The document summarizes concerns about the Cybercrime Prevention Act of 2012 in the Philippines from the Computer Professionals' Union. It discusses how several provisions in the new law threaten freedom of speech and expression by criminalizing libel and allowing websites to be blocked without due process. It also notes how the law could negatively impact internet users and technology professionals by punishing normal computer use or repair work if they are misinterpreted as cybercrimes. Critics argue the issues cannot be addressed through an implementing regulation and call for challenging the law in court.
Republic Act No. 7610
AN ACT PROVIDING FOR STRONGER DETERRENCE AND SPECIAL PROTECTION AGAINST CHILD ABUSE, EXPLOITATION AND DISCRIMINATION, AND FOR OTHER PURPOSES
Republic Act No. 7610
AN ACT PROVIDING FOR STRONGER DETERRENCE AND SPECIAL PROTECTION AGAINST CHILD ABUSE, EXPLOITATION AND DISCRIMINATION, AND FOR OTHER PURPOSES
Philippine Data Privacy Law is in Republic Act No. 10173, otherwise known as the " Data Privacy Act of 2012".
In summary:
1) Processing of personal information is allowed – so long as it complies with the law.
2) As much as possible, consent should be obtained from the Data Subject for the processing of personal information.
3) The confidentiality, integrity, and availability of the personal information should be ensured.
4) Sensitive and personal information are prohibited – unless in exceptional cases.
5) Philippine Data Privacy Law has extraterritorial application and thus violations may be penalized even if done outside the Philippines.
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoPaola Furlanetto
. 3 reasons why A+ worked on Multimedia Audit
. A Media Audit case history, including:
- "old style" mono media assessment
- "uptodate" multimedia assessment
Philippine Data Privacy Law is in Republic Act No. 10173, otherwise known as the " Data Privacy Act of 2012".
In summary:
1) Processing of personal information is allowed – so long as it complies with the law.
2) As much as possible, consent should be obtained from the Data Subject for the processing of personal information.
3) The confidentiality, integrity, and availability of the personal information should be ensured.
4) Sensitive and personal information are prohibited – unless in exceptional cases.
5) Philippine Data Privacy Law has extraterritorial application and thus violations may be penalized even if done outside the Philippines.
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoPaola Furlanetto
. 3 reasons why A+ worked on Multimedia Audit
. A Media Audit case history, including:
- "old style" mono media assessment
- "uptodate" multimedia assessment
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
Published December 14, 2015, in Social media
Research Presentation on Online Social Networks (OSN) Privacy.
CSC 425
Senior Seminar
Hampton University
Fall 2015
---
FVCproductions
https://fvcproductions.com
Anti-bribery, digital investigation and privacyPECB
This presentation was delivered at the ISO 37001 & Anti-Bribery PECB Insights Conference by Sylvain Desharnais, Digital investigation at CFIJ in Canada
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
Content
8. Opportunities, Challenges, and Power of Media and Information
a. Economic, Educational,
Social, and Political
b. Threats, Risks, Abuse, and
Misuse
Learning Competencies
The students will be able to…
1. realize opportunities and challenges in media and information (MIL11/12OCP-IIIh-24);
2. create infographics showing opportunities and challenges in media and information (SSHS); and
3. research and cite recent examples of the power of media and information to affect change (MIL11/12OCP-IIIh-25)
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
Media and Information Literacy (MIL) Legal, Ethical, and Societal Issues in Media and Information (Part 1)
Topics:
1. Intellectual Property in International
and Local Context
2. Fair Use and Creative Commons
LEARNING COMPETENCIES:
1. explain intellectual property and its different types (SSHS);
2. explain copyright, fair use, etc.vis-a-vis human rights (MIL11/12LESI-IIIg20);
3. discuss current issues related to copyright vis-à-vis gov’t./provide sectors actions (MIL11/12LESI-IIIg21);
4. put into practice their understanding of the intellectual property, copy right, and fair use guidelines (MIL11/12LESI-IIIg17); and
5. explain actions to promote ethical use of media and information (MIL11/12LESI-IIIg22);
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
Erratum.Page 23 0f 29. Formative Assessment Question no. 1 is ''Why is plagiarism?''. The correct question is ''What is plagiarism?''. Thank you very much.
Legal, Ethical, and Societal Issues in Media and Information (Part 3)
Topic: Plagiarism:
Learning Competencies
a. define plagiarism;
b.identify and explain the different types of plagiarism;
c. value the importance of understanding the different types of plagiarism; and
d. practice academic honesty and integrity by not committing plagiarism.
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
The Ashley Madison Hack and the data dump that followed didn’t just fuel the gossip mill – they raised complicated moral and legal questions in both the criminal and civil law arenas.
What are the legal implications for a company who gets hacked? What are the legal implications for those who did the hacking?
What legal recourse do Ashley Madison users have?
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
This presentation was made by Zahid Jamil on 7th Sept 2007 which highlighted important issues regarding the new cyber Crime Bill which is soon to be made into a law. http://dbtb.org
Marcia Hofmann is a senior staff attorney at the Electronic Frontier Foundation, where she works on a broad range of digital civil liberties issues including computer security, electronic privacy, free expression, and copyright. She is also a non-residential fellow at the Stanford Law School Center for Internet and Society and an adjunct professor at the University of California Hastings College of the Law. She tweets about law and technology issues at @marciahofmann.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
3. Cybercrime Prevention
Act of 2012
Computer Professionals’ Union
5 October 2012
*Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court
Petitions at mga imahe mula sa Pixel Offensive.
Sunday, October 7, 12
5. Background
Passed House of Representatives on 04 June 2012
Senate Bill No. 2796 and House Bill No. 5808
Passed Senate on 05 June 2012
Signed into law on 12 September 2012
An Act Defining Cybercrime, Providing for the Prevention,
Investigation, Suppression, and the Imposition of Penalties therefor
and for other Purposes
Implemented: October 3, 2012
Sunday, October 7, 12
6. Endorsed by these
senators.
“TG” Guingona III
voting against it.
Sunday, October 7, 12
21. What is the RA 10175 ?
Section 4: Cybercrime Offenses
Illegal access, illegal interception, data interception, data
interference (a)(3), system interference, misuse of devices
Computer-related forgery, computer-related fraud, computer-
related identity theft
Cybersex, child pornography, unsolicited commercial
communications
Libel
Sunday, October 7, 12
22. What is the RA 10175 ?
Section 5: Other Offenses
aiding or abetting in the commission of cybercrime, attempt
in the commission of cybercrime
Section 6: All crimes in RPC if committed by, through and with
the use of ICT
Penalty: one degree higher
Sunday, October 7, 12
23. What is the RA 10175 ?
Section 4(a)(3) on Data Interference: intrudes into
people’s freedom
The intentional or reckless alteration,
damaging, deletion or deterioration of computer data, of speech
electronic document, or electronic data message,
without right including the introduction or alterations
transmission of viruses
vague, “sweep unnecessarily broadly”
“it becomes very burdensome, onerous
and patently discouraging, specially if
the act is for purposes of social and
political criticisms”
Source: BAYAN SC Petition
Sunday, October 7, 12
24. What is the RA 10175 ?
Section 4(b)(3) on Computer-related
Identity Theft:
intrudes into
people’s freedom
The intentional acquisition, use, misuse, of speech
transfer, possession, alteration, or deletion of
identifying information belonging to politician’s full name, age,
another, whether natural or juridical without right. education, employment
Provided, that if no damage has yet been caused, the background, names of parents,
penalty imposable shall be one (1) degree lower. siblings, wife, children and other
members of immediate family) of
another person (e.g. by
intentionally obtaining such
identifying information, without
any consent, from Facebook,
website, or any online article or
document)
Sunday, October 7, 12
25. What is the RA 10175 ?
Section 4(c)(4) on Libel
makes anyone a target of prosecution and punishment
chilling effect on the exercise of freedom of speech
General Comment No. 34 of the United Nations Human Rights
Committee states that “State parties should consider the
decriminalization of defamation
“a violation or disregard of the Philippine government’s obligations under
the International Convention on Civil Political Rights to promote and
protect freedom of expression”
Source: BAYAN SC Petition
Sunday, October 7, 12
26. What is the RA 10175 ?
Section 5(a) on Aiding or intrudes into people’s
Abetting in the commission of
cybercrime: freedom of speech
Section 5(b) on Attempt in the
commission of cybercrime:
Sunday, October 7, 12
27. What is the RA 10175 ?
Section 6 on all crimes defined violation of the right
in Revised Penal Code (RPC),
if committed by, through and of the people not to
with the use of ICT shall be be subjected to
covered by this Act double jeopardy
Section 7 on Liability under
other Laws
A prosecution under this Act shall be without
prejudice to any liability for violation of any
provision of RPC etc
Sunday, October 7, 12
28. What is the RA 10175 ?
Section 12 (1) violation of the right
Real-Time Collection of Traffic
Data of the people against
unreasonable
Law enforcement authorities, with due
searches and seizure
cause, shall be authorized to
collect or record by technical
or electronic means traffic violation of the right
data in real-time associated with to privacy
specified communications transmitted by
means of a computer system
Sunday, October 7, 12
29. What is the RA 10175 ?
Section 17 (1) deprivation of
Destruction of computer data
property without due
Upon expiration of periods authorities shall process of law
immediately and completely
destroy the computer data subject
to prevention and examination.
Sunday, October 7, 12
30. What is the RA 10175 ?
Section 19 (1)
Restricting of Blocking Access to intrudes into
Computer Data people’s freedom of
When a computer data is prima speech
facie found to be in violation of the provision
of this Act, the DOJ shall issue an grant of unbridled
order to restrict or block access
to such computer data. power to
Department of
Justice
“take down clause”
Sunday, October 7, 12
32. Who are affected?
all users of “mobile phones, computers, computer data
storage devises (e.g. USB, external hard disks), emails,
social media and anything that is related to the internet,
cyberspace and information and communications
technology”
Source: BAYAN SC Petition
Sunday, October 7, 12
33. Threats to ICT professionals
For computer professionals and hackers working with
information security and network administration our sets
of tools can be misinterpreted as tools to commit
cybercrime. It should be noted that crackers (bad
hackers) and hackers almost use the same set of tools.
We can be punished for “misuse of devices”...
Source: CP-UNION.COM
Sunday, October 7, 12
34. Threats to ICT professionals
Computer technicians are not spared. They should start
asking waivers if they repair, reformat, and troubleshoot
computer systems and networks. They could be punished
for “system interference” in Section 4 (a) (4).
It “adds a broken tool to current computer security
toolbox used by computer professionals. It opened new
mechanisms for misinterpretations (intentional or not)
by State authorities wherein innocent computer users
and hackers can be tagged to crimes and punished
without due process.”
Source: CP-UNION.COM
Sunday, October 7, 12
35. Can an IRR fix RA 10175 ?
“As such, Akbayancalls on President Aquino to
address the infirmities of the law by
inviting media people and organizations,
social movements and civil society groups to
participate in the crafting of the law’s
implementing rules and regulations (IRR) to
negate the law’s repressive provisions and safeguard the
rights and welfare of internet users. The Aquino
government must swiftly act to salvage this law or
otherwise the people will have no option left but to bring
this to court.”
September 20, 2012 Statement, AKBAYAN
Sunday, October 7, 12
36. Can an IRR fix RA 10175 ?
No.
@natoreyes:
“The IRR cannot accomplish more than what the law sets
out to do. If the law intends to criminalize online libel,
the IRR cannot reverse or negate this. If the law allows
the take-down of websites by the DOJ sans a court order,
the IRR cannot reverse or negate this.”
... “We’re being drawn to a path that leads to a cliff. Huwag
magpaloko.”
Source: http://natoreyes.wordpress.com
Sunday, October 7, 12
46. Binuo ng Computer Professionals’ Union
www.cp-union.com
Ref: http://www.facebook.com/PixelOffensive
BAYAN Supreme Court Petition
Bloggers and Netizens vs Aquino Supreme Court Petition
*Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions
*Mga imahe mula sa Pixel Offensive.
Sunday, October 7, 12
47. On the Cybercrime Law by Computer Professionals’ Union
and Rick Bahague is licensed under a Creative Commons
Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Based on a work at www.cp-union.com.
Sunday, October 7, 12