SlideShare a Scribd company logo
1 of 50
REPUBLIC ACT NO. 10175
"Cybercrime Prevention Act of 2012″
            Presented by:
         Tirso L. Llantada, ECE
REPUBLIC ACT NO. 10175
 AN ACT DEFINING CYBERCRIME,
      PROVIDING FOR THE
          PREVENTION,
         INVESTIGATION,
          SUPPRESSION
AND THE IMPOSITION OF PENALTIES
           THEREFOR
   AND FOR OTHER PURPOSES
LEGAL BACKGROUND
• Electronic Commerce Act of 2000 (RA No. 8792)
  – AN ACT PROVIDING FOR THE RECOGNITION AND USE OF
    ELECTRONIC COMMERCIAL AND NON -COMMERCIAL
    TRANSACTIONS AND DOCUMENTS, PENALTIES FOR
    UNLAWFUL USE THEREOF AND FOR OTHER PURPOSES
Why is there a need to pass such law?
ILOVEYOU VIRUS
by
Onel de Guzman




• The current laws at that time did not provide a
  legal basis for criminalizing crimes committed on
  a computer in general.
Related Facts
• Sonido maintains a blog called “Baratillo
  pamphlet” over the internet.
• Sonido posted 2 blogs which express his opinion
  regarding Senator Sotto’s alleged plagiarism of
  online materials for use in his speech against RH
  Bill.
• Sotto warned his critics that when it became a
  law, they will be penalized
• And so it happened, sotto materialized his threats
Reactions
So… How did it become a law?
• This law emanated from HB No. 5808, authored by
  Representative Susan Yap-Sulit of the second district of
  Tarlac and 36 other co-authors,
• Senate Bill No. 2976, proposed by Senator Edgardo
  Angara.
• Both bills were passed by their respective chambers
  within one day of each other on June 5 and 4, 2012,
  respectively,shortly after the impeachment of Renato
  Corona
• the final version of the Act was later signed into law by
  President Benigno Aquino III on September 12, 2012.
Some Terms to be familiarized
• Access
   – refers to the instruction, communication with, storing data in,
     retrieving data from, or otherwise making use of any resources
     of a computer system or communication network.
• Cyber
   – refers to a computer or a computer network, the electronic
     medium in which online communication takes place.
• Interception
   – refers to listening to, recording, monitoring or surveillance of
     the content of communications, including procurement of the
     content of data, either directly, through access and use of a
     computer system or indirectly, through the use of electronic
     eavesdropping or tapping devices, at the same time that the
     communication is occurring.
Section 4: Punishable Acts
• Offenses against the confidentiality, integrity
  and availability of computer data and systems

• Computer-related Offenses

• Content-related Offenses
Offenses against the confidentiality, integrity
 and availability of computer data and systems
1. Illegal Access – The intentional access to the whole or any
   part of a computer system without right;
2. Illegal Interception – The intentional interception made
   by TECHNICAL MEANS
   Exception: Employee or agent of a service provider
   Exception to the Exception: Except that the latter shall not utilize
       service observing or random monitoring except for
       mechanical or service control quality checks;
3. Data Interference – The intentional or reckless
   alteration, damaging, deletion or deterioration of
   computer DATA
4. System Interference – The intentional alteration or
   reckless hindering or interference with the functioning of
   a computer or computer NETWORK
Offenses against the confidentiality, integrity
 and availability of computer data and systems
5. Misuse of Devices.
   o The use, PRODUCTION, SALE, PROCUREMENT,
     IMPORTATION, DISTRIBUTION or otherwise MAKING
     available intentionally and without right, of:
      o   A device for the purpose of committing any of the offenses
      o   A computer password, access code, or similar data by which the
          whole or any part of a computer system is capable of being
          accessed with the intent that it be used for the purpose of
          committing any of the offenses under this Act;
  o   The POSSESSION of an item referred to in paragraphs (a),
      5(i)(aa) or(bb) herein with the intent to use said devices
      for the purpose of committing any of the offenses under
      this section
Offenses against the confidentiality, integrity
 and availability of computer data and systems
6. Cyber-squatting
  o The ACQUISITION OF A DOMAIN name over the
    internet in bad faith to profit, mislead, destroy
    reputation, and DEPRIVE OTHERS FROM
    REGISTERING THE SAME.
    o   Similar, identical, or confusingly similar to an existing
        trademark registered with the appropriate government
        agency at the time of the domain name registration:
    o   Identical or in any way similar with the name of a person
        other than the registrant, in case of a personal name; and
    o   Acquired without right or with intellectual property
        interests in it.
Computer-related Offenses
1. Computer Forgery.
  o The intentional input, alteration, deletion or
    suppression of any computer data, without right
    resulting in unauthentic data WITH THE INTENT that
    it be considered or acted upon for legal purposes as
    if it were authentic, regardless whether or not the
    data is directly readable and intelligible;
  o The act of knowingly using a computer data which is
    the product of computer-related forgery as defined
    herein, for the purpose of perpetuating a fraudulent
    or dishonest design;
Computer-related Offenses
2. Computer-related Fraud
  o   the intentional and unauthorized input, alteration, or
      deletion of computer data or program or interference in
      the functioning of a computer system including, but not
      limited to, phishing, causing damage thereby, WITH THE
      INTENT of procuring an economic benefit for oneself or
      for another person or for the perpetuation of a
      fraudulent
3. Computer-related Identity Theft
  o   The intentional acquisition, use, misuse, transfer,
      possession, alteration or deletion of identifying
      information BELONGING TO ANOTHER, whether natural
      or juridical, without right.
Content-related Offenses
1. Cybersex
  o   includes any form of interactive prostitution and other
      forms of obscenity through the cyberspace as the
      primary channel with the use of webcams, by inviting
      people either here or in other countries to watch men,
      women and children perform sexual acts;
2. Child Pornography
  o   The unlawful or prohibited acts defined and punishable
      by Republic Act No. 9775 or the Anti-Child Pornography
      Act of 2009, committed through a computer system:
      Provided, That the penalty to be imposed shall be (1) one
      degree higher than that provided for in Republic Act No.
      9775.
Content-related Offenses
3. Unsolicited Commercial Communications
  o   The transmission of commercial electronic
      communication with the use of a computer system which
      seeks to advertise, sell or offer for sale products and
      services are prohibited unless:
      o   There is a prior affirmative consent from the recipient; or
      o   The following conditions are present:
          o   The commercial electronic communication contains a simple, valid and
              reliable way for the recipient to reject receipt of further commercial
              electronic communication from the same source, also referred to as
              opt-out;
          o   The commercial electronic communication does not purposely disguise
              the source of the electronic message; and
          o   The commercial electronic communication does not purposely include
              misleading information in any part of the message in order to induce
              the recipients to read the message.
Content-related Offenses
4. Libel
  o The unlawful or prohibited acts of libel as defined in
    Article 355 of the Revised Penal Code, as amended,
    committed through a computer system or any other
    similar means which may be devised in the future.

  All crimes defined and penalized by the Revised Penal
 Code, as amended, and special criminal laws committed
     by, through and with the use of information and
  communications technologies shall be covered by the
             relevant provisions of this Act.20
Section 5: Other Offenses
• Aiding or Abetting in the Commission of
  Cybercrime
  – Any person who wilfully abets, aids or financially
    benefits in the commission of any of the offenses
    enumerated in this Act shall be held liable; or
• Attempt to Commit Cybercrime
  – Any person who wilfully attempts to commit any
    of the offenses enumerated in this Act shall be
    held liable.
Section 6
• All crimes defined and penalized by the
  Revised Penal Code, as amended, and special
  laws, if committed by, through and with the
  use of information and communications
  technologies shall be covered by the relevant
  provisions of this Act: Provided, That the
  penalty to be imposed shall be ONE (1)
  DEGREE HIGHER THAN THAT PROVIDED for by
  the Revised Penal Code, as amended, and
  special laws, as the case may be.
Section 7. Liability under Other Laws
• A prosecution under this Act shall be
  WITHOUT PREJUDICE TO ANY LIABILITY FOR
  VIOLATION OF ANY PROVISION OF THE
  REVISED PENAL CODE, as amended, or special
  laws.
Section 8. Penalties
• Any person found guilty of any of the punishable acts enumerated in
  Sections 4(a) and 4(b) of this Act shall be punished with imprisonment
  of prision mayor or a fine of at least Two hundred thousand pesos
  (PhP200,000.00) up to a maximum amount commensurate to the damage
  incurred or both.
• Any person found guilty of the punishable act under Section 4(a)(5) shall
  be punished with imprisonment of prision mayor or a fine of not more
  than Five hundred thousand pesos (PhP500,000.00) or both.
• If punishable acts in Section 4(a) are committed against critical
  infrastructure, the penalty of reclusion temporal or a fine of at least Five
  hundred thousand pesos (PhP500,000.00) up to maximum amount
  commensurate to the damage incurred or both, shall be imposed.
• Any person found guilty of any of the punishable acts enumerated in
  Section 4(c)(1) of this Act shall be punished with imprisonment of prision
  mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00)
  but not exceeding One million pesos (PhPl,000,000.00) or both.
Section 8. Penalties
• Any person found guilty of any of the punishable acts enumerated
  in Section 4(c)(2) of this Act shall be punished with the penalties as
  enumerated in Republic Act No. 9775 or the "Anti-Child
  Pornography Act of 2009″: Provided,That the penalty to be imposed
  shall be one (1) degree higher than that provided for in Republic
  Act No. 9775, if committed through a computer system.
• Any person found guilty of any of the punishable acts enumerated
  in Section 4(c)(3) shall be punished with imprisonment of arresto
  mayor or a fine of at least Fifty thousand pesos (PhP50,000.00) but
  not exceeding Two hundred fifty thousand pesos (PhP250,000.00)
  or both.
• Any person found guilty of any of the punishable acts enumerated
  in Section 5 shall be punished with imprisonment one (1) degree
  lower than that of the prescribed penalty for the offense or a fine
  of at least One hundred thousand pesos (PhPl00,000.00) but not
  exceeding Five hundred thousand pesos (PhP500,000.00) or both.
Section 9. Corporate Liability
• Liability shall based on:
    – A power of representation of the juridical person;
    – An authority to take decisions on behalf of the juridical person; or
    – An authority to exercise control within the juridical person.
• Juridical Person and natural person acting under the authority of
  the juridical person is liable for a fine equivalent to at least DOUBLE
  THE FINES imposable in Section 7
• The chairperson of the board of directors, the president, the
  general manager of the corporation, the general partners of a
  partnership, and the officers and employees directly responsible
  shall be JOINTLY AND SEVERALLY LIABLE with the firm for the fine
  imposed therein.
• For foreign corporations, the person or persons directly responsible
  for the management and operation thereof shall be liable.
Section 10. Enforcement and Implementation

• Law Enforcement Agencies: PNP and NBI
Section 12. Real-Time Collection of Traffic Data

• Law enforcement authorities, with due cause,
  shall be authorized to collect or record by
  technical or electronic means traffic data in real-
  time associated with specified communications
  transmitted by means of a computer system.
• LIMITATION: Traffic data refer only to the
  communication’s origin, destination, route, time,
  date, size, duration, or type of underlying service,
  but not content, nor identities
When Court Warrant Could Be Issued
• upon written application and the examination under
  oath or affirmation of the applicant and the witnesses
  he may produce and the showing:
   – that there are reasonable grounds to believe that any of
     the crimes enumerated hereinabove has been committed,
     or is being committed, or is about to be committed.
   – that there are reasonable grounds to believe that evidence
     that will be obtained is essential to the conviction of any
     person for, or to the solution of, or to the prevention of,
     any such crimes; and
   – that there are no other means readily available for
     obtaining such evidence.
Custody of Data
• Preservation of Computer Data: maximum of 90 days and furnishing
  of transmittal document shall be deemed a notification to preserve
  the data until the termination of the case
• Disclosure of Computer Data. – within 72 hours from receipt of the
  order
• Search and Seizure: Within the time period specified in the warrant,
  to conduct interception but may request for an extension no longer
  than thirty (30) days from date of expiration of the warrant.
• Custody of Data: within forty-eight (48) hours after the expiration of
  the period fixed therein, be deposited with the court in a sealed
  package
• Destruction of Data - Upon expiration of the periods as provided in
  Sections 10 and 12
Jurisdiction
• The Regional Trial Court if committed within
  the Philippines or committed with the use of
  any computer system wholly or partly situated
  in the country.
Central Authority
• The Department of        • Section 19. Restricting
  Justice (DOJ) shall be     or Blocking Access to
  responsible for            Computer Data.
  extending immediate         – When a computer data is
  assistance to                 prima facie found to be
  investigations or             in violation of the
                                provisions of this Act,
  proceedings.
                                the DOJ shall issue an
                                order to restrict or block
                                access to such computer
                                data.
SEC. 18. Cybercrime Investigation
     and Coordinating Center
• There is hereby created,
  within thirty (30) days
  from the effectivity of this
  Act, an inter-agency body
  to be known as the
  Cybercrime Investigation
  and Coordinating Center
  (CICC), under the
  administrative
  supervision of the Office
  of the President
SEC. 29. Repealing Clause
• All laws, decrees or rules inconsistent with this
  Act are hereby repealed or modified
  accordingly. Specifically, Section 33(a) on
  Penalties of Republic Act No. 8792 or the
  “Electronic Commerce Act”, is hereby
  modified accordingly.
Who caused the insertion of the libel
              clause
• On January 24, 2012, while the nation was riveted on the
  impeachment trial of then Chief Justice Renato Corona,
  Sotto introduced an amendment to the proposed Cyber
  Crime Law.
Sotto said introducing internet libel would
 make people more cautious on the Net.
After criticizing Sotto Today,
   And One of You “Shout Out”
    their Emotions on SOTTO


Can you be held liable for violation
          of RA 10175?
TRO RESOLUTION

• GIVEN by the Supreme Court of the
  Philippines, this 9th day of October 2012

• NOW, THEREFORE, effective immediately and
  for a period of one hundred twenty (120)
  days, You, Respondents, your
  agents, representatives, or persons acting in
  your place or stead, are hereby ENJOINED from
  implementing and/ on enforcing Republic Act
  No. 10175 (Cybercrime Prevention Act of 2012).
What then happened?
• On 5 February 2013, The Supreme Court
  extended the temporary restraining order on
  the law, "until further orders from the court."
RIGHTS ALLEGEDLY VIOLATED
•   FREEDOM OF EXPRESSION
•   FREEDOM OF PRESS
•   DUE PROCESS
•   EQUAL PROTECTION
•   PRIVACY OF COMMUNICATION
Sections that are violative
         of our constitutional rights
•   Sec 4c4 – reclassifying libel as cybercrime
•   Sec 6 – increase punishment
•   Sec 7 – double jeopardy
•   Sec 12 – warrantless search
•   Sec 19 – restriction to content mandated by
    DOJ to service providers without judicial
    determination
Assuming that the TRO lapse
• Can the one who “Shares” or “Likes” on
  Facebook or re-tweets on Twitter the
  offending piece now be held liable for libel?
• Can someone who posts a comment agreeing
  with the alleged libelous material also be
  sued?
Assuming that the TRO lapse
• In traditional media – newspapers, TV and radio
  networks – the origin of the libelous material is
  easy to identify. On the Web, can someone suing
  for libel obtain a court order to compel an ISP
  (Internet Service Provider) or Facebook or Twitter
  to divulge the identity of the one who posted the
  alleged libel?
• Can these entities also be held liable since they
  carried the offending material the way
  newspapers carry a libelous story?
Assuming that the TRO lapse
• As a blogger, I believe in giving a wide
  democratic space to commenters, including
  those who criticize me.
• Can I now be sued for any comment that
  appears on my site? Besides, libel is in the
  eyes of the offended.
Assuming that the TRO lapse
• Can someone living in Metro Manila file a case
  of internet libel in Zamboanga City on the
  pretext that the complainant was surfing in an
  Internet Cafe in Zamboanga City when he saw
  the offending piece?
Assuming that the TRO lapse
• If someone pretends to be me online and
  issues allegedly libelous material; or if
  someone hacks into my computer, obtains
  files and posts them online,
• can I be sued for libel? How do I defend myself
  on this?
Assuming that the TRO lapse
• What kind of evidence would the court accept
  on internet libel cases?
• Would screencaps suffice?
• How will the court determine if an offensive
  image has been manipulated?
• Or an offending piece was really posted by the
  person being sued?
Assuming that the TRO lapse
• How is malice proven online? What should
  ordinary people online guard against so that
  they are not accused of malice?
• I’m fairly sure there are other issues and
  complications which will emerge.
The answer lies upon the
interpretation of the Court
The END

Thank you!

More Related Content

What's hot

Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Anti b astos law ra 11313-quinto
Anti b astos law ra 11313-quintoAnti b astos law ra 11313-quinto
Anti b astos law ra 11313-quintorubytamayo2
 
RA 9775 - Anti-Child Pornography Act of 2009
RA 9775 - Anti-Child Pornography Act of 2009RA 9775 - Anti-Child Pornography Act of 2009
RA 9775 - Anti-Child Pornography Act of 2009Jasmine Nikki Versoza
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsRonalyn_Cao
 
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptxRepublic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptxmaricelabaya1
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationTrix Rodriguez
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATSJazzyNF
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)F Mad
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 
Bill of rights (lecture)
Bill of rights (lecture)Bill of rights (lecture)
Bill of rights (lecture)John Torres
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Internet Threats
Internet ThreatsInternet Threats
Internet ThreatsLeelet1121
 

What's hot (20)

Ra9165presentation
Ra9165presentationRa9165presentation
Ra9165presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
Anti b astos law ra 11313-quinto
Anti b astos law ra 11313-quintoAnti b astos law ra 11313-quinto
Anti b astos law ra 11313-quinto
 
Power point anti rape law
Power point anti rape lawPower point anti rape law
Power point anti rape law
 
RA 9775 - Anti-Child Pornography Act of 2009
RA 9775 - Anti-Child Pornography Act of 2009RA 9775 - Anti-Child Pornography Act of 2009
RA 9775 - Anti-Child Pornography Act of 2009
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptxRepublic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx
Republic Act No. 11313 Safe Spaces Act (Bawal Bastos Law).pptx
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentation
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Bill of rights (lecture)
Bill of rights (lecture)Bill of rights (lecture)
Bill of rights (lecture)
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
ARTICLE III: Bill of Rights Summary
ARTICLE III: Bill of Rights Summary ARTICLE III: Bill of Rights Summary
ARTICLE III: Bill of Rights Summary
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 

Similar to Cybercrime Act Summary

p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfbadangayonmgb
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxRegineManuel2
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawAbiel Abuy
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesVishni Ganepola
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxRomanoGabrillo1
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-finalAldrin SuperGo
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
 
Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.GissaMaeCastino
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxParasSehgal12
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)GrittyCC
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 

Similar to Cybercrime Act Summary (20)

p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime Law
 
Existing Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber CrimesExisting Sri Lankan Legal Framework on Cyber Crimes
Existing Sri Lankan Legal Framework on Cyber Crimes
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Chapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptxChapter 2 - Computer Engineering and IT Laws.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
 
Furio lerma cybercrime-final
Furio lerma cybercrime-finalFurio lerma cybercrime-final
Furio lerma cybercrime-final
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Cyber law comp
Cyber law compCyber law comp
Cyber law comp
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Unit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptxUnit-3 Cyber Crime PPT.pptx
Unit-3 Cyber Crime PPT.pptx
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 

Cybercrime Act Summary

  • 1. REPUBLIC ACT NO. 10175 "Cybercrime Prevention Act of 2012″ Presented by: Tirso L. Llantada, ECE
  • 2. REPUBLIC ACT NO. 10175 AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES
  • 3. LEGAL BACKGROUND • Electronic Commerce Act of 2000 (RA No. 8792) – AN ACT PROVIDING FOR THE RECOGNITION AND USE OF ELECTRONIC COMMERCIAL AND NON -COMMERCIAL TRANSACTIONS AND DOCUMENTS, PENALTIES FOR UNLAWFUL USE THEREOF AND FOR OTHER PURPOSES
  • 4. Why is there a need to pass such law? ILOVEYOU VIRUS by Onel de Guzman • The current laws at that time did not provide a legal basis for criminalizing crimes committed on a computer in general.
  • 5. Related Facts • Sonido maintains a blog called “Baratillo pamphlet” over the internet. • Sonido posted 2 blogs which express his opinion regarding Senator Sotto’s alleged plagiarism of online materials for use in his speech against RH Bill. • Sotto warned his critics that when it became a law, they will be penalized • And so it happened, sotto materialized his threats
  • 7. So… How did it become a law? • This law emanated from HB No. 5808, authored by Representative Susan Yap-Sulit of the second district of Tarlac and 36 other co-authors, • Senate Bill No. 2976, proposed by Senator Edgardo Angara. • Both bills were passed by their respective chambers within one day of each other on June 5 and 4, 2012, respectively,shortly after the impeachment of Renato Corona • the final version of the Act was later signed into law by President Benigno Aquino III on September 12, 2012.
  • 8. Some Terms to be familiarized • Access – refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network. • Cyber – refers to a computer or a computer network, the electronic medium in which online communication takes place. • Interception – refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
  • 9. Section 4: Punishable Acts • Offenses against the confidentiality, integrity and availability of computer data and systems • Computer-related Offenses • Content-related Offenses
  • 10. Offenses against the confidentiality, integrity and availability of computer data and systems 1. Illegal Access – The intentional access to the whole or any part of a computer system without right; 2. Illegal Interception – The intentional interception made by TECHNICAL MEANS Exception: Employee or agent of a service provider Exception to the Exception: Except that the latter shall not utilize service observing or random monitoring except for mechanical or service control quality checks; 3. Data Interference – The intentional or reckless alteration, damaging, deletion or deterioration of computer DATA 4. System Interference – The intentional alteration or reckless hindering or interference with the functioning of a computer or computer NETWORK
  • 11. Offenses against the confidentiality, integrity and availability of computer data and systems 5. Misuse of Devices. o The use, PRODUCTION, SALE, PROCUREMENT, IMPORTATION, DISTRIBUTION or otherwise MAKING available intentionally and without right, of: o A device for the purpose of committing any of the offenses o A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with the intent that it be used for the purpose of committing any of the offenses under this Act; o The POSSESSION of an item referred to in paragraphs (a), 5(i)(aa) or(bb) herein with the intent to use said devices for the purpose of committing any of the offenses under this section
  • 12. Offenses against the confidentiality, integrity and availability of computer data and systems 6. Cyber-squatting o The ACQUISITION OF A DOMAIN name over the internet in bad faith to profit, mislead, destroy reputation, and DEPRIVE OTHERS FROM REGISTERING THE SAME. o Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration: o Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and o Acquired without right or with intellectual property interests in it.
  • 13.
  • 14. Computer-related Offenses 1. Computer Forgery. o The intentional input, alteration, deletion or suppression of any computer data, without right resulting in unauthentic data WITH THE INTENT that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; o The act of knowingly using a computer data which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design;
  • 15. Computer-related Offenses 2. Computer-related Fraud o the intentional and unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system including, but not limited to, phishing, causing damage thereby, WITH THE INTENT of procuring an economic benefit for oneself or for another person or for the perpetuation of a fraudulent 3. Computer-related Identity Theft o The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information BELONGING TO ANOTHER, whether natural or juridical, without right.
  • 16. Content-related Offenses 1. Cybersex o includes any form of interactive prostitution and other forms of obscenity through the cyberspace as the primary channel with the use of webcams, by inviting people either here or in other countries to watch men, women and children perform sexual acts; 2. Child Pornography o The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775.
  • 17.
  • 18. Content-related Offenses 3. Unsolicited Commercial Communications o The transmission of commercial electronic communication with the use of a computer system which seeks to advertise, sell or offer for sale products and services are prohibited unless: o There is a prior affirmative consent from the recipient; or o The following conditions are present: o The commercial electronic communication contains a simple, valid and reliable way for the recipient to reject receipt of further commercial electronic communication from the same source, also referred to as opt-out; o The commercial electronic communication does not purposely disguise the source of the electronic message; and o The commercial electronic communication does not purposely include misleading information in any part of the message in order to induce the recipients to read the message.
  • 19. Content-related Offenses 4. Libel o The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future. All crimes defined and penalized by the Revised Penal Code, as amended, and special criminal laws committed by, through and with the use of information and communications technologies shall be covered by the relevant provisions of this Act.20
  • 20.
  • 21. Section 5: Other Offenses • Aiding or Abetting in the Commission of Cybercrime – Any person who wilfully abets, aids or financially benefits in the commission of any of the offenses enumerated in this Act shall be held liable; or • Attempt to Commit Cybercrime – Any person who wilfully attempts to commit any of the offenses enumerated in this Act shall be held liable.
  • 22. Section 6 • All crimes defined and penalized by the Revised Penal Code, as amended, and special laws, if committed by, through and with the use of information and communications technologies shall be covered by the relevant provisions of this Act: Provided, That the penalty to be imposed shall be ONE (1) DEGREE HIGHER THAN THAT PROVIDED for by the Revised Penal Code, as amended, and special laws, as the case may be.
  • 23. Section 7. Liability under Other Laws • A prosecution under this Act shall be WITHOUT PREJUDICE TO ANY LIABILITY FOR VIOLATION OF ANY PROVISION OF THE REVISED PENAL CODE, as amended, or special laws.
  • 24. Section 8. Penalties • Any person found guilty of any of the punishable acts enumerated in Sections 4(a) and 4(b) of this Act shall be punished with imprisonment of prision mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00) up to a maximum amount commensurate to the damage incurred or both. • Any person found guilty of the punishable act under Section 4(a)(5) shall be punished with imprisonment of prision mayor or a fine of not more than Five hundred thousand pesos (PhP500,000.00) or both. • If punishable acts in Section 4(a) are committed against critical infrastructure, the penalty of reclusion temporal or a fine of at least Five hundred thousand pesos (PhP500,000.00) up to maximum amount commensurate to the damage incurred or both, shall be imposed. • Any person found guilty of any of the punishable acts enumerated in Section 4(c)(1) of this Act shall be punished with imprisonment of prision mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00) but not exceeding One million pesos (PhPl,000,000.00) or both.
  • 25. Section 8. Penalties • Any person found guilty of any of the punishable acts enumerated in Section 4(c)(2) of this Act shall be punished with the penalties as enumerated in Republic Act No. 9775 or the "Anti-Child Pornography Act of 2009″: Provided,That the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775, if committed through a computer system. • Any person found guilty of any of the punishable acts enumerated in Section 4(c)(3) shall be punished with imprisonment of arresto mayor or a fine of at least Fifty thousand pesos (PhP50,000.00) but not exceeding Two hundred fifty thousand pesos (PhP250,000.00) or both. • Any person found guilty of any of the punishable acts enumerated in Section 5 shall be punished with imprisonment one (1) degree lower than that of the prescribed penalty for the offense or a fine of at least One hundred thousand pesos (PhPl00,000.00) but not exceeding Five hundred thousand pesos (PhP500,000.00) or both.
  • 26. Section 9. Corporate Liability • Liability shall based on: – A power of representation of the juridical person; – An authority to take decisions on behalf of the juridical person; or – An authority to exercise control within the juridical person. • Juridical Person and natural person acting under the authority of the juridical person is liable for a fine equivalent to at least DOUBLE THE FINES imposable in Section 7 • The chairperson of the board of directors, the president, the general manager of the corporation, the general partners of a partnership, and the officers and employees directly responsible shall be JOINTLY AND SEVERALLY LIABLE with the firm for the fine imposed therein. • For foreign corporations, the person or persons directly responsible for the management and operation thereof shall be liable.
  • 27. Section 10. Enforcement and Implementation • Law Enforcement Agencies: PNP and NBI
  • 28. Section 12. Real-Time Collection of Traffic Data • Law enforcement authorities, with due cause, shall be authorized to collect or record by technical or electronic means traffic data in real- time associated with specified communications transmitted by means of a computer system. • LIMITATION: Traffic data refer only to the communication’s origin, destination, route, time, date, size, duration, or type of underlying service, but not content, nor identities
  • 29. When Court Warrant Could Be Issued • upon written application and the examination under oath or affirmation of the applicant and the witnesses he may produce and the showing: – that there are reasonable grounds to believe that any of the crimes enumerated hereinabove has been committed, or is being committed, or is about to be committed. – that there are reasonable grounds to believe that evidence that will be obtained is essential to the conviction of any person for, or to the solution of, or to the prevention of, any such crimes; and – that there are no other means readily available for obtaining such evidence.
  • 30. Custody of Data • Preservation of Computer Data: maximum of 90 days and furnishing of transmittal document shall be deemed a notification to preserve the data until the termination of the case • Disclosure of Computer Data. – within 72 hours from receipt of the order • Search and Seizure: Within the time period specified in the warrant, to conduct interception but may request for an extension no longer than thirty (30) days from date of expiration of the warrant. • Custody of Data: within forty-eight (48) hours after the expiration of the period fixed therein, be deposited with the court in a sealed package • Destruction of Data - Upon expiration of the periods as provided in Sections 10 and 12
  • 31. Jurisdiction • The Regional Trial Court if committed within the Philippines or committed with the use of any computer system wholly or partly situated in the country.
  • 32. Central Authority • The Department of • Section 19. Restricting Justice (DOJ) shall be or Blocking Access to responsible for Computer Data. extending immediate – When a computer data is assistance to prima facie found to be investigations or in violation of the provisions of this Act, proceedings. the DOJ shall issue an order to restrict or block access to such computer data.
  • 33. SEC. 18. Cybercrime Investigation and Coordinating Center • There is hereby created, within thirty (30) days from the effectivity of this Act, an inter-agency body to be known as the Cybercrime Investigation and Coordinating Center (CICC), under the administrative supervision of the Office of the President
  • 34. SEC. 29. Repealing Clause • All laws, decrees or rules inconsistent with this Act are hereby repealed or modified accordingly. Specifically, Section 33(a) on Penalties of Republic Act No. 8792 or the “Electronic Commerce Act”, is hereby modified accordingly.
  • 35. Who caused the insertion of the libel clause • On January 24, 2012, while the nation was riveted on the impeachment trial of then Chief Justice Renato Corona, Sotto introduced an amendment to the proposed Cyber Crime Law.
  • 36. Sotto said introducing internet libel would make people more cautious on the Net.
  • 37. After criticizing Sotto Today, And One of You “Shout Out” their Emotions on SOTTO Can you be held liable for violation of RA 10175?
  • 38. TRO RESOLUTION • GIVEN by the Supreme Court of the Philippines, this 9th day of October 2012 • NOW, THEREFORE, effective immediately and for a period of one hundred twenty (120) days, You, Respondents, your agents, representatives, or persons acting in your place or stead, are hereby ENJOINED from implementing and/ on enforcing Republic Act No. 10175 (Cybercrime Prevention Act of 2012).
  • 39. What then happened? • On 5 February 2013, The Supreme Court extended the temporary restraining order on the law, "until further orders from the court."
  • 40. RIGHTS ALLEGEDLY VIOLATED • FREEDOM OF EXPRESSION • FREEDOM OF PRESS • DUE PROCESS • EQUAL PROTECTION • PRIVACY OF COMMUNICATION
  • 41. Sections that are violative of our constitutional rights • Sec 4c4 – reclassifying libel as cybercrime • Sec 6 – increase punishment • Sec 7 – double jeopardy • Sec 12 – warrantless search • Sec 19 – restriction to content mandated by DOJ to service providers without judicial determination
  • 42. Assuming that the TRO lapse • Can the one who “Shares” or “Likes” on Facebook or re-tweets on Twitter the offending piece now be held liable for libel? • Can someone who posts a comment agreeing with the alleged libelous material also be sued?
  • 43. Assuming that the TRO lapse • In traditional media – newspapers, TV and radio networks – the origin of the libelous material is easy to identify. On the Web, can someone suing for libel obtain a court order to compel an ISP (Internet Service Provider) or Facebook or Twitter to divulge the identity of the one who posted the alleged libel? • Can these entities also be held liable since they carried the offending material the way newspapers carry a libelous story?
  • 44. Assuming that the TRO lapse • As a blogger, I believe in giving a wide democratic space to commenters, including those who criticize me. • Can I now be sued for any comment that appears on my site? Besides, libel is in the eyes of the offended.
  • 45. Assuming that the TRO lapse • Can someone living in Metro Manila file a case of internet libel in Zamboanga City on the pretext that the complainant was surfing in an Internet Cafe in Zamboanga City when he saw the offending piece?
  • 46. Assuming that the TRO lapse • If someone pretends to be me online and issues allegedly libelous material; or if someone hacks into my computer, obtains files and posts them online, • can I be sued for libel? How do I defend myself on this?
  • 47. Assuming that the TRO lapse • What kind of evidence would the court accept on internet libel cases? • Would screencaps suffice? • How will the court determine if an offensive image has been manipulated? • Or an offending piece was really posted by the person being sued?
  • 48. Assuming that the TRO lapse • How is malice proven online? What should ordinary people online guard against so that they are not accused of malice? • I’m fairly sure there are other issues and complications which will emerge.
  • 49. The answer lies upon the interpretation of the Court