FINALS: UNIT 10 - CYBERCRIME Flashcards
AN ACT PROVIDING FOR THE RECOGNITION AND USE OF ELECTRONIC TRANSACTIONS AND DOCUMENT
RA 8792: PHILIPPINE E-COMMERCE ACT OF 2000
AN ACT PROVIDING FOR THE RECOGNITION AND USE OF ELECTRONIC TRANSACTIONS AND DOCUMENT
RA 8792: PHILIPPINE E-COMMERCE ACT OF 2000
● Unauthorized access into a computer system/server or information and communication system
● Any access with the intent to corrupt, alter, steal, or destroy using a computer or computer system without the knowledge and consent of the owner of the system
HACKING / CRACKING
Unauthorized copying, reproduction, storage, uploading, downloading, communication, or broadcasting of protected material [..] through the use of telecommunication networks, e.g. the Internet, in a manner that infringes intellectual property.
PIRACY
Violations against R.A. 7394 (____________)
- pay a fine of PhP _____ to PhP _____ and/or imprisonment of __ to __ years
- The Consumer Act Of The Philippines
- 20,000
- 2,000,000
- 3 to 6 years
Penalty for HACKING/CRACKING and PIRACY:
▪ Pay a fine amounting to a minimum of _______ and a maximum that is commensurate to the damage incurred
▪ Mandatory imprisonment of ____________
- PhP 100,000
- 6 months to 3 years
enacted primarily to protect the consumers
… against hazards to health and safety
… against deceptive, unfair and unconscionable sales acts and practices.
RA 7394: THE CONSUMER ACT OF THE PH
an act that adopts sufficient powers to effectively prevent and combat cybercrime offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels
RA 10175: CYBERCRIME PREVENTION ACT OF 2012
defines CYBERCRIME as a crime committed with or through the use of information and communication technologies such as radio, television, cellular phone, computer and network, and other communication device or application.
RA 10175
JURISDICTION OF R.A. 10175
Who can be charged with violations of this law?
- Any violation committed by a Filipino national regardless of the place of commission.
- Any of the [cybercrime] elements were committed within the Philippines or committed with the use of any computer system wholly or partly situated in the
country. - When by such commission, any damage is caused to a […] person who, at the time of the offense was committed, was in the Philippines
Section 4. CYBERCRIME OFFENSES (10175)
The following acts constitute the offense of cybercrime punishable under this Act:
(a) OFFENSES against the CONFIDENTIALITY, INTEGRITY and AVAILABILITY (CIA) of COMPUTER DATA and COMPUTER SYSTEMS;
(b) COMPUTER-RELATED OFFENSES; and
(c) CONTENT-RELATED OFFENSES
SECTION 4 (a) OFFENSES against the CONFIDENTIALITY, INTEGRITY, and AVAILABILITY (CIA) of COMPUTER DATA and COMPUTER SYSTEMS
- ILLEGAL ACCESS
- ILLEGAL INTERCEPTION
- DATA INTERFERENCE
- SYSTEM INTERFERENCE
SECTION 4 (a) OFFENSES against the CONFIDENTIALITY, INTEGRITY, and AVAILABILITY (CIA) of COMPUTER DATA and COMPUTER SYSTEMS
- ILLEGAL ACCESS
- ILLEGAL INTERCEPTION
- DATA INTERFERENCE
- SYSTEM INTERFERENCE
_____________: access to the whole or any part of a computer system without right.
● “______” is the instruction, communication with, storing/retrieving data from or use of any resources of a computer system of network
● “_____” means having no consent from the owner of the computer system
- ILLEGAL ACCESS
● access
● without right
__________: interception […] of computer data to, from, or within a computer system.
● _______ is listening to, recording, monitoring or surveillance of the content of communications through the use of electronic eavesdropping or tapping devices at the same time that the communication is occurring
- ILLEGAL INTERCEPTION
● Interception
The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document or electronic data message without right – including the introduction or transmission of viruses
DATA INTERFERENCE
The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document or electronic data message without right – including the introduction or transmission of viruses
DATA INTERFERENCE
The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses
● This is more or less an extension of the previous offense whereby the affected entity is not just data but the whole system
SYSTEM INTERFERENCE
The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses
● This is more or less an extension of the previous offense whereby the affected entity is not just data but the whole system
SYSTEM INTERFERENCE
⬥ Refers to software programs and malware components developed to take over a computer’s resources and use them for cryptocurrency mining without the user’s explicit permission
⬥ When you download through torrent sites like “thepiratebay”, you basically give them the authority to use your computer’s CPU to “mine” cryptocurrencies – the reason why downloading a lot of torrent file can cause your computer to heat up
CRYPTOJACKING