SlideShare a Scribd company logo
1 of 18
│
│
 Cyber libel refers to the act of defaming
or damaging someone’s reputation
using electronic means, such as the
internet, social media platforms, or
other digital communication channels.
 It involves the publication of false or
malicious statements that harm an
individual’s character, reputation, or
integrity.
 It is governed by the Cybercrime
Prevention Act of 2012
 The law considers online defamation as a
criminal offense, punishable by
imprisonment and fines,
 Understanding the legal framework
surrounding cyber libel is crucial to
protecting yourself from potential legal
consequences.
 Cybersecurity is the practice of
protecting internet-connected systems
such as hardware, software, and data
from cyberthreats.
 It used by individuals and enterprises to
protect against unauthorized access to
data centers and other computerized
systems.
 An instrumental for disabling or
disrupting a system or device’s
operational activities
More online activity leads to higher risk
of cyber libel and security breaches.
With more sensitive data stored
digitally, strong cyber security is crucial
Cyber Libel can cause serious and
lasting harm to reputation
Cyber attacks can lead to significant
financial losses for individuals and
businesses.
│
“Unlike traditional libel that
was enacted through
printed or published
materials, Cyber Libel has a
broader reach due to the
nature of the internet and
the digital realm, where
information can spread
quickly, uncensored, and
widely.”
 A Filipino and American journalist who is
the CEO of the Rappler. She previously
spent nearly two decades working as a
lead investigative reporter in Southeast
Asia for CNN.
 High profile journalist Maria Ressa was
found guilty of cyber libel. The case
garnered international attention and
raised concerns about press freedom in
the Philippines.
 Walden Flores Bello is a Filipino Academic
who served as a member of the House of the
Representative of the Philippines.
 An International adjunct professor of
Binghamton University, professor of
sociology and public administration at the
University of the Philippines Diliman.
 A social activist and former congressman,
was arrested on charges of cyber libel. This
case highlights the potential use of cyber
libel laws against critics and activist.
 In the Philippines, the Cybercrime Prevention Act
of 2012 includes provisions on cyber libel. The law
has been controversial, with concerns raised about
its potential use to stifle free speech.
 Internationally, laws vary. Some countries have
specific laws on cyber libel, while others apply
traditional libel laws to online content
 The Cybercrime law provides rules of conduct and
standards of behavior for the use of the Internet,
computers, and related digital technologies, and the
actions of the public, government, and private
organizations; rules of evidence and criminal
procedure, and other criminal justice matters in
cyberspace; and regulations.
This is when attackers trick
individuals into revealing
sensitive information, like
passwords or credit card
numbers, by pretending to
be a trustworthy source
Malicious software
designed to cause
damage to a computer,
server, or network. This
includes viruses, worms,
and ransomware
A type of malware where
attackers encrypt a
victim’s files and
demand payment to
restore access.
Adult video streaming website
CAM4 had its server breached,
exposing 10 billion records,
including full names, email
addresses, chat transcripts, and
password hashes.
These tech giants have all
disclosed cybersecurity
attacks over the past 12
months, highlighting that even
the most secure organizations
can be vulnerable.
•
 • Enacting data protection laws, and
prosecuting cybercriminals.
 • Organizations must implement
robust cybersecurity measures and
educate employees on safe online
practices.
Cyber Libel involves the spread of defamatory statements
online, with the potential to harm the reputation of individuals or
organizations. It is essential for protecting digital systems and
data from unauthorized access, damage, or theft. Also, this can
have severe consequences, including reputational damage and
legal implications. Common cyber security threats include phishing,
malware, and ransomware. Prevention and protection measures,
such as strong passwords, two-factor authentication, and secure
networks can mitigate the risks. Furthermore, Governments and
organizations play a pivotal role in ensuring Cyber Security and
upholding digital ethics.
│
BSED – ENGLISH 2A GEL 221 │LIVING IN THE IT ERA Rivas.florecintojrb@spamast.edu.ph

More Related Content

Similar to GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx

Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against propertyvarunbamba
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protectionBavijesh Thaliyil
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptxTEENATHOMAS75
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptxTEENATHOMAS75
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 

Similar to GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx (20)

Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptx
 
Presentation (11).pptx
Presentation (11).pptxPresentation (11).pptx
Presentation (11).pptx
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

GEL 221 - Group 1 PPT (Cyber Libel & Security).pptx

  • 2.  Cyber libel refers to the act of defaming or damaging someone’s reputation using electronic means, such as the internet, social media platforms, or other digital communication channels.  It involves the publication of false or malicious statements that harm an individual’s character, reputation, or integrity.
  • 3.  It is governed by the Cybercrime Prevention Act of 2012  The law considers online defamation as a criminal offense, punishable by imprisonment and fines,  Understanding the legal framework surrounding cyber libel is crucial to protecting yourself from potential legal consequences.
  • 4.  Cybersecurity is the practice of protecting internet-connected systems such as hardware, software, and data from cyberthreats.  It used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.  An instrumental for disabling or disrupting a system or device’s operational activities
  • 5. More online activity leads to higher risk of cyber libel and security breaches. With more sensitive data stored digitally, strong cyber security is crucial Cyber Libel can cause serious and lasting harm to reputation Cyber attacks can lead to significant financial losses for individuals and businesses. │
  • 6. “Unlike traditional libel that was enacted through printed or published materials, Cyber Libel has a broader reach due to the nature of the internet and the digital realm, where information can spread quickly, uncensored, and widely.”
  • 7.  A Filipino and American journalist who is the CEO of the Rappler. She previously spent nearly two decades working as a lead investigative reporter in Southeast Asia for CNN.  High profile journalist Maria Ressa was found guilty of cyber libel. The case garnered international attention and raised concerns about press freedom in the Philippines.
  • 8.  Walden Flores Bello is a Filipino Academic who served as a member of the House of the Representative of the Philippines.  An International adjunct professor of Binghamton University, professor of sociology and public administration at the University of the Philippines Diliman.  A social activist and former congressman, was arrested on charges of cyber libel. This case highlights the potential use of cyber libel laws against critics and activist.
  • 9.  In the Philippines, the Cybercrime Prevention Act of 2012 includes provisions on cyber libel. The law has been controversial, with concerns raised about its potential use to stifle free speech.  Internationally, laws vary. Some countries have specific laws on cyber libel, while others apply traditional libel laws to online content  The Cybercrime law provides rules of conduct and standards of behavior for the use of the Internet, computers, and related digital technologies, and the actions of the public, government, and private organizations; rules of evidence and criminal procedure, and other criminal justice matters in cyberspace; and regulations.
  • 10.
  • 11. This is when attackers trick individuals into revealing sensitive information, like passwords or credit card numbers, by pretending to be a trustworthy source Malicious software designed to cause damage to a computer, server, or network. This includes viruses, worms, and ransomware A type of malware where attackers encrypt a victim’s files and demand payment to restore access.
  • 12. Adult video streaming website CAM4 had its server breached, exposing 10 billion records, including full names, email addresses, chat transcripts, and password hashes.
  • 13. These tech giants have all disclosed cybersecurity attacks over the past 12 months, highlighting that even the most secure organizations can be vulnerable.
  • 14.
  • 15.
  • 16.  • Enacting data protection laws, and prosecuting cybercriminals.  • Organizations must implement robust cybersecurity measures and educate employees on safe online practices.
  • 17. Cyber Libel involves the spread of defamatory statements online, with the potential to harm the reputation of individuals or organizations. It is essential for protecting digital systems and data from unauthorized access, damage, or theft. Also, this can have severe consequences, including reputational damage and legal implications. Common cyber security threats include phishing, malware, and ransomware. Prevention and protection measures, such as strong passwords, two-factor authentication, and secure networks can mitigate the risks. Furthermore, Governments and organizations play a pivotal role in ensuring Cyber Security and upholding digital ethics.
  • 18. │ BSED – ENGLISH 2A GEL 221 │LIVING IN THE IT ERA Rivas.florecintojrb@spamast.edu.ph