This document provides an overview of the legal framework for cybercrime investigation in the Philippines. It discusses international treaties like the Budapest Convention, as well as domestic laws such as the E-Commerce Law, Data Privacy Act, and Cybercrime Prevention Act. The Cybercrime Prevention Act defines cybercrime offenses and corresponding penalties. It grants investigation powers to the NBI and PNP, including collecting traffic data with a court order. The Rules on Digital Evidence and Rules on Cybercrime Warrants provide the legal standards for obtaining various warrants needed in cybercrime cases, such as preservation orders and warrants to disclose computer data.
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
This presentation was made by Zahid Jamil on 7th Sept 2007 which highlighted important issues regarding the new cyber Crime Bill which is soon to be made into a law. http://dbtb.org
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
The research paper attempts to provide a definition on cyber-crimes and has also identified few types of cyber-crimes that have been internationally recognized.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
What are the offences that are considered to be cyber-offences under the Sri Lankan law?
What would be the consequences, if a person commits such cyber-crime in Sri Lanka? In order
to find the answers for the above questions, one need to analyse the provisions of the Sri
Lankan legislative enactments which provides for the identification and prevention of cyber
crimes and the provisions which provide the investigation procedure to be adapted in tracing
the criminals. The law governing the cyber-crimes is mainly found in the Computer Crimes Act
No.24 of 2007 (CCA) while few other legislative enactments such A provide for the
identification of various other offences. With regard to admissibility of computer evidence,
Evidence (Special Provision) Ordinance and Electronic Transaction Act No.19 of 2006 (ETA)
provide the requirements that need to be established before the courts in order for the
evidence to be accepted as relevant.
Cyber
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
When compared with certain other jurisdictions, Sri Lankan legal framework on cyber-crimes is much effective. Yet, there is much potential for it to develop into a more effective legal framework. The chapter suggested certain measures that can be implemented to national level as well as in international level to provide for the irregularities that exist in system while giving examples from few main jurisdictions. Legal measures in order to identify existing and new offences, to provide interpretations for undefined yet commonly used terms and measures to implement lenient measures in relation to admissibility of computer evidence were suggested while social measures to increase public awareness and IT literacy and measures to provide required training expertise to investigators were also suggested. Base of ICT Law is technology. Therefore, answers to certain irregularities could also be found through technology. Thus, technical measures such as implementing national encryption policy and monitoring and surveillance system were recommended. Recommendations were proposed for the international community on how to enhance mutual legal assistance and on empowering international criminal justice system on cyber-crimes.
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
The slide set gives a brief idea as to what is computer crime,types of computer crimes, Existing Legal Framework on Computer Crimes in Sri Lanka, Effectiveness of the current legal framework and also provides few recommendations for further advancement in law.
You can access the video in the second page via the following link:
https://www.youtube.com/watch?v=JDRIGOJk0D4&t=7s
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Important section of IT Act 2000 & IPC sections related to cyber law. these will help each one of us and give us details about these which are very important in our life.
Data Privacy- Security of Sensitive Personal InformationJDP Consulting
Data Privacy Law applies to Government Agencies, particularly for the security of sensitive personal information.
Summary:
1) Data Privacy Law applies to Government Offices.
2) Heads of Agencies are the ones primarily responsible for compliance.
3) Security clearance is required for Government Employees who are accessing sensitive personal information.
4) A request approved by the Head of the Agency is required prior to transportation or access off-site of sensitive personal information.
5) NPC registration is required for Government Contractors for contracts involving access or requiring senstive personal information from at least 1,000 individuals.
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
This presentation was made by Zahid Jamil on 7th Sept 2007 which highlighted important issues regarding the new cyber Crime Bill which is soon to be made into a law. http://dbtb.org
Cyber Crimes: The Transformation of Crime in the Information AgeVishni Ganepola
The research paper attempts to provide a definition on cyber-crimes and has also identified few types of cyber-crimes that have been internationally recognized.
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
What are the offences that are considered to be cyber-offences under the Sri Lankan law?
What would be the consequences, if a person commits such cyber-crime in Sri Lanka? In order
to find the answers for the above questions, one need to analyse the provisions of the Sri
Lankan legislative enactments which provides for the identification and prevention of cyber
crimes and the provisions which provide the investigation procedure to be adapted in tracing
the criminals. The law governing the cyber-crimes is mainly found in the Computer Crimes Act
No.24 of 2007 (CCA) while few other legislative enactments such A provide for the
identification of various other offences. With regard to admissibility of computer evidence,
Evidence (Special Provision) Ordinance and Electronic Transaction Act No.19 of 2006 (ETA)
provide the requirements that need to be established before the courts in order for the
evidence to be accepted as relevant.
Cyber
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
When compared with certain other jurisdictions, Sri Lankan legal framework on cyber-crimes is much effective. Yet, there is much potential for it to develop into a more effective legal framework. The chapter suggested certain measures that can be implemented to national level as well as in international level to provide for the irregularities that exist in system while giving examples from few main jurisdictions. Legal measures in order to identify existing and new offences, to provide interpretations for undefined yet commonly used terms and measures to implement lenient measures in relation to admissibility of computer evidence were suggested while social measures to increase public awareness and IT literacy and measures to provide required training expertise to investigators were also suggested. Base of ICT Law is technology. Therefore, answers to certain irregularities could also be found through technology. Thus, technical measures such as implementing national encryption policy and monitoring and surveillance system were recommended. Recommendations were proposed for the international community on how to enhance mutual legal assistance and on empowering international criminal justice system on cyber-crimes.
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
The slide set gives a brief idea as to what is computer crime,types of computer crimes, Existing Legal Framework on Computer Crimes in Sri Lanka, Effectiveness of the current legal framework and also provides few recommendations for further advancement in law.
You can access the video in the second page via the following link:
https://www.youtube.com/watch?v=JDRIGOJk0D4&t=7s
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
Important section of IT Act 2000 & IPC sections related to cyber law. these will help each one of us and give us details about these which are very important in our life.
Data Privacy- Security of Sensitive Personal InformationJDP Consulting
Data Privacy Law applies to Government Agencies, particularly for the security of sensitive personal information.
Summary:
1) Data Privacy Law applies to Government Offices.
2) Heads of Agencies are the ones primarily responsible for compliance.
3) Security clearance is required for Government Employees who are accessing sensitive personal information.
4) A request approved by the Head of the Agency is required prior to transportation or access off-site of sensitive personal information.
5) NPC registration is required for Government Contractors for contracts involving access or requiring senstive personal information from at least 1,000 individuals.
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
The Ashley Madison Hack and the data dump that followed didn’t just fuel the gossip mill – they raised complicated moral and legal questions in both the criminal and civil law arenas.
What are the legal implications for a company who gets hacked? What are the legal implications for those who did the hacking?
What legal recourse do Ashley Madison users have?
I download this from downloaded from the Communication and Information Technology Commision (CITC) Website - http://www.citc.gov.sa/English/Pages/default.aspx
UNOFFICIAL TRANSLATION
Law on Combating Cybercrime in the Kingdom of Bahrain
On information technology crimes
We are Hamad bin Isa Al Khalifa, King of the Kingdom of Bahrain.
After reviewing the Constitution,
The Penal Code promulgated by Legislative Decree No. 15 of 1976 and its
amendments,
And Decree-Law No. (17) of 1976 regarding Juveniles, amended by Legislative
Decree No. (23) of 2013,
And Decree-Law No. 4 of 2001 on the Prohibition and Combating of Money
Laundering and its amendments,
And Decree-Law No. (28) of 2002 on electronic transactions and its
amendments,
And the Code of Criminal Procedure promulgated by Legislative Decree No. 46 of
2002 and its amendments,
And Decree-Law No. (47) of 2002 regarding the organization of the press,
printing and publishing,
And the Telecommunications Law promulgated by Legislative Decree No. 48 of
2002,
Law No. (19) of 2004 approving the accession of the Kingdom of Bahrain to the
Optional Protocols to the Convention on the Rights of the Child on the
involvement of children in armed conflict and on the sale of children, child
prostitution and child pornography,
Law No. (22) for the year 2006 regarding the protection of copyright and related
rights and its amendments,
Law No. (58) for the year 2006 regarding the protection of society from terrorist
acts and amended by Legislative Decree No. (20) of 2013,
Law No. 64 of 2006 promulgating the Central Bank of Bahrain Law and financial
institutions,
The Shura Council and the Council of Representatives approved the following
law, which we have ratified and issued:
Introductory chapter
Article (1)
In the application of the provisions of this Law, the following words and
expressions shall have the meanings assigned to each of them unless the context
otherwise requires.
Information technology : includes all forms of technology used to create, process,
store, share, use and display information in various formats.
Information : All that can be stored, processed, generated and transmitted using
IT means, in particular, writing, still images, mobile, sound, numbers, letters,
symbols, signs, etc.
Means any electronic, magnetic, optical, electrochemical, or any instrument that
integrates communication, computing or any other device that has the ability to
receive, transmit, process, store and retrieve data very quickly.
IT system : A related or related tool or set of tools, one or more of which
automatically processes the IT data in accordance with a software program.
IT data : representation of facts, facts, information, or concepts in an appropriate
form that allows the IT system to process them.
Program : A set of instructions expressed in words, symbols, methods or
otherwise, if included in any of the machine-readable media, is capable of making
an IT tool perform a particular work or produce a specific result.
Service Provider, any of the following:
A) a.
ASHWINI KUMAR UPADHYAY v/s Union of India.pptxshweeta209
transfer of the P.I.L filed by lawyer Ashwini Kumar Upadhyay in Delhi High Court to Supreme Court.
on the issue of UNIFORM MARRIAGE AGE of men and women.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxOmGod1
Victims of crime have a range of rights designed to ensure their protection, support, and participation in the justice system. These rights include the right to be treated with dignity and respect, the right to be informed about the progress of their case, and the right to be heard during legal proceedings. Victims are entitled to protection from intimidation and harm, access to support services such as counseling and medical care, and the right to restitution from the offender. Additionally, many jurisdictions provide victims with the right to participate in parole hearings and the right to privacy to protect their personal information from public disclosure. These rights aim to acknowledge the impact of crime on victims and to provide them with the necessary resources and involvement in the judicial process.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Debt Mapping Camp bebas riba to know how much our debt
Chapter 3 legal framework of cybercrime and law enforcement tools
1. Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
Chapter 3: Legal Framework of Cybercrime and Law Enforcement tools
Lesson 1: Legal Framework of Cybercrime
At the end of this lesson the students will be able to:
1. Explain the international and local legal framework of cybercrime; and
2. Describe the relationship pf cybercrime laws to human rights.
Budapest Convention
The Convention is the first international treaty on crimes committed via the Internet and
other computer networks, dealing particularly with infringements of copyright, computer-related
fraud, child pornography and violations of network security. It also contains a series of powers
and procedures such as the search of computer networks and interception.
Its main objective, set out in the preamble, is to pursue a common criminal policy aimed
at the protection of society against cybercrime, especially by adopting appropriate legislation and
fostering international co-operation.
E-Commerce Law or RA 8792
The objectives of E-Commerce Law were to facilitate domestic and international transactions,
contracts and exchanges and storage of information through the utilization of electronic, optical
and similar medium, mode, instrumentality and technology to recognize the authenticity and
reliability of electronic documents related to such activities and to promote the universal use of
electronic transaction in the government and general public (Section 3, RA 8792).
Data Privacy Act of 2012 or RA 10173
1. It applies to processing of personal information (section 3g) and sensitive personal
information (Section 3L).
2. Created the National Privacy Commission to monitor the implementation of this law.
(section 7)
3. Gave parameters on when and on what premise can data processing of personal
information be allowed. Its basic premise is when a data subject has given direct consent.
(section 12 and 13)
4. Companies who subcontract processing of personal information to 3rd party shall have full
liability and can’t pass the accountability of such responsibility. (section 14) 5. Data subject
has the right to know if their personal information is being processed. The person can
demand information such as the source of info, how their personal information is being used,
and copy of their information. One has the right to request removal and
2. Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
destruction of one’s personal data unless there is a legal obligation that required for it to
be kept or processed. (Section 16 and 18)
6. If the data subject has already passed away or became incapacitated (for one reason or
another), their legal assignee or lawful heirs may invoke their data privacy rights. (Section
17)
7. Personal information controllers must ensure security measures are in place to protect the
personal information they process and be compliant with the requirements of this law.
(Section 20 and 21)
8. In case a personal information controller systems or data got compromised, they must
notify the affected data subjects and the National Privacy Commission. (Section 20) 9. Heads
of government agencies must ensure their system compliance to this law (including security
requirements). Personnel can only access sensitive personal information off-site, limited to
1000 records, in government systems with proper authority and in a secured manner. (Section
22)
10. Government contractors who have existing or future deals with the government that
involves accessing of 1000 or more records of individuals should register their personal
information processing system with the National Privacy Commission. (Section 25)
11. Provided penalties (up to 5 million as per sec. 33) on the processing of personal
information and sensitive personal information based on the following acts:
• Unauthorized processing (sec. 25)
• Negligence (sec. 26)
• Improper disposal (sec. 27)
• Unauthorized purposes (sec. 28)
• Unauthorized access or intentional breach (sec. 29)
• Concealment of security breaches (sec. 30)
• Malicious (sec. 31) and unauthorized disclosure (sec. 32)
If at least 100 persons are harmed, the maximum penalty shall apply (section 35).
12. For public officers (working in government), an accessory penalty consisting in the
disqualification to occupy public office for a term double the term of criminal penalty
imposed shall he applied. (sec. 36)
Feedback:
1. What have you realized after studying the lesson?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
2. Were you able to achieve the preset learning objectives? If no, please consult your
instructor.
3. Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
Reference/s:
Budapest Convention
RA 8792
RA 10173
Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
Lesson 2: Salient Features of Cybercrime Prevention Act of 2012
At the end of this lesson the students will be able to:
1. Categorize the elements of cybercrime offenses;
2. Distinguish the punishable acts and penalties under cybercrime act; and 3. Identify
the competent authorities who has the jurisdiction over cybercrime offenses.
Cybercrime Prevention Act of 2012 or RA 10175
SECTION 4 CYBERCRIME OFFENSES
a. Offenses against the confidentiality, integrity and availability of computer data and
systems
1. Illegal access – the access to the whole or any part of a computer system without right
2. Illegal interception – the interception made by technical means without right of any
public transmission of computer data to, from or within a computer system including
electromagnetic emissions from a computer system carrying such computer data. 3. Data
Interference – the intentional or reckless alteration, damaging, deletion or deterioration of
computer data, electronic document, or electronic data message, without right including
the introduction or transmission of viruses.
4. System Interference – the intentional alteration or reckless hindering or interference
with the functioning of the computer or computer network by inputting, transmitting,
damaging, deleting, deteriorating, altering or suppressing computer data or program,
electronic document, or electronic data message, without right or authority, including the
introduction or transmission of viruses.
5. Misuse of Devices
i. The use, production, sale, procurement, importation, distribution, or otherwise
making available without right of:
4. aa. A device, including a computer program designed or adapted primarily
for the purpose of committing any of the offenses under this Act, or
bb. A computer password, access code or similar data by which the whole or
any part of the computer system is capable of being accessed with intent
that it be used for the purpose of committing any of the offenses under
this Act.
ii. The possession of an item referred to 5(1)(aa) or (bb) above with intent to use said
devices for the purpose of committing any of the offenses in this Act.
6. Cyber Squatting – the acquisition of a domain name over the internet in bad faith to
profit, mislead, destroy reputation and deprive others from registering the same, if such a
domain name is:
Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
i. Similar, identical or confusingly similar to an existing trademark registered with the
appropriate government agency at the time of the domain name registration.
ii. Identical or any way similar with the name of a person other than the registrant, in
case of a personal name, and
iii. Acquired without right or with intellectual property interests in it
b. Computer-related offenses
1. Computer-related forgery
i. The input, alteration or deletion of any computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic regardless whether or not the data is directly
readable and intelligible; or
ii. The act of knowingly using computer data which is the product of computer related
forgery as defined herein, for the purpose of perpetuating a fraudulent or
dishonest design.
2. Computer-related Fraud – the unauthorized input, alteration, or deletion of computer
data or program or interference in the functioning of a computer system, causing
damage thereby with fraudulent intent: Provided, that if no damage has yet been
caused, the penalty imposable shall be one (1) degree lower
3. Computer-related Identity Theft – The intentional acquisition, use, misuse, transfer,
possession, alteration, or deletion of identifying information belonging to another,
whether natural or juridical, without right: Provided, that if no damage has yet been
caused, the penalty imposable shall be one (1) degree lower.
c. Content-related Offenses:
5. 1. Cybersex- The wilful engagement, maintenance, control, or operation, directly or
indirectly, or any lascivious exhibition of sexual organs or sexual activity, with the aid
of a computer system, for favour or consideration.
2. Child Pornography – The unlawful or prohibited acts defined and punishable by RA
9775 or the Anti-Child Pornography Act of 2009, committed through a computer
system: Provided, that the penalty to be imposed shall be (1) one degree higher than
that provided for in RA 9775
3. Unsolicited Commercial Communications- The transmission of commercial electronic
communication with the use of computer system which seek to advertise, sell, or offer
for sale products and services are prohibited unless:
i. There is prior affirmative consent from the recipient; or
Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
ii. The primary intent of the communication is for service and/or administrative
announcements from the sender to its existing users, subscribers or customers;
or
iii. The following conditions are present:
aa. The commercial electronic communication contain a simple, valid, and
reliable way for the recipient to reject, receipt of further commercial
electronic messages (opt-out) from the same source:
bb. The CEC does not purposely disguise the source of the electronic
message; and
cc. The CEC does not purposely include misleading information in any part
of the message in order to induce the recipients to read the message
4. Libel – The unlawful or prohibited acts of libel as defined in Article 355 of the Revised
Penal Code, as amended, committed through a computer system or any other similar
means which may be devised in the future. (Art 355 is about Libel by means of
writing or similar means)
SECTION 5 OTHER OFFENSES – The following acts shall also constitute an offense:
a. Aiding or abetting in the Commission of Cybercrime – Any person who wilfully abets or
aids in the commission of any of the offenses enumerated in this Act shall be held liable. b.
Attempt in the Commission of Cybercrime – Any person who wilfully attempts to commit
any of the offenses enumerated in this Act shall be held liable
SECTION 6. All crimes defined and penalized by the RPC, as amended, and special laws, if
committed by, through and with the use of information and communications technologies shall be
covered by the relevant provisions of this Act: Provided, that the penalty to be imposed shall be
one (1) degree higher than that provided for by the RPC, and special laws, as the case may be.
Sec. 8 PENALTIES
6. Sec. 4 (a),
(b)
Cybercrime Offense
Offenses against
confidentiality, integrity and
availability of computer data
& systems
Computer-related offenses
Penalty/Fines
- Prision Mayor
- Fine of at least P200,000 up to a
maximum amount commensurate
to the damage incurred, or
- Both
Sec. 4 (a)5 Misuse of Devices - Prision Mayor
- Fine of not more than P500,000,
or
- Both
Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
Sec. 4 (a)
If
committed
against
critical
infrastructure
Offenses against
confidentiality, integrity and
availability of computer data
& systems
- Reclusion temporal
- Fine of at least P500,000 up to a
maximum amount
commensurate to the damage
incurred ,
- Both
Sec. 4 (c) Cybersex - Prision Mayor
- Fine of at least P200,000 but not
exceeding P1 Million pesos, or
- Both
Sec. 4 (C )2
If
committed
through a
computer
system
Child Pornography - One (1) degree higher than that
provided for in RA 9775
Sec 4 (C ) 3 Unsolicited Commercial
Communication
- Arresto Mayor
- Fine of at least P50,000 but not
exceeding P250,000, or
- Both
Sec 5 Aiding or abetting of cybercrime
Attempt in the commission
of cybercrime
- Imprisonment of one (1) degree
lower than that of the
prescribed penalty
- Fine of at least P100,000 but not
exceeding P500,000, or
- Both
7. SEC. 10 LAW ENFORCEMENT AUTHORITIES
1. National Bureau of Investigation
2. Philippine National Police
Both shall organize a cybercrime unit or center manned by special investigators to
exclusively handle cases involving violations of this Act.
SEC. 11 DUTIES OF LAW ENFORCEMENT AUTHORITIES
1. To ensure that the technical nature of cybercrime and its prevention is given focus 2.
To submit timely and regular reports including pre-operation, post-operation and
investigation results and such other documents as may be required to the Dept of Justice
for review and monitoring
SEC. 12
3. Authorized to collect or record by technical or electronic means traffic data in real-time
associated with specified communications transmitted by means of a computer system
Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
Traffic data refer only to the communication’s origin, destination, route, time, date, size,
duration, or type of underlying service, but not content, nor identities.
All other data to be collected or seized or disclosed will require a court
warrant. SEC. 21 JURISDICTION
The Regional Trial Court shall have the jurisdiction over any violation of the provisions
of this Act. Including any violation committed by a Filipino national regardless of the place of
commission. Jurisdiction shall lie if any of the elements was committed within the Philippines or
committed with the use of any computer system wholly or partly situated in the country, or when
by such commission any damage is caused to a natural or juridical person who, at the time the
offense was committed, was in the Philippines.
Feedback:
1. What have you realized after studying the lesson?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
8. 2. Were you able to achieve the preset learning objectives? If no, please consult your
instructor.
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
Reference/s:
RA 10175
Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
Lesson 3: Law Enforcement Tools
At the end of this lesson the students will be able to:
1. Classify the cybercrime warrants provided by Cybercrime Act and Rules on Digital
Evidence; and
2. Explain the legal standard in filing cybercrime cases.
Rules on Digital Evidence
Relevant Philippine Laws
1. Republic Act No. 4200 or the Anti-Wire Tapping Law
2. Republic Act No. 8484 or Access Devices Regulation Act of 1998
3. Republic Act No. 8782 or Electronic Commerce Act of 2000
4. Republic Act No. 9208 or Anti-Trafficking in Persons Act of 2003
5. Republic Act No. 9775 or Anti-Child Pornography Act of 2009
6. Republic Act No. 9995 or Anti-Photo and Video Voyeurism Act of 2009
7. Republic Act No. 10175 or Cybercrime Prevention Act of 2012
Electronic Evidence
The “definition” in the Council of Europe Guide is: “Any information generated, stored or
transmitted in digital form that may later be needed to prove or disprove a fact disputed in legal
proceedings”
A.M. No. 01-7-01-SC or RULES ON ELECTRONIC EVIDENCE
“Electronic document” refers to information or the representation of information, data,
figures, symbols or other modes of written expression, described or however represented, by
which a right is established or an obligation extinguished, or by which a fact may be proved and
affirmed, which is received, recorded, transmitted, stored, processed, retrieved or produced
9. electronically. It includes digitally signed documents and any print-out or output, readable by
sight or other means, which accurately reflects the electronic data message or electronic
document. For purposes of these Rules, the term "electronic document" may be used
interchangeably with "electronic data message".
“Electronic data message” refers to information generated, sent, received or stored by
electronic, optical or similar means.
Rules on Cybercrime Warrants or A.M. No. 17-11-03-SC
Basis for Cybercrime Warrants
Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
Response to specific innovations introduced by RA 10175 in cybercrime prevention,
investigation, and suppression.
Cybercrime warrants
1. Preservation order – Pursuant to Section 13, Chapter IV of RA10175, the integrity of
traffic data and subscriber’s information shall be kept, retained, and preserved by a
service provider for a minimum period of six (6) months from the date of the transaction.
2. Warrant to Disclose Computer Data (WDCD) – A WDCD is an order in writing issued in
the name of the People of the Philippines, signed by a judge, upon application of law
enforcement authorities, authorizing the latter to issue an order to disclose and
accordingly, require any person or service provider to disclose or submit subscriber’s
information, traffic data, or relevant data in his/her or its possession or control.
3. Warrant to Intercept Computer Data (WICD) – A WICD is an order in writing issued in
the name of the People of the Philippines, signed by a judge, upon application of law
enforcement authorities, authorizing the latter to carry out any or all of the following
activities: (a) listening to, (b) recording, (c) monitoring, or (d) surveillance of the content
of communications, including procuring of the content of computer data, either directly
through access and use of a computer system or indirectly, through the use of electronic
eavesdropping or tapping devices, at the same time that the communication is occurring.
4. Warrant to Search, Seize, and Examine Computer Data (WSSED) – A WSSECD is an
order in writing issued in the name of the People of the Philippines, signed by a judge,
upon application of law enforcement authorities, authorizing the latter to search the
particular place for items to be seized and/or examined.
5. Warrant to Examine Computer Data – Upon acquiring possession of a computer device or
computer system via a lawful warrantless arrest, or by any other lawful method, law
enforcement authorities shall first apply for a warrant before searching the said computer
device or computer system for the purpose of obtaining for forensic examination the
computer data contained therein.
10. Legal Standard
In the issuance of a search warrant, probable cause requires such facts and circumstances
which would lead a reasonably discrete and prudent man to believe that an offense has been
committed and that the objects sought in connection with the offense are in the place sought to be
searched.
Who may file the warrant?
Law enforcement authorities as defined by CPA.
Sec. 10, CPA – Law Enforcement Authorities. – The National Bureau of
Investigation (NBI) and the Philippine National Police (PNP) shall be responsible for the
efficient and effective law enforcement of the provisions of this Act. The NBI and the
PNP
Introduction to Cybercrime Investigation
Portia R. Hermosa, RCrim
shall organize a cybercrime unit or center manned by special investigators to exclusively
handle cases involving violations of this Act.
Where to file the warrant?
Secs. 4 and/or 5:
designated cybercrime courts of the province or the city where the offense or any of its
elements has been committed, is being committed, or is about to be committed, or where any part
of the computer system used is situated, or where any of the damage caused to natural or juridical
person took place.
Section 6:
Regular or other specialized regional trial courts, as the case may be, within its territorial
jurisdiction in the places above-described.
Feedback:
1. What have you realized after studying the lesson?
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
2. Were you able to achieve the preset learning objectives? If no, please consult your
instructor.
________________________________________________________________________