Philippines Cybercrime Laws Flashcards

1
Q

Section 2.
The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures of whatever nature and for any purpose shall be inviolable, and no search warrant or warrant of arrest shall issue except upon probably cause to be determined personally by the judge after examination under oath or affirmation of the complainant and the witnesses he may produce, and particularly describing the place to be searched and the persons of things to be seized.
Section 3.
(1) The privacy of communication and correspondence shall be inviolable except upon lawful order of the court, or when public safety or order requires otherwise, as prescribed by law.

A

1987 Constitution Article III
Bill of Rights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It shall be unlawful for any person, not being authorized by all parties to any private communication or spoken word, to tap any wire or cable, or by using any other device or arrangement, to secretly overhear, intercept, or record such communication

A

Anti-Wire Tapping Law (RA 4200) of 1965

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This Act aims to facilitate domestic and international dealings, transactions, arrangements, agreements, contracts and exchanges and storage of information through the utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize the authenticity and reliability of electronic data messages or electronic documents related to such activities and to promote the universal use of electronic transactions in the government and by the general public.

A

Electronic Commerce Act of 2000
(RA 8792)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Gives legal recognition of:
–(Sec 6) Electronic data messages
–(Sec 7) Electronic documents –(Sec 8) Electronic signatures

A

Electronic Commerce Act of 2000
(RA 8792)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Section 33. Penalties.
a)(32) Hacking or cracking which refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communication system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic documents

A

Electronic Commerce Law
(RA 8792)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Section 33. Penalties.
b)(33) Piracy or the unauthorized copying, reproduction, dissemination, distribution, importation, use, removal, alteration, substitution, modification, storage, uploading, downloading, communication, making available to the public, or broadcasting of protected material, electronic signature or copyrighted works including legally protected sound recordings or phonograms or information material on protected works, through the use of telecommunication networks, such as, but not limited to, the internet, in a manner that infringes intellectual property rights

A

Electronic Commerce Law
(RA 8792)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is the policy of the State to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth. The State recognizes the vital role of information and communications technology in nation-building and its inherent obligation to ensure that personal information in information and communications systems in the government and in the private sector are secured and protected.

A

Data Privacy Act (RA 10173)
SEC.
2. Declaration of Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Personal information refers to any information whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual.

A

Data Privacy Act (RA 10173)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

–Sensitive personal information refers to personal information:
–(1) About an individual’s race, ethnic origin, marital status, age, color, and religious, philosophical or political affiliations;
–(2) About an individual’s health, education, genetic or sexual life of a person, or to any proceeding for any offense committed or alleged to have been committed by such person, the disposal of such proceedings, or the sentence of any court in such proceedings;
–(3) Issued by government agencies peculiar to an individual which includes, but not limited to, social security numbers, previous or current health records, licenses or its denials, suspension or revocation, and tax returns; and
–(4) Specifically established by an executive order or an act of Congress to be kept classified.

A

Data Privacy Act (RA 10173)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privileged information refers to any and all forms of data which under the Rules of Court and other pertinent laws constitute privileged communication.
–Filial privilege rule –Marital privilege rule –Attorney-Client Privilege –Doctor-Patient Privilege –Clergy-Penitent Privilege –State Secrets

A

Data Privacy Act (RA 10173)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

–Data subject refers to an individual whose personal information is processed.
–Personal information controller refers to a person or organization who controls the collection, holding, processing or use of personal information, including a person or organization who instructs another person or organization to collect, hold, process, use, transfer or disclose personal information on his or her behalf.
–Personal information processor refers to any natural or juridical person qualified to act as such under this Act to whom a personal information controller may outsource the processing of personal data pertaining to a data subject.

A

Data Privacy Act (RA 10173)
Personas Defined in the Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(a) Be informed whether personal information pertaining to him or her shall be, are being or have been processed;
– (b) Be furnished the information indicated hereunder before the entry of his or her personal information into the processing system of the personal information controller, or at the next practical opportunity:
(1) Description of the personal information to be entered into the system;
(2) Purposes for which they are being or are to be processed; (3) Scope and method of the personal information processing;
(4) The recipients or classes of recipients to whom they are or may be disclosed;
(5) Methods utilized for automated access, if the same is allowed by the data subject, and the extent to which such access is authorized;
(6) The identity and contact details of the personal information controller or its representative;
(7) The period for which the information will be stored; and
(8) The existence of their rights, i.e., to access, correction, as well as the right to lodge a complaint before the Commission.

A

Data Privacy Act (RA 10173)
Sec 16. Rights of Data Subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Processing refers to any operation or any set of operations performed upon personal information including, but not limited to, the collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of data.

A

Data Privacy Act (RA 10173)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Consent should be: - Freely given
- Specific
- Informed
- Recorded (hard evidence) Exceptions:
- Not required for processing where the data subject is party to a contractual agreement, for purposes of fulfilling that contract, response to a national emergency
- Response to a national emergency
- Necessary to pursue the legitimate interests of the data controller

A

Data Privacy Act (RA 10173)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The processing of personal information shall be allowed, subject to compliance with the requirements of this Act and other laws allowing disclosure of information to the public and adherence to the principles of transparency, legitimate purpose and proportionality.
Personal information must be:
– (a) Collected for specified and legitimate purposes determined and declared before, or as soon as reasonably practicable after collection, and later processed in a way compatible with such declared, specified and legitimate purposes only;
– (b) Processed fairly and lawfully;
– (c) Accurate, relevant and, where necessary for purposes for which it is to be used the processing of personal information, kept up to date; inaccurate or incomplete data must be rectified, supplemented, destroyed or their further processing restricted;
– (d) Adequate and not excessive in relation to the purposes for which they are collected and processed;
– (e) Retained only for as long as necessary for the fulfillment of the purposes for which the data was obtained or for the establishment, exercise or defense of legal claims, or for legitimate business purposes, or as provided by law; and
– (f) Kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the data were collected and
processed: Provided, That personal information collected for other purposes may lie processed for historical, statistical or scientific purposes, and in cases laid down in law may be stored for longer periods: Provided, further, That adequate safeguards are guaranteed by said laws authorizing their processing.

A

Data Privacy Act (RA 10173)
SEC. 11. General Data Privacy Principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(a) The personal information controller must implement reasonable and appropriate organizational, physical and technical measures intended for the protection of personal information against any accidental or unlawful destruction, alteration and disclosure, as well as against any other unlawful processing.
(b) The personal information controller shall implement reasonable and appropriate measures to protect personal information against natural dangers such as accidental loss or destruction, and human dangers such as unlawful access, fraudulent misuse, unlawful destruction, alteration and contamination.
(c) The determination of the appropriate level of security under this section must take into account the nature of the personal information to be protected, the risks represented by the processing, the size of the organization and complexity of its operations, current data privacy best practices and the cost of security implementation. Subject to guidelines as the Commission may issue from time to time, the measures implemented must include:

A

Data Privacy Act (RA 10173)
SEC. 20. Security of Personal Information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(1) Safeguards to protect its computer network against accidental, unlawful or unauthorized usage or interference with or hindering of their functioning or availability;
(2) A security policy with respect to the processing of personal information;
(3) A process for identifying and accessing reasonably foreseeable vulnerabilities in its computer networks, and for taking preventive, corrective and mitigating action against security incidents that can lead to a security breach; and
(4) Regular monitoring for security breaches and a process for taking preventive, corrective and mitigating action against security incidents that can lead to a security breach.

A

Data Privacy Act (RA 10173)
SEC. 20. Security of Personal Information.

18
Q

Requirements to Notify:
- Breached information must be sensitive personal information, or information that can be used for identity fraud
- Reasonable belief that unauthorized acquisition has occurred
- Risk to data subject is real
- Potential harm

A

Data Privacy Act (RA 10173)
SEC. 20. Security of Personal Information.

19
Q

SEC. 25. Unauthorized Processing of Personal Information and Sensitive Personal Information.
SEC. 26. Accessing Personal Information and Sensitive Personal Information Due to Negligence.
SEC. 27. Improper Disposal of Personal Information and Sensitive Personal Information.

A

Data Privacy Act (RA 10173)
Chapter VIII
Penalties

20
Q

SEC. 28. Processing of Personal Information and Sensitive Personal Information for Unauthorized Purposes
SEC. 29. Unauthorized Access or Intentional Breach.
SEC. 30. Concealment of Security Breaches Involving Sensitive Personal Information.

A

Data Privacy Act (RA 10173)
Chapter VIII
Penalties

21
Q

Any personal information controller or personal information processor or any of its officials, employees or agents, who, with malice or in bad faith, discloses unwarranted or false information relative to any personal information or personal sensitive information obtained by him or her, shall be subject to imprisonment ranging from one (1) year and six (6) months to five (5) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00).

A

Data Privacy Act (RA 10173)
Chapter VIII
Penalties
SEC. 31. Malicious Disclosure

22
Q

(a) Any personal information controller or personal information processor or any of its officials, employees or agents, who discloses to a third party personal information not covered by the immediately preceding section without the consent of the data subject, shall be subject to imprisonment ranging from one (1) year to three (3) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00).

A

Data Privacy Act (RA 10173)
Chapter VIII
Penalties
SEC.
32. Unauthorized Disclosure.

23
Q

Any combination or series of acts as defined in Sections 25 to 32 shall make the person subject to imprisonment ranging from three (3) years to six (6) years and a fine of not less than One million pesos (Php1,000,000.00) but not more than Five million pesos (Php5,000,000.00).

A

Data Privacy Act (RA 10173)
Chapter VIII
Penalties
SEC.
33. Combination or Series of Acts.

24
Q

refers to a computer or a computer network, the electronic medium in which OL communication takes place

A

Cyber

25
Q

computer crime, the use of a computer and the internet as instruments to further illegal ends such as:
– Fraud
–Trafficking in child pornography, intellectual
property
–Stealing identities, violating privacy

A

Cybercrime

26
Q

(a)Offenses against the confidentiality, integrity and availability of computer data and systems:
(1)Illegal Access (2)Illegal Interception (3)Data Interference (4)System Interference (5)Misuse of Devices (6)Cyber Squatting

A

Cybercrime Prevention Act of 2012
(RA 10175)
Section
4. Cybercrime Offenses.

27
Q

(b) Computer-related Offenses (1)Computer Related Forgery
(2)Computer Related Fraud (3)Computer Related Identity Theft

A

Cybercrime Prevention Act of 2012
Section
4. Cybercrime Offenses.

28
Q

(c) Content-related Offenses
(1)Cybersex
(2)Child Pornography
(3)Unsolicited Commercial Communications
(4)Libel

A

Cybercrime Prevention Act of 2012
Section
4. Cybercrime Offenses.

29
Q

Libel by means of writings or similar means. — A libel committed by means of writing, printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition, cinematographic exhibition, or any similar means, shall be punished by prision correccional in its minimum and medium periods or a fine ranging from 200 to 6,000 pesos, or both, in addition to the civil action which may be brought by the offended party.

A

Article 355 of the Revised Penal Code

30
Q

Definition of libel. — A libel is a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead.

A

Article 353 of the Revised Penal Code

30
Q

Definition of libel. — A libel is a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead.

A

Article 353 of the Revised Penal Code

31
Q

refers to any representation, whether visual, audio, or written combination thereof, by electronic, mechanical, digital, optical, magnetic or any other means, of child engaged or involved in real or simulated explicit sexual activities.

A

“Child pornography”

32
Q

refers to a person below eighteen (18) years of age or over, but is unable to fully take care of himself/herself from abuse, neglect, cruelty, exploitation or discrimination because of a physical or mental disability or condition.
(1) a person regardless of age who is presented, depicted or portrayed as a child as defined herein; and
(2) computer-generated, digitally or manually crafted images or graphics of a person who is represented or who is made to appear to be a child as defined herein.

A

“Child”

33
Q

ncludes actual or simulated –
(1) As to form:
(i) sexual intercourse or lascivious act including, but not limited to, contact involving genital to genital, oral to genital, anal to genital, or oral to anal, whether between persons of the same or opposite sex;
(2) bestiality;
(3) masturbation;
(4) sadistic or masochistic abuse;
(5) lascivious exhibition of the genitals, buttocks, breasts, pubic area and/or anus; or
(6) use of any object or instrument for lascivious acts

A

“Explicit Sexual Activity”

34
Q

(a) To hire, employ, use, persuade, induce or coerce a child to perform in the creation or production of any form of child pornography;
(b) To produce, direct, manufacture or create any form of child pornography;
(c) To publish offer, transmit, sell, distribute, broadcast, advertise, promote, export or import any form of child pornography;
(d) To possess any form of child pornography with the intent to sell, distribute, publish, or broadcast: Provided. That possession of three (3) or more articles of child pornography of the same form shall be prima facie evidence of the intent to sell, distribute, publish or broadcast;
(e) To knowingly, willfully and intentionally provide a venue for the commission of prohibited acts as, but not limited to, dens, private rooms, cubicles, cinemas, houses or in establishments purporting to be a legitimate business;

A

Anti-Child Pornography Act of 2009
Section 4.
Unlawful or Prohibited Acts

35
Q

(f) For film distributors, theaters and telecommunication companies, by themselves or in cooperation with other entities, to distribute any form of child pornography;
(g) For a parent, legal guardian or person having custody or control of a child to knowingly permit the child to engage, participate or assist in any form of child pornography;
(h) To engage in the luring or grooming of a child;
(i) To engage in pandering of any form of child pornography; (j) To willfully access any form of child pornography;
(k) To conspire to commit any of the prohibited acts stated in this section. Conspiracy to commit any form of child pornography shall be committed when two (2) or more persons come to an agreement concerning the commission of any of the said prohibited acts and decide to commit it; and
(l) To possess any form of child pornography.

A

Anti-Child Pornography Act of 2009
Section 4.
Unlawful or Prohibited Acts

36
Q

(a) Aiding or Abetting in the Commission of Cybercrime. – Any person who willfully abets or aids in the commission of any of the offenses enumerated in this Act shall be held liable.
(b) Attempt in the Commission of Cybercrime. — Any person who willfully attempts to commit any of the offenses enumerated in this Act shall be held liable.

A

Cybercrime Prevention Act of 2012
Section 5. Other Offenses

37
Q

The National Bureau of Investigation (NBI) and the Philippine National Police (PNP) shall be responsible for the efficient and effective law enforcement of the provisions of this Act. The NBI and the PNP shall organize a cybercrime unit or center manned by special investigators to exclusively handle cases involving violations of this Act.

A

Cybercrime Prevention Act of 2012
Section
10. Law
Enforcement Authorities

38
Q

Cybercrime Prevention Act of 2012
What to do if you’re a victim?

A

–Screen capture the defamatory or libelous post
–Report to the NBI/Police
–File a case for violation of Cybercrime Law or
Office of the Public Prosecutor (City Hall)

39
Q

Cybercrime Prevention Act of 2012
What to do if you’re accused?

A
  • Appear in court acc. to date/time set in subpoena
  • File a counter-affidavit
40
Q

means the act of taking photo or video coverage of a person or group of persons performing sexual act or any similar activity or of capturing an image of the private area of a person or persons without the latter’s consent, under circumstances in which such person/s has/have a reasonable expectation of privacy, or the act of selling, copying, reproducing, broadcasting, sharing, showing or exhibiting the photo or video coverage or recordings of such sexual act or similar activity through VCD/DVD, internet, cellular phones and similar means or device without the written consent of the person/s involved, notwithstanding that consent to record or take photo or video coverage of same was given by such person’s.

A

Anti-Photo and Video Voyeurism Act of 2009

“Photo or video voyeurism”