SlideShare a Scribd company logo
LAW

LAW
PHILIPPINE SETTINGS
CYBERCRIME
TYPES OF CYBER CRIME

PENALTIES

 Illegal access
 Unauthorized access

 (imprisonment of six

(without right) to a
computer system or
application.

years and 1 day up to 12
years) or a fine of at least
Two hundred thousand
pesos (P200,000) up to a
maximum amount
commensurate to the
damage incurred
 Illegal interception

Unauthorized
interception of any
non-public
transmission of
computer data to, from,
or within a computer
system.

 (imprisonment of six

years and 1 day up to 12
years) or a fine of at
least Two hundred
thousand pesos
(P200,000) up to a
maximum amount
commensurate to the
damage incurred
 Data Interference

Unauthorized alteration,
damaging, deletion or
deterioration of
computer data,
electronic document, or
electronic data message,
and including the
introduction or
transmission of viruses.

 SAME AS ABOVE
 System Interference
Unauthorized hindering or
interference with the
functioning of a computer or

computer network by inputting,
transmitting, damaging,
deleting, deteriorating, altering
or suppressing computer data
or program, electronic
document, or electronic data
messages, and including the
introduction or transmission of
viruses.

 SAME AS ABOVE
 Misuse of devices

The unauthorized use,
possession, production,
sale, procurement,
importation, distribution, or
otherwise making available,
of devices, computer
program designed or
adapted for the purpose of
committing any of the
offenses stated in Republic
Act 10175.Unauthorized use
of computer password



same as above
except fine should be
no more than Five
hundred thousand
pesos (P500,000).
 Cyber-squatting

Acquisition of domain name
over the Internet in bad faith to
profit, mislead, destroy
reputation, and deprive others
from the registering the same.
This includes those existing
trademark at the time of
registration; names of persons
other than the registrant; and
acquired with intellectual
property interests in it.

 SAME AS ABOVE
 Computer-related

Fraud

Unauthorized input,
alteration, or deletion of
computer data or
program or interference
in the functioning of a
computer system,
causing damage thereby
with fraudulent intent.

 same as above

Provided, That if no
damage has yet been
caused, the penalty
imposed shall be one (1)
degree lower.
 Computer-related

Identity Theft

Unauthorized
acquisition, use, misuse,
transfer, possession,
alteration or deletion of
identifying information
belonging to another,
whether natural or
juridical.

 SAME AS ABOVE
 Cybersex

Willful engagement,
maintenance, control, or
operation, directly or
indirectly, of any lascivious
exhibition of sexual organs or
sexual activity, with the aid of
a computer system, for favor
or consideration. There is a
discussion on this matter if it
involves “couples” or “people
in relationship” who engage in
cybersex.

 . For as long it is not done for
favor or consideration, I don’t
think it will be covered.
However, if one party (in a
couple or relationship) sues
claiming to be forced to do
cybersex, then it can be
covered.
 PENALTY
 (imprisonment of six years and
1 day up to 12 years) or a fine of
at least Two hundred thousand

pesos (P200,000) but not
exceeding One million pesos
(P1,000,000) or BOTH.
 Child Pornography

Unlawful or prohibited
acts defined and
punishable by Republic
Act No. 9775 or the AntiChild Pornography Act of
2009, committed
through a computer
system.

 imposed shall be

one (1) degree
higher than that
provided for in
Republic Act 9775,
if committed
through a
computer system.
CYBERCRIME LAW
UNITED STATES SETTINGS
CYBERCRIMES
 4. Online Gambling
 5. Intellectual property crimes such as theft of

computer source code, software piracy,
copyright infringement, trademark violations
 6. Harassments such as cyber stalking, cyber
defamation, indecent and abusing mails
CYBERCRIMES
 7. Cyber frauds such as forgery of

documents including currency and any other
documents
 8. Launching of virus, worms and Trojans
 9. Denial-of-service attacks

 10. Cyber attacks and cyber terrorism
CYBERCRIMES
 11. Economic espionage
 12. Consumer harassment and consumer

protection
 13. Privacy of citizens

 14. Sale of illegal articles such as narcotics,

weapons, wildlife, etc
Cyber crimes that can generally occur within
organizations are as follows;
 E-mail abuse
 2. Spam mails
 3. Cyber defamation
 4. Theft of source code

 5. Exchange of business secrets and documents
CYBERCRIMES
 6. Insider attacks on personal database
 7. Use of office computer for running other business
 8. Transmission and viewing of pornographic materials
 9. External cyber attacks on an organization resulting in

denial-of-service

 10. Information espionage

More Related Content

What's hot

Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornographyOmar Jacalne
 
Ra 9262
Ra 9262Ra 9262
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004Sharon Geroquia
 
Anti-Violence Against Women and Children
Anti-Violence Against Women and ChildrenAnti-Violence Against Women and Children
Anti-Violence Against Women and Children
bigkiskababaihan
 
VAWC
VAWCVAWC
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
SAMBIT SWAIN
 
6 ra 10630 amending ra 9344
6   ra 10630 amending ra 93446   ra 10630 amending ra 9344
6 ra 10630 amending ra 9344
hanahgail
 
Republic act 9262 LECTURE.ppt
Republic act 9262 LECTURE.pptRepublic act 9262 LECTURE.ppt
Republic act 9262 LECTURE.ppt
KinseSac
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
shiela mae dupa
 
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 ps
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 psModyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 ps
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 psDhon Reyes
 
R.A. 7610
R.A. 7610R.A. 7610
R.A. 7610
Jen_castle
 
Cybercrime
CybercrimeCybercrime
Cybercrime
John Ela Echon
 
Ra 7610
Ra 7610Ra 7610
Edited rape law lectures
Edited  rape law lecturesEdited  rape law lectures
Edited rape law lectures
JoyCee8
 
Philippine Cyber-Libel
Philippine Cyber-LibelPhilippine Cyber-Libel
Philippine Cyber-Libel
Lawrence Villamar
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
Ronnel Fernandez
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)
F Mad
 

What's hot (20)

Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
 
Ra 9262
Ra 9262Ra 9262
Ra 9262
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
 
Anti-Violence Against Women and Children
Anti-Violence Against Women and ChildrenAnti-Violence Against Women and Children
Anti-Violence Against Women and Children
 
VAWC
VAWCVAWC
VAWC
 
OSAEC - pptx
OSAEC - pptxOSAEC - pptx
OSAEC - pptx
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
 
6 ra 10630 amending ra 9344
6   ra 10630 amending ra 93446   ra 10630 amending ra 9344
6 ra 10630 amending ra 9344
 
Republic act 9262 LECTURE.ppt
Republic act 9262 LECTURE.pptRepublic act 9262 LECTURE.ppt
Republic act 9262 LECTURE.ppt
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 ps
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 psModyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 ps
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 ps
 
R.A. 7610
R.A. 7610R.A. 7610
R.A. 7610
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Edited rape law lectures
Edited  rape law lecturesEdited  rape law lectures
Edited rape law lectures
 
Philippine Cyber-Libel
Philippine Cyber-LibelPhilippine Cyber-Libel
Philippine Cyber-Libel
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)
 

Viewers also liked

Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
SensePost
 
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampWSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampSonnie Santos
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
Arthur Landry
 
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6sabtolinux
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
DianaVolodina
 
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre..."The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
Helen Tsipliareles-Pryor
 
Casenote Bullying
Casenote BullyingCasenote Bullying
Casenote Bullying
Thomas Müller
 
Johnson, d. preventing bullying
Johnson, d. preventing bullying Johnson, d. preventing bullying
Johnson, d. preventing bullying EDITHA HONRADEZ
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpointtorremalku
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
jaenjenny
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Winthrop Yu
 
Accomplishments
AccomplishmentsAccomplishments
Accomplishments
calldoming
 
Cyber Wellness Program for the philippines
Cyber Wellness Program  for the philippinesCyber Wellness Program  for the philippines
Cyber Wellness Program for the philippinesSonnie Santos
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)
Mark Peralta
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
Pew Research Center's Internet & American Life Project
 

Viewers also liked (20)

Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampWSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
 
Bullying and teacher practices
Bullying and teacher practicesBullying and teacher practices
Bullying and teacher practices
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre..."The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
 
Casenote Bullying
Casenote BullyingCasenote Bullying
Casenote Bullying
 
Johnson, d. preventing bullying
Johnson, d. preventing bullying Johnson, d. preventing bullying
Johnson, d. preventing bullying
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpoint
 
OSI models
OSI modelsOSI models
OSI models
 
Abstract
AbstractAbstract
Abstract
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 
Accomplishments
AccomplishmentsAccomplishments
Accomplishments
 
Cyber Wellness Program for the philippines
Cyber Wellness Program  for the philippinesCyber Wellness Program  for the philippines
Cyber Wellness Program for the philippines
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 

Similar to Cybercrime law legality report

Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
GissaMaeCastino
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
MohaiUDin
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
ishmecse13
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
MarkDennielMontiano
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
Ayesha Majid
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
Zaheer Irshad
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Paul Senthil
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
missstevenson01
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
DINESH KAMBLE
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
Dilip Prajapati
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
badangayonmgb
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
jcgevana
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
angellaclarianes1
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
mar timawa
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data Protection
LawPlus Ltd.
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
RegineManuel2
 

Similar to Cybercrime law legality report (20)

Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data Protection
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
 

Recently uploaded

Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLOLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
lorraineandreiamcidl
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
SocioCosmos
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
Digital Marketing Lab
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
AJHSSR Journal
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
AJHSSR Journal
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
madisonsmith478075
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 

Recently uploaded (13)

Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLOLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...Buy Pinterest Followers, Reactions & Repins  Go Viral on Pinterest with Socio...
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 

Cybercrime law legality report

  • 3. CYBERCRIME TYPES OF CYBER CRIME PENALTIES  Illegal access  Unauthorized access  (imprisonment of six (without right) to a computer system or application. years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred
  • 4.  Illegal interception Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system.  (imprisonment of six years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred
  • 5.  Data Interference Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses.  SAME AS ABOVE
  • 6.  System Interference Unauthorized hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, and including the introduction or transmission of viruses.  SAME AS ABOVE
  • 7.  Misuse of devices The unauthorized use, possession, production, sale, procurement, importation, distribution, or otherwise making available, of devices, computer program designed or adapted for the purpose of committing any of the offenses stated in Republic Act 10175.Unauthorized use of computer password  same as above except fine should be no more than Five hundred thousand pesos (P500,000).
  • 8.  Cyber-squatting Acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same. This includes those existing trademark at the time of registration; names of persons other than the registrant; and acquired with intellectual property interests in it.  SAME AS ABOVE
  • 9.  Computer-related Fraud Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.  same as above Provided, That if no damage has yet been caused, the penalty imposed shall be one (1) degree lower.
  • 10.  Computer-related Identity Theft Unauthorized acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical.  SAME AS ABOVE
  • 11.  Cybersex Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex.  . For as long it is not done for favor or consideration, I don’t think it will be covered. However, if one party (in a couple or relationship) sues claiming to be forced to do cybersex, then it can be covered.  PENALTY  (imprisonment of six years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) but not exceeding One million pesos (P1,000,000) or BOTH.
  • 12.  Child Pornography Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the AntiChild Pornography Act of 2009, committed through a computer system.  imposed shall be one (1) degree higher than that provided for in Republic Act 9775, if committed through a computer system.
  • 14. CYBERCRIMES  4. Online Gambling  5. Intellectual property crimes such as theft of computer source code, software piracy, copyright infringement, trademark violations  6. Harassments such as cyber stalking, cyber defamation, indecent and abusing mails
  • 15. CYBERCRIMES  7. Cyber frauds such as forgery of documents including currency and any other documents  8. Launching of virus, worms and Trojans  9. Denial-of-service attacks  10. Cyber attacks and cyber terrorism
  • 16. CYBERCRIMES  11. Economic espionage  12. Consumer harassment and consumer protection  13. Privacy of citizens  14. Sale of illegal articles such as narcotics, weapons, wildlife, etc
  • 17. Cyber crimes that can generally occur within organizations are as follows;  E-mail abuse  2. Spam mails  3. Cyber defamation  4. Theft of source code  5. Exchange of business secrets and documents
  • 18. CYBERCRIMES  6. Insider attacks on personal database  7. Use of office computer for running other business  8. Transmission and viewing of pornographic materials  9. External cyber attacks on an organization resulting in denial-of-service  10. Information espionage