SlideShare a Scribd company logo
Sunday, October 7, 12
Sunday, October 7, 12
Cybercrime Prevention
                             Act of 2012
                                Computer Professionals’ Union
                                      5 October 2012




         *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court
         Petitions at mga imahe mula sa Pixel Offensive.

Sunday, October 7, 12
Sunday, October 7, 12
Background
         Passed House of Representatives on 04 June 2012

              Senate Bill No. 2796 and House Bill No. 5808


         Passed Senate on 05 June 2012

         Signed into law on 12 September 2012

              An Act Defining Cybercrime, Providing for the Prevention,
              Investigation, Suppression, and the Imposition of Penalties therefor
              and for other Purposes


         Implemented: October 3, 2012
Sunday, October 7, 12
Endorsed by these
         senators.



         “TG” Guingona III
         voting against it.




Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
We fight back!

                  SC petitions to Junk/Repeal/Amend

                        Senate Bill No. 2796 and House Bill No. 5808




Sunday, October 7, 12
We fight back!


                         Online blackout campaign




Sunday, October 7, 12
We fight back!

               Silent protest in SC




Sunday, October 7, 12
We fight back!

            Protest in SC




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
“Anonymous” fights back!




Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
What is the RA 10175 ?
            Section 4: Cybercrime Offenses

                  Illegal access, illegal interception, data interception, data
                  interference (a)(3), system interference, misuse of devices

                  Computer-related forgery, computer-related fraud, computer-
                  related identity theft

                  Cybersex, child pornography, unsolicited commercial
                  communications

                  Libel



Sunday, October 7, 12
What is the RA 10175 ?
            Section 5: Other Offenses

                  aiding or abetting in the commission of cybercrime, attempt
                  in the commission of cybercrime


            Section 6: All crimes in RPC if committed by, through and with
            the use of ICT

                  Penalty: one degree higher




Sunday, October 7, 12
What is the RA 10175 ?
           Section 4(a)(3) on Data Interference:                   intrudes into
                                                                   people’s freedom
           The intentional or reckless alteration,
           damaging, deletion or deterioration of computer data,   of speech
           electronic document, or electronic data message,
           without right including the introduction or                       alterations
           transmission of viruses


           vague, “sweep unnecessarily broadly”

           “it becomes very burdensome, onerous
           and patently discouraging, specially if
           the act is for purposes of social and
           political criticisms”

     Source: BAYAN SC Petition
Sunday, October 7, 12
What is the RA 10175 ?
           Section 4(b)(3) on Computer-related
           Identity Theft:
                                                                  intrudes into
                                                                  people’s freedom
           The intentional       acquisition, use, misuse,        of speech
           transfer, possession, alteration, or deletion of
           identifying information belonging to                   politician’s full name, age,
           another, whether natural or juridical without right.   education, employment
           Provided, that if no damage has yet been caused, the   background, names of parents,
           penalty imposable shall be one (1) degree lower.       siblings, wife, children and other
                                                                  members of immediate family) of
                                                                  another person (e.g. by
                                                                  intentionally obtaining such
                                                                  identifying information, without
                                                                  any consent, from Facebook,
                                                                  website, or any online article or
                                                                  document)



Sunday, October 7, 12
What is the RA 10175 ?

           Section 4(c)(4) on Libel

             makes anyone a target of prosecution and punishment


             chilling effect on the exercise of freedom of speech

             General Comment   No.   34   of   the   United   Nations   Human   Rights  
             Committee states that   “State   parties should consider the
             decriminalization of defamation

             “a violation or disregard of the Philippine government’s obligations under
             the International Convention on Civil Political Rights to promote and
             protect freedom of expression”
          Source: BAYAN SC Petition
Sunday, October 7, 12
What is the RA 10175 ?
         Section 5(a) on Aiding or        intrudes into people’s
         Abetting in the commission of
         cybercrime:                      freedom of speech
         Section 5(b) on Attempt in the
         commission of cybercrime:




Sunday, October 7, 12
What is the RA 10175 ?
         Section 6 on all crimes defined                    violation of the right
         in Revised Penal Code (RPC),
         if committed by, through and                      of the people not to
         with the use of ICT shall be                      be subjected to
         covered by this Act                               double jeopardy

         Section 7 on Liability under
         other Laws

         A prosecution under this Act shall be without
         prejudice to any liability for violation of any
         provision of RPC etc




Sunday, October 7, 12
What is the RA 10175 ?
         Section 12 (1)                           violation of the right
         Real-Time Collection of Traffic
         Data                                     of the people against
                                                  unreasonable
         Law enforcement authorities, with due
                                                  searches and seizure
         cause, shall be authorized to
         collect or record by technical
         or electronic means traffic               violation of the right
         data in real-time associated with        to privacy
         specified communications transmitted by
         means of a computer system




Sunday, October 7, 12
What is the RA 10175 ?

         Section 17 (1)                                 deprivation of
         Destruction of computer data
                                                        property without due
         Upon expiration of periods authorities shall   process of law
         immediately and completely
         destroy the computer data subject
         to prevention and examination.




Sunday, October 7, 12
What is the RA 10175 ?
         Section 19 (1)
         Restricting of Blocking Access to                 intrudes into
         Computer Data                                     people’s freedom of
         When a computer          data is prima            speech
         facie found to be in violation of the provision
         of this Act, the DOJ shall issue an               grant of unbridled
         order to restrict or block access
         to such computer data.                            power to
                                                           Department of
                                                           Justice
         “take down clause”



Sunday, October 7, 12
Sunday, October 7, 12
Who are affected?

               all users of “mobile phones, computers, computer data
               storage devises (e.g. USB, external hard disks), emails,
               social media and anything that is related to the internet,
               cyberspace and information and communications
               technology”




             Source: BAYAN SC Petition

Sunday, October 7, 12
Threats to ICT professionals

                  For computer professionals and hackers working with
                  information security and network administration our sets
                  of tools can be misinterpreted as tools to commit
                  cybercrime. It should be noted that crackers (bad
                  hackers) and hackers almost use the same set of tools.
                  We can be punished for “misuse of devices”...




                  Source: CP-UNION.COM

Sunday, October 7, 12
Threats to ICT professionals
                  Computer technicians are not spared. They should start
                  asking waivers if they repair, reformat, and troubleshoot
                  computer systems and networks. They could be punished
                  for “system interference” in Section 4 (a) (4).


                  It “adds a broken tool to current computer security
                  toolbox used by computer professionals. It opened new
                  mechanisms for misinterpretations (intentional or not)
                  by State authorities wherein innocent computer users
                  and hackers can be tagged to crimes and punished
                  without due process.”


                  Source: CP-UNION.COM

Sunday, October 7, 12
Can an IRR fix RA 10175 ?
               “As such, Akbayancalls on President Aquino to
               address the infirmities of the law by
               inviting media people and organizations,
               social movements and civil society groups to
               participate in the crafting of the law’s
               implementing rules and regulations (IRR) to
               negate the law’s repressive provisions and safeguard the
               rights and welfare of internet users. The Aquino
               government must swiftly act to salvage this law or
               otherwise the people will have no option left but to bring
               this to court.”
               September 20, 2012 Statement, AKBAYAN
Sunday, October 7, 12
Can an IRR fix RA 10175 ?

                No.


               @natoreyes:
               “The IRR cannot accomplish more than what the law sets
               out to do. If the law intends to criminalize online libel,
               the IRR cannot reverse or negate this. If the law allows
               the take-down of websites by the DOJ sans a court order,
               the IRR cannot reverse or negate this.”
               ... “We’re being drawn to a path that leads to a cliff. Huwag
               magpaloko.”
               Source: http://natoreyes.wordpress.com



Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
We have bigger problems but they decided to prioritize
                 punishment of cybercrime.



Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Binuo ng Computer Professionals’ Union
                              www.cp-union.com




           Ref: http://www.facebook.com/PixelOffensive
           BAYAN Supreme Court Petition
           Bloggers and Netizens vs Aquino Supreme Court Petition

           *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions
           *Mga imahe mula sa Pixel Offensive.




Sunday, October 7, 12
On the Cybercrime Law by Computer Professionals’ Union
                   and Rick Bahague is licensed under a Creative Commons
                 Attribution-NonCommercial-ShareAlike 3.0 Unported License.
                            Based on a work at www.cp-union.com.



Sunday, October 7, 12

More Related Content

What's hot

Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentation
Trix Rodriguez
 
Anti b astos law ra 11313-quinto
Anti b astos law ra 11313-quintoAnti b astos law ra 11313-quinto
Anti b astos law ra 11313-quinto
rubytamayo2
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
shiela mae dupa
 
9 republic act 9208.pptx eman pogi anti-trafficking
9   republic act 9208.pptx eman pogi anti-trafficking9   republic act 9208.pptx eman pogi anti-trafficking
9 republic act 9208.pptx eman pogi anti-trafficking
hanahgail
 
Basic Data Privacy for Non Lawyers
Basic Data Privacy for Non LawyersBasic Data Privacy for Non Lawyers
Basic Data Privacy for Non Lawyers
JDP Consulting
 
Special protection of children against child abuse exploitation and discrim...
Special protection of children against child abuse   exploitation and discrim...Special protection of children against child abuse   exploitation and discrim...
Special protection of children against child abuse exploitation and discrim...
Gerald Anthony Lazaro
 
Orientation ra 9208 ii
Orientation ra 9208 iiOrientation ra 9208 ii
Orientation ra 9208 iiOmar Jacalne
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final ping
XFactor Umitz
 
Rape law lectures
 Rape law lectures Rape law lectures
Rape law lectures
JoyCee8
 
woman and child protection in the Philippines
woman and child protection in the Philippineswoman and child protection in the Philippines
woman and child protection in the PhilippinesJenna Sumnerswift
 
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptxRepublic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
Marsha Pasong
 
ANTIBULLYING PPT.ppt
ANTIBULLYING PPT.pptANTIBULLYING PPT.ppt
ANTIBULLYING PPT.ppt
ArtAlbay1
 
Cybercrime
CybercrimeCybercrime
Cybercrime
John Ela Echon
 
RA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptxRA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptx
ArthurLegaspina3
 
ANTI-HAZING-ACT-OF-2018-pptx.pptx
ANTI-HAZING-ACT-OF-2018-pptx.pptxANTI-HAZING-ACT-OF-2018-pptx.pptx
ANTI-HAZING-ACT-OF-2018-pptx.pptx
JaninGallana
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
ian amper
 

What's hot (20)

Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentation
 
Republic act 8353
Republic act 8353Republic act 8353
Republic act 8353
 
Anti b astos law ra 11313-quinto
Anti b astos law ra 11313-quintoAnti b astos law ra 11313-quinto
Anti b astos law ra 11313-quinto
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
9 republic act 9208.pptx eman pogi anti-trafficking
9   republic act 9208.pptx eman pogi anti-trafficking9   republic act 9208.pptx eman pogi anti-trafficking
9 republic act 9208.pptx eman pogi anti-trafficking
 
Basic Data Privacy for Non Lawyers
Basic Data Privacy for Non LawyersBasic Data Privacy for Non Lawyers
Basic Data Privacy for Non Lawyers
 
Special protection of children against child abuse exploitation and discrim...
Special protection of children against child abuse   exploitation and discrim...Special protection of children against child abuse   exploitation and discrim...
Special protection of children against child abuse exploitation and discrim...
 
Orientation ra 9208 ii
Orientation ra 9208 iiOrientation ra 9208 ii
Orientation ra 9208 ii
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final ping
 
Rape law lectures
 Rape law lectures Rape law lectures
Rape law lectures
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
woman and child protection in the Philippines
woman and child protection in the Philippineswoman and child protection in the Philippines
woman and child protection in the Philippines
 
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptxRepublic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
 
ANTIBULLYING PPT.ppt
ANTIBULLYING PPT.pptANTIBULLYING PPT.ppt
ANTIBULLYING PPT.ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
RA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptxRA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptx
 
ANTI-HAZING-ACT-OF-2018-pptx.pptx
ANTI-HAZING-ACT-OF-2018-pptx.pptxANTI-HAZING-ACT-OF-2018-pptx.pptx
ANTI-HAZING-ACT-OF-2018-pptx.pptx
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 

Viewers also liked

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Paola Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancementsguest5f7bf4
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkingHamid Zainudin
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
Shatakshi Goswami
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
JIJO CLEETUS
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
Frances Coronel
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry BenRay95
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
PECB
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Viewers also liked (18)

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to On the cybercrime act

Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
MarkDennielMontiano
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Anna Manley
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case StudyEddan Katz
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
Kevin Cedeño, CISM, CISA
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
TheMuslimLady
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
Teeth Maestro
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
MohaiUDin
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
London School of Cyber Security
 
IT ACT 2000
IT ACT 2000IT ACT 2000
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
YashPatel132112
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
Megan Espinoza
 
2009 case law overview
2009 case law overview2009 case law overview
2009 case law overview
Richard Whidden
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
Agustina
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
atuljaybhaye
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 

Similar to On the cybercrime act (20)

Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case Study
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
2009 case law overview
2009 case law overview2009 case law overview
2009 case law overview
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 

More from CP-Union

James Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonJames Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on Python
CP-Union
 
Albert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisAlbert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and Analysis
CP-Union
 
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
CP-Union
 
Jojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaJojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to Wikimedia
CP-Union
 
Gerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerGerald Villorente on Intro to Docker
Gerald Villorente on Intro to Docker
CP-Union
 
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryEladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
CP-Union
 
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardRep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
CP-Union
 
Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.
CP-Union
 
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
CP-Union
 
Foss and ict for the people
Foss and ict for the peopleFoss and ict for the people
Foss and ict for the peopleCP-Union
 
Drupal for Non-Profits
Drupal for Non-ProfitsDrupal for Non-Profits
Drupal for Non-Profits
CP-Union
 

More from CP-Union (11)

James Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonJames Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on Python
 
Albert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisAlbert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and Analysis
 
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
 
Jojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaJojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to Wikimedia
 
Gerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerGerald Villorente on Intro to Docker
Gerald Villorente on Intro to Docker
 
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryEladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
 
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardRep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
 
Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.
 
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
 
Foss and ict for the people
Foss and ict for the peopleFoss and ict for the people
Foss and ict for the people
 
Drupal for Non-Profits
Drupal for Non-ProfitsDrupal for Non-Profits
Drupal for Non-Profits
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 

On the cybercrime act

  • 3. Cybercrime Prevention Act of 2012 Computer Professionals’ Union 5 October 2012 *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions at mga imahe mula sa Pixel Offensive. Sunday, October 7, 12
  • 5. Background Passed House of Representatives on 04 June 2012 Senate Bill No. 2796 and House Bill No. 5808 Passed Senate on 05 June 2012 Signed into law on 12 September 2012 An Act Defining Cybercrime, Providing for the Prevention, Investigation, Suppression, and the Imposition of Penalties therefor and for other Purposes Implemented: October 3, 2012 Sunday, October 7, 12
  • 6. Endorsed by these senators. “TG” Guingona III voting against it. Sunday, October 7, 12
  • 9. We fight back! SC petitions to Junk/Repeal/Amend Senate Bill No. 2796 and House Bill No. 5808 Sunday, October 7, 12
  • 10. We fight back! Online blackout campaign Sunday, October 7, 12
  • 11. We fight back! Silent protest in SC Sunday, October 7, 12
  • 12. We fight back! Protest in SC Sunday, October 7, 12
  • 13. We fight back! Social Media Sunday, October 7, 12
  • 14. We fight back! Social Media Sunday, October 7, 12
  • 15. We fight back! Social Media Sunday, October 7, 12
  • 16. We fight back! Social Media Sunday, October 7, 12
  • 17. We fight back! Social Media Sunday, October 7, 12
  • 21. What is the RA 10175 ? Section 4: Cybercrime Offenses Illegal access, illegal interception, data interception, data interference (a)(3), system interference, misuse of devices Computer-related forgery, computer-related fraud, computer- related identity theft Cybersex, child pornography, unsolicited commercial communications Libel Sunday, October 7, 12
  • 22. What is the RA 10175 ? Section 5: Other Offenses aiding or abetting in the commission of cybercrime, attempt in the commission of cybercrime Section 6: All crimes in RPC if committed by, through and with the use of ICT Penalty: one degree higher Sunday, October 7, 12
  • 23. What is the RA 10175 ? Section 4(a)(3) on Data Interference: intrudes into people’s freedom The intentional or reckless alteration, damaging, deletion or deterioration of computer data, of speech electronic document, or electronic data message, without right including the introduction or alterations transmission of viruses vague, “sweep unnecessarily broadly” “it becomes very burdensome, onerous and patently discouraging, specially if the act is for purposes of social and political criticisms” Source: BAYAN SC Petition Sunday, October 7, 12
  • 24. What is the RA 10175 ? Section 4(b)(3) on Computer-related Identity Theft: intrudes into people’s freedom The intentional acquisition, use, misuse, of speech transfer, possession, alteration, or deletion of identifying information belonging to politician’s full name, age, another, whether natural or juridical without right. education, employment Provided, that if no damage has yet been caused, the background, names of parents, penalty imposable shall be one (1) degree lower. siblings, wife, children and other members of immediate family) of another person (e.g. by intentionally obtaining such identifying information, without any consent, from Facebook, website, or any online article or document) Sunday, October 7, 12
  • 25. What is the RA 10175 ? Section 4(c)(4) on Libel makes anyone a target of prosecution and punishment chilling effect on the exercise of freedom of speech General Comment   No.   34   of   the   United   Nations   Human   Rights   Committee states that   “State   parties should consider the decriminalization of defamation “a violation or disregard of the Philippine government’s obligations under the International Convention on Civil Political Rights to promote and protect freedom of expression” Source: BAYAN SC Petition Sunday, October 7, 12
  • 26. What is the RA 10175 ? Section 5(a) on Aiding or intrudes into people’s Abetting in the commission of cybercrime: freedom of speech Section 5(b) on Attempt in the commission of cybercrime: Sunday, October 7, 12
  • 27. What is the RA 10175 ? Section 6 on all crimes defined violation of the right in Revised Penal Code (RPC), if committed by, through and of the people not to with the use of ICT shall be be subjected to covered by this Act double jeopardy Section 7 on Liability under other Laws A prosecution under this Act shall be without prejudice to any liability for violation of any provision of RPC etc Sunday, October 7, 12
  • 28. What is the RA 10175 ? Section 12 (1) violation of the right Real-Time Collection of Traffic Data of the people against unreasonable Law enforcement authorities, with due searches and seizure cause, shall be authorized to collect or record by technical or electronic means traffic violation of the right data in real-time associated with to privacy specified communications transmitted by means of a computer system Sunday, October 7, 12
  • 29. What is the RA 10175 ? Section 17 (1) deprivation of Destruction of computer data property without due Upon expiration of periods authorities shall process of law immediately and completely destroy the computer data subject to prevention and examination. Sunday, October 7, 12
  • 30. What is the RA 10175 ? Section 19 (1) Restricting of Blocking Access to intrudes into Computer Data people’s freedom of When a computer data is prima speech facie found to be in violation of the provision of this Act, the DOJ shall issue an grant of unbridled order to restrict or block access to such computer data. power to Department of Justice “take down clause” Sunday, October 7, 12
  • 32. Who are affected? all users of “mobile phones, computers, computer data storage devises (e.g. USB, external hard disks), emails, social media and anything that is related to the internet, cyberspace and information and communications technology” Source: BAYAN SC Petition Sunday, October 7, 12
  • 33. Threats to ICT professionals For computer professionals and hackers working with information security and network administration our sets of tools can be misinterpreted as tools to commit cybercrime. It should be noted that crackers (bad hackers) and hackers almost use the same set of tools. We can be punished for “misuse of devices”... Source: CP-UNION.COM Sunday, October 7, 12
  • 34. Threats to ICT professionals Computer technicians are not spared. They should start asking waivers if they repair, reformat, and troubleshoot computer systems and networks. They could be punished for “system interference” in Section 4 (a) (4). It “adds a broken tool to current computer security toolbox used by computer professionals. It opened new mechanisms for misinterpretations (intentional or not) by State authorities wherein innocent computer users and hackers can be tagged to crimes and punished without due process.” Source: CP-UNION.COM Sunday, October 7, 12
  • 35. Can an IRR fix RA 10175 ? “As such, Akbayancalls on President Aquino to address the infirmities of the law by inviting media people and organizations, social movements and civil society groups to participate in the crafting of the law’s implementing rules and regulations (IRR) to negate the law’s repressive provisions and safeguard the rights and welfare of internet users. The Aquino government must swiftly act to salvage this law or otherwise the people will have no option left but to bring this to court.” September 20, 2012 Statement, AKBAYAN Sunday, October 7, 12
  • 36. Can an IRR fix RA 10175 ? No. @natoreyes: “The IRR cannot accomplish more than what the law sets out to do. If the law intends to criminalize online libel, the IRR cannot reverse or negate this. If the law allows the take-down of websites by the DOJ sans a court order, the IRR cannot reverse or negate this.” ... “We’re being drawn to a path that leads to a cliff. Huwag magpaloko.” Source: http://natoreyes.wordpress.com Sunday, October 7, 12
  • 39. We have bigger problems but they decided to prioritize punishment of cybercrime. Sunday, October 7, 12
  • 46. Binuo ng Computer Professionals’ Union www.cp-union.com Ref: http://www.facebook.com/PixelOffensive BAYAN Supreme Court Petition Bloggers and Netizens vs Aquino Supreme Court Petition *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions *Mga imahe mula sa Pixel Offensive. Sunday, October 7, 12
  • 47. On the Cybercrime Law by Computer Professionals’ Union and Rick Bahague is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Based on a work at www.cp-union.com. Sunday, October 7, 12