME AS ABOVE
  • 7.  Misuse of devices The unauthorized use, possession, production, sale, procurement, importation, distribution, or otherwise making available, of devices, computer program designed or adapted for the purpose of committing any of the offenses stated in Republic Act 10175.Unauthorized use of computer password  same as above except fine should be no more than Five hundred thousand pesos (P500,000).
  • 8.  Cyber-squatting Acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same. This includes those existing trademark at the time of registration; names of persons other than the registrant; and acquired with intellectual property interests in it.  SAME AS ABOVE
  • 9.  Computer-related Fraud Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.  same as above Provided, That if no damage has yet been caused, the penalty imposed shall be one (1) degree lower.
  • 10.  Computer-related Identity Theft Unauthorized acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical.  SAME AS ABOVE
  • 11.  Cybersex Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex.  . For as long it is not done for favor or consideration, I don’t think it will be covered. However, if one party (in a couple or relationship) sues claiming to be forced to do cybersex, then it can be covered.  PENALTY  (imprisonment of six years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) but not exceeding One million pesos (P1,000,000) or BOTH.
  • 12.  Child Pornography Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the AntiChild Pornography Act of 2009, committed through a computer system.  imposed shall be one (1) degree higher than that provided for in Republic Act 9775, if committed through a computer system.
  • 13. CYBERCRIME LAW UNITED STATES SETTINGS
  • 14. CYBERCRIMES  4. Online Gambling  5. Intellectual property crimes such as theft of computer source code, software piracy, copyright infringement, trademark violations  6. Harassments such as cyber stalking, cyber defamation, indecent and abusing mails
  • 15. CYBERCRIMES  7. Cyber frauds such as forgery of documents including currency and any other documents  8. Launching of virus, worms and Trojans  9. Denial-of-service attacks  10. Cyber attacks and cyber terrorism
  • 16. CYBERCRIMES  11. Economic espionage  12. Consumer harassment and consumer protection  13. Privacy of citizens  14. Sale of illegal articles such as narcotics, weapons, wildlife, etc
  • 17. Cyber crimes that can generally occur within organizations are as follows;  E-mail abuse  2. Spam mails  3. Cyber defamation  4. Theft of source code  5. Exchange of business secrets and documents
  • 18. CYBERCRIMES  6. Insider attacks on personal database  7. Use of office computer for running other business  8. Transmission and viewing of pornographic materials  9. External cyber attacks on an organization resulting in denial-of-service  10. Information espionage

×