IT ERA Flashcards
Defined as a crime in which a computer is the object of
the crime (hacking, phishing, spamming) or is used as a
tool to commit an offense (child pornography, hate
crimes).
CYBERCRIME
Cybercrime may also be referred to as _______________________
computer crime.
TWO CATEGORIES OF
CYBERCRIME ACTIVITIES
- Crimes that target computer networks or devices.
- Crimes that use computer networks to advance other criminal activities.
These types of crimes include viruses and denial-of-service (DoS) attacks.
Crimes that target computer networks or devices.
These types of crimes
include cyberstalking, phishing and fraud or
identity theft.
Crimes that use computer networks to advance
other criminal activities.
RA 8792
E-commerce (Electronic Commerce) Law of the Philippines
refers to the business over the internet.
Websites such as Lazada, Zalora, Shopee and etc.
E-commerce
RA 8792 Allows the formation of contracts in _____________________
electronic form.
__________________________ supervises the
e-commerce development in the Philippines.
Department of Trade & Industry
Provided guidelines as to when a service provider can
be liable.
RA 8792
sells products/services
directly to personal use customers. It includes online
retailing, banking, travel services, auctions, health, and real
estate sites.
Business-to-Consumer (B2C)
involves transactions
between business, such as manufacturer to wholesaler and
wholesaler to retailer.
Business-to-Business (B2B)
Provide a secure legal framework and environment for
electronic commerce.
Protect the integrity of electronic documents and signatures,
as well as its transmission and communication so as to build
and ensure the trust and reliance of the public on electronic
transactions.
RA 8792 OBJECTIVES
RA 10175 was signed into law by President _________________________ on
_________________________.
Benigno Aquino III, September 12, 2012
RA 10175 went into effect on ___________________
October 3, 2012
RA 10175 received a temporary restraining order (TRO) on ___________________________
October 9, 2012.
Anti-Wiretapping Law
RA 4200
Access Device Regulation Act
RA 8484
E-commerce Law
RA 8792
Anti-Trafficking in Persons Act
RA 9208
Anti-Child Pornography Act
RA 9775
Anti-Photo and Voyeurism Act
RA 9995
RA 10175 identifies the ____________________ and the
________________________ as key enforcement agencies.
Philippine National Police (PNP), National Bureau of Investigation (NBI)
RA 10175 Created an Office of Cybercrime within the ______
DOJ.
CICC meaning
Cybercrime Investigation and Coordinating Center
Allows authorities to intercept, copy, and block data by virtue of a search and seizure warrant.
RA 10175 CICC
Unauthorized Access to a computer system or application
Illegal Access
Illegal Access Penalty
6-12 years or 200k fine, if done against critical infrastructure 12-25 years or 500k fine
Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system
Illegal Interception
Unauthorized alternation, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses
Data Interference
Unauthorized hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, and including the introduction or transmission of viruses
System Interference
Unauthorized use, possession, reproduction, sale, procurement, importation, distribution, or otherwise making available, of devices, computer designed or adapted for the purpose of committing any of the offenses stated in RA 10175
Misuse of Device
Acquisition of domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive other form the registering the same.
Cyber-Squatting
Unauthorized input, alteration, or deletion of computer data resulting to inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intellegable
Computer-related Forgery
Computer-related Forgery Penalty
6-12 years or 200k fine
Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent
Computer-related Fraud
Unauthorized acquisition, use, misuse, transfer, possession, alteration, or deletion of identifying information belonging to another, whether natural or juridical
Computer-related Identity Theft
Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organ or sexual activity, with the aid of a computer system, for favor or consideration
Cybersex
unlawful or prohibited acts defined and punishable by RA 9775. committed through a computer system
Child Pornography
Unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended committed through a computer system or any other similar means which may be devised in the future
Libel
RA 10175
Cybercrime Law of the Philippines
RA 10173
Data Privacy Act
An act protecting individual personal information in information and communications systems in the government and private sector, creating for this purpose a National
Privacy Commission (NPC), and for other purposes.
RA 10173
In RA 10173 The _______________________ is the responsible agency and home to
the NPC.
Department of Information and Communications Technology (DICT)
Companies with at least _____ employees or access to the personable and identifiable information of at least _______ people are required to register in 10173
250, 1,000
An act creating the Department of Information and Communications Technology (DICT),
defining its powers and functions appropriating
funds therefor, and for other purposes.
RA 10844
RA 10844
Department of Information and Communications Technology (DICT) Act
Improving Public Access
Educate and expand our knowledge on Information and
Communications Technology (ICT)
Protect the Consumer and Industry development
Nation Building through ICT
Safeguarding of Information
Widen the scope of ICT in the Philippines
THINGS RA 10844 FOCUSES ON
The university’s IP policy only applies
to research activities that result in
patented or copyrighted materials
True or False
False
Applies to all research and creative activities
Covers tangible and intangible research
properties/outcomes
Includes activities with or without patent/copyright
protection
Encompasses all resources used for research
Includes all technology transfer arrangements
Section 1. Applicability.
All rights in IP devised, created, or made by a University Employee or a Student-Employee in the normal course of their assigned duties and activities of employment shall generally be owned
automatically by the ___________________
University.
What is the main benefit of patent protection for inventors?
A. Free public use of their inventions
B. Financial compensation for creative works
C. Exclusive rights to exploit the invention for a limited time
D. Immediate commercialization of their invention
B. Financial compensation for creative works
Dr. X, a professor of computer science at the university, has
developed a novel algorithm for optimizing network traffic flow. She
created this algorithm while discussing a problem with a graduate
student during office hours. Which of the following statements is true
based on this Policy?
A. Dr. X retains full ownership of the algorithm.
B. The University automatically owns the algorithm.
C. Dr. X needs to file a patent application to claim ownership.
D. The University must negotiate with Dr. X for the right to own the
algorithm.
B) The University automatically owns the algorithm.
Students whom the University does not employ shall generally
___________________________ Rights they devised, created, or made in the
normal course of their studies at the University, such as class projects or
course requirements, including but not limited to theses, capstone projects,
design projects, dissertations, and other scholarly works.
own all IP and associated IP
IP of Students’ works with
significant contribution from the University Employees, as part of their
responsibilities as advisers and the technical panel, shall be ________ by
the University and the Student.
co-owned
A graduate student who creates an innovative
algorithm for their thesis project, with guidance from
their advisor but without any direct contribution from
university employees beyond typical academic
supervision, retains full ownership of the intellectual
property rights to the algorithm.
True or False
False
Ownership of IP devised, created, or made by other persons
performing research tasks in the University, who are neither employees
nor students, in the course of their research activities in the University shall generally be owned automatically by the __________ unless there is a
separate agreement regarding ownership entered into between said
parties.
University
Upon leaving the University, a Visitor must complete and submit an ____________________ to the ITSO, revealing any IP created during their time at
the University.
IP Disclosure form
Dr. Maria Rodriguez, a renowned researcher from Spain, spends six months at the University of Immaculate Conception (UIC), collaborating with faculty members on a cutting-edge biotechnology project. She developed a novel gene editing technique that showed great promise for treating genetic diseases during her stay.
Upon completing her visit, Dr. Rodriguez prepares to return to her home institution. What should she do regarding the intellectual property rights of the gene editing
technique?
A. Keep all rights to herself as she is not a UIC employee or student
B. Automatically transfer all rights to UIC
C. Complete and submit an IP Disclosure form to the ITSO
D. Negotiate a separate agreement with UIC regarding ownership
C) Complete and submit an IP Disclosure form to the ITSO
Professor Lee, a renowned computer scientist at UIC, has been working on a
revolutionary AI system with his team. They’ve developed a sophisticated natural language processing algorithm that could significantly impact various industries. As they near completion of the project, Professor Lee realizes that he wants to ensure his team members receive fair credit and compensation for their contributions. He approaches the university administration to discuss the ownership of the AI system and its components. Which of the following statements accurately reflects what can
happen according to the UIC IP Policy?
A. The university will automatically own all rights to the AI system and its
components.
B. Professor Lee and his team must accept whatever ownership arrangement the
university decides.
C. The ownership of the AI system and its components can be determined through
an agreement between Professor Lee, his team, and the university.
D. Only Professor Lee can negotiate ownership rights, regardless of who contributed
to the project.
C. The ownership of the AI system and its components can be determined through
an agreement between Professor Lee, his team, and the university.
Creators will provide the University a _________________________ right to use
their IP Works for the University’s administrative, promotional, research, and educational activities, among others. Creators shall diligently make efforts to commercialize the University IP.
non-exclusive, royalty-free
Dr. James, a physics professor at UIC, invents a new method for
improving solar panel efficiency. He plans to start a company to
commercialize this technology. However, he also wants to ensure
that his colleagues in the physics department can continue to use
and study this method in their research.
True or False
False
Dr. Rachel, a literature professor at UIC, writes a groundbreaking book on postmodern poetry. When the
university’s marketing department prepares to promote the
book, they want to modify the title and cover design without
consulting Dr. Rachel.
True or False
The university can alter the title and cover design of Dr.
Patel’s book without her consent, as long as they
acknowledge her authorship.
Answer False
University employees, students, and visitors are ________________ from
entering into any research contract with external parties on behalf of the
University unless an official express authorization from a representative
of the University is obtained.
prohibited
Net IP Revenue received by the University shall be distributed as follows:
70% Creator
10% University
20% Other relevant organizational units
(RPIC)