Ethics Finals Exam Last Flashcards

1
Q

What are the three (3) computer-related offenses under Section 4(b) of RA 10175?

A
  1. Computer-related Forgery
  2. Computer-related Fraud
  3. Computer-related Identity Theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Computer-related Forgery?

A

The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless of whether or not the data is directly readable and intelligible.
It also includes knowingly using computer data that is the product of computer-related forgery for the purpose of perpetuating a fraudulent or dishonest design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can a person be guilty of forgery in a general sense?

A

A person is guilty of forgery if:
- With purpose to defraud or injure anyone; OR
- With knowledge that he is facilitating a fraud or injury to be perpetrated by anyone, the actor:
- Alters any writings of another without his authority;
- Makes, completes, executes, authenticates, issues, or transfers any writing to make it appear as the act of another who did not authorize it;
- Utters any writing which he knows to be forged as specified in the revised penal code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the elements of Computer-related Forgery?

A

First Type: ACTIVE COMPUTER-RELATED FORGERY:
1. Input, alteration, or deletion of any computer data without right.
2. The result is inauthentic data.
3. The intent is to use the inauthentic data to be considered or acted upon as if it were authentic.

Second Type: PASSIVE COMPUTER-RELATED FORGERY:
1. There must be existing inauthentic data brought about by active computer-related forgery.
2. Knowingly acting on the inauthentic data to perpetuate a fraudulent or dishonest design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the penalty for Computer-related Forgery?

A

Prision mayor (imprisonment of six years and 1 day up to 12 years) or a fine of at least P200,000 up to a maximum amount commensurate to the damage incurred, or BOTH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are examples of Computer-related Forgery?

A

Impersonation of legitimate individuals, authorities, agencies, and other entities online for fraudulent purposes.
Techniques include phishing emails leading to fake websites that steal login credentials.
Cybercriminals impersonate legitimate organizations to trick users into revealing personal information and providing money, goods, or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Computer-related Fraud?

A

The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage with fraudulent intent.
If no damage has yet been caused, the penalty shall be one degree lower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the elements of Computer-related Fraud?

A
  1. Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system.
  2. The purpose is to cause damage to the computer system with fraudulent intent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the penalty for Computer-related Fraud?

A

Same as Computer-related Forgery. If no damage has been caused, the penalty shall be one degree lower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of Computer-related Fraud?

A

Online swindles involving false promises of love (catphishing), property (inheritance scams), and money (lottery scams, investment fraud, etc.).
Common schemes involve advance fee fraud, where victims are tricked into paying a small amount with the promise of a larger financial return.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Computer-related Identity Theft?

A

The intentional acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information belonging to another, whether natural or juridical, without right.
If no damage has been caused, the penalty shall be one degree lower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an example of Computer-related Identity Theft?

A

Creating a fake social media profile pretending to be someone else.
Using stolen identity information to deceive victims into transferring money or personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the penalty for Computer-related Identity Theft?

A

Same as Computer-related Forgery and Computer-related Fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of data is targeted in Identity Theft?

A

Identity-related information such as:
- Identification numbers (e.g., Social Security Numbers)
- Identity documents (e.g., passports, driver’s licenses)
- Online credentials (e.g., usernames and passwords).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Cybersex under Section 4(c) of RA 10175?

A

The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the elements of Cybersex?

A
  1. There must be a willful engagement, maintenance, control, or operation of any lascivious exhibition of sexual organs or sexual activity.
  2. The act must be done with the aid of or through the use of a computer system.
  3. The activity must be done for a favor or consideration.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the penalty for Cybersex?

A

Prision mayor (imprisonment of six years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) but not exceeding One million pesos (P1,000,000) or BOTH.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Child Pornography under Section 4(c) of RA 10175?

A

The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 (Anti-Child Pornography Act of 2009), committed through a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does the Cybercrime Law affect Child Pornography cases?

A

If child pornography is committed through the use of a computer system, the penalty to be imposed is one (1) degree higher than that provided for in RA 9775.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the penalty for Child Pornography if committed through a computer system?

A

One (1) degree higher than the penalty provided for in Republic Act 9775, if committed through a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are Unsolicited Commercial Communications under Section 4(c) of RA 10175?

A

The transmission of commercial electronic communication with the use of a computer system which seeks to advertise, sell, or offer for sale products and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When are Unsolicited Commercial Communications prohibited?

A

Unsolicited Commercial Communications are prohibited unless:
1. There is a prior affirmative consent from the recipient.
2. The primary intent is for service and/or administrative announcement from the sender to existing users, subscribers, or customers.
3. Certain conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What conditions must be met for commercial electronic communication to be legal?

A

For a commercial electronic communication to be legal:
1. It must contain a simple, valid, and reliable way for the recipient to reject further messages (‘opt-out’).
2. It must not disguise the source of the message.
3. It must not include misleading information to induce the recipient to read it.

25
What is the penalty for Unsolicited Commercial Communications?
The penalty imposed shall be one (1) degree higher than that provided for by the Revised Penal Code, as amended, and special laws, if committed through the use of information and communications technologies.
26
Term
Definition
27
RA 8484
The Access Devices Regulation Act of 1998, regulating issuance and use of access devices and prohibiting fraudulent acts.
28
Access Device
Any means of account access (e.g., card, code, PIN) used to obtain money, goods, services, or initiate fund transfers.
29
Credit Card
A device (card, plate, coupon book) used to obtain money, goods, property, labor, or services on credit.
30
Lost Credit Card Procedure
Cardholder must notify the issuer upon knowledge of loss to avoid financial liability for fraudulent use.
31
Legal Tender
National currency (paper money and coins) declared by law as valid payment for debts and obligations.
32
Legal Tender Limits
PHP 1,000 limit for 1-, 5-, and 10-Piso coins; PHP 100 limit for 1-, 5-, 10-, and 25-Sentimo coins.
33
Electronic Money (E-Money)
Monetary value electronically stored, issued against funds, accepted as payment, and withdrawable in cash or equivalent.
34
Electronic Money Issuer (EMI)
Classified as EMI-Bank, EMI-NBFI, and EMI-Others based on type of institution issuing e-money.
35
Ordinary Negligence
Failure of a software developer to use reasonable care in developing a product, leading to liability.
36
Malpractice in Software Development
Failure to meet a higher standard of care expected from professionals, though not fully established in law.
37
Strict Liability
Holding manufacturers liable for defective products, though rarely applied in computer-related cases.
38
Software Liability in the Philippines
Governed by the Civil Code, either under Sales Law (Art. 1458-1645) or Contract for a Piece of Work (Art. 1713-1731).
39
Contract of Sale vs. Contract for a Piece of Work
Sale covers mass-market software; contract for work covers custom-developed software.
40
Contractor Definition
A person or entity undertaking work/services for a fixed price, including ICT professionals developing software.
41
Quality and Standard in Software
Art. 1715 requires the contractor to deliver work of agreed quality; defects must be removed or reworked.
42
Acceptance of Work and Liability
Under Art. 1719, acceptance relieves liability unless defects are hidden or employer reserves rights.
43
Term
Definition
44
E-Commerce Law
The legal framework in the Philippines for internet-based services, including electronic commerce.
45
R.A. 8792
The law enacted to provide legal binding effect to electronic documents and signatures, similar to paper-based documents.
46
Cybercrime Punishments
Includes penalties for hacking, virus introduction, and copyright piracy under Section 33 of R.A. 8792.
47
E-Commerce Act Aim
Facilitates domestic and international electronic transactions and recognizes the authenticity of electronic documents.
48
Types of E-Commerce
Business-to-Business (B2B), Business-to-Consumer (B2C), Consumer-to-Consumer (C2C).
49
B2B Model
Transactions between businesses, e.g., Boeing selling aircraft to airlines.
50
B2C Model
Businesses selling directly to consumers, e.g., Amazon, Walmart.
51
C2C Model
Consumers trading with each other, e.g., eBay, Craigslist.
52
E-Commerce Security
Protection of assets from unauthorized access, use, alteration, or destruction.
53
6 Dimensions of Security
Integrity, Non-repudiation, Authenticity, Confidentiality, Privacy, Availability.
54
User Authorization Methods
Password protection, encrypted smart cards, biometrics, firewalls.
55
Transaction Security Requirements
Privacy, confidentiality, integrity.
56
Secret-Key Encryption
Uses a single shared key for both encryption and decryption.
57
Public/Private Key Encryption
Uses two keys: a public key for encryption and a private key for decryption.
58
Encryption
Transforms information into a secure format only readable with a decryption key.
59
Digital Signature
A cryptographic mechanism verifying the authenticity of a sender and message integrity.