4 for COMPRE Flashcards
Type of case review conducted at an early stage of the investigation
Informal (Golden Hour Review)
Allows the investigator to ensure that he has completed all the basic procedural and investigative requirements.
Self-inspection
Provide an overview of a long term investigation in order to aid decision-making with respect to whether all operational resources should be removed from the investigation
Concluding reviews
A review on a sample of their solved cases in an effort to identify good practices and thereby learn from their past successes
Detected Case Review
The preventive and protective measures and actions undertaken in order to safeguard records/documents in all government agencies from unauthorized and indiscriminate disclosure, damage, destruction and loss, whether these records are filed in the current or non-current storage area.
Security of records
The stage wherein record come into existence as a result of an agency’s operations.
Records Creation
Refers to managerial activities involve with respect to the records … Record maintenance and use transmission, retention and record… Order to achieve adequate and proper documentation of policies and
Records Management
An advisory body on the improvement of all phases of records management chairman and members of which shall be designated by the head of the agency
Records Management Improvement Committee
Addresses the issue on paper files piling and document security from natural environmental cause
Digitizations program
Deals with keeping and maintaining records in custody as well as the procedures of classifying, filing and servicing them.
Files Management
Major Categories of Value of Records
Time Value
Utility Value
Classification of Records
- Top Secret Documents
- Secret Records or Documents
- Confidential Records or Documents
- Restricted Records or Documents
Republic Act No. 9470
“National Archives of the Philippines Act of 2007”
Any act of introducing any dangerous drug into the body of any person, with or without his/her knowledge, by injection, inhalation, ingestion or other means, or of committing any act of indispensable assistance to a person in administering a dangerous drug to himself/herself unless administered by a duly licensed practitioner for purposes of medication.
Administer
An analytical test using a device, tool or equipment with a different chemical or physical principle that is more specific which will validate and confirm the result of the screening test.
Confirmatory Test
Any act of knowingly planting, growing, raising, or permitting the planting, growing or raising of any plant which is the source of a dangerous drug.
Cultivation
Any act of knowingly passing a dangerous drug to another, personally or otherwise, and by any means, with or without consideration.
delivery
The willful act by any person of maliciously and surreptitiously inserting, placing, adding or attaching directly or indirectly, through any overt or covert act, whatever quantity of any dangerous drug and/or controlled precursor and essential chemical in the person, house, effects or in the immediate vicinity of an innocent individual for the purpose of implicating, incriminating or imputing the commission of any violation of this Act.
Planting of Evidence.
Any person who knowingly and willfully consents to the unlawful acts provided for in this Act and uses his/her influence, power or position in shielding, harboring, screening or facilitating the escape of any person he/she knows, or has reasonable grounds to believe on or suspects, has violated the provisions of this Act in order to prevent the arrest, prosecution and conviction of the violator.
Protector/Coddler
Any person who sells, trades, administers, dispenses, delivers or gives away to another, on any terms whatsoever, or distributes, dispatches in transit or transports dangerous drugs or who acts as a broker in any of such transactions, in violation of this Act.
Pusher
Any act of giving away any dangerous drug and/or controlled precursor and essential chemical whether for money or any other consideration.
Sell
Transactions involving the illegal trafficking of dangerous drugs and/or controlled precursors and essential chemicals using electronic devices such as, but not limited to, text messages, email, mobile or landlines, two-way radios, internet, instant messengers and chat rooms or acting as a broker in any of such transactions whether for money or any other consideration in violation of this Act.
Trading
Any act of injecting, intravenously or intramuscularly, of consuming, either by chewing, smoking, sniffing, eating, swallowing, drinking or otherwise introducing into the physiological system of the body, and of the dangerous drugs.
Use.
RA 9208
THE ANTI-TRAFFICKING IN PERSONS ACT OF 2003”
“AN ACT TO INSTITUTE POLICIES TO ELIMINATE TRAFFICKING IN PERSONS ESPECIALLY WOMEN AND CHILDREN, ESTABLISHING THE NECESSARY INSTITUTIONAL MECHANISMS FOR THE PROTECTION AND SUPPORT OF TRAFFICKED PERSONS, PROVIDING PENALTIES FOR ITS VIOLATIONS, AND FOR OTHER PURPOSES”
REPUBLIC ACT 10364
THERE ARE THREE INTERRELATED AND INTER-DEPENDENT ELEMENTS THAT MUST BE PRESENT TO ESTABLISH A TIP CASE:
- ACT/S
- MEANS
- EXPLOITATIVE PURPOSE
- Recruitment
- Obtaining
- Hiring
- Providing
- Offering
- Transportation
- Transfer
- Maintaining
- Harboring
- Receipt of persons
Acts
- Threat
- Use of force
- Coercion
- Abduction
- Fraud
- Deception
- Abuse of power
- Abuse of position
- Taking advantage of the vulnerability of the person
- Giving or receiving payment or benefits
Means
Prostitution of others •Other forms of sexual exploitation •Forced labor or services •Slavery or practices similar to slavery •Involuntary Servitude •Removal of organs •Children in armed conflict
Exploitative Purpose
If the victim is a child, the _____ are irrelevant.
means
Victim’s consent or knowledge is ______.
irrelevant
is an unlawful acts wherein the computer is either a:
- TOOL
- TARGET
- or Both
Cybercrime
provides a target rich environment for criminals
Cyberspace
Offense against Confidentiality, Integrity, and Availability (CIA) of computer data and system: such as;
- Illegal Access
- Illegal Interception
- Data Interference
- System Interference
- Misuse of Devices
is simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
Hacking
Its is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means
Phishing
-Section 33 of the law has two (2) provisions that enumerates and penalizes the following acts:
Computer hacking,
Introduction of computer virus, and
Copyright infringement
Republic Act 8792 Electronic Commerce Act of 2000
This device is overlaid onto an existing ATM machine keypad and allows the ATM machine to function properly while it records the keystrokes
Skimming Device
Pinpad overlay device
Tiny camera
➢Suspect get profile of would-be victims online
➢Suspects & victims Communicate online or thru phone call
➢Suspect offers sale of shares of stocks
➢Victim send payment to account number provided by suspects.
BOILER ROOM/INVESTMENT FRAUD
➢an attacker hijacks communications between two machines, he then sets up his computer to filter the communications between the two compromised accounts, allowing him to view and alter the
Man-in-the-Middle
-is the creation of an account (email, social media account, etc.) that looks like the same of the original, which the receiver cannot distinguish at the first instance.
Email spoofing
Bad guy/gal uses online dating or social networking sites and posts attractive picture
➢Communicates and gains victim’s confidence
➢Then asks for money
➢Travel expenses to meet in person
➢Medical expenses
➢Information about the victim’s significant details such as bank account and credit cards to commit fraud.
- Romance scam
Devising any scheme to defraud, or for obtaining money or property by means of false or fraudulent pretenses, or promises, and using the Internet for the purpose of executing the scheme.”
- NON-DELIVERY/NON-PAYMENT OF MERCHANDISE