Successfully reported this slideshow.

Cyber crime law libreoffice


Published on

  • Be the first to comment

Cyber crime law libreoffice

  1. 1. CYBER CRIME LAW Back...!!!
  2. 2. Table of ContentI.Cyber Crime Law A)Definitio B)History II.What is Cyber Crime III.Why we learn about Cyber Crime? IV.Cyber Crime Victims V. Types of Cyber Crime A) Hacking B) Denial of service attack C) Virus Dessimanition D) Software piracy E) Pornography F) Credit card Fraud
  3. 3. G)NIRC CrimeInternet Chat(IRC) H)Phishing I)Spoofing J)Cyber stalking K)Cyber Defamation L)Threatening M)Salami attack N)Sale of narcotics V.Cyber Crime Punishment VI.Cyber Crime Penalty VII.Protecting your self from Cyber Crime VIII.Top 10 Cyber Crime prevention tips IX.The 10 Commandments of the Cyber crime law X. Reference
  4. 4. Cyber Crime law (republiC aCt No. 10175) Isa  in the  Philippinesapproved on 12 September 2012.It aimsto addresslegal issuesconcerning onlineinteractionsand theinternet In thephilippines. Among theCyber crimeoffensesincluded in the Bill are cybersquatting, cybersex, child pornography, identity theft, Illegal accessto dataand libel. Whilehailed for penalizing illegal doneviatheinternet that werenot covered by old laws, theact hasbeen criticized for itsprovision on criminalizing libel, which isperceived to beacurtailment in freedom of expression.   Back...!!!!
  5. 5. HiStory TheCyber crimePreventionAct of 2012 isthefirst law in the Philippines which specifically criminalizes computer crime,which prior to thepassageof thelaw had no strong legal precedent in Philippinesjurisprudence. Whilelawssuch astheElectronic CommerceAct of 2000(RepublicAct 8792) regulated certain  computer-related activities, theselawsdid not providealegal basis for criminalizing crimescommitted on acomputer in general : for example, Onel deGuzman, thecomputer programmer charged with purportedly writing the  I LOVE YOU computer worm, was ultimately not prosecuted by Philippineauthoritiesdueto alack of legal basisfor him to becharged under existing Philippines lawsat thetimeof hisarrest. Back...!!!
  6. 6. Thefirst spam email took placein 1978 when it wassent out over theARPAnet, theDefenseDepartment'snetwork. It wasused to flog anew computer. Thefirst viruswasinstalled on an apple computer in 1982 when ahigh school student, Rich Skrenta, developed theElk cloner. Hehid it on afloppy disk that we needed to boot theoperating system on thecomputer. For every fifty bootsthat weremade, abad poem appeared on thecomputer Screen. Back...!!!
  7. 7. WHAT IS CYBER CRIME? Back...!!!
  8. 8. Cyber crimesareillegal activitiesthat occur over thecomputer, usually over theInternet. Thisisarelatively new crimedueto thefact that theInternet and advancesin technology arepretty recent. With theadvent of smartphonesand tablets, cyber crimes now hit thoseaswell aslaptops, computers, and gaming systems. All crimesperformed or resorted to by abuseof electronic mediaor otherwise, with thepurposeof influencing the functioning of computer or computer system. IN SHORT COMPUTER CRIME isany crime whereComputer isatarget. – Computer isatool of crime– Computer isincidental to crime Back...!!!
  9. 9. wHy we learN about Cyber Crime? ecause everybody is using COMPUTERS. From white collar riminals to terrorist organizations And from Teenagers to Adults onventional crimes like Forgery, extortions, kidnapping etc. bein ommitted with the help off computers. New generation is growin p with computer. Most important,Monetary transaction are moving on to the INTERNET. Back...!!!
  10. 10. CYBER CRIME VICTIMS Disgruntled employees Gullible Teenagers Desperados and greedy Professional hackers people Business Rival Unskilled orUnexperienced Ex boy friend orEx girl friend Unlucky people Divorced husband Back...!!!
  11. 11. TYPES OF CYBER CRIME HACKING Hacking in simpletermsmeansillegal intrusioninto acomputer System without thepermissionof thecomputer owner/user. DENIALOFSERVICEATTACK Thisisan act by thecriminal, who floodstheband width of the victim’sNetwork or fillshise-mail box with spaam mail depriving him of theservicesheisentitled to accessor provide. VIRUS DISSEMINATION Thisisan act by the• Malicioussoftwarecriminal, who floods that attachesitself to thebandwidth of theother software. victim‘snetwork or (virus, worms, Trojan fillshise-mail box Horse, Timewith spam mail bomb, ETC.) Back...!!!
  12. 12. SOFTWAREPIRACY Theft of softwarethrough theillegal copying of genuineprograms or thecounterfeiting and distribution of productsintended to pass for theoriginal. Retail revenuelossesworldwideareever Increasing dueto thiscrime. Can bedonein variousways. End user copying, Hard disk loading, Counterfeiting, Illegal downloadsfrom the internet etc. PORNOGRAPHY Pornography isthefirst consistently successful ecommerceproduct. Deceptivemarketing tacticsand mousetrapping technologiesPor nography encouragecustomersto accesstheir websites. Anybody including children can log on to theinternet and accesswebsites with pornographic contentswith aclick of amouse. Back...!!!
  13. 13. CREDITCARDFRAUD You simply haveto typecredit card number into www pageoff thevendor for onlinetransaction.• If electronic transactionsare not secured thecredit card numberscan bestolen by thehackers who can misusethiscard by impersonating thecredit card owner . Credit card skimmer A. How thecredit card skimmer isusedCredit card skimmer, is used to collect thedataof userbeforeit swapped. B. Additional Slot InATM Machine C. Falsepamphlet Box Affixed toATM Cubical side D. InsidetheFalsepamphlet Box Cameraposition at correct angle to view keypad & monitor. Back...!!!
  14. 14. NIRC CRIMEInternet Relay Chat (IRC) servershavechat roomsin whichpeoplefrom anywhere. The world can cometogether andchat with each other. Criminalsuse it for meeting.– Hackersuseit for discussing their exploits/ sharing thetechniques. Paedophilesusechat roomsto alluresmall Children. Cyber Stalking - In order to harassawoman her telephonenumber isgiven to othersasif shewantsto befriend Males. PHISHING Copying the• It istechniqueof company’spulling out confidential datain confidential order to extort said information from the company for hugebank/financial amount.. institutional account holdersby deceptivemeans. Back...!!!
  15. 15. SPOOFING Getting onecomputer on anetwork to pretend to havetheidentity of another computer, usually onewith special accessprivileges, so asto obtain accessto theother computerson thenetwork.. CYBERSTALKING TheCriminal followson anetwork to thevictim by pretend to have thesending identity off another computer, usually oneemails, entering thewith special accesschat roomsprivileges, so asto frequently. obtain accessto theother computerson thenetwork. CYBERDEFAMATION TheCriminal sendsemailscontaining defamatory mattersto all concerned of thevictim or post thedefamatory matterson awebsite. (disgruntled employeemay do thisagainst boss, ex-boysfriend Against girl, divorced husband against wifeetc) Back...!!!
  16. 16. THREATENING TheCriminal sendsemails• TheCriminal sendscontaining Defamatory threatening email or mattersto all concerned comes in contact in chat off thevictim or post theroomswith victim. defamatory matterson awebsite. SALAMIATTACK In such crimecriminal makesinsignificant changesin such a manner that such changeswould go unnoticed. Criminal makes such program that deductssmall amount like2.50 per month from theaccount of all thecustomer of theBank and deposit the samein hisaccount. In thiscaseno account holder will approach thebank for such small amount but criminal gainshugeamount. Back...!!!
  17. 17. SALEOFNARCOTICS In such crimecriminal makes Sale& Purchasethrough insignificant changesin such anet.. manner that such changeswould Thereareweb sitewhich go unnoticed. offer saleand• Criminal makessuch program that deductssmall amount like Shipment off contrabandsRs. 2.50 per month from thedrugs.. account of all thecustomer of They may usethetechniques theBank and deposit thesamein off hisaccount. In this caseno Stegnography for hiding theaccount holder will approach thebank for such small amount but messages.. criminal gainshugeamount. Back...!!!
  18. 18. CYBER CRIME PUNISHMENT Punishment fora variety of cyber-crimes will often depend on the location and which state the crime took place in. Each state has theirown set of laws that deal with internet crime and it's offenders. Child pornography is one of the harshest internet crimes and most often will be punished with jail time, and theirname being registered in the sexual predators list. Back...!!!
  19. 19. CYBER CRIME PENALTY Back...!!!
  20. 20. A.)Any person found guilty of committing cybercrimeacts enumerated six yearsand oneday to twelve12 yearsin prison, or a fineof at least PHP200,000 up to PHP500,000. B.)A person found guilty of committing punishableactsenumerated In thefirst group shall bepunished with reclusio n tempo ral, or Serving of12 yearsand oneday to 20 yearsin prison, or afineof atleast PHP500,000 up to themaximum amount in proportion to thedamageincurred, or both. C.)A person found guilty of committing cybersex shall bepunished in thefirst two groupsshall bepunished with prisio n mayo r, or serving with prisio n mayo r, or serving of six yearsand oneday to 12 yearsin prison, or afineof at least PHP200,000 but not Exceeding PHP1,000,000, or both. Back...!!!
  21. 21. D.)A person found guilty of committing child pornography shall be punished with thepenaltiesenumerated in theRepublicAct No. 9775. E.)A person found guilty of committing unsolicited commercial communicationsshall bepunished with arresto mayo r, or serving of onemonth and oneday to six months, or afineof at least PHP50,000 but not exceeding PHP250,000, or both. F.)A person found guilty of committing other offensesenumerated in thelast group shall bepunished with imprisonment onedegree lower than that of theprescribed penalty for theoffense, or afine of at least PHP100,000 but not exceeding PHP500,000, or both. Back...!!!
  22. 22. PROTECTING YOURSELF FROMCYBER-CRIME? Individuals can protect themselves from credit card fraud by not replying to strange orunusual emails asking forpersonal financial information. Shoppers also need to be aware that any shopping website has an encrypted secure shopping cart when inputting theircredit card information. Parents can keep a closereye on their children and install filters to block out unwanted material on the internet, and keep them away from chatrooms to prevent Internet harassment and block internet predators. Back...!!!
  23. 23. ToP 10 CYBER CRIME PREvENTIoN TIPs Back...!!!
  24. 24. 1.Use Strong Passwords Usedifferent user ID / password combinationsfor different account and avoid writing them down. Makethepasswordsmorecomplicated by combining letters, numbers, special characters(minimum 10 charactersin total) and changethem on aregular basis. 2. Secure yourcomputer Activate yourfirewall Firewallsarethefirst lineof cyber defense; they block connections to unknown or bogussitesand will keep out sometypesof viruses and hackers. 3. Use anti-virus/malware software Prevent virusesfrom infecting your computer by installing and regularly updating anti-virussoftware. Block spyware attacks Prevent spywarefrom infiltrating your computer by installing and updating anti-spywaresoftware. Back...!!!
  25. 25. 4. Be Social-Media Savvy Makesureyour social networking profiles(e.g.facebook,Twiter, Youtube, MSN, etc.) areset to private. Check your security settings. Becareful what information you post online.  Onceit ison theInternet, it isthereforever! Secure yourMobile Devices Beawarethat your mobiledeviceisvulnerableto virusesand hackers.  Download applicationsfrom trusted sources. 5.Install the latest operating system updates Keep your applicationsand operating system (e.g. Windows, Mac, Linux) current with thelatest system updates. Turn on automatic updatesto prevent potential attackson older software. Back...!!!
  26. 26. 6. Protect yourData  Useencryption for your most sensitivefilessuch astax returns or financial records, makeregular back-upsof all your important data, and storeit in another location. 7. Secure yourwireless network Wi-Fi (wireless) networksat homearevulnerableto intrusion if they arenot properly secured. Review and modify default settings. Public Wi-Fi, a.k.a. “Hot Spots”, arealso vulnerable. Avoid conducting financial or corporatetransactionson thesenetworks. 8. Protect youre-identity Becautiouswhen giving out personal information such asyour name, address, phonenumber or financial information on the Internet. Makesurethat websitesaresecure(e.g. when making onlinepurchases) or that you’veenabled privacy settings Back...!!!
  27. 27. 9. Avoid being scammed Alwaysthink beforeyou click on alink or fileof unknown origin. Don’t feel pressured by any emails. Check thesourceof themessage. When in doubt, verify thesource. Never reply to emailsthat ask you to verify your information or confirm your user ID or password.   1o. Call the right person forhelp Don’t panic! If you areavictim, if you encounter illegal Internet content (e.g. child exploitation) or if you suspect acomputer crime, identity theft or acommercial scam, report thisto your local police. If you need help with maintenanceor softwareinstallation on your computer, consult with your serviceprovider or acertified computer technician. Back...!!!
  28. 28. The 10 Commandments of the Cybercrime Law of the Philippines.Back...!!!
  29. 29. 1.You shall only say nicethingson theInternet.Thisisthemain fault attributed to thelaw: It'saviolation of theFreedom of Expression with itscyberlibel provision. Thanksto thisprovision inserted "without knowledge" by most of thelawmakers, if you say something bad against certain peopleon theInternet, you can becharged in court. 2.You cannot tell theTruth, whether joking or seriously, if it hurts someone--In relation to the1st Commandment, regardlessif you stateafact or you usesatireor sarcasm or even say something in ajoking toneon the'net, you can still beheld liablefor cyberlibel for impugning against another person'ssupposed dignity asper theanti-libel law of theRevised Penal Code. Back...!!!
  30. 30. 3. What you say can beheld against you forever. According to onlinelegal expert Atty. JJDisini, because of thenatureof your onlineposts, anything you posted yearsago that arestill livetoday can bestill held against you in acourt of law. 4. What you likecan also beheld against you--In relation to the3rd Commandment, liking aFB post can beconsidered asabetting libel. Retweeting aprobably libeloustweet might becovered hereaswell so bewarned. 5. Thegovernment now hasthepower to takedown your Internet--Thanksto thepower given by thelaw, theDepartment of Justice, together with itsarmsin theNational Bureau of Investigation and thePhilippineNational Policehavethepower to order theshutdown of Web sitesif thereisprimafacieevidence of violation of thelaw--even without acourt warrant. Back...!!!
  31. 31. 6. Your Internet isrequired to compileevidenceagainst you. In relation to the5th Commandment, Internet serviceproviders arenow required to keep their datafor six monthsafter which they can beforced to keep it for six moremonthsif authorities request it. 7. You can bepunished moreharshly for onlinecrimesthan for real lifecrimes--Thanksto thewording of thelaw, punishment for thosecharged with thislaw is"onedegreehigher" than that provided for in theRevised Penal Code. Becauseof this, if you're charged with onlinelibel, you can befined amillion bucksor spend 12 monthsin jail. Back...!!!
  32. 32. 8. You must trust thegovernment to do theright thing in implementing thelaw--Thegovernment refusesto budge on thislaw, saying thepublic should trust them to comeup with theproper Implementing Rulesand Regulation to ensure that therewon't beabusesof thelaw despitethevaguewording. Thisafter thesomeof thelawmakerswho signed thelaw admitted they had no ideawhat had goneinto thelaw. 9. Thelaw shall apply to all Filipinoswherever they are. Just becauseyou think you'renot in thePhilippines, you can escape jurisdiction from thisPhilippinelaw. Think again: thislaw has universal jurisdiction. Even your electronic devicesthat aresituated (or even partly) in thePhilippinesareunder jurisdiction under this law. Back...!!!
  33. 33. 10. Thelaw doesn't really protect you. Supposedly it goesafter identity-theft. However, becauseof theheavy provisionsagainst onlinelibel, ahacker can takeover your account and post libelousstuff, and then pull out. From thesafety of distance, hecan watch thefireworksfly asthe government screwsyou over. So yes, it can protect industries and therich and powerful, just not you. Back...!!!