REPUBLIC ACT 10175 Flashcards
RA 10175 is known as
“Cybercrime Prevention Act of 2012”
refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network;
ACCESS
refers to the modification or change, in form or substance, of an
existing computer data or program;
Alteration
refers to the DOJ - Office of Cybercrime;
Central Authority
Central Authority refers to
DOJ - Office of Cybercrime;
What Republic Act is the Anti child pornography act of 2009
RA NO 9775
refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775
CHILD PORNOGRAPHY
refers to gathering and receiving information;
Collection
refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data;
Communication
refers to either the Cybercrime Investigation and
Coordinating Center or the DOJ - Office of Cybercrime, as the case may be;
Competent Authority
refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device.
COMPUTER
refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents and/or electronic data messages whether stored in local computer systems or online;
COMPUTER DATA
refers to a set of instructions executed by the computer
to achieve intended results;
COMPUTER PROGRAM
refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data.
computer system
It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones.
COMPUTER SYSTEM
It also includes computer data storage devices or media;
Computer System
refers to the communication content of the communication, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than traffic data.
Content Data
refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters;
CRITICAL INFRASTRUCURE
refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets;
Cybersecurity
refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.
National Cybersecurity Plan
It is a top-down approach to cybersecurity that contains broad policy statements and establishes a set of national objectives and priorities that should be achieved within a specific timeframe;
National Cybersecurity Plan
refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration;
Cybersex
refers to a computer or a computer network, the electronic medium in
which online communication takes place;
CYBER
refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system;
Database
refers to digital information that may be used as evidence in a case. The gathering of the digital information may be carried out by confiscation of the storage media (data carrier), the tapping or monitoring of network traffic, or the making of digital copies (e.g., forensic images, file copies, etc.), of the data held;
Digital evidence
refers to evidence, the use of which is sanctioned by existing rules of evidence, in ascertaining in a judicial proceeding, the truth respecting a matter of fact, which evidence is received, recorded, transmitted, stored, processed, retrieved or produced electronically;
Electronic evidence
refers to the application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context;
Forensics
also known as a forensic copy, refers to an exact bit-by-bit copy of a data carrier, including slack, unallocated space and unused space.
FORENSIC IMAGE
refers to the mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information
HASH VALUE
It is a one way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;
HASH VALUE
refers to any name or number that may be used alone or in conjunction with any other information to identify any specific individual, including any of the following:
IDENTIFYING INFORMATION
IDENTIFYING INFORMATION may have the following infos
- Name, date of birth, driver’s license number, passport number or tax identification number;
- Unique biometric data
- Unique electronic identification number, address or routing code
- Telecommunication identifying information or access device.
refers to system intended for, and capable of, generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents, and includes the computer system or other similar device by or in which data is recorded or stored, and any procedures related to the recording or storage of electronic data message or electronic document;
Information and communication technology
refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a computer system
Interception
refers to a person who hosts or who proposes to host
internet content in the Philippines;
Internet content host