SlideShare a Scribd company logo
CHALLENGES AND RISKS IN MEDIA
•PEOPLE NOWADAYS FIND MEDIA AS THE FASTEST MEANS OF
EXCHANGING NUMEROUS INFORMATION, BUT LACK TO NOTE
THE POSSIBLE HARMFUL EFFECTS OF IT. THE INTERNATIONAL
HUMAN RIGHTS LAW MANAGES TO PROVIDE SECURITY
AGAINST POSSIBLE HARMFUL ONLINE CONTENT.
THE FOLLOWING ARE RISKS RELATED TO
ONLINE CONTACT:
•MONEY THEFT/PHISHING
•COMMERCIAL FRAUD
•GROOMING
•BULLYING
•COMPUTER ADDICTION
•DIGITAL DIVIDE
MONEY THEFT/PHISHING
REFERS TO THE PROCESS OF HARVESTING BANK DETAILS, IN
PARTICULAR, PERSONAL IDENTIFICATION NUMBERS (PINS)
AND TRANSACTION AUTHENTICATION NUMBERS (TANS), WITH
THE INTENT TO RANSACK OTHER PEOPLE’S BANK ACCOUNTS.
COMMERCIAL FRAUD
HAPPENS WHEN SELLERS PRETEND TO SELL GOODS OR
SERVICES WHICH, AFTER PAYMENT, EITHER DO NOT SHOW THE
PROMISED ATTRIBUTES OR ARE NOT DELIVERED AT ALL.
GROOMING
REFERS TO PEDOPHILES USING THE INTERNET AS A MEANS TO
CONTACT CHILDREN AND YOUNG PEOPLE WHILE CONCEALING
THEIR ADULT IDENTITY.
BULLYING
VARIOUS TYPES OF BULLYING SEEM ALWAYS TO BE PART OF PEOPLE’S
LIVES. EVEN THOUGH PUBLISHINGCONTENT LIKE DEFAMATORY PICTURES CAN
BE PART OF BULLYING, THE PHENOMENONIS CHIEFLY RELATEDTO ONLINE
CONTACT.
MULTIFUNCTIONAL MOBILE PHONES ARE OFTEN USED FOR TAKING
PICTURES WITH THE INTENTIONOF BULLYING AND THEN UPLOADINGTHE
PICTURES TO THE INTERNET OR SENDING THEM VIA MULTIMEDIA MESSAGING
(MMS) TO OTHERS. ANOTHER EXAMPLE IS SENDING MESSAGES/EMAILS OF
INSULT, HUMILIATING PHOTOSAND FAKE PROFILESDELIBERATELY SHARED
ACROSS SOCIAL MEDIA.
COMPUTER ADDICTION
THE EXCESSIVE USE OF COMPUTERS TO THE EXTENT THAT IT
INTERFERES WITH DAILY LIFE.
DIGITAL DIVIDE
THE ECONOMIC INEQUALITY BETWEEN GROUPS IN TERMS OF
ACCESS TO, USE OF, OR KNOWLEDGE OF ICT.
PUNISHABLE ACTS
PHILIPPINE GOVERNMENT APPROVED THE REPUBLIC ACT
10175 ALSO KNOWN AS THE “CYBERCRIME PREVENTION ACT
OF 2012” WHICH AIMS TO ADDRESS LEGAL ISSUES
CONCERNING ONLINE INTERACTIONS AND TECHNOLOGY
RELATED CONCERNS IN THE COUNTRY.
CYBERCRIME OFFENSES
(A) OFFENSES AGAINST THE CONFIDENTIALITY, INTEGRITY, AND
AVAILABILITY OF COMPUTER
DATA AND SYSTEMS:
(1) ILLEGAL ACCESS
THE ACCESS TO THE WHOLE OR ANY PART OF A COMPUTER
SYSTEM WITHOUT RIGHT.
(2) ILLEGAL INTERCEPTION
THE INTERCEPTION MADE BY TECHNICAL MEANS WITHOUT
RIGHT OF ANY NON-PUBLIC TRANSMISSION OF COMPUTER
DATA TO, FROM, OR WITHIN A COMPUTER SYSTEM INCLUDING
ELECTROMAGNETIC EMISSIONS FROM A COMPUTER
SYSTEM CARRYING SUCH COMPUTER DATA.
(3) DATA INTERFERENCE
THE INTENTIONAL OR RECKLESS ALTERATION, DAMAGING,
DELETION OR DETERIORATION OF COMPUTER DATA,
ELECTRONIC DOCUMENT, OR ELECTRONIC DATA MESSAGE,
WITHOUT RIGHT, INCLUDING THE INTRODUCTION OR
TRANSMISSION OF VIRUSES.
(4) SYSTEM INTERFERENCE
THE INTENTIONAL ALTERATION OR RECKLESS HINDERING OR
INTERFERENCE WITH THE FUNCTIONING OF A COMPUTER OR
COMPUTER NETWORK BY INPUTTING, TRANSMITTING, DAMAGING,
DELETING, DETERIORATING, ALTERING OR SUPPRESSING COMPUTER
DATA OR PROGRAM, ELECTRONIC DOCUMENT, OR ELECTRONIC DATA
MESSAGE, WITHOUT RIGHT OR AUTHORITY, INCLUDING THE
INTRODUCTION OR TRANSMISSION OF VIRUSES.
(5) MISUSE OF DEVICES
THE USE, PRODUCTION, SALE, PROCUREMENT, IMPORTATION,
DISTRIBUTION, OR OTHERWISE MAKING AVAILABLE, WITHOUT
RIGHT
(6) CYBER-SQUATTING
THE ACQUISITION OF A DOMAIN NAME OVER THE
INTERNET IN BAD FAITH TO PROFIT, MISLEAD, DESTROY
REPUTATION, AND DEPRIVE OTHERS FROM REGISTERING THE
SAME.
(B) COMPUTER-RELATED OFFENSES:
(1) COMPUTER-RELATED FORGERY
THE INPUT, ALTERATION, OR DELETION OF ANY COMPUTER DATA
WITHOUT RIGHT, RESULTING IN INAUTHENTIC DATA WITH THE INTENT
THAT IT BE CONSIDERED OR ACTED UPON FOR LEGAL PURPOSES AS IF
IT WERE AUTHENTIC, REGARDLESS WHETHER OR NOT THE
DATA IS DIRECTLY READABLE AND INTELLIGIBLE
(2) COMPUTER-RELATED FRAUD
THE UNAUTHORIZED INPUT, ALTERATION, OR DELETION OF COMPUTER
DATA OR PROGRAM OR INTERFERENCE IN THE FUNCTIONING OF A
COMPUTER SYSTEM, CAUSING DAMAGE THEREBY WITH FRAUDULENT
INTENT: PROVIDED, THAT IF NO DAMAGE HAS YET BEEN CAUSED, THE
PENALTY IMPOSABLE SHALL BE ONE (1) DEGREE
LOWER.
(3) COMPUTER-RELATED IDENTITY THEFT
THE INTENTIONAL ACQUISITION, USE, MISUSE, TRANSFER,
POSSESSION, ALTERATION OR DELETION OF IDENTIFYING INFORMATION
BELONGING TO ANOTHER, WHETHER NATURAL OR JURIDICAL, WITHOUT
RIGHT: PROVIDED, THAT IF NO DAMAGE HAS YET BEEN CAUSED, THE
PENALTY IMPOSABLE SHALL BE ONE (1) DEGREE LOWER.
(C) CONTENT-RELATED OFFENSES:
(1) CYBERSEX
THE WILLFUL ENGAGEMENT, MAINTENANCE, CONTROL, OR
OPERATION, DIRECTLY OR INDIRECTLY, OF ANY LASCIVIOUS
EXHIBITION OF SEXUAL ORGANS OR SEXUAL ACTIVITY, WITH THE AID
OF A COMPUTER SYSTEM, FOR FAVOR OR CONSIDERATION.
(2) CHILD PORNOGRAPHY
THE UNLAWFUL OR PROHIBITED ACTS DEFINED AND PUNISHABLE
BY REPUBLIC ACT NO. 9775 OR THE ANTI-CHILD PORNOGRAPHY ACT
OF 2009, COMMITTED THROUGH A COMPUTER SYSTEM: PROVIDED,
THAT THE PENALTY TO BE IMPOSED SHALL BE (1) ONE DEGREE HIGHER
THAN THAT PROVIDED FOR IN REPUBLIC ACT NO. 9775.
(3) UNSOLICITED COMMERCIAL
COMMUNICATIONS
THE TRANSMISSION OF COMMERCIAL ELECTRONIC
COMMUNICATION WITH THE USE OF COMPUTER SYSTEM WHICH SEEK
TO ADVERTISE, SELL, OR OFFER FOR SALE PRODUCTS AND SERVICES
ARE PROHIBITED UNLESS: (I) THERE IS PRIOR AFFIRMATIVE CONSENT
FROM THE RECIPIENT; OR (II) THE PRIMARY INTENT OF THE
COMMUNICATION IS FOR SERVICE AND/OR ADMINISTRATIVE
ANNOUNCEMENTS FROM THE SENDER TO ITS EXISTING USERS,
SUBSCRIBERS OR CUSTOMERS.
(4) LIBEL
THE UNLAWFUL OR PROHIBITED ACTS OF LIBEL AS DEFINED IN
ARTICLE 355 OF THE REVISED PENAL CODE, AS AMENDED, COMMITTED
THROUGH A COMPUTER SYSTEM OR ANY OTHER SIMILAR MEANS
WHICH MAY BE DEVISED IN THE FUTURE.
SECTION 8 OF THE LAW TACKLES ABOUT
PENALTIES
ANY PERSON FOUND GUILTY OF ANY OF THE PUNISHABLE ACTS
ENUMERATED IN SECTIONS 4(A) AND 4(B) OF THIS ACT SHALL BE PUNISHED
WITH IMPRISONMENT OF PRISION MAYOR OR A FINE OF AT LEAST TWO
HUNDRED THOUSAND PESOS (PHP200,000.00) UP TO A MAXIMUM AMOUNT
COMMENSURATE TO THE DAMAGE INCURRED OR BOTH. ANY PERSON FOUND
GUILTY OF THE PUNISHABLE ACT UNDER SECTION 4(A)(5) SHALL BE PUNISHED
WITH IMPRISONMENT OF PRISION MAYOR OR A FINE OF NOT MORE THAN FIVE
HUNDRED THOUSAND PESOS (PHP500,000.00) OR BOTH.
THANK YOU

More Related Content

Similar to Challenges in The Virtual.pdf

Similar to Challenges in The Virtual.pdf (20)

UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
law.pptx
law.pptxlaw.pptx
law.pptx
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyber law
Cyber lawCyber law
Cyber law
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Dangers of Computer devices
Dangers of Computer devices Dangers of Computer devices
Dangers of Computer devices
 

More from AneSieras

Figurative Languages – Simile and Metaphor.pptx
Figurative Languages – Simile and Metaphor.pptxFigurative Languages – Simile and Metaphor.pptx
Figurative Languages – Simile and Metaphor.pptx
AneSieras
 
Principle of Speech Writing.pptx
Principle of Speech Writing.pptxPrinciple of Speech Writing.pptx
Principle of Speech Writing.pptx
AneSieras
 
CREATIVE WRITING (INTRODUCTION).pptx
CREATIVE WRITING (INTRODUCTION).pptxCREATIVE WRITING (INTRODUCTION).pptx
CREATIVE WRITING (INTRODUCTION).pptx
AneSieras
 
ENGLISH-PROFICIENCY-SEMINAR (1).pptx
ENGLISH-PROFICIENCY-SEMINAR (1).pptxENGLISH-PROFICIENCY-SEMINAR (1).pptx
ENGLISH-PROFICIENCY-SEMINAR (1).pptx
AneSieras
 
SPEECH_DELIVERY_pptx - Copy.pptx
SPEECH_DELIVERY_pptx - Copy.pptxSPEECH_DELIVERY_pptx - Copy.pptx
SPEECH_DELIVERY_pptx - Copy.pptx
AneSieras
 
Elements Of Drama.ppt
Elements Of Drama.pptElements Of Drama.ppt
Elements Of Drama.ppt
AneSieras
 
Understanding Intertextuality.pptx
Understanding Intertextuality.pptxUnderstanding Intertextuality.pptx
Understanding Intertextuality.pptx
AneSieras
 
scene ppt (2) (1).pptx
scene ppt (2) (1).pptxscene ppt (2) (1).pptx
scene ppt (2) (1).pptx
AneSieras
 
FICTIONAL JOURNAL.pptx
FICTIONAL JOURNAL.pptxFICTIONAL JOURNAL.pptx
FICTIONAL JOURNAL.pptx
AneSieras
 
unitii-lesson3-types of communicative strategy.pptx
unitii-lesson3-types of communicative strategy.pptxunitii-lesson3-types of communicative strategy.pptx
unitii-lesson3-types of communicative strategy.pptx
AneSieras
 
scene ppt (2).pdf
scene ppt (2).pdfscene ppt (2).pdf
scene ppt (2).pdf
AneSieras
 
MEDIA_AND_INFORMATION_LANGUAGES.pptx
MEDIA_AND_INFORMATION_LANGUAGES.pptxMEDIA_AND_INFORMATION_LANGUAGES.pptx
MEDIA_AND_INFORMATION_LANGUAGES.pptx
AneSieras
 
MEDIA_AND_INFORMATION_LANGUAGES week 6.pptx
MEDIA_AND_INFORMATION_LANGUAGES week 6.pptxMEDIA_AND_INFORMATION_LANGUAGES week 6.pptx
MEDIA_AND_INFORMATION_LANGUAGES week 6.pptx
AneSieras
 

More from AneSieras (20)

Figurative Languages – Simile and Metaphor.pptx
Figurative Languages – Simile and Metaphor.pptxFigurative Languages – Simile and Metaphor.pptx
Figurative Languages – Simile and Metaphor.pptx
 
Principle of Speech Writing.pptx
Principle of Speech Writing.pptxPrinciple of Speech Writing.pptx
Principle of Speech Writing.pptx
 
CREATIVE WRITING (INTRODUCTION).pptx
CREATIVE WRITING (INTRODUCTION).pptxCREATIVE WRITING (INTRODUCTION).pptx
CREATIVE WRITING (INTRODUCTION).pptx
 
Q2W3.pptx
Q2W3.pptxQ2W3.pptx
Q2W3.pptx
 
ENGLISH-PROFICIENCY-SEMINAR (1).pptx
ENGLISH-PROFICIENCY-SEMINAR (1).pptxENGLISH-PROFICIENCY-SEMINAR (1).pptx
ENGLISH-PROFICIENCY-SEMINAR (1).pptx
 
Q2W8a.pptx
Q2W8a.pptxQ2W8a.pptx
Q2W8a.pptx
 
Q2W5-O.pptx
Q2W5-O.pptxQ2W5-O.pptx
Q2W5-O.pptx
 
TVL MIL COT DEMO final.ppt
TVL MIL COT DEMO final.pptTVL MIL COT DEMO final.ppt
TVL MIL COT DEMO final.ppt
 
Writing one act play.pptx
Writing one act play.pptxWriting one act play.pptx
Writing one act play.pptx
 
SPEECH_DELIVERY_pptx - Copy.pptx
SPEECH_DELIVERY_pptx - Copy.pptxSPEECH_DELIVERY_pptx - Copy.pptx
SPEECH_DELIVERY_pptx - Copy.pptx
 
Writing a Craft Essay.pptx
Writing a Craft Essay.pptxWriting a Craft Essay.pptx
Writing a Craft Essay.pptx
 
STAGING_MODALITIES.pptx
STAGING_MODALITIES.pptxSTAGING_MODALITIES.pptx
STAGING_MODALITIES.pptx
 
Elements Of Drama.ppt
Elements Of Drama.pptElements Of Drama.ppt
Elements Of Drama.ppt
 
Understanding Intertextuality.pptx
Understanding Intertextuality.pptxUnderstanding Intertextuality.pptx
Understanding Intertextuality.pptx
 
scene ppt (2) (1).pptx
scene ppt (2) (1).pptxscene ppt (2) (1).pptx
scene ppt (2) (1).pptx
 
FICTIONAL JOURNAL.pptx
FICTIONAL JOURNAL.pptxFICTIONAL JOURNAL.pptx
FICTIONAL JOURNAL.pptx
 
unitii-lesson3-types of communicative strategy.pptx
unitii-lesson3-types of communicative strategy.pptxunitii-lesson3-types of communicative strategy.pptx
unitii-lesson3-types of communicative strategy.pptx
 
scene ppt (2).pdf
scene ppt (2).pdfscene ppt (2).pdf
scene ppt (2).pdf
 
MEDIA_AND_INFORMATION_LANGUAGES.pptx
MEDIA_AND_INFORMATION_LANGUAGES.pptxMEDIA_AND_INFORMATION_LANGUAGES.pptx
MEDIA_AND_INFORMATION_LANGUAGES.pptx
 
MEDIA_AND_INFORMATION_LANGUAGES week 6.pptx
MEDIA_AND_INFORMATION_LANGUAGES week 6.pptxMEDIA_AND_INFORMATION_LANGUAGES week 6.pptx
MEDIA_AND_INFORMATION_LANGUAGES week 6.pptx
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Forest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDFForest and Wildlife Resources Class 10 Free Study Material PDF
Forest and Wildlife Resources Class 10 Free Study Material PDF
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 

Challenges in The Virtual.pdf

  • 1.
  • 2. CHALLENGES AND RISKS IN MEDIA •PEOPLE NOWADAYS FIND MEDIA AS THE FASTEST MEANS OF EXCHANGING NUMEROUS INFORMATION, BUT LACK TO NOTE THE POSSIBLE HARMFUL EFFECTS OF IT. THE INTERNATIONAL HUMAN RIGHTS LAW MANAGES TO PROVIDE SECURITY AGAINST POSSIBLE HARMFUL ONLINE CONTENT.
  • 3. THE FOLLOWING ARE RISKS RELATED TO ONLINE CONTACT: •MONEY THEFT/PHISHING •COMMERCIAL FRAUD •GROOMING •BULLYING •COMPUTER ADDICTION •DIGITAL DIVIDE
  • 4. MONEY THEFT/PHISHING REFERS TO THE PROCESS OF HARVESTING BANK DETAILS, IN PARTICULAR, PERSONAL IDENTIFICATION NUMBERS (PINS) AND TRANSACTION AUTHENTICATION NUMBERS (TANS), WITH THE INTENT TO RANSACK OTHER PEOPLE’S BANK ACCOUNTS.
  • 5. COMMERCIAL FRAUD HAPPENS WHEN SELLERS PRETEND TO SELL GOODS OR SERVICES WHICH, AFTER PAYMENT, EITHER DO NOT SHOW THE PROMISED ATTRIBUTES OR ARE NOT DELIVERED AT ALL.
  • 6. GROOMING REFERS TO PEDOPHILES USING THE INTERNET AS A MEANS TO CONTACT CHILDREN AND YOUNG PEOPLE WHILE CONCEALING THEIR ADULT IDENTITY.
  • 7. BULLYING VARIOUS TYPES OF BULLYING SEEM ALWAYS TO BE PART OF PEOPLE’S LIVES. EVEN THOUGH PUBLISHINGCONTENT LIKE DEFAMATORY PICTURES CAN BE PART OF BULLYING, THE PHENOMENONIS CHIEFLY RELATEDTO ONLINE CONTACT. MULTIFUNCTIONAL MOBILE PHONES ARE OFTEN USED FOR TAKING PICTURES WITH THE INTENTIONOF BULLYING AND THEN UPLOADINGTHE PICTURES TO THE INTERNET OR SENDING THEM VIA MULTIMEDIA MESSAGING (MMS) TO OTHERS. ANOTHER EXAMPLE IS SENDING MESSAGES/EMAILS OF INSULT, HUMILIATING PHOTOSAND FAKE PROFILESDELIBERATELY SHARED ACROSS SOCIAL MEDIA.
  • 8. COMPUTER ADDICTION THE EXCESSIVE USE OF COMPUTERS TO THE EXTENT THAT IT INTERFERES WITH DAILY LIFE.
  • 9. DIGITAL DIVIDE THE ECONOMIC INEQUALITY BETWEEN GROUPS IN TERMS OF ACCESS TO, USE OF, OR KNOWLEDGE OF ICT.
  • 10. PUNISHABLE ACTS PHILIPPINE GOVERNMENT APPROVED THE REPUBLIC ACT 10175 ALSO KNOWN AS THE “CYBERCRIME PREVENTION ACT OF 2012” WHICH AIMS TO ADDRESS LEGAL ISSUES CONCERNING ONLINE INTERACTIONS AND TECHNOLOGY RELATED CONCERNS IN THE COUNTRY.
  • 11. CYBERCRIME OFFENSES (A) OFFENSES AGAINST THE CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY OF COMPUTER DATA AND SYSTEMS:
  • 12. (1) ILLEGAL ACCESS THE ACCESS TO THE WHOLE OR ANY PART OF A COMPUTER SYSTEM WITHOUT RIGHT.
  • 13. (2) ILLEGAL INTERCEPTION THE INTERCEPTION MADE BY TECHNICAL MEANS WITHOUT RIGHT OF ANY NON-PUBLIC TRANSMISSION OF COMPUTER DATA TO, FROM, OR WITHIN A COMPUTER SYSTEM INCLUDING ELECTROMAGNETIC EMISSIONS FROM A COMPUTER SYSTEM CARRYING SUCH COMPUTER DATA.
  • 14. (3) DATA INTERFERENCE THE INTENTIONAL OR RECKLESS ALTERATION, DAMAGING, DELETION OR DETERIORATION OF COMPUTER DATA, ELECTRONIC DOCUMENT, OR ELECTRONIC DATA MESSAGE, WITHOUT RIGHT, INCLUDING THE INTRODUCTION OR TRANSMISSION OF VIRUSES.
  • 15. (4) SYSTEM INTERFERENCE THE INTENTIONAL ALTERATION OR RECKLESS HINDERING OR INTERFERENCE WITH THE FUNCTIONING OF A COMPUTER OR COMPUTER NETWORK BY INPUTTING, TRANSMITTING, DAMAGING, DELETING, DETERIORATING, ALTERING OR SUPPRESSING COMPUTER DATA OR PROGRAM, ELECTRONIC DOCUMENT, OR ELECTRONIC DATA MESSAGE, WITHOUT RIGHT OR AUTHORITY, INCLUDING THE INTRODUCTION OR TRANSMISSION OF VIRUSES.
  • 16. (5) MISUSE OF DEVICES THE USE, PRODUCTION, SALE, PROCUREMENT, IMPORTATION, DISTRIBUTION, OR OTHERWISE MAKING AVAILABLE, WITHOUT RIGHT
  • 17. (6) CYBER-SQUATTING THE ACQUISITION OF A DOMAIN NAME OVER THE INTERNET IN BAD FAITH TO PROFIT, MISLEAD, DESTROY REPUTATION, AND DEPRIVE OTHERS FROM REGISTERING THE SAME.
  • 18. (B) COMPUTER-RELATED OFFENSES: (1) COMPUTER-RELATED FORGERY THE INPUT, ALTERATION, OR DELETION OF ANY COMPUTER DATA WITHOUT RIGHT, RESULTING IN INAUTHENTIC DATA WITH THE INTENT THAT IT BE CONSIDERED OR ACTED UPON FOR LEGAL PURPOSES AS IF IT WERE AUTHENTIC, REGARDLESS WHETHER OR NOT THE DATA IS DIRECTLY READABLE AND INTELLIGIBLE
  • 19. (2) COMPUTER-RELATED FRAUD THE UNAUTHORIZED INPUT, ALTERATION, OR DELETION OF COMPUTER DATA OR PROGRAM OR INTERFERENCE IN THE FUNCTIONING OF A COMPUTER SYSTEM, CAUSING DAMAGE THEREBY WITH FRAUDULENT INTENT: PROVIDED, THAT IF NO DAMAGE HAS YET BEEN CAUSED, THE PENALTY IMPOSABLE SHALL BE ONE (1) DEGREE LOWER.
  • 20. (3) COMPUTER-RELATED IDENTITY THEFT THE INTENTIONAL ACQUISITION, USE, MISUSE, TRANSFER, POSSESSION, ALTERATION OR DELETION OF IDENTIFYING INFORMATION BELONGING TO ANOTHER, WHETHER NATURAL OR JURIDICAL, WITHOUT RIGHT: PROVIDED, THAT IF NO DAMAGE HAS YET BEEN CAUSED, THE PENALTY IMPOSABLE SHALL BE ONE (1) DEGREE LOWER.
  • 22. (1) CYBERSEX THE WILLFUL ENGAGEMENT, MAINTENANCE, CONTROL, OR OPERATION, DIRECTLY OR INDIRECTLY, OF ANY LASCIVIOUS EXHIBITION OF SEXUAL ORGANS OR SEXUAL ACTIVITY, WITH THE AID OF A COMPUTER SYSTEM, FOR FAVOR OR CONSIDERATION.
  • 23. (2) CHILD PORNOGRAPHY THE UNLAWFUL OR PROHIBITED ACTS DEFINED AND PUNISHABLE BY REPUBLIC ACT NO. 9775 OR THE ANTI-CHILD PORNOGRAPHY ACT OF 2009, COMMITTED THROUGH A COMPUTER SYSTEM: PROVIDED, THAT THE PENALTY TO BE IMPOSED SHALL BE (1) ONE DEGREE HIGHER THAN THAT PROVIDED FOR IN REPUBLIC ACT NO. 9775.
  • 24. (3) UNSOLICITED COMMERCIAL COMMUNICATIONS THE TRANSMISSION OF COMMERCIAL ELECTRONIC COMMUNICATION WITH THE USE OF COMPUTER SYSTEM WHICH SEEK TO ADVERTISE, SELL, OR OFFER FOR SALE PRODUCTS AND SERVICES ARE PROHIBITED UNLESS: (I) THERE IS PRIOR AFFIRMATIVE CONSENT FROM THE RECIPIENT; OR (II) THE PRIMARY INTENT OF THE COMMUNICATION IS FOR SERVICE AND/OR ADMINISTRATIVE ANNOUNCEMENTS FROM THE SENDER TO ITS EXISTING USERS, SUBSCRIBERS OR CUSTOMERS.
  • 25. (4) LIBEL THE UNLAWFUL OR PROHIBITED ACTS OF LIBEL AS DEFINED IN ARTICLE 355 OF THE REVISED PENAL CODE, AS AMENDED, COMMITTED THROUGH A COMPUTER SYSTEM OR ANY OTHER SIMILAR MEANS WHICH MAY BE DEVISED IN THE FUTURE.
  • 26. SECTION 8 OF THE LAW TACKLES ABOUT PENALTIES ANY PERSON FOUND GUILTY OF ANY OF THE PUNISHABLE ACTS ENUMERATED IN SECTIONS 4(A) AND 4(B) OF THIS ACT SHALL BE PUNISHED WITH IMPRISONMENT OF PRISION MAYOR OR A FINE OF AT LEAST TWO HUNDRED THOUSAND PESOS (PHP200,000.00) UP TO A MAXIMUM AMOUNT COMMENSURATE TO THE DAMAGE INCURRED OR BOTH. ANY PERSON FOUND GUILTY OF THE PUNISHABLE ACT UNDER SECTION 4(A)(5) SHALL BE PUNISHED WITH IMPRISONMENT OF PRISION MAYOR OR A FINE OF NOT MORE THAN FIVE HUNDRED THOUSAND PESOS (PHP500,000.00) OR BOTH.