SlideShare uma empresa Scribd logo
1 de 18
LAW

LAW
PHILIPPINE SETTINGS
CYBERCRIME
TYPES OF CYBER CRIME

PENALTIES

 Illegal access
 Unauthorized access

 (imprisonment of six

(without right) to a
computer system or
application.

years and 1 day up to 12
years) or a fine of at least
Two hundred thousand
pesos (P200,000) up to a
maximum amount
commensurate to the
damage incurred
 Illegal interception

Unauthorized
interception of any
non-public
transmission of
computer data to, from,
or within a computer
system.

 (imprisonment of six

years and 1 day up to 12
years) or a fine of at
least Two hundred
thousand pesos
(P200,000) up to a
maximum amount
commensurate to the
damage incurred
 Data Interference

Unauthorized alteration,
damaging, deletion or
deterioration of
computer data,
electronic document, or
electronic data message,
and including the
introduction or
transmission of viruses.

 SAME AS ABOVE
 System Interference
Unauthorized hindering or
interference with the
functioning of a computer or

computer network by inputting,
transmitting, damaging,
deleting, deteriorating, altering
or suppressing computer data
or program, electronic
document, or electronic data
messages, and including the
introduction or transmission of
viruses.

 SAME AS ABOVE
 Misuse of devices

The unauthorized use,
possession, production,
sale, procurement,
importation, distribution, or
otherwise making available,
of devices, computer
program designed or
adapted for the purpose of
committing any of the
offenses stated in Republic
Act 10175.Unauthorized use
of computer password



same as above
except fine should be
no more than Five
hundred thousand
pesos (P500,000).
 Cyber-squatting

Acquisition of domain name
over the Internet in bad faith to
profit, mislead, destroy
reputation, and deprive others
from the registering the same.
This includes those existing
trademark at the time of
registration; names of persons
other than the registrant; and
acquired with intellectual
property interests in it.

 SAME AS ABOVE
 Computer-related

Fraud

Unauthorized input,
alteration, or deletion of
computer data or
program or interference
in the functioning of a
computer system,
causing damage thereby
with fraudulent intent.

 same as above

Provided, That if no
damage has yet been
caused, the penalty
imposed shall be one (1)
degree lower.
 Computer-related

Identity Theft

Unauthorized
acquisition, use, misuse,
transfer, possession,
alteration or deletion of
identifying information
belonging to another,
whether natural or
juridical.

 SAME AS ABOVE
 Cybersex

Willful engagement,
maintenance, control, or
operation, directly or
indirectly, of any lascivious
exhibition of sexual organs or
sexual activity, with the aid of
a computer system, for favor
or consideration. There is a
discussion on this matter if it
involves “couples” or “people
in relationship” who engage in
cybersex.

 . For as long it is not done for
favor or consideration, I don’t
think it will be covered.
However, if one party (in a
couple or relationship) sues
claiming to be forced to do
cybersex, then it can be
covered.
 PENALTY
 (imprisonment of six years and
1 day up to 12 years) or a fine of
at least Two hundred thousand

pesos (P200,000) but not
exceeding One million pesos
(P1,000,000) or BOTH.
 Child Pornography

Unlawful or prohibited
acts defined and
punishable by Republic
Act No. 9775 or the AntiChild Pornography Act of
2009, committed
through a computer
system.

 imposed shall be

one (1) degree
higher than that
provided for in
Republic Act 9775,
if committed
through a
computer system.
CYBERCRIME LAW
UNITED STATES SETTINGS
CYBERCRIMES
 4. Online Gambling
 5. Intellectual property crimes such as theft of

computer source code, software piracy,
copyright infringement, trademark violations
 6. Harassments such as cyber stalking, cyber
defamation, indecent and abusing mails
CYBERCRIMES
 7. Cyber frauds such as forgery of

documents including currency and any other
documents
 8. Launching of virus, worms and Trojans
 9. Denial-of-service attacks

 10. Cyber attacks and cyber terrorism
CYBERCRIMES
 11. Economic espionage
 12. Consumer harassment and consumer

protection
 13. Privacy of citizens

 14. Sale of illegal articles such as narcotics,

weapons, wildlife, etc
Cyber crimes that can generally occur within
organizations are as follows;
 E-mail abuse
 2. Spam mails
 3. Cyber defamation
 4. Theft of source code

 5. Exchange of business secrets and documents
CYBERCRIMES
 6. Insider attacks on personal database
 7. Use of office computer for running other business
 8. Transmission and viewing of pornographic materials
 9. External cyber attacks on an organization resulting in

denial-of-service

 10. Information espionage

Mais conteúdo relacionado

Mais procurados

Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Involving computers (Laws and bills)
Involving computers (Laws and bills)Involving computers (Laws and bills)
Involving computers (Laws and bills)
Sharwin Calimlim
 
Digital law
Digital lawDigital law
Digital law
zrh48
 

Mais procurados (20)

Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012Republic Act 10175: Cybercrime Prevention Act of 2012
Republic Act 10175: Cybercrime Prevention Act of 2012
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
IT Security
IT SecurityIT Security
IT Security
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Involving computers (Laws and bills)
Involving computers (Laws and bills)Involving computers (Laws and bills)
Involving computers (Laws and bills)
 
Anti bullying ra 10627 final ping
Anti bullying ra 10627 final pingAnti bullying ra 10627 final ping
Anti bullying ra 10627 final ping
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the Philippines
 
Digital law
Digital lawDigital law
Digital law
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks reveton
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Data privacy act
Data privacy actData privacy act
Data privacy act
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 

Destaque

WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampWSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
Sonnie Santos
 
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
sabtolinux
 
Johnson, d. preventing bullying
Johnson, d. preventing bullying Johnson, d. preventing bullying
Johnson, d. preventing bullying
EDITHA HONRADEZ
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpoint
torremalku
 
Cyber Wellness Program for the philippines
Cyber Wellness Program  for the philippinesCyber Wellness Program  for the philippines
Cyber Wellness Program for the philippines
Sonnie Santos
 

Destaque (20)

Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampWSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
 
Bullying and teacher practices
Bullying and teacher practicesBullying and teacher practices
Bullying and teacher practices
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre..."The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
 
Casenote Bullying
Casenote BullyingCasenote Bullying
Casenote Bullying
 
Johnson, d. preventing bullying
Johnson, d. preventing bullying Johnson, d. preventing bullying
Johnson, d. preventing bullying
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpoint
 
OSI models
OSI modelsOSI models
OSI models
 
Abstract
AbstractAbstract
Abstract
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 
Accomplishments
AccomplishmentsAccomplishments
Accomplishments
 
Cyber Wellness Program for the philippines
Cyber Wellness Program  for the philippinesCyber Wellness Program  for the philippines
Cyber Wellness Program for the philippines
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)
 

Semelhante a Cybercrime law legality report

Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
GissaMaeCastino
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
badangayonmgb
 

Semelhante a Cybercrime law legality report (20)

Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data Protection
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
 

Último

+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Health
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
ednyonat
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 

Último (20)

Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing Company
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 
Finance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdfFinance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdf
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with Sociocosmos
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 

Cybercrime law legality report

  • 3. CYBERCRIME TYPES OF CYBER CRIME PENALTIES  Illegal access  Unauthorized access  (imprisonment of six (without right) to a computer system or application. years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred
  • 4.  Illegal interception Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system.  (imprisonment of six years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred
  • 5.  Data Interference Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses.  SAME AS ABOVE
  • 6.  System Interference Unauthorized hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, and including the introduction or transmission of viruses.  SAME AS ABOVE
  • 7.  Misuse of devices The unauthorized use, possession, production, sale, procurement, importation, distribution, or otherwise making available, of devices, computer program designed or adapted for the purpose of committing any of the offenses stated in Republic Act 10175.Unauthorized use of computer password  same as above except fine should be no more than Five hundred thousand pesos (P500,000).
  • 8.  Cyber-squatting Acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same. This includes those existing trademark at the time of registration; names of persons other than the registrant; and acquired with intellectual property interests in it.  SAME AS ABOVE
  • 9.  Computer-related Fraud Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.  same as above Provided, That if no damage has yet been caused, the penalty imposed shall be one (1) degree lower.
  • 10.  Computer-related Identity Theft Unauthorized acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical.  SAME AS ABOVE
  • 11.  Cybersex Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex.  . For as long it is not done for favor or consideration, I don’t think it will be covered. However, if one party (in a couple or relationship) sues claiming to be forced to do cybersex, then it can be covered.  PENALTY  (imprisonment of six years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) but not exceeding One million pesos (P1,000,000) or BOTH.
  • 12.  Child Pornography Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the AntiChild Pornography Act of 2009, committed through a computer system.  imposed shall be one (1) degree higher than that provided for in Republic Act 9775, if committed through a computer system.
  • 14. CYBERCRIMES  4. Online Gambling  5. Intellectual property crimes such as theft of computer source code, software piracy, copyright infringement, trademark violations  6. Harassments such as cyber stalking, cyber defamation, indecent and abusing mails
  • 15. CYBERCRIMES  7. Cyber frauds such as forgery of documents including currency and any other documents  8. Launching of virus, worms and Trojans  9. Denial-of-service attacks  10. Cyber attacks and cyber terrorism
  • 16. CYBERCRIMES  11. Economic espionage  12. Consumer harassment and consumer protection  13. Privacy of citizens  14. Sale of illegal articles such as narcotics, weapons, wildlife, etc
  • 17. Cyber crimes that can generally occur within organizations are as follows;  E-mail abuse  2. Spam mails  3. Cyber defamation  4. Theft of source code  5. Exchange of business secrets and documents
  • 18. CYBERCRIMES  6. Insider attacks on personal database  7. Use of office computer for running other business  8. Transmission and viewing of pornographic materials  9. External cyber attacks on an organization resulting in denial-of-service  10. Information espionage