SlideShare uma empresa Scribd logo
1 de 47
Baixar para ler offline
Sunday, October 7, 12
Sunday, October 7, 12
Cybercrime Prevention
                             Act of 2012
                                Computer Professionals’ Union
                                      5 October 2012




         *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court
         Petitions at mga imahe mula sa Pixel Offensive.

Sunday, October 7, 12
Sunday, October 7, 12
Background
         Passed House of Representatives on 04 June 2012

              Senate Bill No. 2796 and House Bill No. 5808


         Passed Senate on 05 June 2012

         Signed into law on 12 September 2012

              An Act Defining Cybercrime, Providing for the Prevention,
              Investigation, Suppression, and the Imposition of Penalties therefor
              and for other Purposes


         Implemented: October 3, 2012
Sunday, October 7, 12
Endorsed by these
         senators.



         “TG” Guingona III
         voting against it.




Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
We fight back!

                  SC petitions to Junk/Repeal/Amend

                        Senate Bill No. 2796 and House Bill No. 5808




Sunday, October 7, 12
We fight back!


                         Online blackout campaign




Sunday, October 7, 12
We fight back!

               Silent protest in SC




Sunday, October 7, 12
We fight back!

            Protest in SC




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
“Anonymous” fights back!




Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
What is the RA 10175 ?
            Section 4: Cybercrime Offenses

                  Illegal access, illegal interception, data interception, data
                  interference (a)(3), system interference, misuse of devices

                  Computer-related forgery, computer-related fraud, computer-
                  related identity theft

                  Cybersex, child pornography, unsolicited commercial
                  communications

                  Libel



Sunday, October 7, 12
What is the RA 10175 ?
            Section 5: Other Offenses

                  aiding or abetting in the commission of cybercrime, attempt
                  in the commission of cybercrime


            Section 6: All crimes in RPC if committed by, through and with
            the use of ICT

                  Penalty: one degree higher




Sunday, October 7, 12
What is the RA 10175 ?
           Section 4(a)(3) on Data Interference:                   intrudes into
                                                                   people’s freedom
           The intentional or reckless alteration,
           damaging, deletion or deterioration of computer data,   of speech
           electronic document, or electronic data message,
           without right including the introduction or                       alterations
           transmission of viruses


           vague, “sweep unnecessarily broadly”

           “it becomes very burdensome, onerous
           and patently discouraging, specially if
           the act is for purposes of social and
           political criticisms”

     Source: BAYAN SC Petition
Sunday, October 7, 12
What is the RA 10175 ?
           Section 4(b)(3) on Computer-related
           Identity Theft:
                                                                  intrudes into
                                                                  people’s freedom
           The intentional       acquisition, use, misuse,        of speech
           transfer, possession, alteration, or deletion of
           identifying information belonging to                   politician’s full name, age,
           another, whether natural or juridical without right.   education, employment
           Provided, that if no damage has yet been caused, the   background, names of parents,
           penalty imposable shall be one (1) degree lower.       siblings, wife, children and other
                                                                  members of immediate family) of
                                                                  another person (e.g. by
                                                                  intentionally obtaining such
                                                                  identifying information, without
                                                                  any consent, from Facebook,
                                                                  website, or any online article or
                                                                  document)



Sunday, October 7, 12
What is the RA 10175 ?

           Section 4(c)(4) on Libel

             makes anyone a target of prosecution and punishment


             chilling effect on the exercise of freedom of speech

             General Comment   No.   34   of   the   United   Nations   Human   Rights  
             Committee states that   “State   parties should consider the
             decriminalization of defamation

             “a violation or disregard of the Philippine government’s obligations under
             the International Convention on Civil Political Rights to promote and
             protect freedom of expression”
          Source: BAYAN SC Petition
Sunday, October 7, 12
What is the RA 10175 ?
         Section 5(a) on Aiding or        intrudes into people’s
         Abetting in the commission of
         cybercrime:                      freedom of speech
         Section 5(b) on Attempt in the
         commission of cybercrime:




Sunday, October 7, 12
What is the RA 10175 ?
         Section 6 on all crimes defined                    violation of the right
         in Revised Penal Code (RPC),
         if committed by, through and                      of the people not to
         with the use of ICT shall be                      be subjected to
         covered by this Act                               double jeopardy

         Section 7 on Liability under
         other Laws

         A prosecution under this Act shall be without
         prejudice to any liability for violation of any
         provision of RPC etc




Sunday, October 7, 12
What is the RA 10175 ?
         Section 12 (1)                           violation of the right
         Real-Time Collection of Traffic
         Data                                     of the people against
                                                  unreasonable
         Law enforcement authorities, with due
                                                  searches and seizure
         cause, shall be authorized to
         collect or record by technical
         or electronic means traffic               violation of the right
         data in real-time associated with        to privacy
         specified communications transmitted by
         means of a computer system




Sunday, October 7, 12
What is the RA 10175 ?

         Section 17 (1)                                 deprivation of
         Destruction of computer data
                                                        property without due
         Upon expiration of periods authorities shall   process of law
         immediately and completely
         destroy the computer data subject
         to prevention and examination.




Sunday, October 7, 12
What is the RA 10175 ?
         Section 19 (1)
         Restricting of Blocking Access to                 intrudes into
         Computer Data                                     people’s freedom of
         When a computer          data is prima            speech
         facie found to be in violation of the provision
         of this Act, the DOJ shall issue an               grant of unbridled
         order to restrict or block access
         to such computer data.                            power to
                                                           Department of
                                                           Justice
         “take down clause”



Sunday, October 7, 12
Sunday, October 7, 12
Who are affected?

               all users of “mobile phones, computers, computer data
               storage devises (e.g. USB, external hard disks), emails,
               social media and anything that is related to the internet,
               cyberspace and information and communications
               technology”




             Source: BAYAN SC Petition

Sunday, October 7, 12
Threats to ICT professionals

                  For computer professionals and hackers working with
                  information security and network administration our sets
                  of tools can be misinterpreted as tools to commit
                  cybercrime. It should be noted that crackers (bad
                  hackers) and hackers almost use the same set of tools.
                  We can be punished for “misuse of devices”...




                  Source: CP-UNION.COM

Sunday, October 7, 12
Threats to ICT professionals
                  Computer technicians are not spared. They should start
                  asking waivers if they repair, reformat, and troubleshoot
                  computer systems and networks. They could be punished
                  for “system interference” in Section 4 (a) (4).


                  It “adds a broken tool to current computer security
                  toolbox used by computer professionals. It opened new
                  mechanisms for misinterpretations (intentional or not)
                  by State authorities wherein innocent computer users
                  and hackers can be tagged to crimes and punished
                  without due process.”


                  Source: CP-UNION.COM

Sunday, October 7, 12
Can an IRR fix RA 10175 ?
               “As such, Akbayancalls on President Aquino to
               address the infirmities of the law by
               inviting media people and organizations,
               social movements and civil society groups to
               participate in the crafting of the law’s
               implementing rules and regulations (IRR) to
               negate the law’s repressive provisions and safeguard the
               rights and welfare of internet users. The Aquino
               government must swiftly act to salvage this law or
               otherwise the people will have no option left but to bring
               this to court.”
               September 20, 2012 Statement, AKBAYAN
Sunday, October 7, 12
Can an IRR fix RA 10175 ?

                No.


               @natoreyes:
               “The IRR cannot accomplish more than what the law sets
               out to do. If the law intends to criminalize online libel,
               the IRR cannot reverse or negate this. If the law allows
               the take-down of websites by the DOJ sans a court order,
               the IRR cannot reverse or negate this.”
               ... “We’re being drawn to a path that leads to a cliff. Huwag
               magpaloko.”
               Source: http://natoreyes.wordpress.com



Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
We have bigger problems but they decided to prioritize
                 punishment of cybercrime.



Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Binuo ng Computer Professionals’ Union
                              www.cp-union.com




           Ref: http://www.facebook.com/PixelOffensive
           BAYAN Supreme Court Petition
           Bloggers and Netizens vs Aquino Supreme Court Petition

           *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions
           *Mga imahe mula sa Pixel Offensive.




Sunday, October 7, 12
On the Cybercrime Law by Computer Professionals’ Union
                   and Rick Bahague is licensed under a Creative Commons
                 Attribution-NonCommercial-ShareAlike 3.0 Unported License.
                            Based on a work at www.cp-union.com.



Sunday, October 7, 12

Mais conteúdo relacionado

Mais procurados

Anti - Bullying Act of 2013.pptx
Anti - Bullying Act of 2013.pptxAnti - Bullying Act of 2013.pptx
Anti - Bullying Act of 2013.pptxCeciliaLazaro3
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004Sharon Geroquia
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)F Mad
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final pingXFactor Umitz
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Republic Act 7610
Republic Act 7610Republic Act 7610
Republic Act 7610M4R1V3L
 
Anti b astos law ra 11313-quinto
Anti b astos law ra 11313-quintoAnti b astos law ra 11313-quinto
Anti b astos law ra 11313-quintorubytamayo2
 
Article 3 sec 6-9
Article 3 sec 6-9Article 3 sec 6-9
Article 3 sec 6-9Erniel Ecle
 
Bawal Bastos Law.pptx
Bawal Bastos Law.pptxBawal Bastos Law.pptx
Bawal Bastos Law.pptxRicVince1
 
Criminal Procedure By Charlemagne James P. Ramos
Criminal Procedure By Charlemagne James P. RamosCriminal Procedure By Charlemagne James P. Ramos
Criminal Procedure By Charlemagne James P. RamosCharlemagne James Ramos
 
Rape law lectures
 Rape law lectures Rape law lectures
Rape law lecturesJoyCee8
 
Anti-Violence Against Women and Children
Anti-Violence Against Women and ChildrenAnti-Violence Against Women and Children
Anti-Violence Against Women and Childrenbigkiskababaihan
 
Anti bullying Act 2013 & DO no. 40 s. 2012
Anti bullying Act 2013 & DO no. 40 s. 2012Anti bullying Act 2013 & DO no. 40 s. 2012
Anti bullying Act 2013 & DO no. 40 s. 2012iteach 2learn
 
RA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptxRA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptxArthurLegaspina3
 

Mais procurados (20)

Anti - Bullying Act of 2013.pptx
Anti - Bullying Act of 2013.pptxAnti - Bullying Act of 2013.pptx
Anti - Bullying Act of 2013.pptx
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
 
Ra 9262 (VAWC)
Ra 9262 (VAWC)Ra 9262 (VAWC)
Ra 9262 (VAWC)
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final ping
 
Power point anti rape law
Power point anti rape lawPower point anti rape law
Power point anti rape law
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Republic Act 7610
Republic Act 7610Republic Act 7610
Republic Act 7610
 
Anti b astos law ra 11313-quinto
Anti b astos law ra 11313-quintoAnti b astos law ra 11313-quinto
Anti b astos law ra 11313-quinto
 
Article 3 sec 6-9
Article 3 sec 6-9Article 3 sec 6-9
Article 3 sec 6-9
 
Bawal Bastos Law.pptx
Bawal Bastos Law.pptxBawal Bastos Law.pptx
Bawal Bastos Law.pptx
 
Criminal Procedure By Charlemagne James P. Ramos
Criminal Procedure By Charlemagne James P. RamosCriminal Procedure By Charlemagne James P. Ramos
Criminal Procedure By Charlemagne James P. Ramos
 
Rape law lectures
 Rape law lectures Rape law lectures
Rape law lectures
 
Anti-Violence Against Women and Children
Anti-Violence Against Women and ChildrenAnti-Violence Against Women and Children
Anti-Violence Against Women and Children
 
Crimes against chastity
Crimes against chastityCrimes against chastity
Crimes against chastity
 
RPC-Book-2_JRM.ppt
RPC-Book-2_JRM.pptRPC-Book-2_JRM.ppt
RPC-Book-2_JRM.ppt
 
Anti bullying Act 2013 & DO no. 40 s. 2012
Anti bullying Act 2013 & DO no. 40 s. 2012Anti bullying Act 2013 & DO no. 40 s. 2012
Anti bullying Act 2013 & DO no. 40 s. 2012
 
RA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptxRA 9344-PRESENTATION.ppt.pptx
RA 9344-PRESENTATION.ppt.pptx
 

Destaque

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoPaola Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancementsguest5f7bf4
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkingHamid Zainudin
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry BenRay95
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Destaque (18)

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Semelhante a On the cybercrime act

Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case StudyEddan Katz
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptxTheMuslimLady
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )Megan Espinoza
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 

Semelhante a On the cybercrime act (20)

Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case Study
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
2009 case law overview
2009 case law overview2009 case law overview
2009 case law overview
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 

Mais de CP-Union

James Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonJames Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonCP-Union
 
Albert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisAlbert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisCP-Union
 
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...CP-Union
 
Jojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaJojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaCP-Union
 
Gerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerGerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerCP-Union
 
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryEladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryCP-Union
 
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardRep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardCP-Union
 
Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.CP-Union
 
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.CP-Union
 
Foss and ict for the people
Foss and ict for the peopleFoss and ict for the people
Foss and ict for the peopleCP-Union
 
Drupal for Non-Profits
Drupal for Non-ProfitsDrupal for Non-Profits
Drupal for Non-ProfitsCP-Union
 

Mais de CP-Union (11)

James Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonJames Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on Python
 
Albert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisAlbert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and Analysis
 
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
 
Jojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaJojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to Wikimedia
 
Gerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerGerald Villorente on Intro to Docker
Gerald Villorente on Intro to Docker
 
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryEladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
 
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardRep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
 
Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.
 
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
 
Foss and ict for the people
Foss and ict for the peopleFoss and ict for the people
Foss and ict for the people
 
Drupal for Non-Profits
Drupal for Non-ProfitsDrupal for Non-Profits
Drupal for Non-Profits
 

Último

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Último (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

On the cybercrime act

  • 3. Cybercrime Prevention Act of 2012 Computer Professionals’ Union 5 October 2012 *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions at mga imahe mula sa Pixel Offensive. Sunday, October 7, 12
  • 5. Background Passed House of Representatives on 04 June 2012 Senate Bill No. 2796 and House Bill No. 5808 Passed Senate on 05 June 2012 Signed into law on 12 September 2012 An Act Defining Cybercrime, Providing for the Prevention, Investigation, Suppression, and the Imposition of Penalties therefor and for other Purposes Implemented: October 3, 2012 Sunday, October 7, 12
  • 6. Endorsed by these senators. “TG” Guingona III voting against it. Sunday, October 7, 12
  • 9. We fight back! SC petitions to Junk/Repeal/Amend Senate Bill No. 2796 and House Bill No. 5808 Sunday, October 7, 12
  • 10. We fight back! Online blackout campaign Sunday, October 7, 12
  • 11. We fight back! Silent protest in SC Sunday, October 7, 12
  • 12. We fight back! Protest in SC Sunday, October 7, 12
  • 13. We fight back! Social Media Sunday, October 7, 12
  • 14. We fight back! Social Media Sunday, October 7, 12
  • 15. We fight back! Social Media Sunday, October 7, 12
  • 16. We fight back! Social Media Sunday, October 7, 12
  • 17. We fight back! Social Media Sunday, October 7, 12
  • 21. What is the RA 10175 ? Section 4: Cybercrime Offenses Illegal access, illegal interception, data interception, data interference (a)(3), system interference, misuse of devices Computer-related forgery, computer-related fraud, computer- related identity theft Cybersex, child pornography, unsolicited commercial communications Libel Sunday, October 7, 12
  • 22. What is the RA 10175 ? Section 5: Other Offenses aiding or abetting in the commission of cybercrime, attempt in the commission of cybercrime Section 6: All crimes in RPC if committed by, through and with the use of ICT Penalty: one degree higher Sunday, October 7, 12
  • 23. What is the RA 10175 ? Section 4(a)(3) on Data Interference: intrudes into people’s freedom The intentional or reckless alteration, damaging, deletion or deterioration of computer data, of speech electronic document, or electronic data message, without right including the introduction or alterations transmission of viruses vague, “sweep unnecessarily broadly” “it becomes very burdensome, onerous and patently discouraging, specially if the act is for purposes of social and political criticisms” Source: BAYAN SC Petition Sunday, October 7, 12
  • 24. What is the RA 10175 ? Section 4(b)(3) on Computer-related Identity Theft: intrudes into people’s freedom The intentional acquisition, use, misuse, of speech transfer, possession, alteration, or deletion of identifying information belonging to politician’s full name, age, another, whether natural or juridical without right. education, employment Provided, that if no damage has yet been caused, the background, names of parents, penalty imposable shall be one (1) degree lower. siblings, wife, children and other members of immediate family) of another person (e.g. by intentionally obtaining such identifying information, without any consent, from Facebook, website, or any online article or document) Sunday, October 7, 12
  • 25. What is the RA 10175 ? Section 4(c)(4) on Libel makes anyone a target of prosecution and punishment chilling effect on the exercise of freedom of speech General Comment   No.   34   of   the   United   Nations   Human   Rights   Committee states that   “State   parties should consider the decriminalization of defamation “a violation or disregard of the Philippine government’s obligations under the International Convention on Civil Political Rights to promote and protect freedom of expression” Source: BAYAN SC Petition Sunday, October 7, 12
  • 26. What is the RA 10175 ? Section 5(a) on Aiding or intrudes into people’s Abetting in the commission of cybercrime: freedom of speech Section 5(b) on Attempt in the commission of cybercrime: Sunday, October 7, 12
  • 27. What is the RA 10175 ? Section 6 on all crimes defined violation of the right in Revised Penal Code (RPC), if committed by, through and of the people not to with the use of ICT shall be be subjected to covered by this Act double jeopardy Section 7 on Liability under other Laws A prosecution under this Act shall be without prejudice to any liability for violation of any provision of RPC etc Sunday, October 7, 12
  • 28. What is the RA 10175 ? Section 12 (1) violation of the right Real-Time Collection of Traffic Data of the people against unreasonable Law enforcement authorities, with due searches and seizure cause, shall be authorized to collect or record by technical or electronic means traffic violation of the right data in real-time associated with to privacy specified communications transmitted by means of a computer system Sunday, October 7, 12
  • 29. What is the RA 10175 ? Section 17 (1) deprivation of Destruction of computer data property without due Upon expiration of periods authorities shall process of law immediately and completely destroy the computer data subject to prevention and examination. Sunday, October 7, 12
  • 30. What is the RA 10175 ? Section 19 (1) Restricting of Blocking Access to intrudes into Computer Data people’s freedom of When a computer data is prima speech facie found to be in violation of the provision of this Act, the DOJ shall issue an grant of unbridled order to restrict or block access to such computer data. power to Department of Justice “take down clause” Sunday, October 7, 12
  • 32. Who are affected? all users of “mobile phones, computers, computer data storage devises (e.g. USB, external hard disks), emails, social media and anything that is related to the internet, cyberspace and information and communications technology” Source: BAYAN SC Petition Sunday, October 7, 12
  • 33. Threats to ICT professionals For computer professionals and hackers working with information security and network administration our sets of tools can be misinterpreted as tools to commit cybercrime. It should be noted that crackers (bad hackers) and hackers almost use the same set of tools. We can be punished for “misuse of devices”... Source: CP-UNION.COM Sunday, October 7, 12
  • 34. Threats to ICT professionals Computer technicians are not spared. They should start asking waivers if they repair, reformat, and troubleshoot computer systems and networks. They could be punished for “system interference” in Section 4 (a) (4). It “adds a broken tool to current computer security toolbox used by computer professionals. It opened new mechanisms for misinterpretations (intentional or not) by State authorities wherein innocent computer users and hackers can be tagged to crimes and punished without due process.” Source: CP-UNION.COM Sunday, October 7, 12
  • 35. Can an IRR fix RA 10175 ? “As such, Akbayancalls on President Aquino to address the infirmities of the law by inviting media people and organizations, social movements and civil society groups to participate in the crafting of the law’s implementing rules and regulations (IRR) to negate the law’s repressive provisions and safeguard the rights and welfare of internet users. The Aquino government must swiftly act to salvage this law or otherwise the people will have no option left but to bring this to court.” September 20, 2012 Statement, AKBAYAN Sunday, October 7, 12
  • 36. Can an IRR fix RA 10175 ? No. @natoreyes: “The IRR cannot accomplish more than what the law sets out to do. If the law intends to criminalize online libel, the IRR cannot reverse or negate this. If the law allows the take-down of websites by the DOJ sans a court order, the IRR cannot reverse or negate this.” ... “We’re being drawn to a path that leads to a cliff. Huwag magpaloko.” Source: http://natoreyes.wordpress.com Sunday, October 7, 12
  • 39. We have bigger problems but they decided to prioritize punishment of cybercrime. Sunday, October 7, 12
  • 46. Binuo ng Computer Professionals’ Union www.cp-union.com Ref: http://www.facebook.com/PixelOffensive BAYAN Supreme Court Petition Bloggers and Netizens vs Aquino Supreme Court Petition *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions *Mga imahe mula sa Pixel Offensive. Sunday, October 7, 12
  • 47. On the Cybercrime Law by Computer Professionals’ Union and Rick Bahague is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Based on a work at www.cp-union.com. Sunday, October 7, 12