Documente Academic
Documente Profesional
Documente Cultură
CRIMES
ORDER OF PRESENTATION
1. Effectivity of RA 10175
2. Categories of Cybercrimes
3. Salient Features:
a. Definition of Terms
b. Punishable Acts
c. Sections Declared Unconstitutional
d. Enforcement and Implementation
1. Effectivity of RA 10175
Approved September 12, 2012
TRO issued October 9, 2012
Disini Decision February 18, 2014
2. Categories of Cybercrimes:
3. SALIENT FEATURES
a. Definition of Terms
Access refers to:
the instruction,
communication with,
storing data in,
retrieving data from, or
making use of any resources of a computer system
or communication network.
Definition of Terms
Alteration:
the modification or change, in form or substance,
of an existing computer data or program.
Communication:
the transmission of information through ICT
media, including voice, video, and other forms of
data.
Definition of Terms
Computer:
1)An electronic, magnetic, optical,
electromechanical, or other data
processing or communications device, or
grouping of such device, capable of performing
logical, arithmetic, routing, or storage functions;
2) Any storage facility, or equipment or
communications facility or equipment directly related to or
operating in conjunction with such device.
3) Devices with data processing capabilities like mobile
phones, smart phones, computer networks and other
devices connected to the Internet.
Definition of Terms
Definition of
Terms
Without right:
(i)conduct undertake without or in excess of
authority; or
(ii) conduct not covered by established legal
defenses, excuses, court orders, justifications,
or relevant principles under the law.
Definition of Terms
Interception:
listening to, recording,
monitoring or surveillance
of the content of communications,
including procuring of the content of data,
either directly, through access and use of a computer
system or indirectly, through the use of electronic
eavesdropping or tapping devices, at the same time
that the communication is occurring.
Definition of Terms
Service provider:
(1) Any public or private entity
that provides to users of its
service the ability to communication
by means of a computer system, and
(2) Any other entity that processes or stores computer
data on behalf of such communication service or
users of such service.
Definition of Terms
Subscribers information:
any information contained in the form of computer data or any
other form that is held by a service provider, relating to
subscribers of its services other than traffic or content data and
by
which
identity
can
be
established.
Definition of Terms
Traffic data or non-content data:
any computer data other than the content of the
communication including, but not limited to:
1.the communications origin,
2.destination,
3.route,
4.time,
5.data,
6.size,
7.duration, or
8.type of underlying service.
Definition of Terms
Content Data data which are not traffic data.
b. Punishable Acts
Illegal access The access to the
whole or any part of a computer system
without right.
Simply, it implies an unauthorized interaction between the
culprit and the targeted devices or computer components,
usually by accessing the computer, using its keyboard or
mouse, printing a document, browsing folders, opening files,
running software, and processing data, stored within, with the
purpose of acquiring information.
Punishable Acts
Illegal interception
Elements:
a) A person (natural or juridical),
b) intercepts non-public transmission of computer data
to, from, or within a computer system, and
c) the interception was done by technical means.
Punishable Acts
Data Interference
Elements:
1)There is an alteration, damage,
deletion or deterioration of computer
data, electronic document or electronic data
messages,
2) without right,
3) by reckless or intentional conduct or by
introducing or transmitting viruses.
Punishable Acts
System Interference
Elements:
1.A person, without right or authority,
2.Intentionally alters or recklessly hinders or
interferes with the functioning of a computer or
computer network,
3.By inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data
or program, electronic document, or data message; or
b. Introducing or transmitting viruses.
Punishable Acts
Misuse of devices Elements:
1. A person, whether natural or juridical,
2. Uses, produces, sells, procures, imports, distributes or otherwise makes
available, without right, of:
(a) A device, including a computer program, designed or adapted primarily
for the purpose of committing any of the offenses under the Act, or
(b) A computer password, access code, or similar data by which the whole
or any part of a computer system is capable of being accessed with intent
that it can be used for the purpose of committing any offenses under the
Act.
2. The possession of (a) and (b) with intent to use for the purpose of
committing any of the offenses under Section 4, RA 10175.
Punishable Acts
Cyber-squatting
Elements:
1. A person (natural or juridical);
2. Acquires a domain name in the internet;
3. Domain name is similar, identical, or confusingly similar to
an existing trademark registered with the appropriate
government agency at the time of the domain name
registration, or, in case of a personal name, identical or in any
way similar with the name of a person other than the
registrant;
4. Purpose is to profit, misled, destroy reputation, and deprive
others from registering the same;
3. The acquisition is in bad faith; and
4. The acquisition is without right or with intellectual property
interests in it.
Punishable Acts
Computer-related Forgery Elements:
1. A person (natural or juridical),
2. Inputs, alters, or deletes any existing computer
data without right, and
3. Said act results in inauthentic data with the intent
that it can be considered or acted upon for legal
purposes as if it were authentic.
Punishable Acts
Computer-related Fraud.
Elements:
1.There is an input, alteration, or
deletion of computer data or program or
interference in the functioning of a computer
system,
2. The act is unauthorized,
3. The act is with fraudulent intent,
4. The act caused damage to another.
Note: If no damage has yet been caused, the
penalty imposed shall be one (1) degree lower.
Punishable Acts
Computer-related Identity Theft Requisites:
1. There is an identifying information belonging to
another, whether natural or juridical,
2. Another person acquires, uses, misuses,
transfers, possesses, alters or deletes such
identifying information,
3. The act is committed intentionally; and
4. The act is committed without right.
Punishable Acts
Cybersex
Elements:
1.A person willfully engages,
maintains, controls or operates any lascivious
exhibition of sexual organs or sexual activity.
2. He does it with the aid of a computer system.
3. His participation may be direct or indirect.
4. He does it for favor or consideration.
Punishable Acts
Child Pornography punishable
acts same in Republic Act No. 9775
or the Anti-Child Pornography Act of 2009.
Penalty is one degree higher.
Punishable Acts
Punishable Acts
Other Offenses (Not Applicable to Child
Pornography, Unsolicited Commercial
Communications and Online Libel Supreme Court)
(a) Aiding or Abetting in the Commission of
Cybercrime.
(b) Attempt in the Commission of Cybercrime.
Punishable Acts
Section 6. All crimes defined and penalized by the
Revised Penal Code, as amended, and special laws,
if committed by, through and with the use of
information and communications technologies shall
be covered by the relevant provisions of this Act.
Penalty: One degree higher.
c. Provisions Declared
Unconstitutional
SECTION 12. Real-Time Collection of Traffic Data.
SECTION 19. Unsolicited Commercial Communications.
d. Enforcement and
Implementation
SEC. 10. Law Enforcement Authorities.
The cybercrime unit of the NBI and the
PNP shall exclusively handle violation of
punishable acts defined and penalized by the
Act.
Exclusionary Rule:
Section 18. Exclusionary Rule. Any evidence
procured without a valid warrant or beyond the authority
of the same shall be inadmissible for any proceeding
before any court or tribunal.
END OF PRESENTATION