IT ERA Flashcards

1
Q

Defined as a crime in which a computer is the object of
the crime (hacking, phishing, spamming) or is used as a
tool to commit an offense (child pornography, hate
crimes).

A

CYBERCRIME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cybercrime may also be referred to as _______________________

A

computer crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TWO CATEGORIES OF
CYBERCRIME ACTIVITIES

A
  • Crimes that target computer networks or devices.
  • Crimes that use computer networks to advance other criminal activities.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These types of crimes include viruses and denial-of-service (DoS) attacks.

A

Crimes that target computer networks or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

These types of crimes
include cyberstalking, phishing and fraud or
identity theft.

A

Crimes that use computer networks to advance
other criminal activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RA 8792

A

E-commerce (Electronic Commerce) Law of the Philippines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

refers to the business over the internet.
Websites such as Lazada, Zalora, Shopee and etc.

A

E-commerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RA 8792 Allows the formation of contracts in _____________________

A

electronic form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

__________________________ supervises the
e-commerce development in the Philippines.

A

Department of Trade & Industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Provided guidelines as to when a service provider can
be liable.

A

RA 8792

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

sells products/services
directly to personal use customers. It includes online
retailing, banking, travel services, auctions, health, and real
estate sites.

A

Business-to-Consumer (B2C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

involves transactions
between business, such as manufacturer to wholesaler and
wholesaler to retailer.

A

Business-to-Business (B2B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Provide a secure legal framework and environment for
electronic commerce.

Protect the integrity of electronic documents and signatures,
as well as its transmission and communication so as to build
and ensure the trust and reliance of the public on electronic
transactions.

A

RA 8792 OBJECTIVES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RA 10175 was signed into law by President _________________________ on
_________________________.

A

Benigno Aquino III, September 12, 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RA 10175 went into effect on ___________________

A

October 3, 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RA 10175 received a temporary restraining order (TRO) on ___________________________

A

October 9, 2012.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Anti-Wiretapping Law

A

RA 4200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Access Device Regulation Act

A

RA 8484

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

E-commerce Law

A

RA 8792

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Anti-Trafficking in Persons Act

A

RA 9208

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Anti-Child Pornography Act

A

RA 9775

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Anti-Photo and Voyeurism Act

A

RA 9995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RA 10175 identifies the ____________________ and the
________________________ as key enforcement agencies.

A

Philippine National Police (PNP), National Bureau of Investigation (NBI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

RA 10175 Created an Office of Cybercrime within the ______

A

DOJ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CICC meaning

A

Cybercrime Investigation and Coordinating Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Allows authorities to intercept, copy, and block data by virtue of a search and seizure warrant.

A

RA 10175 CICC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Unauthorized Access to a computer system or application

A

Illegal Access

28
Q

Illegal Access Penalty

A

6-12 years or 200k fine, if done against critical infrastructure 12-25 years or 500k fine

29
Q

Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system

A

Illegal Interception

30
Q

Unauthorized alternation, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses

A

Data Interference

31
Q

Unauthorized hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, and including the introduction or transmission of viruses

A

System Interference

32
Q

Unauthorized use, possession, reproduction, sale, procurement, importation, distribution, or otherwise making available, of devices, computer designed or adapted for the purpose of committing any of the offenses stated in RA 10175

A

Misuse of Device

33
Q

Acquisition of domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive other form the registering the same.

A

Cyber-Squatting

34
Q

Unauthorized input, alteration, or deletion of computer data resulting to inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intellegable

A

Computer-related Forgery

35
Q

Computer-related Forgery Penalty

A

6-12 years or 200k fine

36
Q

Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent

A

Computer-related Fraud

37
Q

Unauthorized acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information belonging to another, whether natural or juridical

A

Computer-related Identity Theft

38
Q

Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organ or sexual activity, with the aid of a computer system, for favor or consideration

A

Cybersex

39
Q

unlawful or prohibited acts defined and punishable by RA 9775. committed through a computer system

A

Child Pornography

40
Q

Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended committed through a computer system or any other similar means which may be devised in the future

A

Libel

41
Q

RA 10175

A

Cybercrime Law of the Philippines

42
Q

RA 10173

A

Data Privacy Act

43
Q

An act protecting individual personal information in information and communications systems in the government and private sector, creating for this purpose a National
Privacy Commission (NPC), and for other purposes.

A

RA 10173

44
Q

In RA 10173 The _______________________ is the responsible agency and home to
the NPC.

A

Department of Information and Communications Technology (DICT)

45
Q

Companies with at least _____ employees or access to the personable and identifiable information of at least _______ people are required to register in 10173

A

250, 1,000

46
Q

An act creating the Department of Information and Communications Technology (DICT),
defining its powers and functions appropriating
funds therefor, and for other purposes.

A

RA 10844

47
Q

RA 10844

A

Department of Information and Communications Technology (DICT) Act

48
Q

Improving Public Access

Educate and expand our knowledge on Information and
Communications Technology (ICT)

Protect the Consumer and Industry development

Nation Building through ICT

Safeguarding of Information

Widen the scope of ICT in the Philippines

A

THINGS RA 10844 FOCUSES ON

49
Q

The university’s IP policy only applies
to research activities that result in
patented or copyrighted materials

True or False

A

False

50
Q

Applies to all research and creative activities

Covers tangible and intangible research
properties/outcomes

Includes activities with or without patent/copyright
protection

Encompasses all resources used for research

Includes all technology transfer arrangements

A

Section 1. Applicability.

51
Q

All rights in IP devised, created, or made by a University Employee or a Student-Employee in the normal course of their assigned duties and activities of employment shall generally be owned
automatically by the ___________________

A

University.

52
Q

What is the main benefit of patent protection for inventors?

A. Free public use of their inventions
B. Financial compensation for creative works
C. Exclusive rights to exploit the invention for a limited time
D. Immediate commercialization of their invention

A

B. Financial compensation for creative works

53
Q

Dr. X, a professor of computer science at the university, has
developed a novel algorithm for optimizing network traffic flow. She
created this algorithm while discussing a problem with a graduate
student during office hours. Which of the following statements is true
based on this Policy?

A. Dr. X retains full ownership of the algorithm.

B. The University automatically owns the algorithm.

C. Dr. X needs to file a patent application to claim ownership.

D. The University must negotiate with Dr. X for the right to own the
algorithm.

A

B) The University automatically owns the algorithm.

54
Q

Students whom the University does not employ shall generally
___________________________ Rights they devised, created, or made in the
normal course of their studies at the University, such as class projects or
course requirements, including but not limited to theses, capstone projects,
design projects, dissertations, and other scholarly works.

A

own all IP and associated IP

55
Q

IP of Students’ works with
significant contribution from the University Employees, as part of their
responsibilities as advisers and the technical panel, shall be ________ by
the University and the Student.

A

co-owned

56
Q

A graduate student who creates an innovative
algorithm for their thesis project, with guidance from
their advisor but without any direct contribution from
university employees beyond typical academic
supervision, retains full ownership of the intellectual
property rights to the algorithm.

True or False

A

False

57
Q

Ownership of IP devised, created, or made by other persons
performing research tasks in the University, who are neither employees
nor students, in the course of their research activities in the University shall generally be owned automatically by the __________ unless there is a
separate agreement regarding ownership entered into between said
parties.

A

University

58
Q

Upon leaving the University, a Visitor must complete and submit an ____________________ to the ITSO, revealing any IP created during their time at
the University.

A

IP Disclosure form

59
Q

Dr. Maria Rodriguez, a renowned researcher from Spain, spends six months at the University of Immaculate Conception (UIC), collaborating with faculty members on a cutting-edge biotechnology project. She developed a novel gene editing technique that showed great promise for treating genetic diseases during her stay.
Upon completing her visit, Dr. Rodriguez prepares to return to her home institution. What should she do regarding the intellectual property rights of the gene editing
technique?

A. Keep all rights to herself as she is not a UIC employee or student

B. Automatically transfer all rights to UIC

C. Complete and submit an IP Disclosure form to the ITSO

D. Negotiate a separate agreement with UIC regarding ownership

A

C) Complete and submit an IP Disclosure form to the ITSO

60
Q

Professor Lee, a renowned computer scientist at UIC, has been working on a
revolutionary AI system with his team. They’ve developed a sophisticated natural language processing algorithm that could significantly impact various industries. As they near completion of the project, Professor Lee realizes that he wants to ensure his team members receive fair credit and compensation for their contributions. He approaches the university administration to discuss the ownership of the AI system and its components. Which of the following statements accurately reflects what can
happen according to the UIC IP Policy?

A. The university will automatically own all rights to the AI system and its
components.

B. Professor Lee and his team must accept whatever ownership arrangement the
university decides.

C. The ownership of the AI system and its components can be determined through
an agreement between Professor Lee, his team, and the university.

D. Only Professor Lee can negotiate ownership rights, regardless of who contributed
to the project.

A

C. The ownership of the AI system and its components can be determined through
an agreement between Professor Lee, his team, and the university.

61
Q

Creators will provide the University a _________________________ right to use
their IP Works for the University’s administrative, promotional, research, and educational activities, among others. Creators shall diligently make efforts to commercialize the University IP.

A

non-exclusive, royalty-free

62
Q

Dr. James, a physics professor at UIC, invents a new method for
improving solar panel efficiency. He plans to start a company to
commercialize this technology. However, he also wants to ensure
that his colleagues in the physics department can continue to use
and study this method in their research.

True or False

A

False

63
Q

Dr. Rachel, a literature professor at UIC, writes a groundbreaking book on postmodern poetry. When the
university’s marketing department prepares to promote the
book, they want to modify the title and cover design without
consulting Dr. Rachel.

True or False

A

The university can alter the title and cover design of Dr.
Patel’s book without her consent, as long as they
acknowledge her authorship.

Answer False

64
Q

University employees, students, and visitors are ________________ from
entering into any research contract with external parties on behalf of the
University unless an official express authorization from a representative
of the University is obtained.

A

prohibited

65
Q

Net IP Revenue received by the University shall be distributed as follows:

A

70% Creator

10% University

20% Other relevant organizational units
(RPIC)