SlideShare uma empresa Scribd logo
1 de 29
E-COMMERCE LAW IN THE PHILIPPINES
 E-commerce (electronic-commerce)
refers to business over the Internet.
Web sites such as Amazon.com,
Buy.com, and eBay are all
e-commerce sites.
Business-to-Consumer (B2C)
Business-to-Consumer (B2C)
Business-to-Consumer (B2C)
 business transactions between
companies, business-to-consumer
models are those that sell products
or services directly to personal-use
customers
 connects, communicates and
conducts business transactions with
consumers most often via the
Internet
 larger than just online retailing; it
includes online banking, travel
services, online auctions, and health
and real estate sites.
Business-to-Business (B2B)
 A type of commerce
transaction that exists
between businesses, such
as those involving a
manufacturer and
wholesaler, or a
wholesaler and a retailer
 conducted between
companies, rather than
between a company and
individual consumers
by the Senate and House of Representatives of the
Republic of the Philippines
An act providing for the recognition and use of
electronic commercial and non-commercial
transactions and documents, penalties for unlawful
use thereof and for other purposes .
Electronic Commerce is defined as the process of
buying and selling goods electronically by consumers
and from company to company through computerized
business transactions. The Organization for Electronic
Cooperation and Development defines it as
commercial transactions based on electronic
transmission of data over communication networks
such as the Internet. Although the definition of
electronic commerce is strictly confined to
commercial undertakings, RA8792 is made applicable
to both
 provide a secure legal framework
and environment for electronic
commerce.
 protect the integrity of electronic
documents and electronic
signatures as well as its
transmission and communication
so as to build and ensure the
trust and reliance of the public
on electronic transactions.
Authors
Sen. Ramon Magsaysay Jr., Reps. Leandro
Verceles,Jr. and Marcial Punzalan, Jr. Co-Authors
of the Act who filed electronic commerce bills
were Sen. Juan Flavier, and Blas Ople and Reps.
Harry Angping, Roilo Golez and Dante Liban. Other
co-authors include Sen. Vicente Sotto III, Franklin
Drilon, Fran-cisco Tatad, Raul Roco, Aquilino
Pimentel Jr., Miriam Defesor-Santiago and Reps.
HerminioTeves, Magtanggol Guinigundo, Rolando
Sarmiento, Orlando Fua, JoeySalceda, Oscar
Moreno, and Ignacio Bunye.
a. “Addressee”
 a person who is intended by the
originator to receive the electronic
data message or electronic
document.
b. “Computer”
 any device or apparatus which, by
electronic, electro-mechanical or
magnetic impulse, or by other means
is capable of receiving, recording,
transmitting, storing, processing,
retrieving, or producing information,
c. “Electronic Data Message”
 information generated, sent,
received or stored by electronic,
optical or similar means.
data, figures, symbols or other modes
of written expression according to
mathematical and logical rules or of
performing any one or more of those
functions.
d.“Information and Communication
System”
 a system intended for and capable of
generating, sending, receiving,
storing or otherwise processing
electronic data messages or
electronic documents and includes
the computer system or other similar
device by or in which data is
recorded or stored and any
procedures related to the recording
or storage of electronic data
message or electronic document.
e. “Electronic Signature”
 any distinctive mark,
characteristic and/or sound in
electronic form, representing the
identity of a person and attached
to or logically associated with the
electronic data message or
electronic document or any
methodology or procedures
employed or adopted by a
person and executed or
adopted by such person with the
intention of authenticating or
approving an electronic data
message or electronic document.
f. “Electronic Document”
 information or the representation
of information, data, figures,
symbols or other modes of written
expression, described or however
represented, by which a right is
established or an obligation
extinguished, or by which a fact
may be proved and affirmed,
which is received, recorded,
transmitted, stored, processed,
retrieved or produced
electronically.
g. “Electronic Key”
 a secret code which secures
and defends sensitive
information that crosses over
public channels into a form
decipherable only with a
matching electronic key.
h. “Intermediary”
 a person who in behalf of another
person and with respect to a
particular electronic document sends,
receives and/or stores or provides
other services in respect of that
electronic document.
i. “Originator”
 a person by whom, or on whose
behalf, the electronic document
purports to have been created,
generated and/or sent . The term
does not include a person acting
as an intermediary with respect
to that electronic document.
j. “Service Provider”
 a provider of :
(i) On-line services or network
access, or the operator of facilities
therefore, including entities offering the
transmission, routing, or providing of
connections for online communications,
digital or otherwise, between or among
points specified by a user, of electronic
documents of the user’s choosing; or (ii)
The necessary technical means by
which electronic documents of an
originator may be stored and made
accessible to a designated or
undesignated third party; Such service
providers shall have no authority to modify
or alter the content of the electronic data
message or electronic document received
or to make any entry therein on behalf of
the originator, addressee or any third party
unless specifically authorized to do so,
and who shall retain the electronic
document in accordance with the specific
request or as necessary for the purpose of
performing the services it was engaged to
perform.
Salient Features of
Republic Act 8792
1. It gives legal
recognition of
electronic data
messages, electronic
documents, and
electronic signatures.
(section 6 to 13)
Sec. 6. Legal Recognition of Data Messages.
SEC. 13. Retention of Electronic Data
Message and Electronic Document.
Section 7. Legal Recognition of Electronic documents
Section 8. Legal Recognition of Electronic Signatures
Section 9. Presumption Relating to Electronic Signatures
Section 10. Original Documents.
Section 11. Authentication of Electronic Data
Messages and Electronic Documents
Section 12. Admissibility and
Evidential Weight of Electronic
Data Message or electronic
document.
SEC. 16. Formation and Validity of
Electronic Contracts.
2. Allows the
formation of
contracts in
electronic form.
(section 16)
3. Makes banking
transactions done
through ATM switching
networks absolute
once consummated.
(section 16)
4. Parties are given
the right to choose
the type and level
of security methods
that suit their
needs. (section 24)
SEC. 24. Choice of Security Methods.
5. Provides the mandate for the
electronic implementation of
transport documents to facilitate
carriage of goods. This includes
documents such as, but not limited
to, multi-modal, airport, road,
rail, inland waterway, courier, post
receipts, transport documents
issued by freight forwarders,
marine/ocean bill of lading, non-
negotiable seaway bill, charter
party bill of lading. (section 25 and
26)
SEC. 25. Actions Related to
Contracts of Carriage of
Goods.
SEC. 26. Transport
Documents.
6. Mandates the
government to have
the capability to do e-
commerce within 2
years or before June
19, 2002. (section 27)
SEC. 27. Government Use of
Electronic Data Messages, Electronic
Documents and
Electronic Signatures.
7. Mandates RPWeb to be implemented.
RPWeb is a strategy that intends to
connect all government offices to the
Internet and provide universal access to
the general public. The Department of
Transportation and Communications,
National Telecommunications
Commission, and National Computer
Center will come up with policies and
rules that shall lead to substantial
reduction of costs of telecommunication
and Internet facilities to ensure the
implementation of RPWeb. (section 28)
SEC. 28. RPWEB To
Promote the Use Of
Electronic Documents and
Electronic Data
Messages In Government
and to the General Public.
8. Made cable,
broadcast, and wireless
physical infrastructure
within the activity of
telecommunications.
(section 28)
SEC. 28. RPWEB To Promote the
Use Of Electronic Documents and
Electronic Data
Messages In Government and to
the General Public.
9. Empowers the Department of
Trade and Industry to supervise
the development of e-
commerce in the country. It can
also come up with policies and
regulations, when needed, to
facilitate the growth of e-
commerce. (section 29)
SEC. 29. Authority of the Department of Trade and
Industry and Participating Entities.
10. Provided
guidelines as to
when a service
provider can be
liable. (section
30)
SEC. 30. Extent of Liability of a Service Provider.
11. Authorities and parties
with the legal right can only
gain access to electronic
documents, electronic data
messages, and electronic
signatures. For confidentiality
purposes, it shall not share or
convey to any other person.
SEC. 31. Lawful Access. (section 31 and 32)
SEC. 32. Obligation of Confidentiality.
12. Hacking or cracking,
refers to unauthorized
access including the
introduction of computer
viruses, is punishable by a
fine from 100 thousand to
maximum commensurating
to the damage. With
imprisonment from 6
months to 3 years. (section
33)
SEC. 33. Penalties.
13. Piracy through the
use of
telecommunication
networks, such as the
Internet, that infringes
intellectual property
rights is punishable.
The penalties are the
same as hacking.
(section 33)
SEC. 33. Penalties.
14. All existing laws such
as the Consumer Act of the
Philippines also applies to
e-commerce transactions.
(section 33
SEC. 33. Penalties.

Mais conteúdo relacionado

Semelhante a e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippines-140914041005-phpapp01.pptx

24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-lawMd Aktar
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.pptMaruthi N.E
 
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law raissarobles
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in indiaatuljaybhaye
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008Mohit Goswami
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in IndiaDr. Prashant Vats
 
Article on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdfArticle on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdfRISHAVBHARDWAJ12
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
Advanced Electronic Signatures
Advanced Electronic SignaturesAdvanced Electronic Signatures
Advanced Electronic SignaturesClaire Webber
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Povo News
 

Semelhante a e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippines-140914041005-phpapp01.pptx (20)

24227541 cyber-law
24227541 cyber-law24227541 cyber-law
24227541 cyber-law
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
IT LAW PRESENATION
IT LAW PRESENATIONIT LAW PRESENATION
IT LAW PRESENATION
 
The Cyber Law regime in India.ppt
The Cyber Law regime in India.pptThe Cyber Law regime in India.ppt
The Cyber Law regime in India.ppt
 
Class it act
Class it actClass it act
Class it act
 
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law
Draft Implementing Rules and Regulations (IRR) of the Cybercrime Law
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
E commerce in india
E  commerce in indiaE  commerce in india
E commerce in india
 
Information Technology Act 2008
Information Technology Act 2008Information Technology Act 2008
Information Technology Act 2008
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
The Cyber Law Regime in India
The Cyber Law Regime in IndiaThe Cyber Law Regime in India
The Cyber Law Regime in India
 
IT Act,2000
IT Act,2000IT Act,2000
IT Act,2000
 
Article on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdfArticle on e-Contract_maryanka.pdf
Article on e-Contract_maryanka.pdf
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
Advanced Electronic Signatures
Advanced Electronic SignaturesAdvanced Electronic Signatures
Advanced Electronic Signatures
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017
 
Cyber law
Cyber lawCyber law
Cyber law
 

Mais de recoveraccount1

market anlysis SOFTware.pptx
market anlysis SOFTware.pptxmarket anlysis SOFTware.pptx
market anlysis SOFTware.pptxrecoveraccount1
 
TYPES OF CUSTOMERS- software design.pptx
TYPES  OF  CUSTOMERS-  software design.pptxTYPES  OF  CUSTOMERS-  software design.pptx
TYPES OF CUSTOMERS- software design.pptxrecoveraccount1
 
intellectualproperty CpET Laws and Professional Practices.pptx
intellectualproperty CpET Laws and Professional Practices.pptxintellectualproperty CpET Laws and Professional Practices.pptx
intellectualproperty CpET Laws and Professional Practices.pptxrecoveraccount1
 
NAND AND NOR IMPLEMENTATION.pptx
NAND AND NOR IMPLEMENTATION.pptxNAND AND NOR IMPLEMENTATION.pptx
NAND AND NOR IMPLEMENTATION.pptxrecoveraccount1
 
REPRESENTATION TO FLIP-FLOPS CHARACTERISTICS TABLE AND FLIP-FLOPS EXCITATION ...
REPRESENTATION TO FLIP-FLOPS CHARACTERISTICS TABLE AND FLIP-FLOPS EXCITATION ...REPRESENTATION TO FLIP-FLOPS CHARACTERISTICS TABLE AND FLIP-FLOPS EXCITATION ...
REPRESENTATION TO FLIP-FLOPS CHARACTERISTICS TABLE AND FLIP-FLOPS EXCITATION ...recoveraccount1
 
ROMANDPLAPRESENTATION.pptx
ROMANDPLAPRESENTATION.pptxROMANDPLAPRESENTATION.pptx
ROMANDPLAPRESENTATION.pptxrecoveraccount1
 
emtech chapter 3emtech chapter 3.pptx
emtech chapter 3emtech chapter 3.pptxemtech chapter 3emtech chapter 3.pptx
emtech chapter 3emtech chapter 3.pptxrecoveraccount1
 
chapter 1 software design.pptx
chapter 1 software design.pptxchapter 1 software design.pptx
chapter 1 software design.pptxrecoveraccount1
 

Mais de recoveraccount1 (12)

15286249.ppt
15286249.ppt15286249.ppt
15286249.ppt
 
market anlysis SOFTware.pptx
market anlysis SOFTware.pptxmarket anlysis SOFTware.pptx
market anlysis SOFTware.pptx
 
chapter 2.pdf
chapter 2.pdfchapter 2.pdf
chapter 2.pdf
 
TYPES OF CUSTOMERS- software design.pptx
TYPES  OF  CUSTOMERS-  software design.pptxTYPES  OF  CUSTOMERS-  software design.pptx
TYPES OF CUSTOMERS- software design.pptx
 
intellectualproperty CpET Laws and Professional Practices.pptx
intellectualproperty CpET Laws and Professional Practices.pptxintellectualproperty CpET Laws and Professional Practices.pptx
intellectualproperty CpET Laws and Professional Practices.pptx
 
NAND AND NOR IMPLEMENTATION.pptx
NAND AND NOR IMPLEMENTATION.pptxNAND AND NOR IMPLEMENTATION.pptx
NAND AND NOR IMPLEMENTATION.pptx
 
REPRESENTATION TO FLIP-FLOPS CHARACTERISTICS TABLE AND FLIP-FLOPS EXCITATION ...
REPRESENTATION TO FLIP-FLOPS CHARACTERISTICS TABLE AND FLIP-FLOPS EXCITATION ...REPRESENTATION TO FLIP-FLOPS CHARACTERISTICS TABLE AND FLIP-FLOPS EXCITATION ...
REPRESENTATION TO FLIP-FLOPS CHARACTERISTICS TABLE AND FLIP-FLOPS EXCITATION ...
 
ROMANDPLAPRESENTATION.pptx
ROMANDPLAPRESENTATION.pptxROMANDPLAPRESENTATION.pptx
ROMANDPLAPRESENTATION.pptx
 
emtech chapter 3emtech chapter 3.pptx
emtech chapter 3emtech chapter 3.pptxemtech chapter 3emtech chapter 3.pptx
emtech chapter 3emtech chapter 3.pptx
 
chapter 1 software design.pptx
chapter 1 software design.pptxchapter 1 software design.pptx
chapter 1 software design.pptx
 
emtech blockchain.pptx
emtech blockchain.pptxemtech blockchain.pptx
emtech blockchain.pptx
 
emtech chap 2.pptx
emtech chap 2.pptxemtech chap 2.pptx
emtech chap 2.pptx
 

Último

A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 

Último (20)

A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

e-commercelawinthephilippines-140914041005-phpapp01e-commercelawinthephilippines-140914041005-phpapp01.pptx

  • 1. E-COMMERCE LAW IN THE PHILIPPINES
  • 2.  E-commerce (electronic-commerce) refers to business over the Internet. Web sites such as Amazon.com, Buy.com, and eBay are all e-commerce sites.
  • 3. Business-to-Consumer (B2C) Business-to-Consumer (B2C) Business-to-Consumer (B2C)  business transactions between companies, business-to-consumer models are those that sell products or services directly to personal-use customers  connects, communicates and conducts business transactions with consumers most often via the Internet  larger than just online retailing; it includes online banking, travel services, online auctions, and health and real estate sites.
  • 4. Business-to-Business (B2B)  A type of commerce transaction that exists between businesses, such as those involving a manufacturer and wholesaler, or a wholesaler and a retailer  conducted between companies, rather than between a company and individual consumers
  • 5. by the Senate and House of Representatives of the Republic of the Philippines An act providing for the recognition and use of electronic commercial and non-commercial transactions and documents, penalties for unlawful use thereof and for other purposes .
  • 6. Electronic Commerce is defined as the process of buying and selling goods electronically by consumers and from company to company through computerized business transactions. The Organization for Electronic Cooperation and Development defines it as commercial transactions based on electronic transmission of data over communication networks such as the Internet. Although the definition of electronic commerce is strictly confined to commercial undertakings, RA8792 is made applicable to both
  • 7.  provide a secure legal framework and environment for electronic commerce.  protect the integrity of electronic documents and electronic signatures as well as its transmission and communication so as to build and ensure the trust and reliance of the public on electronic transactions.
  • 8. Authors Sen. Ramon Magsaysay Jr., Reps. Leandro Verceles,Jr. and Marcial Punzalan, Jr. Co-Authors of the Act who filed electronic commerce bills were Sen. Juan Flavier, and Blas Ople and Reps. Harry Angping, Roilo Golez and Dante Liban. Other co-authors include Sen. Vicente Sotto III, Franklin Drilon, Fran-cisco Tatad, Raul Roco, Aquilino Pimentel Jr., Miriam Defesor-Santiago and Reps. HerminioTeves, Magtanggol Guinigundo, Rolando Sarmiento, Orlando Fua, JoeySalceda, Oscar Moreno, and Ignacio Bunye.
  • 9.
  • 10. a. “Addressee”  a person who is intended by the originator to receive the electronic data message or electronic document. b. “Computer”  any device or apparatus which, by electronic, electro-mechanical or magnetic impulse, or by other means is capable of receiving, recording, transmitting, storing, processing, retrieving, or producing information, c. “Electronic Data Message”  information generated, sent, received or stored by electronic, optical or similar means. data, figures, symbols or other modes of written expression according to mathematical and logical rules or of performing any one or more of those functions.
  • 11. d.“Information and Communication System”  a system intended for and capable of generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents and includes the computer system or other similar device by or in which data is recorded or stored and any procedures related to the recording or storage of electronic data message or electronic document.
  • 12. e. “Electronic Signature”  any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document.
  • 13. f. “Electronic Document”  information or the representation of information, data, figures, symbols or other modes of written expression, described or however represented, by which a right is established or an obligation extinguished, or by which a fact may be proved and affirmed, which is received, recorded, transmitted, stored, processed, retrieved or produced electronically. g. “Electronic Key”  a secret code which secures and defends sensitive information that crosses over public channels into a form decipherable only with a matching electronic key.
  • 14. h. “Intermediary”  a person who in behalf of another person and with respect to a particular electronic document sends, receives and/or stores or provides other services in respect of that electronic document. i. “Originator”  a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent . The term does not include a person acting as an intermediary with respect to that electronic document.
  • 15. j. “Service Provider”  a provider of : (i) On-line services or network access, or the operator of facilities therefore, including entities offering the transmission, routing, or providing of connections for online communications, digital or otherwise, between or among points specified by a user, of electronic documents of the user’s choosing; or (ii) The necessary technical means by which electronic documents of an originator may be stored and made accessible to a designated or undesignated third party; Such service providers shall have no authority to modify or alter the content of the electronic data message or electronic document received or to make any entry therein on behalf of the originator, addressee or any third party unless specifically authorized to do so, and who shall retain the electronic document in accordance with the specific request or as necessary for the purpose of performing the services it was engaged to perform.
  • 17. 1. It gives legal recognition of electronic data messages, electronic documents, and electronic signatures. (section 6 to 13) Sec. 6. Legal Recognition of Data Messages. SEC. 13. Retention of Electronic Data Message and Electronic Document. Section 7. Legal Recognition of Electronic documents Section 8. Legal Recognition of Electronic Signatures Section 9. Presumption Relating to Electronic Signatures Section 10. Original Documents. Section 11. Authentication of Electronic Data Messages and Electronic Documents Section 12. Admissibility and Evidential Weight of Electronic Data Message or electronic document.
  • 18. SEC. 16. Formation and Validity of Electronic Contracts. 2. Allows the formation of contracts in electronic form. (section 16) 3. Makes banking transactions done through ATM switching networks absolute once consummated. (section 16)
  • 19. 4. Parties are given the right to choose the type and level of security methods that suit their needs. (section 24) SEC. 24. Choice of Security Methods.
  • 20. 5. Provides the mandate for the electronic implementation of transport documents to facilitate carriage of goods. This includes documents such as, but not limited to, multi-modal, airport, road, rail, inland waterway, courier, post receipts, transport documents issued by freight forwarders, marine/ocean bill of lading, non- negotiable seaway bill, charter party bill of lading. (section 25 and 26) SEC. 25. Actions Related to Contracts of Carriage of Goods. SEC. 26. Transport Documents.
  • 21. 6. Mandates the government to have the capability to do e- commerce within 2 years or before June 19, 2002. (section 27) SEC. 27. Government Use of Electronic Data Messages, Electronic Documents and Electronic Signatures.
  • 22. 7. Mandates RPWeb to be implemented. RPWeb is a strategy that intends to connect all government offices to the Internet and provide universal access to the general public. The Department of Transportation and Communications, National Telecommunications Commission, and National Computer Center will come up with policies and rules that shall lead to substantial reduction of costs of telecommunication and Internet facilities to ensure the implementation of RPWeb. (section 28) SEC. 28. RPWEB To Promote the Use Of Electronic Documents and Electronic Data Messages In Government and to the General Public.
  • 23. 8. Made cable, broadcast, and wireless physical infrastructure within the activity of telecommunications. (section 28) SEC. 28. RPWEB To Promote the Use Of Electronic Documents and Electronic Data Messages In Government and to the General Public.
  • 24. 9. Empowers the Department of Trade and Industry to supervise the development of e- commerce in the country. It can also come up with policies and regulations, when needed, to facilitate the growth of e- commerce. (section 29) SEC. 29. Authority of the Department of Trade and Industry and Participating Entities.
  • 25. 10. Provided guidelines as to when a service provider can be liable. (section 30) SEC. 30. Extent of Liability of a Service Provider.
  • 26. 11. Authorities and parties with the legal right can only gain access to electronic documents, electronic data messages, and electronic signatures. For confidentiality purposes, it shall not share or convey to any other person. SEC. 31. Lawful Access. (section 31 and 32) SEC. 32. Obligation of Confidentiality.
  • 27. 12. Hacking or cracking, refers to unauthorized access including the introduction of computer viruses, is punishable by a fine from 100 thousand to maximum commensurating to the damage. With imprisonment from 6 months to 3 years. (section 33) SEC. 33. Penalties.
  • 28. 13. Piracy through the use of telecommunication networks, such as the Internet, that infringes intellectual property rights is punishable. The penalties are the same as hacking. (section 33) SEC. 33. Penalties.
  • 29. 14. All existing laws such as the Consumer Act of the Philippines also applies to e-commerce transactions. (section 33 SEC. 33. Penalties.