Finals Flashcards
Criminal activity that either targets or uses a computer or a network device to commit cyber violations
Cybercrime
The hacker who created the i love you virus
Onel de guzman
The law emphasizes the broad consequences of crimes done via computers or the internet
RA 10175 CYBERCRIME PREVENTION ACT OF 2012
Processing of all types of personal information
Ra 10173 data privacy act of 2012
Any natural or juridical person involved in personal information processing
Ra 10173 data privacy act of 2012
Criminalizes the unauthorized recording taking or capturing a photos or videos of a person’s private areas without their content to view share or distribute such materials
Ra 9995 anti photo and video voyeurism act of 2009
Prohibits actions of producing using or trafficking in one or more counterfeit unauthorized or fraudulently apply for access devices
Ra 8484 access devices regulation act of 1998
This law establishes the intellectual property office and provides the protection of intellectual property rights including copyright
Ra 8293 intellectual property code of the philippines
Any information that can identify a person
Personal information
The person or organization who controls the processing of personal data
Personal information controller
To explain how the company collects uses or protects personal data
Purpose of privacy policy
Not sharing personal data freely on social media
Protecting personal data online
Role of national privacy commissioner or npc in the philippines
To enforce data privacy laws and regulations
Penalty for unauthorized disclosure
10 million pesos fine and imprisonment of up to 10 years
Must be free given specific informed and unambiguous
Valid consent
Any incident where data is accessed by unauthorized parties
Data breach
Data that must be protected to safeguard privacy or security
Sensitive information data
You access to the whole or any part of a computer system without right
Illegal access
The interception of computer data to from or within a computer system
Illegal interception
The intentional or reckless alteration imaging deletion or deterioration of computer data electronic document or electronic data messages without right
Data interference
The unauthorized use production seal procurement distribution or otherwise making available of a device
Misuse of device
The acquisition of a domain name on the internet in bad faith to profit mislead destroy reputation and deprived others from registering the same
Cyber squatting
Input alteration or deletion of many computer data without right resulting inauthentic data
Computer related forgery
The unauthorized input alteration or deletion of computer data or program or interference in the functioning of a computer system causing damage thereby with fraudulent intent
Computer related fraud
The intentional acquisition use misuse transfer possession alteration or deletion of identifying information belonging to another person without right
Computer related identity theft
The willful engagement maintenance control or operation directly or indirectly lascivious exhibition of sexual organs or sexual activity
Cybersex
The unlawful or prohibited acts defined and punishable by ra 9775 the anti child pornography act of 2009
Child pornography
Public and malicious imputation of a crime or any act omission condition status or circumstance tending to cost in dishonored discredit or contempt of a person or to black and the memory of the dead
Online libel
The right of an individual to be free from unwarranted publicity or to live with the unwanted interference by the public in matters in which the public is not necessarily concerned
The right to privacy
Also known as the right to be left alone
Reasonable expectation of a privacy
The individual corporation or body who decides what to do with data
Personal information controller
One of processes data for a pac and does not process information for the pip’s own purpose
Personal information processor
Data collected must be always be collected only for the specific explicit and legitimate purposes of the pic
Legitimate purpose principle
The amount of data collected for processing should be adequate relevant and not accessed in proportion to the purpose of the data processing
Principal of proportionality
A control that describes anything tangible
Physical control
Control that includes hardware or software mechanisms used to protect assets
Technical controls
Controls that refer to polices,procedures, guidelines
Administrative control
a legal concept that grants creators of original works exclusive rights to control
the use and distribution of their works.
Copyright
a legal doctrine that allows limited use
of copyrighted material without permission for purposes such as criticism, comment, news
reporting, teaching, scholarship, or research.
Fair use
a visible sign that distinguishes the goods
Trademark
to an invention that is new, inventive,
and industrially applicable
Patent