SlideShare a Scribd company logo
1 of 35
ISSUES
                  IN
             POLITICAL
              SCIENCE
study of government: the study of political organizations and institutions, especially governments
ISSUE #1
WHAT IS THE
ISSUE ?
Cybercrime
Prevention Act
of 2012-
RA#10175
This Act was made to prevent all
 forms of misuse, abuse, and
 illegal access of information, to
 protect and safeguard the
 integrity of computer, computer
 and             communications
 systems,       networks,     and
 databases,         and       the
 confidentiality, integrity, and
 availability of information and
WHAT MAKES IT AN
ISSUE?
Some people are
claiming that
RA#10175 violates
the freedom of
expression
(Art.III, Sec. 4)
REVIEW:
Freedom of speech and
 expression , and of the
 press, otherwise known
 as       freedom       of
 expression, implies the
 right to freely utter and
 publish whatever one
previous restraint, and to
 be protected against any
 responsibility as long as it
 does not violate the
 law, or injure someone's
 character, reputation or
 business. It also includes
 the right to circulate what
 is published.
SCOPE OF FREEDOM OF
 EXPRESSION
Free speech and free
 press, the rights of
 assembly                and
 petition, the right to form
 associations or society
 not contrary to law, and
 the right to religious
 freedom.
"Speech" and "expression"
 covers any form of oral
 utterances such as protests
 as expression of opinion
 about subjects of public
 concern. (picketing, display
 of flag, salute to the flag, or
 expression by means of
 motion picture)
The "press" covers every
 sort of publications:
 newspapers, periodicals
 , magazines, books, leafl
 ets, etc., Radio and
 television as
 instruments of mass
 comm. may also be
QUESTION:
Does
RA#10175
really violates
the freedom of
IT HAS BEEN CLEARED FROM
 THE VERY BEGINNING THAT:
The Act was made to prevent all
 forms of misuse, abuse, and illegal
 access of information, to protect
 and safeguard the integrity of
 computer, computer and
 communications
 systems, networks, and
 databases, and the
 confidentiality, integrity, and
 availability of information and data
 stored.
freedom of expression as
 long as it does not violate
 the law, or injure
 someone's
 character, reputation or
 business. Includes the
 right to circulate what is
 published.
WHAT ACTS ARE INCLUDED
IN CYBERCRIME OFFENSES?
 SOME offenses against the
  confidentiality, integrity and availability
  of computer data and systems:
(1) Illegal Access. – The access to the
  whole or any part of a computer system
  without right.
(2) Data Interference. — The intentional
  or reckless
  alteration, damaging, deletion or
  deterioration of computer
  data, electronic document, or electronic
  data message, without right, including
  the introduction or transmission of
 Misuse of Devices.
The
 use, production, sale, procurement,
  importation,    distribution,    or
 otherwise                     making
 available, without right, of:
A computer password, access
 code, or similar data by which the
 whole or any part of a computer
 system is capable of being
 accessed with intent that it be used
 for the purpose of committing any
 of the offenses under this Act.
 Cyber-squatting. – The acquisition of a
  domain name over the internet in bad
  faith   to    profit, mislead,     destroy
  reputation, and deprive others from
  registering the same
 (b) Computer-related Offenses:
Computer-related        Forgery.      —The
  input, alteration, or deletion of any
  computer data without right resulting in
  inauthentic data with the intent that it be
  considered or acted upon for legal
  purposes        as     if     it      were
  authentic, regardless whether or not the
Computer-related Fraud. — The
 unauthorized input, alteration, or
 deletion of computer data or
 program or interference in the
 functioning     of     a   computer
 system, causing damage
Computer-related Identity Theft. –
 The                      intentional
 acquisition, use, misuse, transfer, p
 ossession, alteration or deletion of
 identifying information belonging
 to another, whether natural or
 juridical, without right
 Content-related Offenses:
(1) Cybersex. — The willful
 engagement, maintenance, c
 ontrol, or operation, directly
 or     indirectly,   of   any
 lascivious     exhibition   of
 sexual organs or sexual
 activity, with the aid of a
 computer system
NOW, ARE THOSE
 OFFENSES CITED
 VIOLATE THE LAW, OR
 INJURE SOMEONE'S
 CHARACTER, REPUTAT
 ION OR BUSINESS?
Therefore, is there
 any violation made
 against the
 freedom of
 expression? YES
 or NO ? WHY ?
RA#10175 ITS EFFECT TO OUR PRESENT
  SITUATION? WHAT IT SUGGESTS?
INFORMATION AND COMMUNICATIONS
  INDUSTRIES       such   as    content
  production, telecommunications, broad
  casting electronic commerce, and data
  processing,     CONTRIBUTE IN THE
  NATION’S OVERALL SOCIAL AND
  ECONOMIC DEVELOPMENT.
 The importance of providing conducive
  environment       also helps to the
  development and acceleration of the
  state
Thank You for
cooperating : )
ISSUE #2
Thank You for
 cooperating : )

More Related Content

What's hot

Edited rape law lectures
Edited  rape law lecturesEdited  rape law lectures
Edited rape law lecturesJoyCee8
 
Sexual Harassment Myths and Facts , Dr. Sharda Jain, Lifecare Centre
Sexual Harassment Myths and Facts , Dr. Sharda Jain, Lifecare Centre Sexual Harassment Myths and Facts , Dr. Sharda Jain, Lifecare Centre
Sexual Harassment Myths and Facts , Dr. Sharda Jain, Lifecare Centre Lifecare Centre
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime actCP-Union
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final pingXFactor Umitz
 
RA 7787 - "ANTI SEXUAL HARASSMENT ACT OF 1995"
RA 7787 - "ANTI SEXUAL HARASSMENT ACT OF 1995"RA 7787 - "ANTI SEXUAL HARASSMENT ACT OF 1995"
RA 7787 - "ANTI SEXUAL HARASSMENT ACT OF 1995"Niño Zedrhic Villanueva
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Rape law lectures
 Rape law lectures Rape law lectures
Rape law lecturesJoyCee8
 
Sexual harassment
Sexual harassmentSexual harassment
Sexual harassmentMayomi Lee
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004Sharon Geroquia
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying PresentationCourtney Cole
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitationmckenln
 
Internet censorship
Internet censorshipInternet censorship
Internet censorshipmateo davis
 
Human trafficking
Human traffickingHuman trafficking
Human traffickingian amper
 

What's hot (20)

Edited rape law lectures
Edited  rape law lecturesEdited  rape law lectures
Edited rape law lectures
 
Sexual Harassment Myths and Facts , Dr. Sharda Jain, Lifecare Centre
Sexual Harassment Myths and Facts , Dr. Sharda Jain, Lifecare Centre Sexual Harassment Myths and Facts , Dr. Sharda Jain, Lifecare Centre
Sexual Harassment Myths and Facts , Dr. Sharda Jain, Lifecare Centre
 
Anti bullying
Anti bullyingAnti bullying
Anti bullying
 
On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
ra 10364 new.pptx
ra 10364 new.pptxra 10364 new.pptx
ra 10364 new.pptx
 
School Bullying
School Bullying  School Bullying
School Bullying
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final ping
 
RA 7787 - "ANTI SEXUAL HARASSMENT ACT OF 1995"
RA 7787 - "ANTI SEXUAL HARASSMENT ACT OF 1995"RA 7787 - "ANTI SEXUAL HARASSMENT ACT OF 1995"
RA 7787 - "ANTI SEXUAL HARASSMENT ACT OF 1995"
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
The Role of the Department of Education in Preventing Child Sexual Abuse
The Role of the Department of Education in Preventing Child Sexual AbuseThe Role of the Department of Education in Preventing Child Sexual Abuse
The Role of the Department of Education in Preventing Child Sexual Abuse
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Rape law lectures
 Rape law lectures Rape law lectures
Rape law lectures
 
Sexual harassment
Sexual harassmentSexual harassment
Sexual harassment
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
 
Cyber bullying Presentation
Cyber bullying PresentationCyber bullying Presentation
Cyber bullying Presentation
 
Philgov
PhilgovPhilgov
Philgov
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Confronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and ExploitationConfronting Online Child Sexual Abuse and Exploitation
Confronting Online Child Sexual Abuse and Exploitation
 
Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 

Viewers also liked (8)

Gendercide
GendercideGendercide
Gendercide
 
Denisova hominin
Denisova homininDenisova hominin
Denisova hominin
 
Gendercide
Gendercide Gendercide
Gendercide
 
Ebolusyon ng Tao
Ebolusyon ng TaoEbolusyon ng Tao
Ebolusyon ng Tao
 
Manajemen Terpadu Balita Sakit (MTBS)/ Manajemen Terpadu Bayi Muda (MTBM)
Manajemen Terpadu Balita Sakit (MTBS)/ Manajemen Terpadu Bayi Muda (MTBM)Manajemen Terpadu Balita Sakit (MTBS)/ Manajemen Terpadu Bayi Muda (MTBM)
Manajemen Terpadu Balita Sakit (MTBS)/ Manajemen Terpadu Bayi Muda (MTBM)
 
Pinagmulan ng Tao
Pinagmulan ng TaoPinagmulan ng Tao
Pinagmulan ng Tao
 
Ang Ebolusyon ng Tao
Ang Ebolusyon ng TaoAng Ebolusyon ng Tao
Ang Ebolusyon ng Tao
 
Ebolusyon ng tao
Ebolusyon ng taoEbolusyon ng tao
Ebolusyon ng tao
 

Similar to Cyber crime

Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.GissaMaeCastino
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxRomanoGabrillo1
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxBini R A
 
It legislation
It legislationIt legislation
It legislationdoogstone
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxOlusegun Mosugu
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwkamalbhatt9229
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 

Similar to Cyber crime (20)

Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
It legislation
It legislationIt legislation
It legislation
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
presentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptxpresentation_on_cyber_crimes_slides.pptx
presentation_on_cyber_crimes_slides.pptx
 
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjwppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
ppt.pptx jwjwjwjwhwjwjqhhahwhwhwjwhwjwjjwjw
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 

More from Dani Ann Eunice Vargas Espelico (11)

Temperature
TemperatureTemperature
Temperature
 
Solar system
Solar systemSolar system
Solar system
 
Rocks
RocksRocks
Rocks
 
Ocean and Seas
Ocean and SeasOcean and Seas
Ocean and Seas
 
Planets and Satellites
Planets and SatellitesPlanets and Satellites
Planets and Satellites
 
Land Subsidence
Land SubsidenceLand Subsidence
Land Subsidence
 
Diastrophism
DiastrophismDiastrophism
Diastrophism
 
Spring, Well, Caverns, and Geysers
Spring, Well, Caverns, and GeysersSpring, Well, Caverns, and Geysers
Spring, Well, Caverns, and Geysers
 
Volcano
VolcanoVolcano
Volcano
 
Water and land forms
Water and land formsWater and land forms
Water and land forms
 
Likas na yaman
Likas na yamanLikas na yaman
Likas na yaman
 

Recently uploaded

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Cyber crime

  • 1. ISSUES IN POLITICAL SCIENCE study of government: the study of political organizations and institutions, especially governments
  • 3. WHAT IS THE ISSUE ? Cybercrime Prevention Act of 2012- RA#10175
  • 4. This Act was made to prevent all forms of misuse, abuse, and illegal access of information, to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and
  • 5. WHAT MAKES IT AN ISSUE? Some people are claiming that RA#10175 violates the freedom of expression (Art.III, Sec. 4)
  • 6. REVIEW: Freedom of speech and expression , and of the press, otherwise known as freedom of expression, implies the right to freely utter and publish whatever one
  • 7. previous restraint, and to be protected against any responsibility as long as it does not violate the law, or injure someone's character, reputation or business. It also includes the right to circulate what is published.
  • 8. SCOPE OF FREEDOM OF EXPRESSION Free speech and free press, the rights of assembly and petition, the right to form associations or society not contrary to law, and the right to religious freedom.
  • 9. "Speech" and "expression" covers any form of oral utterances such as protests as expression of opinion about subjects of public concern. (picketing, display of flag, salute to the flag, or expression by means of motion picture)
  • 10. The "press" covers every sort of publications: newspapers, periodicals , magazines, books, leafl ets, etc., Radio and television as instruments of mass comm. may also be
  • 11.
  • 13. IT HAS BEEN CLEARED FROM THE VERY BEGINNING THAT: The Act was made to prevent all forms of misuse, abuse, and illegal access of information, to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored.
  • 14. freedom of expression as long as it does not violate the law, or injure someone's character, reputation or business. Includes the right to circulate what is published.
  • 15. WHAT ACTS ARE INCLUDED IN CYBERCRIME OFFENSES? SOME offenses against the confidentiality, integrity and availability of computer data and systems: (1) Illegal Access. – The access to the whole or any part of a computer system without right. (2) Data Interference. — The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of
  • 16.  Misuse of Devices. The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of: A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.
  • 17.  Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same  (b) Computer-related Offenses: Computer-related Forgery. —The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the
  • 18. Computer-related Fraud. — The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer, p ossession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right
  • 19.  Content-related Offenses: (1) Cybersex. — The willful engagement, maintenance, c ontrol, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system
  • 20. NOW, ARE THOSE OFFENSES CITED VIOLATE THE LAW, OR INJURE SOMEONE'S CHARACTER, REPUTAT ION OR BUSINESS?
  • 21. Therefore, is there any violation made against the freedom of expression? YES or NO ? WHY ?
  • 22.
  • 23. RA#10175 ITS EFFECT TO OUR PRESENT SITUATION? WHAT IT SUGGESTS? INFORMATION AND COMMUNICATIONS INDUSTRIES such as content production, telecommunications, broad casting electronic commerce, and data processing, CONTRIBUTE IN THE NATION’S OVERALL SOCIAL AND ECONOMIC DEVELOPMENT. The importance of providing conducive environment also helps to the development and acceleration of the state
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Thank You for cooperating : )