SlideShare a Scribd company logo
1 of 25
REPUBLIC ACT NO. 10175
• An Act defining Cybercrime
providing for the prevention,
Investigation, Suppression and the
Imposition of penalties therefore and
for other purposes
Section 1: This Act Shall Be Known As The " Cybercrime Prevention Act
Of 2012“
Section 2: Declaration of Policy
- The state recognizes the vital role of information and communications
industries such as content production, telecommunication, broadcasting,
electronic commerce, and data processing, in the nation's overall social
and economic development
Section 3: Definition of Terms For Purposes of this Act, The Following Terms
Are Here By Defined As Follows.
A) Access
B) Alteration
C) Communication
D) Computer
E) Computer Data
F) Computer Program
G) Computer System
H) Without Right
I) Cyber
J) Critical Infrastructure
K) Cyber Security
L) Database
M) Interception
N) Service Provider
O) Subscriber's Information
P) Traffic Data
Section 4: Cybercrime offenses The following Acts constitution the offense of
Cybercrime Punishable under this Act:
(a)Offenses against the confidentially, integrity and availability of computer Data and
Systems:
(1)Illegal Access.- The access to the whole or any part of a computer system without
right.
(2) Illegal Interception.- The Interception made by technical means without right of
any non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such computer
data.
(3) Data Interference.- The intentional or reckless alteration, damaging , deletion or deterioration of
computer data, electronic document, or electronic data message, without right, including the introduction or
transmission of viruses.
(4) System Interference.- The intentional alteration or reckless hindering or interference with the
functioning of a computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document, or electronic data
message without right or authority, including the introduction or transmission of viruses.
(5) Misuse of Devices
(1) The use, production, sale, procurement, importation, distribution, or otherwise making available,
without right of
(aa) A device, including a computer program, designed or adapted primarily for the purpose
of committing any of the offenses under this Act, or
(bb) A Computer password, access code, or similar data by which the whole or any part of a
computer system is capable of being accessed with intent that it be used for the purpose of
committing any of the offenses under this Act.
(6) Cyber-Squatting.- The acquisition of a domain name over the internet in bad faith to profit,
mislead, destroy reputation, and deprived others from registering the same, if such a domain name
is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate
government agency at the time of the domain name registrations;
(ii) Identical or in any way similar with the name of a person other than the registrant, in case
of a personal name; and
(iii) Acquired without right or with intellectual property interest in it.
(b) Computer- Related Offenses:
(1)Computer- Related Forgery.-
(i) The input, alteration, or deletion of any computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes as if
were authentic, regardless whether or not the data is directly readable and intelligible; or
(ii) Identical or in any way similar with the name of a person other than the registrant, in case
of a personal name; and
(iii) Acquired without right or with intellectual property interest in it.
(b) Computer- Related Offenses:
(1)Computer- Related Forgery.-
(i) The input, alteration, or deletion of any computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes as if
were authentic, regardless whether or not the data is directly readable and intelligible.
(2) Computer- Related Fraud- The unauthorized input, alteration, or deletion of computer
data or program interference in the functioning of a computer system, causing damage
thereby with fraudulent intent: Provided
(4) Libel- The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal
Code, as amended, committed through a computer system or any other similar means which may
be devised in the future.
Section 5. Other Offenses.- The following acts shall also constitute an offense:
(a)Aiding or Abetting in the Commission of Cybercrime.
• Any person who willfully abets or aids in the commission of any of the offenses enumerated in
this Act shall be held liable.
(b) Attempt in the Commission of Cybercrime.- Any person who willfully attempts to commit
any of the offenses enumerated in this Act shall be held liable.
Section 6 All crimes defined and penalized by the revised Penal Code, as amended and special
laws, if committed by through and with the used of information and communications
technologies shall be covered by the relevant provisions of this Act
Section 7 Liability under Other Laws- A prosecution under this act shall be without prejudice
to any liability for violation of any provision of the Revised Penal Code, as amended, or
Special Laws.
Chapter 3 of the Cybercrime Prevention Act of 2012 outlines the penalties for
various cybercrime offenses.
SECTION 8- Punishable acts under Sections 4(a) and 4(b) can result in
imprisonment of prison mayor or a fine of at least Two hundred thousand pesos
(PhP200,000.00), or both. The fine may vary based on the extent of the damage
caused.
• The punishable act under Section 4(a)(5) can lead to imprisonment of prison
mayor or a fine of not more than Five hundred thousand pesos (PhP500,000.00),
or both.
• If the punishable acts in Section 4(a) are committed against critical
infrastructure, the penalty is reclusion temporal or a fine of at least Five hundred
thousand pesos (PhP500,000.00), or both.
• Punishable acts under Section 4(c)(1) can result in imprisonment of prison
mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00) but not
exceeding One million pesos (PhP1,000,000.00), or both.
• Punishable acts under Section 4(c)(2) are subject to the penalties specified in
the "Anti-Child Pornography Act of 2009," with the penalty being one degree
higher if committed through a computer system.
• Punishable acts under Section 4(c)(3) can lead to imprisonment of arrest mayor
or a fine of at least Fifty thousand pesos (PhP50,000.00) but not exceeding Two
hundred fifty thousand pesos (PhP250,000.00), or both.
• Punishable acts under Section 5 are subject to imprisonment one degree lower
than the prescribed penalty or a fine of at least One hundred thousand pesos
(PhP100,000.00) but not exceeding Five hundred thousand pesos
(PhP500,000.00), or both.
• SECTION 9 - Corporate liability is imposed when the punishable acts are
committed on behalf of or for the benefit of a juridical person. In such cases, the
juridical person can be fined at least double the fines specified in Section 7, up to
a maximum of Ten million pesos (PhP10,000,000.00).
• If the commission of the punishable acts is due to the lack of supervision or
control by a natural person acting under the authority of the juridical
person, the juridical person can be fined at least double the fines in Section
7, up to a maximum of Five million pesos (PhP5,000,000.00).
Section 10: Law enforcement authority
Section 11: Duties of law enforcement
authorities
Section 12: Real-time collection of traffic data
Section 13: Preservation of computer data
Section 14: Disclosure of computer data
Section 15: Search, seizure and examination of
computer data
Section 16: Custody of computer data
Section 17: Destruction of computer data
Section 18: Exclusionary rule
Section 19: Restricting or blocking access
to computer data
Section 20: Noncompliance
SECTION 21 Jurisdiction – The Regional Trail Court shall have jurisdiction over any
violation of the provisions of this Act including any violation committed by a Filipino national
regardless of the place of commission. Jurisdiction shall lie if any of the elements was
committed within the Philippines or committed with the use if any computer system wholly or
any damage is cause to a natural or juridical person who at the time the offense was committed,
was in the Philippines.
There shall be designated special cybercrime courts manned by specially trained judges to
handle cybercrime cases.
INTERNATIONAL COORPORATION
Sec. General principles relating to international corporation - all relevant
international instruments on international corporation in criminal matters,
arrangements agreed on the basis of uniform or reciprocal legislation, and domestic
laws, to the widest extent possible for the purposes of investigations or proceeding
concerning criminal offenses related to computer systems and data, or for the
collection of evidence in electronic form of a criminal offense shall be given full force
and effect
A Competent Authority is any person or organization that has the legally delegated
or invested authority, capacity, or power to perform a designated function. Similarly,
once an authority is delegated to perform a certain act, only the competent authority
is entitled to take accounts therefrom and no one else.
Sec.23. Department of Justice (DOJ)
Sec.24. Cybercrime Investigation and coordinating Center
Sec.25. Composition
Sec. 26. Powers and Functions.
SEC. 27: Appropriation
SEC. 28: Implementing Rules and Regulations
SEC. 29: Separability Clause
SEC. 30: Repealing Clause
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx

More Related Content

Similar to PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx

Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaVishni Ganepola
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Eunice Alamag
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data ProtectionLawPlus Ltd.
 
Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawAbiel Abuy
 
Computer Crimes Act B.E. 2550 Eng
Computer Crimes Act B.E. 2550 EngComputer Crimes Act B.E. 2550 Eng
Computer Crimes Act B.E. 2550 EngDanai Thongsin
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009Neeraj Aarora
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)GrittyCC
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCEanthony4web
 
information related crime in asu
information related crime in asuinformation related crime in asu
information related crime in asuyihunie ayalew
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakDipayan Sarkar
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law. KOMALMALLIK
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 

Similar to PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx (20)

Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
Computer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lankaComputer crime and the adequacy of the current legal framework in sri lanka
Computer crime and the adequacy of the current legal framework in sri lanka
 
Em505 report(pecha kucha video)
Em505 report(pecha kucha video)Em505 report(pecha kucha video)
Em505 report(pecha kucha video)
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data Protection
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Saudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime LawSaudi Arabia's Anti-Cyber Crime Law
Saudi Arabia's Anti-Cyber Crime Law
 
Computer Crimes Act B.E. 2550 Eng
Computer Crimes Act B.E. 2550 EngComputer Crimes Act B.E. 2550 Eng
Computer Crimes Act B.E. 2550 Eng
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
International Cybercrime (Part 2)
International Cybercrime (Part 2)International Cybercrime (Part 2)
International Cybercrime (Part 2)
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime 1
Cyber crime 1Cyber crime 1
Cyber crime 1
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
information related crime in asu
information related crime in asuinformation related crime in asu
information related crime in asu
 
Information Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K PathakInformation Technology Act 2000 - Santosh K Pathak
Information Technology Act 2000 - Santosh K Pathak
 
Important section of IT Act 2000 & IPC sections related to cyber law.
Important section  of IT Act 2000 & IPC sections related to cyber law. Important section  of IT Act 2000 & IPC sections related to cyber law.
Important section of IT Act 2000 & IPC sections related to cyber law.
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 

More from RegineManuel2

Dll_empowerment_technologies-1.docx........
Dll_empowerment_technologies-1.docx........Dll_empowerment_technologies-1.docx........
Dll_empowerment_technologies-1.docx........RegineManuel2
 
TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptx
TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptx
TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxRegineManuel2
 
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...RegineManuel2
 
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...RegineManuel2
 
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...RegineManuel2
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...RegineManuel2
 
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNING
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNINGLESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNING
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNINGRegineManuel2
 
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...RegineManuel2
 
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...RegineManuel2
 
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...RegineManuel2
 
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........RegineManuel2
 
Motherboard.pptx...,.......,..............
Motherboard.pptx...,.......,..............Motherboard.pptx...,.......,..............
Motherboard.pptx...,.......,..............RegineManuel2
 
TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................RegineManuel2
 
Technology for Teaching and Lerning 1......
Technology for Teaching and Lerning 1......Technology for Teaching and Lerning 1......
Technology for Teaching and Lerning 1......RegineManuel2
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfRegineManuel2
 
Presentation_(2)_(2)_(2).pdf
Presentation_(2)_(2)_(2).pdfPresentation_(2)_(2)_(2).pdf
Presentation_(2)_(2)_(2).pdfRegineManuel2
 

More from RegineManuel2 (17)

Dll_empowerment_technologies-1.docx........
Dll_empowerment_technologies-1.docx........Dll_empowerment_technologies-1.docx........
Dll_empowerment_technologies-1.docx........
 
TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptx
TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptx
TPACK.pptxTPACK.pptxTPACK.pptxTPACK.pptx
 
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...
Abdulhakim-Mohammad-Al-shariff-Porte-and-connector.pptxAbdulhakim-Mohammad-Al...
 
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...
TYPES-OF-CPU-AND-PROCESSING-UNITS.pptx...
 
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...
TPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK-WPS-Office.pptxTPACK-FRAMEWORK...
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
 
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNING
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNINGLESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNING
LESSON 2.pptx ROLES OF TECHNOLOGY FOR TEACHING AND LEARNING
 
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...
PED-8-REPORT-group7.-fiPED-8-REPORT-group7.-final.pptxPED-8-REPORT-group7.-fi...
 
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...
EXPANSION-CARD.pptx-ajin-and-aljismer.pptxEXPANSION-CARD.pptx-ajin-and-aljism...
 
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...
Motherboard.pptxMotherboard.ppMotherboard.pptxMotherboard.pptxMotherboard.ppt...
 
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........
ICT-4-TYPES-OF-MODEL-SHEETS.pptx.........
 
Motherboard.pptx...,.......,..............
Motherboard.pptx...,.......,..............Motherboard.pptx...,.......,..............
Motherboard.pptx...,.......,..............
 
TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................TLE 7-OHS.pptx............................................
TLE 7-OHS.pptx............................................
 
Technology for Teaching and Lerning 1......
Technology for Teaching and Lerning 1......Technology for Teaching and Lerning 1......
Technology for Teaching and Lerning 1......
 
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdfLEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
LEGAL, ETHICAL AND SOCIETAL ISSUES OF.pdf
 
LESSON 2.pptx
LESSON 2.pptxLESSON 2.pptx
LESSON 2.pptx
 
Presentation_(2)_(2)_(2).pdf
Presentation_(2)_(2)_(2).pdfPresentation_(2)_(2)_(2).pdf
Presentation_(2)_(2)_(2).pdf
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx

  • 1.
  • 2.
  • 3. REPUBLIC ACT NO. 10175 • An Act defining Cybercrime providing for the prevention, Investigation, Suppression and the Imposition of penalties therefore and for other purposes
  • 4. Section 1: This Act Shall Be Known As The " Cybercrime Prevention Act Of 2012“ Section 2: Declaration of Policy - The state recognizes the vital role of information and communications industries such as content production, telecommunication, broadcasting, electronic commerce, and data processing, in the nation's overall social and economic development
  • 5. Section 3: Definition of Terms For Purposes of this Act, The Following Terms Are Here By Defined As Follows. A) Access B) Alteration C) Communication D) Computer E) Computer Data F) Computer Program G) Computer System H) Without Right I) Cyber J) Critical Infrastructure K) Cyber Security L) Database M) Interception N) Service Provider O) Subscriber's Information P) Traffic Data
  • 6. Section 4: Cybercrime offenses The following Acts constitution the offense of Cybercrime Punishable under this Act: (a)Offenses against the confidentially, integrity and availability of computer Data and Systems: (1)Illegal Access.- The access to the whole or any part of a computer system without right. (2) Illegal Interception.- The Interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.
  • 7. (3) Data Interference.- The intentional or reckless alteration, damaging , deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses. (4) System Interference.- The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message without right or authority, including the introduction or transmission of viruses. (5) Misuse of Devices (1) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right of
  • 8. (aa) A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act, or (bb) A Computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act. (6) Cyber-Squatting.- The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprived others from registering the same, if such a domain name is: (i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registrations;
  • 9. (ii) Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and (iii) Acquired without right or with intellectual property interest in it. (b) Computer- Related Offenses: (1)Computer- Related Forgery.- (i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if were authentic, regardless whether or not the data is directly readable and intelligible; or
  • 10. (ii) Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and (iii) Acquired without right or with intellectual property interest in it. (b) Computer- Related Offenses: (1)Computer- Related Forgery.- (i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if were authentic, regardless whether or not the data is directly readable and intelligible.
  • 11. (2) Computer- Related Fraud- The unauthorized input, alteration, or deletion of computer data or program interference in the functioning of a computer system, causing damage thereby with fraudulent intent: Provided (4) Libel- The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future. Section 5. Other Offenses.- The following acts shall also constitute an offense: (a)Aiding or Abetting in the Commission of Cybercrime. • Any person who willfully abets or aids in the commission of any of the offenses enumerated in this Act shall be held liable.
  • 12. (b) Attempt in the Commission of Cybercrime.- Any person who willfully attempts to commit any of the offenses enumerated in this Act shall be held liable. Section 6 All crimes defined and penalized by the revised Penal Code, as amended and special laws, if committed by through and with the used of information and communications technologies shall be covered by the relevant provisions of this Act Section 7 Liability under Other Laws- A prosecution under this act shall be without prejudice to any liability for violation of any provision of the Revised Penal Code, as amended, or Special Laws.
  • 13. Chapter 3 of the Cybercrime Prevention Act of 2012 outlines the penalties for various cybercrime offenses. SECTION 8- Punishable acts under Sections 4(a) and 4(b) can result in imprisonment of prison mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00), or both. The fine may vary based on the extent of the damage caused. • The punishable act under Section 4(a)(5) can lead to imprisonment of prison mayor or a fine of not more than Five hundred thousand pesos (PhP500,000.00), or both.
  • 14. • If the punishable acts in Section 4(a) are committed against critical infrastructure, the penalty is reclusion temporal or a fine of at least Five hundred thousand pesos (PhP500,000.00), or both. • Punishable acts under Section 4(c)(1) can result in imprisonment of prison mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00) but not exceeding One million pesos (PhP1,000,000.00), or both. • Punishable acts under Section 4(c)(2) are subject to the penalties specified in the "Anti-Child Pornography Act of 2009," with the penalty being one degree higher if committed through a computer system.
  • 15. • Punishable acts under Section 4(c)(3) can lead to imprisonment of arrest mayor or a fine of at least Fifty thousand pesos (PhP50,000.00) but not exceeding Two hundred fifty thousand pesos (PhP250,000.00), or both. • Punishable acts under Section 5 are subject to imprisonment one degree lower than the prescribed penalty or a fine of at least One hundred thousand pesos (PhP100,000.00) but not exceeding Five hundred thousand pesos (PhP500,000.00), or both.
  • 16. • SECTION 9 - Corporate liability is imposed when the punishable acts are committed on behalf of or for the benefit of a juridical person. In such cases, the juridical person can be fined at least double the fines specified in Section 7, up to a maximum of Ten million pesos (PhP10,000,000.00). • If the commission of the punishable acts is due to the lack of supervision or control by a natural person acting under the authority of the juridical person, the juridical person can be fined at least double the fines in Section 7, up to a maximum of Five million pesos (PhP5,000,000.00).
  • 17. Section 10: Law enforcement authority Section 11: Duties of law enforcement authorities Section 12: Real-time collection of traffic data Section 13: Preservation of computer data Section 14: Disclosure of computer data Section 15: Search, seizure and examination of computer data Section 16: Custody of computer data Section 17: Destruction of computer data Section 18: Exclusionary rule Section 19: Restricting or blocking access to computer data Section 20: Noncompliance
  • 18. SECTION 21 Jurisdiction – The Regional Trail Court shall have jurisdiction over any violation of the provisions of this Act including any violation committed by a Filipino national regardless of the place of commission. Jurisdiction shall lie if any of the elements was committed within the Philippines or committed with the use if any computer system wholly or any damage is cause to a natural or juridical person who at the time the offense was committed, was in the Philippines. There shall be designated special cybercrime courts manned by specially trained judges to handle cybercrime cases.
  • 19.
  • 20.
  • 21. INTERNATIONAL COORPORATION Sec. General principles relating to international corporation - all relevant international instruments on international corporation in criminal matters, arrangements agreed on the basis of uniform or reciprocal legislation, and domestic laws, to the widest extent possible for the purposes of investigations or proceeding concerning criminal offenses related to computer systems and data, or for the collection of evidence in electronic form of a criminal offense shall be given full force and effect
  • 22. A Competent Authority is any person or organization that has the legally delegated or invested authority, capacity, or power to perform a designated function. Similarly, once an authority is delegated to perform a certain act, only the competent authority is entitled to take accounts therefrom and no one else. Sec.23. Department of Justice (DOJ) Sec.24. Cybercrime Investigation and coordinating Center Sec.25. Composition Sec. 26. Powers and Functions.
  • 23. SEC. 27: Appropriation SEC. 28: Implementing Rules and Regulations SEC. 29: Separability Clause SEC. 30: Repealing Clause