SlideShare a Scribd company logo
CYBERCRIME
Presented by:
JOHN FLORENTINO E. ECHON
SIMEON S. TAGUDA
GEOFF DANIEL RODENAS
CAYECELYN TAJA
LESLIE Q. QUEVAS
JENNIFER ADAON
Bataan Peninsula State University
bpsu
OVERview
• Meaning
• Types of cybercrime
• The Global Trend
• The Trend in PH
• The Trend in PH Part 2
• Cybercrime Related Laws
• The first recorded cybercrime in the Philippines
• Law penalizing computer crimes or cybercrimes
• Convicted cybercriminal in the PH
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
Cybercrime
 A cybercrime is a crime committed with or
through the use of information and
communication technologies such as radio,
television, cellular phone, computer and
network, and other communication device or
application.
bpsu
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
CYBERCRIME
OVERVIEW
Types of cybercrime
(1)offences against the confidentiality, integrity and
availability of computer data and systems;
(2)computer-related offences;
(3)content-related offences; and
(4)offences related to infringements of copyright
and related rights.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
The global trend of cybercrime
According to Norton Cyber Crime Report, 431
million adults worldwide were victims of
cybercrimes in 2011. The top cybercrimes in 2011
were (1) computer viruses or
malware - 54% overall; (2) online Scams - 11%
overall; and (3) phishing - 10% overall.
bpsu
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
CYBERCRIME
OVERVIEW
The trend of cybercrime in the Philippines
The Anti-Transnational Crime Division
(ATCD) of the Criminal Investigation and
Detection Group (CIDG) of the Philippine
National Police (PNP) has encountered
2,778 referred cases of computer crimes
from government agencies and private
individuals nationwide from 2003 to 2012.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
The trend of cybercrime in the Philippines
In a 2010 report of the security software firm
Symantec, 87% of Filipino internet users were
identified as victims of crimes and malicious
activities committed online. The following
activities were: (1) malware (virus and Trojan)
invasion; (2) online or phishing scams; (3) sexual
predation; and (4) services in social networking
site like Facebook and Twitter.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
Cybercrime-related laws in the Philippines
 (1) RA 10175 – Cybercrime Prevention Act of 2012, which is currently suspended
due to a TRO issued by the Supreme Court;
 (2) RA 9995 - Anti-Photo and Voyeurism Act of 2009;
 (3) RA 9725 - Anti-Child Pornography Act of 2009;
 (4) RA 9208 - Anti-Trafficking in Persons Act of 2003;
 (5) RA 8792 - E-Commerce Act of 2000;
 (6) RA 8484 - Access Device Regulation Act of 1998; and
 (7) RA 4200 or Anti-Wiretapping Law.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
The first recorded cybercrime in the
Philippines
In 2000, Onel de Guzman released the “I
Love You” virus. The
case filed against De Guzman was dismissed at the
first stage because there was no law punishing the
deed as of that time in May 2000, in the Philippines.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
Law penalizing computer crimes or
cybercrimes
On 14 June 2000, RA 8792 or the Electronic
Commerce Act was signed into law. RA 8792
positioned the Philippines as the third country to
enact an e-commerce law, next to Singapore
and Malaysia.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
Convicted cybercriminal in the PH
The first one was pursued by the PNP-CIDG; a
person was convicted in September 2005 for
pleading guilty of hacking the government
portal “gov.ph” and other government websites.
Be Aware!
Thank you for listening!
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW

More Related Content

What's hot

On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
CP-Union
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
Ronnel Fernandez
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
Rochelle Nato
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
DOFJLCCDD
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Avinash
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
Can R. PAHALI
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
shiela mae dupa
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slidesguest7e2cdf
 
Digital law
Digital lawDigital law
Digital law
Alieyn_
 
Online defamation
Online defamationOnline defamation
Online defamation
Apostolos Syropoulos
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Living in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxLiving in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptx
Froilan Cantillo
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
atifkhanniazi
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
JohnArsenAsuncion
 
M1 presentation2
M1 presentation2M1 presentation2
M1 presentation2
Ciel Educttu
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
nitss007
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 

What's hot (20)

On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Online safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and EtiquetteOnline safety, Security, Ethics and Etiquette
Online safety, Security, Ethics and Etiquette
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cyber Wellness Power point slides
Cyber Wellness Power point slidesCyber Wellness Power point slides
Cyber Wellness Power point slides
 
Digital law
Digital lawDigital law
Digital law
 
Online defamation
Online defamationOnline defamation
Online defamation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Living in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptxLiving in the IT Era - Lesson 3.pptx
Living in the IT Era - Lesson 3.pptx
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
CYBERCRIME.pptx
CYBERCRIME.pptxCYBERCRIME.pptx
CYBERCRIME.pptx
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
M1 presentation2
M1 presentation2M1 presentation2
M1 presentation2
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 

Viewers also liked

RA 8049 Antihazing Law
RA 8049 Antihazing LawRA 8049 Antihazing Law
RA 8049 Antihazing Law
thecriminologist
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
RaiaR
 
Case study about voyeurism
Case study about voyeurismCase study about voyeurism
Case study about voyeurism
Neha Saleem
 
Voyeurism
VoyeurismVoyeurism
Voyeurismsdeabr2
 
Voyeurism
VoyeurismVoyeurism
Voyeurism
Humble Awan
 
Voyeurism
VoyeurismVoyeurism
Voyeurism
ramshaimran9
 
Republic act no 8049 final report
Republic act no 8049 final reportRepublic act no 8049 final report
Republic act no 8049 final reportOmar Jacalne
 
Voyeurism in music video
Voyeurism in music videoVoyeurism in music video
Voyeurism in music videofjones11
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentation
Trix Rodriguez
 
E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017
Janette Toral
 
Hazing Powerpoint
Hazing PowerpointHazing Powerpoint
Hazing Powerpointkristen
 

Viewers also liked (12)

RA 8049 Antihazing Law
RA 8049 Antihazing LawRA 8049 Antihazing Law
RA 8049 Antihazing Law
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
Case study about voyeurism
Case study about voyeurismCase study about voyeurism
Case study about voyeurism
 
Voyeurism
VoyeurismVoyeurism
Voyeurism
 
Voyeurism
VoyeurismVoyeurism
Voyeurism
 
Voyeurism
VoyeurismVoyeurism
Voyeurism
 
Republic act no 8049 final report
Republic act no 8049 final reportRepublic act no 8049 final report
Republic act no 8049 final report
 
Voyeurism in music video
Voyeurism in music videoVoyeurism in music video
Voyeurism in music video
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentation
 
Voyeurism
VoyeurismVoyeurism
Voyeurism
 
E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017
 
Hazing Powerpoint
Hazing PowerpointHazing Powerpoint
Hazing Powerpoint
 

Similar to Cybercrime

Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
mar timawa
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
008_Anuj
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
angellaclarianes1
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT SecutiryGranthamEdu
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
TeacherAnneApolinari
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Reyad Hossain
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
NIST, berhampur
 
Cyber crimes
Cyber crimesCyber crimes
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
Karnika Seth
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
Gener Luis Morada
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet yadith_
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internetryangregory55
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
ryangregory55
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Pawan Kurmi
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Gamaliel Olayiwola Fasuyi
 

Similar to Cybercrime (20)

Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT Secutiry
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Porno
PornoPorno
Porno
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 

Recently uploaded

Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
FernandoSimesBlanco1
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
BridgeWest.eu
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 

Recently uploaded (20)

Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
The Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot CitizenshipThe Main Procedures for Obtaining Cypriot Citizenship
The Main Procedures for Obtaining Cypriot Citizenship
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 

Cybercrime

  • 1. CYBERCRIME Presented by: JOHN FLORENTINO E. ECHON SIMEON S. TAGUDA GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON Bataan Peninsula State University bpsu
  • 2. OVERview • Meaning • Types of cybercrime • The Global Trend • The Trend in PH • The Trend in PH Part 2 • Cybercrime Related Laws • The first recorded cybercrime in the Philippines • Law penalizing computer crimes or cybercrimes • Convicted cybercriminal in the PH bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
  • 3. Cybercrime  A cybercrime is a crime committed with or through the use of information and communication technologies such as radio, television, cellular phone, computer and network, and other communication device or application. bpsu Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON CYBERCRIME OVERVIEW
  • 4. Types of cybercrime (1)offences against the confidentiality, integrity and availability of computer data and systems; (2)computer-related offences; (3)content-related offences; and (4)offences related to infringements of copyright and related rights. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 5. The global trend of cybercrime According to Norton Cyber Crime Report, 431 million adults worldwide were victims of cybercrimes in 2011. The top cybercrimes in 2011 were (1) computer viruses or malware - 54% overall; (2) online Scams - 11% overall; and (3) phishing - 10% overall. bpsu Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON CYBERCRIME OVERVIEW
  • 6. The trend of cybercrime in the Philippines The Anti-Transnational Crime Division (ATCD) of the Criminal Investigation and Detection Group (CIDG) of the Philippine National Police (PNP) has encountered 2,778 referred cases of computer crimes from government agencies and private individuals nationwide from 2003 to 2012. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 7. The trend of cybercrime in the Philippines In a 2010 report of the security software firm Symantec, 87% of Filipino internet users were identified as victims of crimes and malicious activities committed online. The following activities were: (1) malware (virus and Trojan) invasion; (2) online or phishing scams; (3) sexual predation; and (4) services in social networking site like Facebook and Twitter. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 8. Cybercrime-related laws in the Philippines  (1) RA 10175 – Cybercrime Prevention Act of 2012, which is currently suspended due to a TRO issued by the Supreme Court;  (2) RA 9995 - Anti-Photo and Voyeurism Act of 2009;  (3) RA 9725 - Anti-Child Pornography Act of 2009;  (4) RA 9208 - Anti-Trafficking in Persons Act of 2003;  (5) RA 8792 - E-Commerce Act of 2000;  (6) RA 8484 - Access Device Regulation Act of 1998; and  (7) RA 4200 or Anti-Wiretapping Law. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 9. The first recorded cybercrime in the Philippines In 2000, Onel de Guzman released the “I Love You” virus. The case filed against De Guzman was dismissed at the first stage because there was no law punishing the deed as of that time in May 2000, in the Philippines. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 10. Law penalizing computer crimes or cybercrimes On 14 June 2000, RA 8792 or the Electronic Commerce Act was signed into law. RA 8792 positioned the Philippines as the third country to enact an e-commerce law, next to Singapore and Malaysia. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 11. Convicted cybercriminal in the PH The first one was pursued by the PNP-CIDG; a person was convicted in September 2005 for pleading guilty of hacking the government portal “gov.ph” and other government websites. Be Aware! Thank you for listening! bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW