SlideShare uma empresa Scribd logo
1 de 47
Baixar para ler offline
Sunday, October 7, 12
Sunday, October 7, 12
Cybercrime Prevention
                             Act of 2012
                                Computer Professionals’ Union
                                      5 October 2012




         *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court
         Petitions at mga imahe mula sa Pixel Offensive.

Sunday, October 7, 12
Sunday, October 7, 12
Background
         Passed House of Representatives on 04 June 2012

              Senate Bill No. 2796 and House Bill No. 5808


         Passed Senate on 05 June 2012

         Signed into law on 12 September 2012

              An Act Defining Cybercrime, Providing for the Prevention,
              Investigation, Suppression, and the Imposition of Penalties therefor
              and for other Purposes


         Implemented: October 3, 2012
Sunday, October 7, 12
Endorsed by these
         senators.



         “TG” Guingona III
         voting against it.




Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
We fight back!

                  SC petitions to Junk/Repeal/Amend

                        Senate Bill No. 2796 and House Bill No. 5808




Sunday, October 7, 12
We fight back!


                         Online blackout campaign




Sunday, October 7, 12
We fight back!

               Silent protest in SC




Sunday, October 7, 12
We fight back!

            Protest in SC




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
“Anonymous” fights back!




Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
What is the RA 10175 ?
            Section 4: Cybercrime Offenses

                  Illegal access, illegal interception, data interception, data
                  interference (a)(3), system interference, misuse of devices

                  Computer-related forgery, computer-related fraud, computer-
                  related identity theft

                  Cybersex, child pornography, unsolicited commercial
                  communications

                  Libel



Sunday, October 7, 12
What is the RA 10175 ?
            Section 5: Other Offenses

                  aiding or abetting in the commission of cybercrime, attempt
                  in the commission of cybercrime


            Section 6: All crimes in RPC if committed by, through and with
            the use of ICT

                  Penalty: one degree higher




Sunday, October 7, 12
What is the RA 10175 ?
           Section 4(a)(3) on Data Interference:                   intrudes into
                                                                   people’s freedom
           The intentional or reckless alteration,
           damaging, deletion or deterioration of computer data,   of speech
           electronic document, or electronic data message,
           without right including the introduction or                       alterations
           transmission of viruses


           vague, “sweep unnecessarily broadly”

           “it becomes very burdensome, onerous
           and patently discouraging, specially if
           the act is for purposes of social and
           political criticisms”

     Source: BAYAN SC Petition
Sunday, October 7, 12
What is the RA 10175 ?
           Section 4(b)(3) on Computer-related
           Identity Theft:
                                                                  intrudes into
                                                                  people’s freedom
           The intentional       acquisition, use, misuse,        of speech
           transfer, possession, alteration, or deletion of
           identifying information belonging to                   politician’s full name, age,
           another, whether natural or juridical without right.   education, employment
           Provided, that if no damage has yet been caused, the   background, names of parents,
           penalty imposable shall be one (1) degree lower.       siblings, wife, children and other
                                                                  members of immediate family) of
                                                                  another person (e.g. by
                                                                  intentionally obtaining such
                                                                  identifying information, without
                                                                  any consent, from Facebook,
                                                                  website, or any online article or
                                                                  document)



Sunday, October 7, 12
What is the RA 10175 ?

           Section 4(c)(4) on Libel

             makes anyone a target of prosecution and punishment


             chilling effect on the exercise of freedom of speech

             General Comment   No.   34   of   the   United   Nations   Human   Rights  
             Committee states that   “State   parties should consider the
             decriminalization of defamation

             “a violation or disregard of the Philippine government’s obligations under
             the International Convention on Civil Political Rights to promote and
             protect freedom of expression”
          Source: BAYAN SC Petition
Sunday, October 7, 12
What is the RA 10175 ?
         Section 5(a) on Aiding or        intrudes into people’s
         Abetting in the commission of
         cybercrime:                      freedom of speech
         Section 5(b) on Attempt in the
         commission of cybercrime:




Sunday, October 7, 12
What is the RA 10175 ?
         Section 6 on all crimes defined                    violation of the right
         in Revised Penal Code (RPC),
         if committed by, through and                      of the people not to
         with the use of ICT shall be                      be subjected to
         covered by this Act                               double jeopardy

         Section 7 on Liability under
         other Laws

         A prosecution under this Act shall be without
         prejudice to any liability for violation of any
         provision of RPC etc




Sunday, October 7, 12
What is the RA 10175 ?
         Section 12 (1)                           violation of the right
         Real-Time Collection of Traffic
         Data                                     of the people against
                                                  unreasonable
         Law enforcement authorities, with due
                                                  searches and seizure
         cause, shall be authorized to
         collect or record by technical
         or electronic means traffic               violation of the right
         data in real-time associated with        to privacy
         specified communications transmitted by
         means of a computer system




Sunday, October 7, 12
What is the RA 10175 ?

         Section 17 (1)                                 deprivation of
         Destruction of computer data
                                                        property without due
         Upon expiration of periods authorities shall   process of law
         immediately and completely
         destroy the computer data subject
         to prevention and examination.




Sunday, October 7, 12
What is the RA 10175 ?
         Section 19 (1)
         Restricting of Blocking Access to                 intrudes into
         Computer Data                                     people’s freedom of
         When a computer          data is prima            speech
         facie found to be in violation of the provision
         of this Act, the DOJ shall issue an               grant of unbridled
         order to restrict or block access
         to such computer data.                            power to
                                                           Department of
                                                           Justice
         “take down clause”



Sunday, October 7, 12
Sunday, October 7, 12
Who are affected?

               all users of “mobile phones, computers, computer data
               storage devises (e.g. USB, external hard disks), emails,
               social media and anything that is related to the internet,
               cyberspace and information and communications
               technology”




             Source: BAYAN SC Petition

Sunday, October 7, 12
Threats to ICT professionals

                  For computer professionals and hackers working with
                  information security and network administration our sets
                  of tools can be misinterpreted as tools to commit
                  cybercrime. It should be noted that crackers (bad
                  hackers) and hackers almost use the same set of tools.
                  We can be punished for “misuse of devices”...




                  Source: CP-UNION.COM

Sunday, October 7, 12
Threats to ICT professionals
                  Computer technicians are not spared. They should start
                  asking waivers if they repair, reformat, and troubleshoot
                  computer systems and networks. They could be punished
                  for “system interference” in Section 4 (a) (4).


                  It “adds a broken tool to current computer security
                  toolbox used by computer professionals. It opened new
                  mechanisms for misinterpretations (intentional or not)
                  by State authorities wherein innocent computer users
                  and hackers can be tagged to crimes and punished
                  without due process.”


                  Source: CP-UNION.COM

Sunday, October 7, 12
Can an IRR fix RA 10175 ?
               “As such, Akbayancalls on President Aquino to
               address the infirmities of the law by
               inviting media people and organizations,
               social movements and civil society groups to
               participate in the crafting of the law’s
               implementing rules and regulations (IRR) to
               negate the law’s repressive provisions and safeguard the
               rights and welfare of internet users. The Aquino
               government must swiftly act to salvage this law or
               otherwise the people will have no option left but to bring
               this to court.”
               September 20, 2012 Statement, AKBAYAN
Sunday, October 7, 12
Can an IRR fix RA 10175 ?

                No.


               @natoreyes:
               “The IRR cannot accomplish more than what the law sets
               out to do. If the law intends to criminalize online libel,
               the IRR cannot reverse or negate this. If the law allows
               the take-down of websites by the DOJ sans a court order,
               the IRR cannot reverse or negate this.”
               ... “We’re being drawn to a path that leads to a cliff. Huwag
               magpaloko.”
               Source: http://natoreyes.wordpress.com



Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
We have bigger problems but they decided to prioritize
                 punishment of cybercrime.



Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Binuo ng Computer Professionals’ Union
                              www.cp-union.com




           Ref: http://www.facebook.com/PixelOffensive
           BAYAN Supreme Court Petition
           Bloggers and Netizens vs Aquino Supreme Court Petition

           *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions
           *Mga imahe mula sa Pixel Offensive.




Sunday, October 7, 12
On the Cybercrime Law by Computer Professionals’ Union
                   and Rick Bahague is licensed under a Creative Commons
                 Attribution-NonCommercial-ShareAlike 3.0 Unported License.
                            Based on a work at www.cp-union.com.



Sunday, October 7, 12

Mais conteúdo relacionado

Mais procurados

The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptxRepublic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptxMarsha Pasong
 
Basic Data Privacy for Non Lawyers
Basic Data Privacy for Non LawyersBasic Data Privacy for Non Lawyers
Basic Data Privacy for Non LawyersJDP Consulting
 
Sexual Harassment
Sexual HarassmentSexual Harassment
Sexual Harassmentrodpatingan
 
Orientation ra 9208 ii
Orientation ra 9208 iiOrientation ra 9208 ii
Orientation ra 9208 iiOmar Jacalne
 
Privilege Speech: Child Cyber Pornography
Privilege Speech: Child Cyber PornographyPrivilege Speech: Child Cyber Pornography
Privilege Speech: Child Cyber PornographySenator Loren Legarda
 
Act no.-3815-revised-penal-code-of-the-phils.-crimes-committed-by-public-offi...
Act no.-3815-revised-penal-code-of-the-phils.-crimes-committed-by-public-offi...Act no.-3815-revised-penal-code-of-the-phils.-crimes-committed-by-public-offi...
Act no.-3815-revised-penal-code-of-the-phils.-crimes-committed-by-public-offi...cherry Marie Facun
 
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Jay Castillo
 
Ra 9262 anti_violence_against_woment_and
Ra 9262 anti_violence_against_woment_andRa 9262 anti_violence_against_woment_and
Ra 9262 anti_violence_against_woment_andJennifer Fabre
 

Mais procurados (20)

The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptxRepublic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
Republic Act 9208 or the Anti-Trafficking in Persons_As Amended.pptx
 
R.A. 7610
R.A. 7610R.A. 7610
R.A. 7610
 
Basic Data Privacy for Non Lawyers
Basic Data Privacy for Non LawyersBasic Data Privacy for Non Lawyers
Basic Data Privacy for Non Lawyers
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Anti wiretapping-act
Anti wiretapping-actAnti wiretapping-act
Anti wiretapping-act
 
Sexual Harassment
Sexual HarassmentSexual Harassment
Sexual Harassment
 
Republic act 7877
Republic act 7877Republic act 7877
Republic act 7877
 
Orientation ra 9208 ii
Orientation ra 9208 iiOrientation ra 9208 ii
Orientation ra 9208 ii
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
VAWC
VAWCVAWC
VAWC
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Privilege Speech: Child Cyber Pornography
Privilege Speech: Child Cyber PornographyPrivilege Speech: Child Cyber Pornography
Privilege Speech: Child Cyber Pornography
 
Act no.-3815-revised-penal-code-of-the-phils.-crimes-committed-by-public-offi...
Act no.-3815-revised-penal-code-of-the-phils.-crimes-committed-by-public-offi...Act no.-3815-revised-penal-code-of-the-phils.-crimes-committed-by-public-offi...
Act no.-3815-revised-penal-code-of-the-phils.-crimes-committed-by-public-offi...
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
Data Privacy Act of 2012 (R.A. 10173) Briefing 2017
 
Ra 9262 anti_violence_against_woment_and
Ra 9262 anti_violence_against_woment_andRa 9262 anti_violence_against_woment_and
Ra 9262 anti_violence_against_woment_and
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 

Destaque

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoPaola Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancementsguest5f7bf4
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkingHamid Zainudin
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry BenRay95
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Destaque (18)

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Semelhante a On the cybercrime act

Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case StudyEddan Katz
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptxTheMuslimLady
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )Megan Espinoza
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 

Semelhante a On the cybercrime act (20)

Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case Study
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
2009 case law overview
2009 case law overview2009 case law overview
2009 case law overview
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 

Mais de CP-Union

James Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonJames Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonCP-Union
 
Albert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisAlbert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisCP-Union
 
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...CP-Union
 
Jojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaJojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaCP-Union
 
Gerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerGerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerCP-Union
 
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryEladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryCP-Union
 
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardRep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardCP-Union
 
Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.CP-Union
 
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.CP-Union
 
Foss and ict for the people
Foss and ict for the peopleFoss and ict for the people
Foss and ict for the peopleCP-Union
 
Drupal for Non-Profits
Drupal for Non-ProfitsDrupal for Non-Profits
Drupal for Non-ProfitsCP-Union
 

Mais de CP-Union (11)

James Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonJames Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on Python
 
Albert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisAlbert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and Analysis
 
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
 
Jojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaJojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to Wikimedia
 
Gerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerGerald Villorente on Intro to Docker
Gerald Villorente on Intro to Docker
 
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryEladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
 
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardRep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
 
Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.
 
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
 
Foss and ict for the people
Foss and ict for the peopleFoss and ict for the people
Foss and ict for the people
 
Drupal for Non-Profits
Drupal for Non-ProfitsDrupal for Non-Profits
Drupal for Non-Profits
 

Último

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Último (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

On the cybercrime act

  • 3. Cybercrime Prevention Act of 2012 Computer Professionals’ Union 5 October 2012 *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions at mga imahe mula sa Pixel Offensive. Sunday, October 7, 12
  • 5. Background Passed House of Representatives on 04 June 2012 Senate Bill No. 2796 and House Bill No. 5808 Passed Senate on 05 June 2012 Signed into law on 12 September 2012 An Act Defining Cybercrime, Providing for the Prevention, Investigation, Suppression, and the Imposition of Penalties therefor and for other Purposes Implemented: October 3, 2012 Sunday, October 7, 12
  • 6. Endorsed by these senators. “TG” Guingona III voting against it. Sunday, October 7, 12
  • 9. We fight back! SC petitions to Junk/Repeal/Amend Senate Bill No. 2796 and House Bill No. 5808 Sunday, October 7, 12
  • 10. We fight back! Online blackout campaign Sunday, October 7, 12
  • 11. We fight back! Silent protest in SC Sunday, October 7, 12
  • 12. We fight back! Protest in SC Sunday, October 7, 12
  • 13. We fight back! Social Media Sunday, October 7, 12
  • 14. We fight back! Social Media Sunday, October 7, 12
  • 15. We fight back! Social Media Sunday, October 7, 12
  • 16. We fight back! Social Media Sunday, October 7, 12
  • 17. We fight back! Social Media Sunday, October 7, 12
  • 21. What is the RA 10175 ? Section 4: Cybercrime Offenses Illegal access, illegal interception, data interception, data interference (a)(3), system interference, misuse of devices Computer-related forgery, computer-related fraud, computer- related identity theft Cybersex, child pornography, unsolicited commercial communications Libel Sunday, October 7, 12
  • 22. What is the RA 10175 ? Section 5: Other Offenses aiding or abetting in the commission of cybercrime, attempt in the commission of cybercrime Section 6: All crimes in RPC if committed by, through and with the use of ICT Penalty: one degree higher Sunday, October 7, 12
  • 23. What is the RA 10175 ? Section 4(a)(3) on Data Interference: intrudes into people’s freedom The intentional or reckless alteration, damaging, deletion or deterioration of computer data, of speech electronic document, or electronic data message, without right including the introduction or alterations transmission of viruses vague, “sweep unnecessarily broadly” “it becomes very burdensome, onerous and patently discouraging, specially if the act is for purposes of social and political criticisms” Source: BAYAN SC Petition Sunday, October 7, 12
  • 24. What is the RA 10175 ? Section 4(b)(3) on Computer-related Identity Theft: intrudes into people’s freedom The intentional acquisition, use, misuse, of speech transfer, possession, alteration, or deletion of identifying information belonging to politician’s full name, age, another, whether natural or juridical without right. education, employment Provided, that if no damage has yet been caused, the background, names of parents, penalty imposable shall be one (1) degree lower. siblings, wife, children and other members of immediate family) of another person (e.g. by intentionally obtaining such identifying information, without any consent, from Facebook, website, or any online article or document) Sunday, October 7, 12
  • 25. What is the RA 10175 ? Section 4(c)(4) on Libel makes anyone a target of prosecution and punishment chilling effect on the exercise of freedom of speech General Comment   No.   34   of   the   United   Nations   Human   Rights   Committee states that   “State   parties should consider the decriminalization of defamation “a violation or disregard of the Philippine government’s obligations under the International Convention on Civil Political Rights to promote and protect freedom of expression” Source: BAYAN SC Petition Sunday, October 7, 12
  • 26. What is the RA 10175 ? Section 5(a) on Aiding or intrudes into people’s Abetting in the commission of cybercrime: freedom of speech Section 5(b) on Attempt in the commission of cybercrime: Sunday, October 7, 12
  • 27. What is the RA 10175 ? Section 6 on all crimes defined violation of the right in Revised Penal Code (RPC), if committed by, through and of the people not to with the use of ICT shall be be subjected to covered by this Act double jeopardy Section 7 on Liability under other Laws A prosecution under this Act shall be without prejudice to any liability for violation of any provision of RPC etc Sunday, October 7, 12
  • 28. What is the RA 10175 ? Section 12 (1) violation of the right Real-Time Collection of Traffic Data of the people against unreasonable Law enforcement authorities, with due searches and seizure cause, shall be authorized to collect or record by technical or electronic means traffic violation of the right data in real-time associated with to privacy specified communications transmitted by means of a computer system Sunday, October 7, 12
  • 29. What is the RA 10175 ? Section 17 (1) deprivation of Destruction of computer data property without due Upon expiration of periods authorities shall process of law immediately and completely destroy the computer data subject to prevention and examination. Sunday, October 7, 12
  • 30. What is the RA 10175 ? Section 19 (1) Restricting of Blocking Access to intrudes into Computer Data people’s freedom of When a computer data is prima speech facie found to be in violation of the provision of this Act, the DOJ shall issue an grant of unbridled order to restrict or block access to such computer data. power to Department of Justice “take down clause” Sunday, October 7, 12
  • 32. Who are affected? all users of “mobile phones, computers, computer data storage devises (e.g. USB, external hard disks), emails, social media and anything that is related to the internet, cyberspace and information and communications technology” Source: BAYAN SC Petition Sunday, October 7, 12
  • 33. Threats to ICT professionals For computer professionals and hackers working with information security and network administration our sets of tools can be misinterpreted as tools to commit cybercrime. It should be noted that crackers (bad hackers) and hackers almost use the same set of tools. We can be punished for “misuse of devices”... Source: CP-UNION.COM Sunday, October 7, 12
  • 34. Threats to ICT professionals Computer technicians are not spared. They should start asking waivers if they repair, reformat, and troubleshoot computer systems and networks. They could be punished for “system interference” in Section 4 (a) (4). It “adds a broken tool to current computer security toolbox used by computer professionals. It opened new mechanisms for misinterpretations (intentional or not) by State authorities wherein innocent computer users and hackers can be tagged to crimes and punished without due process.” Source: CP-UNION.COM Sunday, October 7, 12
  • 35. Can an IRR fix RA 10175 ? “As such, Akbayancalls on President Aquino to address the infirmities of the law by inviting media people and organizations, social movements and civil society groups to participate in the crafting of the law’s implementing rules and regulations (IRR) to negate the law’s repressive provisions and safeguard the rights and welfare of internet users. The Aquino government must swiftly act to salvage this law or otherwise the people will have no option left but to bring this to court.” September 20, 2012 Statement, AKBAYAN Sunday, October 7, 12
  • 36. Can an IRR fix RA 10175 ? No. @natoreyes: “The IRR cannot accomplish more than what the law sets out to do. If the law intends to criminalize online libel, the IRR cannot reverse or negate this. If the law allows the take-down of websites by the DOJ sans a court order, the IRR cannot reverse or negate this.” ... “We’re being drawn to a path that leads to a cliff. Huwag magpaloko.” Source: http://natoreyes.wordpress.com Sunday, October 7, 12
  • 39. We have bigger problems but they decided to prioritize punishment of cybercrime. Sunday, October 7, 12
  • 46. Binuo ng Computer Professionals’ Union www.cp-union.com Ref: http://www.facebook.com/PixelOffensive BAYAN Supreme Court Petition Bloggers and Netizens vs Aquino Supreme Court Petition *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions *Mga imahe mula sa Pixel Offensive. Sunday, October 7, 12
  • 47. On the Cybercrime Law by Computer Professionals’ Union and Rick Bahague is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Based on a work at www.cp-union.com. Sunday, October 7, 12