CYBER CRIME
LAW
Back...!!!
Table of ContentI.Cyber Crime Law
A)Definitio
B)History
II.What is Cyber Crime
III.Why we learn about Cyber Crime?
IV.Cyber Crime Victims
V. Types of Cyber Crime
A) Hacking
B) Denial of service attack
C) Virus Dessimanition
D) Software piracy
E) Pornography
F) Credit card Fraud
G)NIRC CrimeInternet Chat(IRC)
H)Phishing
I)Spoofing
J)Cyber stalking
K)Cyber Defamation
L)Threatening
M)Salami attack
N)Sale of narcotics
V.Cyber Crime Punishment
VI.Cyber Crime Penalty
VII.Protecting your self from Cyber Crime
VIII.Top 10 Cyber Crime prevention tips
IX.The 10 Commandments of the Cyber crime law
X. Reference
Cyber Crime law
(republiC aCt No. 10175)
Isa  in the  Philippinesapproved on 12 September 2012.It aimsto
addresslegal issuesconcerning onlineinteractionsand theinternet
In thephilippines. Among theCyber crimeoffensesincluded in the
Bill are cybersquatting, cybersex, child pornography, identity theft,
Illegal accessto dataand libel. Whilehailed for penalizing illegal
doneviatheinternet that werenot covered by old laws, theact
hasbeen criticized for itsprovision on criminalizing libel, which
isperceived to beacurtailment in freedom of expression.  
Back...!!!!
HiStory
TheCyber crimePreventionAct of 2012 isthefirst law in the
Philippines which specifically criminalizes computer crime,which
prior to thepassageof thelaw had no strong legal precedent in
Philippinesjurisprudence. Whilelawssuch astheElectronic
CommerceAct of 2000(RepublicAct 8792) regulated certain
 computer-related activities, theselawsdid not providealegal basis
for criminalizing crimescommitted on acomputer in general :
for example, Onel deGuzman, thecomputer programmer charged
with purportedly writing the  I LOVE YOU computer worm, was
ultimately not prosecuted by Philippineauthoritiesdueto alack
of legal basisfor him to becharged under existing Philippines
lawsat thetimeof hisarrest.
Back...!!!
Thefirst spam email took placein 1978 when it wassent out over
theARPAnet, theDefenseDepartment'snetwork. It wasused to
flog anew computer. Thefirst viruswasinstalled on an apple
computer in 1982 when ahigh school student, Rich Skrenta,
developed theElk cloner. Hehid it on afloppy disk that we
needed to boot theoperating system on thecomputer. For every
fifty bootsthat weremade, abad poem appeared on thecomputer
Screen.
Back...!!!
WHAT IS
CYBER CRIME?
Back...!!!
Cyber crimesareillegal activitiesthat occur over thecomputer,
usually over theInternet. Thisisarelatively new crimedueto
thefact that theInternet and advancesin technology arepretty
recent. With theadvent of smartphonesand tablets, cyber crimes
now hit thoseaswell aslaptops, computers, and gaming systems.
All crimesperformed or resorted to by abuseof electronic
mediaor otherwise, with thepurposeof influencing the
functioning of computer or computer system.
IN SHORT
COMPUTER CRIME isany crime
whereComputer isatarget. – Computer isatool of
crime– Computer isincidental to crime
Back...!!!
wHy we learN about
Cyber Crime?
ecause everybody is using COMPUTERS. From white collar
riminals to terrorist organizations And from Teenagers to Adults
onventional crimes like Forgery, extortions, kidnapping etc. bein
ommitted with the help off computers. New generation is growin
p with computer. Most important,Monetary transaction are
moving on to the INTERNET.
Back...!!!
CYBER CRIME VICTIMS
Disgruntled employees
Gullible
Teenagers
Desperados and greedy
Professional hackers people
Business Rival
Unskilled orUnexperienced
Ex boy friend orEx girl friend
Unlucky people
Divorced husband
Back...!!!
TYPES OF CYBER CRIME
HACKING
Hacking in simpletermsmeansillegal intrusioninto acomputer
System without thepermissionof thecomputer owner/user.
DENIALOFSERVICEATTACK
Thisisan act by thecriminal, who floodstheband width of the
victim’sNetwork or fillshise-mail box with spaam mail depriving
him of theservicesheisentitled to accessor provide.
VIRUS DISSEMINATION
Thisisan act by the• Malicioussoftwarecriminal, who floods
that attachesitself to thebandwidth of theother software.
victim‘snetwork or (virus, worms, Trojan fillshise-mail box Horse,
Timewith spam mail bomb, ETC.)
Back...!!!
SOFTWAREPIRACY
Theft of softwarethrough theillegal copying of genuineprograms
or thecounterfeiting and distribution of productsintended to pass
for theoriginal. Retail revenuelossesworldwideareever Increasing
dueto thiscrime. Can bedonein variousways. End user copying,
Hard disk loading, Counterfeiting, Illegal downloadsfrom the
internet etc.
PORNOGRAPHY
Pornography isthefirst consistently successful ecommerceproduct.
Deceptivemarketing tacticsand mousetrapping technologiesPor
nography encouragecustomersto accesstheir websites. Anybody
including children can log on to theinternet and accesswebsites
with pornographic contentswith aclick of amouse.
Back...!!!
CREDITCARDFRAUD
You simply haveto typecredit card number into www pageoff
thevendor for onlinetransaction.• If electronic transactionsare
not secured thecredit card numberscan bestolen by thehackers
who can misusethiscard by impersonating thecredit card owner
. Credit card skimmer
A. How thecredit card skimmer isusedCredit card skimmer, is
used to collect thedataof userbeforeit swapped.
B. Additional Slot InATM Machine
C. Falsepamphlet Box Affixed toATM Cubical side
D. InsidetheFalsepamphlet Box Cameraposition at correct angle
to view keypad & monitor.
Back...!!!
NIRC CRIMEInternet Relay Chat (IRC)
servershavechat roomsin whichpeoplefrom anywhere. The
world can cometogether andchat with each other. Criminalsuse
it for meeting.– Hackersuseit for discussing their exploits/
sharing thetechniques. Paedophilesusechat roomsto alluresmall
Children. Cyber Stalking - In order to harassawoman her
telephonenumber isgiven to othersasif shewantsto befriend
Males.
PHISHING
Copying the• It istechniqueof company’spulling out confidential
datain confidential order to extort said information from the
company for hugebank/financial amount.. institutional account
holdersby deceptivemeans.
Back...!!!
SPOOFING
Getting onecomputer on anetwork to pretend to havetheidentity
of another computer, usually onewith special accessprivileges, so
asto obtain accessto theother computerson thenetwork..
CYBERSTALKING
TheCriminal followson anetwork to thevictim by pretend to have
thesending identity off another computer, usually oneemails,
entering thewith special accesschat roomsprivileges, so asto
frequently. obtain accessto theother computerson thenetwork.
CYBERDEFAMATION
TheCriminal sendsemailscontaining defamatory mattersto all
concerned of thevictim or post thedefamatory matterson awebsite.
(disgruntled employeemay do thisagainst boss, ex-boysfriend
Against girl, divorced husband against wifeetc)
Back...!!!
THREATENING
TheCriminal sendsemails• TheCriminal sendscontaining
Defamatory threatening email or mattersto all concerned comes
in contact in chat off thevictim or post theroomswith victim.
defamatory matterson awebsite.
SALAMIATTACK
In such crimecriminal makesinsignificant changesin such a
manner that such changeswould go unnoticed. Criminal makes
such program that deductssmall amount like2.50 per month
from theaccount of all thecustomer of theBank and deposit the
samein hisaccount. In thiscaseno account holder will approach
thebank for such small amount but criminal gainshugeamount.
Back...!!!
SALEOFNARCOTICS
In such crimecriminal makes
Sale& Purchasethrough insignificant changesin such anet..
manner that such changeswould
Thereareweb sitewhich go unnoticed. offer saleand•
Criminal makessuch program that
deductssmall amount like
Shipment off contrabandsRs. 2.50 per month from thedrugs..
account of all thecustomer of They may usethetechniques
theBank and deposit thesamein off hisaccount. In this
caseno Stegnography for hiding theaccount holder will
approach thebank for such small amount but messages..
criminal gainshugeamount.
Back...!!!
CYBER CRIME PUNISHMENT
Punishment fora variety of cyber-crimes will often depend on
the location and which state the crime took place in.
Each state has theirown set of laws that deal with internet
crime and it's offenders. Child pornography is one of
the harshest internet crimes and most often will be punished
with jail time, and theirname being registered in the
sexual predators list.
Back...!!!
CYBER CRIME
PENALTY
Back...!!!
A.)Any person found guilty of committing cybercrimeacts
enumerated six yearsand oneday to twelve12 yearsin prison, or a
fineof at least PHP200,000 up to PHP500,000.
B.)A person found guilty of committing punishableactsenumerated
In thefirst group shall bepunished with reclusio n tempo ral, or
Serving of12 yearsand oneday to 20 yearsin prison, or afineof
atleast PHP500,000 up to themaximum amount in proportion
to thedamageincurred, or both.
C.)A person found guilty of committing cybersex shall bepunished
in thefirst two groupsshall bepunished with prisio n mayo r, or
serving with prisio n mayo r, or serving of six yearsand oneday to
12 yearsin prison, or afineof at least PHP200,000 but not
Exceeding PHP1,000,000, or both.
Back...!!!
D.)A person found guilty of committing child pornography shall be
punished with thepenaltiesenumerated in theRepublicAct
No. 9775.
E.)A person found guilty of committing unsolicited
commercial communicationsshall bepunished with arresto
mayo r, or serving of onemonth and oneday to six months, or
afineof at least PHP50,000 but not exceeding PHP250,000,
or both.
F.)A person found guilty of committing other offensesenumerated
in thelast group shall bepunished with imprisonment onedegree
lower than that of theprescribed penalty for theoffense, or afine
of at least PHP100,000 but not exceeding PHP500,000, or both.
Back...!!!
PROTECTING YOURSELF
FROMCYBER-CRIME?
Individuals can protect themselves from credit card
fraud by not replying to strange orunusual emails
asking forpersonal financial information. Shoppers
also need to be aware that any shopping website has an
encrypted secure shopping cart when inputting theircredit
card information. Parents can keep a closereye on their
children and install filters to block out unwanted material
on the internet, and keep them away from chatrooms to
prevent Internet harassment and block internet predators.
Back...!!!
ToP 10
CYBER CRIME
PREvENTIoN TIPs
Back...!!!
1.Use Strong Passwords
Usedifferent user ID / password combinationsfor different account
and avoid writing them down. Makethepasswordsmorecomplicated
by combining letters, numbers, special characters(minimum 10 charactersin total)
and changethem on aregular basis.
2. Secure yourcomputer
Activate yourfirewall
Firewallsarethefirst lineof cyber defense; they block connections
to unknown or bogussitesand will keep out sometypesof viruses
and hackers.
3. Use anti-virus/malware software
Prevent virusesfrom infecting your computer by installing and
regularly updating anti-virussoftware.
Block spyware attacks
Prevent spywarefrom infiltrating your computer by installing and
updating anti-spywaresoftware.
Back...!!!
4. Be Social-Media Savvy
Makesureyour social networking profiles(e.g.facebook,Twiter,
Youtube, MSN, etc.) areset to private. Check your security
settings. Becareful what information you post online.  Onceit
ison theInternet, it isthereforever!
Secure yourMobile Devices
Beawarethat your mobiledeviceisvulnerableto virusesand
hackers.  Download applicationsfrom trusted sources.
5.Install the latest operating system updates
Keep your applicationsand operating system (e.g. Windows,
Mac, Linux) current with thelatest system updates. Turn on
automatic updatesto prevent potential attackson older software.
Back...!!!
6. Protect yourData 
Useencryption for your most sensitivefilessuch astax returns
or financial records, makeregular back-upsof all your important
data, and storeit in another location.
7. Secure yourwireless network
Wi-Fi (wireless) networksat homearevulnerableto intrusion if
they arenot properly secured. Review and modify default settings.
Public Wi-Fi, a.k.a. “Hot Spots”, arealso vulnerable. Avoid conducting
financial or corporatetransactionson thesenetworks.
8. Protect youre-identity
Becautiouswhen giving out personal information such asyour
name, address, phonenumber or financial information on the
Internet. Makesurethat websitesaresecure(e.g. when making
onlinepurchases) or that you’veenabled privacy settings
Back...!!!
9. Avoid being scammed
Alwaysthink beforeyou click on alink or fileof unknown origin.
Don’t feel pressured by any emails. Check thesourceof themessage.
When in doubt, verify thesource. Never reply to emailsthat ask you
to verify your information or confirm your user ID or password.  
1o. Call the right person forhelp
Don’t panic! If you areavictim, if you encounter illegal Internet
content (e.g. child exploitation) or if you suspect acomputer crime,
identity theft or acommercial scam, report thisto your local police.
If you need help with maintenanceor softwareinstallation on your
computer, consult with your serviceprovider or acertified computer
technician.
Back...!!!
The 10
Commandments
of the
Cybercrime Law
of
the Philippines.Back...!!!
1.You shall only say nicethingson theInternet.Thisisthemain fault
attributed to thelaw: It'saviolation of theFreedom of Expression
with itscyberlibel provision. Thanksto thisprovision inserted
"without knowledge" by most of thelawmakers, if you say something
bad against certain peopleon theInternet, you can becharged in
court.
2.You cannot tell theTruth, whether joking or seriously, if it hurts
someone--In relation to the1st Commandment, regardlessif
you stateafact or you usesatireor sarcasm or even say something
in ajoking toneon the'net, you can still beheld liablefor cyberlibel
for impugning against another person'ssupposed dignity asper
theanti-libel law of theRevised Penal Code.
Back...!!!
3. What you say can beheld against you forever.
According to onlinelegal expert Atty. JJDisini, because
of thenatureof your onlineposts, anything you posted
yearsago that arestill livetoday can bestill held against
you in acourt of law.
4. What you likecan also beheld against you--In relation
to the3rd Commandment, liking aFB post can beconsidered
asabetting libel. Retweeting aprobably libeloustweet might
becovered hereaswell so bewarned.
5. Thegovernment now hasthepower to takedown your
Internet--Thanksto thepower given by thelaw, theDepartment
of Justice, together with itsarmsin theNational Bureau of
Investigation and thePhilippineNational Policehavethepower
to order theshutdown of Web sitesif thereisprimafacieevidence
of violation of thelaw--even without acourt warrant.
Back...!!!
6. Your Internet isrequired to compileevidenceagainst you.
In relation to the5th Commandment, Internet serviceproviders
arenow required to keep their datafor six monthsafter which
they can beforced to keep it for six moremonthsif authorities
request it.
7. You can bepunished moreharshly for onlinecrimesthan for
real lifecrimes--Thanksto thewording of thelaw, punishment
for thosecharged with thislaw is"onedegreehigher" than that
provided for in theRevised Penal Code. Becauseof this, if you're
charged with onlinelibel, you can befined amillion bucksor spend
12 monthsin jail.
Back...!!!
8. You must trust thegovernment to do theright thing
in implementing thelaw--Thegovernment refusesto budge
on thislaw, saying thepublic should trust them to comeup
with theproper Implementing Rulesand Regulation to ensure
that therewon't beabusesof thelaw despitethevaguewording.
Thisafter thesomeof thelawmakerswho signed thelaw admitted
they had no ideawhat had goneinto thelaw.
9. Thelaw shall apply to all Filipinoswherever they are. Just
becauseyou think you'renot in thePhilippines, you can escape
jurisdiction from thisPhilippinelaw. Think again: thislaw has
universal jurisdiction. Even your electronic devicesthat aresituated
(or even partly) in thePhilippinesareunder jurisdiction under this
law.
Back...!!!
10. Thelaw doesn't really protect you. Supposedly it
goesafter identity-theft. However, becauseof theheavy
provisionsagainst onlinelibel, ahacker can takeover your
account and post libelousstuff, and then pull out. From
thesafety of distance, hecan watch thefireworksfly asthe
government screwsyou over. So yes, it can protect industries
and therich and powerful, just not you.
Back...!!!
REFERENCE:
CYBERCRIME HANDBOOK
BY BERNADETTE H. SCHELL AND CLEMENSMARTINS
SANTA BARBARA,
CA: ABC-CLIO,2004. 247PP
Back...!!!
Cyber crime law libreoffice

Cyber crime law libreoffice

  • 1.
  • 2.
    Table of ContentI.CyberCrime Law A)Definitio B)History II.What is Cyber Crime III.Why we learn about Cyber Crime? IV.Cyber Crime Victims V. Types of Cyber Crime A) Hacking B) Denial of service attack C) Virus Dessimanition D) Software piracy E) Pornography F) Credit card Fraud
  • 3.
    G)NIRC CrimeInternet Chat(IRC) H)Phishing I)Spoofing J)Cyberstalking K)Cyber Defamation L)Threatening M)Salami attack N)Sale of narcotics V.Cyber Crime Punishment VI.Cyber Crime Penalty VII.Protecting your self from Cyber Crime VIII.Top 10 Cyber Crime prevention tips IX.The 10 Commandments of the Cyber crime law X. Reference
  • 4.
    Cyber Crime law (republiCaCt No. 10175) Isa  in the  Philippinesapproved on 12 September 2012.It aimsto addresslegal issuesconcerning onlineinteractionsand theinternet In thephilippines. Among theCyber crimeoffensesincluded in the Bill are cybersquatting, cybersex, child pornography, identity theft, Illegal accessto dataand libel. Whilehailed for penalizing illegal doneviatheinternet that werenot covered by old laws, theact hasbeen criticized for itsprovision on criminalizing libel, which isperceived to beacurtailment in freedom of expression.   Back...!!!!
  • 5.
    HiStory TheCyber crimePreventionAct of2012 isthefirst law in the Philippines which specifically criminalizes computer crime,which prior to thepassageof thelaw had no strong legal precedent in Philippinesjurisprudence. Whilelawssuch astheElectronic CommerceAct of 2000(RepublicAct 8792) regulated certain  computer-related activities, theselawsdid not providealegal basis for criminalizing crimescommitted on acomputer in general : for example, Onel deGuzman, thecomputer programmer charged with purportedly writing the  I LOVE YOU computer worm, was ultimately not prosecuted by Philippineauthoritiesdueto alack of legal basisfor him to becharged under existing Philippines lawsat thetimeof hisarrest. Back...!!!
  • 6.
    Thefirst spam emailtook placein 1978 when it wassent out over theARPAnet, theDefenseDepartment'snetwork. It wasused to flog anew computer. Thefirst viruswasinstalled on an apple computer in 1982 when ahigh school student, Rich Skrenta, developed theElk cloner. Hehid it on afloppy disk that we needed to boot theoperating system on thecomputer. For every fifty bootsthat weremade, abad poem appeared on thecomputer Screen. Back...!!!
  • 7.
  • 8.
    Cyber crimesareillegal activitiesthatoccur over thecomputer, usually over theInternet. Thisisarelatively new crimedueto thefact that theInternet and advancesin technology arepretty recent. With theadvent of smartphonesand tablets, cyber crimes now hit thoseaswell aslaptops, computers, and gaming systems. All crimesperformed or resorted to by abuseof electronic mediaor otherwise, with thepurposeof influencing the functioning of computer or computer system. IN SHORT COMPUTER CRIME isany crime whereComputer isatarget. – Computer isatool of crime– Computer isincidental to crime Back...!!!
  • 9.
    wHy we learNabout Cyber Crime? ecause everybody is using COMPUTERS. From white collar riminals to terrorist organizations And from Teenagers to Adults onventional crimes like Forgery, extortions, kidnapping etc. bein ommitted with the help off computers. New generation is growin p with computer. Most important,Monetary transaction are moving on to the INTERNET. Back...!!!
  • 10.
    CYBER CRIME VICTIMS Disgruntledemployees Gullible Teenagers Desperados and greedy Professional hackers people Business Rival Unskilled orUnexperienced Ex boy friend orEx girl friend Unlucky people Divorced husband Back...!!!
  • 11.
    TYPES OF CYBERCRIME HACKING Hacking in simpletermsmeansillegal intrusioninto acomputer System without thepermissionof thecomputer owner/user. DENIALOFSERVICEATTACK Thisisan act by thecriminal, who floodstheband width of the victim’sNetwork or fillshise-mail box with spaam mail depriving him of theservicesheisentitled to accessor provide. VIRUS DISSEMINATION Thisisan act by the• Malicioussoftwarecriminal, who floods that attachesitself to thebandwidth of theother software. victim‘snetwork or (virus, worms, Trojan fillshise-mail box Horse, Timewith spam mail bomb, ETC.) Back...!!!
  • 12.
    SOFTWAREPIRACY Theft of softwarethroughtheillegal copying of genuineprograms or thecounterfeiting and distribution of productsintended to pass for theoriginal. Retail revenuelossesworldwideareever Increasing dueto thiscrime. Can bedonein variousways. End user copying, Hard disk loading, Counterfeiting, Illegal downloadsfrom the internet etc. PORNOGRAPHY Pornography isthefirst consistently successful ecommerceproduct. Deceptivemarketing tacticsand mousetrapping technologiesPor nography encouragecustomersto accesstheir websites. Anybody including children can log on to theinternet and accesswebsites with pornographic contentswith aclick of amouse. Back...!!!
  • 13.
    CREDITCARDFRAUD You simply havetotypecredit card number into www pageoff thevendor for onlinetransaction.• If electronic transactionsare not secured thecredit card numberscan bestolen by thehackers who can misusethiscard by impersonating thecredit card owner . Credit card skimmer A. How thecredit card skimmer isusedCredit card skimmer, is used to collect thedataof userbeforeit swapped. B. Additional Slot InATM Machine C. Falsepamphlet Box Affixed toATM Cubical side D. InsidetheFalsepamphlet Box Cameraposition at correct angle to view keypad & monitor. Back...!!!
  • 14.
    NIRC CRIMEInternet RelayChat (IRC) servershavechat roomsin whichpeoplefrom anywhere. The world can cometogether andchat with each other. Criminalsuse it for meeting.– Hackersuseit for discussing their exploits/ sharing thetechniques. Paedophilesusechat roomsto alluresmall Children. Cyber Stalking - In order to harassawoman her telephonenumber isgiven to othersasif shewantsto befriend Males. PHISHING Copying the• It istechniqueof company’spulling out confidential datain confidential order to extort said information from the company for hugebank/financial amount.. institutional account holdersby deceptivemeans. Back...!!!
  • 15.
    SPOOFING Getting onecomputer onanetwork to pretend to havetheidentity of another computer, usually onewith special accessprivileges, so asto obtain accessto theother computerson thenetwork.. CYBERSTALKING TheCriminal followson anetwork to thevictim by pretend to have thesending identity off another computer, usually oneemails, entering thewith special accesschat roomsprivileges, so asto frequently. obtain accessto theother computerson thenetwork. CYBERDEFAMATION TheCriminal sendsemailscontaining defamatory mattersto all concerned of thevictim or post thedefamatory matterson awebsite. (disgruntled employeemay do thisagainst boss, ex-boysfriend Against girl, divorced husband against wifeetc) Back...!!!
  • 16.
    THREATENING TheCriminal sendsemails• TheCriminalsendscontaining Defamatory threatening email or mattersto all concerned comes in contact in chat off thevictim or post theroomswith victim. defamatory matterson awebsite. SALAMIATTACK In such crimecriminal makesinsignificant changesin such a manner that such changeswould go unnoticed. Criminal makes such program that deductssmall amount like2.50 per month from theaccount of all thecustomer of theBank and deposit the samein hisaccount. In thiscaseno account holder will approach thebank for such small amount but criminal gainshugeamount. Back...!!!
  • 17.
    SALEOFNARCOTICS In such crimecriminalmakes Sale& Purchasethrough insignificant changesin such anet.. manner that such changeswould Thereareweb sitewhich go unnoticed. offer saleand• Criminal makessuch program that deductssmall amount like Shipment off contrabandsRs. 2.50 per month from thedrugs.. account of all thecustomer of They may usethetechniques theBank and deposit thesamein off hisaccount. In this caseno Stegnography for hiding theaccount holder will approach thebank for such small amount but messages.. criminal gainshugeamount. Back...!!!
  • 18.
    CYBER CRIME PUNISHMENT Punishmentfora variety of cyber-crimes will often depend on the location and which state the crime took place in. Each state has theirown set of laws that deal with internet crime and it's offenders. Child pornography is one of the harshest internet crimes and most often will be punished with jail time, and theirname being registered in the sexual predators list. Back...!!!
  • 19.
  • 20.
    A.)Any person foundguilty of committing cybercrimeacts enumerated six yearsand oneday to twelve12 yearsin prison, or a fineof at least PHP200,000 up to PHP500,000. B.)A person found guilty of committing punishableactsenumerated In thefirst group shall bepunished with reclusio n tempo ral, or Serving of12 yearsand oneday to 20 yearsin prison, or afineof atleast PHP500,000 up to themaximum amount in proportion to thedamageincurred, or both. C.)A person found guilty of committing cybersex shall bepunished in thefirst two groupsshall bepunished with prisio n mayo r, or serving with prisio n mayo r, or serving of six yearsand oneday to 12 yearsin prison, or afineof at least PHP200,000 but not Exceeding PHP1,000,000, or both. Back...!!!
  • 21.
    D.)A person foundguilty of committing child pornography shall be punished with thepenaltiesenumerated in theRepublicAct No. 9775. E.)A person found guilty of committing unsolicited commercial communicationsshall bepunished with arresto mayo r, or serving of onemonth and oneday to six months, or afineof at least PHP50,000 but not exceeding PHP250,000, or both. F.)A person found guilty of committing other offensesenumerated in thelast group shall bepunished with imprisonment onedegree lower than that of theprescribed penalty for theoffense, or afine of at least PHP100,000 but not exceeding PHP500,000, or both. Back...!!!
  • 22.
    PROTECTING YOURSELF FROMCYBER-CRIME? Individuals canprotect themselves from credit card fraud by not replying to strange orunusual emails asking forpersonal financial information. Shoppers also need to be aware that any shopping website has an encrypted secure shopping cart when inputting theircredit card information. Parents can keep a closereye on their children and install filters to block out unwanted material on the internet, and keep them away from chatrooms to prevent Internet harassment and block internet predators. Back...!!!
  • 23.
  • 24.
    1.Use Strong Passwords Usedifferentuser ID / password combinationsfor different account and avoid writing them down. Makethepasswordsmorecomplicated by combining letters, numbers, special characters(minimum 10 charactersin total) and changethem on aregular basis. 2. Secure yourcomputer Activate yourfirewall Firewallsarethefirst lineof cyber defense; they block connections to unknown or bogussitesand will keep out sometypesof viruses and hackers. 3. Use anti-virus/malware software Prevent virusesfrom infecting your computer by installing and regularly updating anti-virussoftware. Block spyware attacks Prevent spywarefrom infiltrating your computer by installing and updating anti-spywaresoftware. Back...!!!
  • 25.
    4. Be Social-MediaSavvy Makesureyour social networking profiles(e.g.facebook,Twiter, Youtube, MSN, etc.) areset to private. Check your security settings. Becareful what information you post online.  Onceit ison theInternet, it isthereforever! Secure yourMobile Devices Beawarethat your mobiledeviceisvulnerableto virusesand hackers.  Download applicationsfrom trusted sources. 5.Install the latest operating system updates Keep your applicationsand operating system (e.g. Windows, Mac, Linux) current with thelatest system updates. Turn on automatic updatesto prevent potential attackson older software. Back...!!!
  • 26.
    6. Protect yourData  Useencryptionfor your most sensitivefilessuch astax returns or financial records, makeregular back-upsof all your important data, and storeit in another location. 7. Secure yourwireless network Wi-Fi (wireless) networksat homearevulnerableto intrusion if they arenot properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, arealso vulnerable. Avoid conducting financial or corporatetransactionson thesenetworks. 8. Protect youre-identity Becautiouswhen giving out personal information such asyour name, address, phonenumber or financial information on the Internet. Makesurethat websitesaresecure(e.g. when making onlinepurchases) or that you’veenabled privacy settings Back...!!!
  • 27.
    9. Avoid beingscammed Alwaysthink beforeyou click on alink or fileof unknown origin. Don’t feel pressured by any emails. Check thesourceof themessage. When in doubt, verify thesource. Never reply to emailsthat ask you to verify your information or confirm your user ID or password.   1o. Call the right person forhelp Don’t panic! If you areavictim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect acomputer crime, identity theft or acommercial scam, report thisto your local police. If you need help with maintenanceor softwareinstallation on your computer, consult with your serviceprovider or acertified computer technician. Back...!!!
  • 28.
    The 10 Commandments of the CybercrimeLaw of the Philippines.Back...!!!
  • 29.
    1.You shall onlysay nicethingson theInternet.Thisisthemain fault attributed to thelaw: It'saviolation of theFreedom of Expression with itscyberlibel provision. Thanksto thisprovision inserted "without knowledge" by most of thelawmakers, if you say something bad against certain peopleon theInternet, you can becharged in court. 2.You cannot tell theTruth, whether joking or seriously, if it hurts someone--In relation to the1st Commandment, regardlessif you stateafact or you usesatireor sarcasm or even say something in ajoking toneon the'net, you can still beheld liablefor cyberlibel for impugning against another person'ssupposed dignity asper theanti-libel law of theRevised Penal Code. Back...!!!
  • 30.
    3. What yousay can beheld against you forever. According to onlinelegal expert Atty. JJDisini, because of thenatureof your onlineposts, anything you posted yearsago that arestill livetoday can bestill held against you in acourt of law. 4. What you likecan also beheld against you--In relation to the3rd Commandment, liking aFB post can beconsidered asabetting libel. Retweeting aprobably libeloustweet might becovered hereaswell so bewarned. 5. Thegovernment now hasthepower to takedown your Internet--Thanksto thepower given by thelaw, theDepartment of Justice, together with itsarmsin theNational Bureau of Investigation and thePhilippineNational Policehavethepower to order theshutdown of Web sitesif thereisprimafacieevidence of violation of thelaw--even without acourt warrant. Back...!!!
  • 31.
    6. Your Internetisrequired to compileevidenceagainst you. In relation to the5th Commandment, Internet serviceproviders arenow required to keep their datafor six monthsafter which they can beforced to keep it for six moremonthsif authorities request it. 7. You can bepunished moreharshly for onlinecrimesthan for real lifecrimes--Thanksto thewording of thelaw, punishment for thosecharged with thislaw is"onedegreehigher" than that provided for in theRevised Penal Code. Becauseof this, if you're charged with onlinelibel, you can befined amillion bucksor spend 12 monthsin jail. Back...!!!
  • 32.
    8. You musttrust thegovernment to do theright thing in implementing thelaw--Thegovernment refusesto budge on thislaw, saying thepublic should trust them to comeup with theproper Implementing Rulesand Regulation to ensure that therewon't beabusesof thelaw despitethevaguewording. Thisafter thesomeof thelawmakerswho signed thelaw admitted they had no ideawhat had goneinto thelaw. 9. Thelaw shall apply to all Filipinoswherever they are. Just becauseyou think you'renot in thePhilippines, you can escape jurisdiction from thisPhilippinelaw. Think again: thislaw has universal jurisdiction. Even your electronic devicesthat aresituated (or even partly) in thePhilippinesareunder jurisdiction under this law. Back...!!!
  • 33.
    10. Thelaw doesn'treally protect you. Supposedly it goesafter identity-theft. However, becauseof theheavy provisionsagainst onlinelibel, ahacker can takeover your account and post libelousstuff, and then pull out. From thesafety of distance, hecan watch thefireworksfly asthe government screwsyou over. So yes, it can protect industries and therich and powerful, just not you. Back...!!!
  • 34.
    REFERENCE: CYBERCRIME HANDBOOK BY BERNADETTEH. SCHELL AND CLEMENSMARTINS SANTA BARBARA, CA: ABC-CLIO,2004. 247PP Back...!!!