REPUBLIC ACT 10175 Flashcards

1
Q

RA 10175 is known as

A

“Cybercrime Prevention Act of 2012”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network;

A

ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

refers to the modification or change, in form or substance, of an
existing computer data or program;

A

Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

refers to the DOJ - Office of Cybercrime;

A

Central Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Central Authority refers to

A

DOJ - Office of Cybercrime;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Republic Act is the Anti child pornography act of 2009

A

RA NO 9775

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

refers to the unlawful or prohibited acts defined and punishable by Republic Act No. 9775

A

CHILD PORNOGRAPHY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

refers to gathering and receiving information;

A

Collection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

refers to the transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data;

A

Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refers to either the Cybercrime Investigation and
Coordinating Center or the DOJ - Office of Cybercrime, as the case may be;

A

Competent Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

refers to an electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device.

A

COMPUTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function, and includes electronic documents and/or electronic data messages whether stored in local computer systems or online;

A

COMPUTER DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

refers to a set of instructions executed by the computer
to achieve intended results;

A

COMPUTER PROGRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data.

A

computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones.

A

COMPUTER SYSTEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It also includes computer data storage devices or media;

A

Computer System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

refers to the communication content of the communication, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than traffic data.

A

Content Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

refers to the computer systems, and/or networks, whether physical or virtual, and/or the computer programs, computer data and/or traffic data that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters;

A

CRITICAL INFRASTRUCURE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user’s assets;

A

Cybersecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

refers to a comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services.

A

National Cybersecurity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It is a top-down approach to cybersecurity that contains broad policy statements and establishes a set of national objectives and priorities that should be achieved within a specific timeframe;

A

National Cybersecurity Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

refers to the willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration;

A

Cybersex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

refers to a computer or a computer network, the electronic medium in
which online communication takes place;

A

CYBER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system;

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

refers to digital information that may be used as evidence in a case. The gathering of the digital information may be carried out by confiscation of the storage media (data carrier), the tapping or monitoring of network traffic, or the making of digital copies (e.g., forensic images, file copies, etc.), of the data held;

A

Digital evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

refers to evidence, the use of which is sanctioned by existing rules of evidence, in ascertaining in a judicial proceeding, the truth respecting a matter of fact, which evidence is received, recorded, transmitted, stored, processed, retrieved or produced electronically;

A

Electronic evidence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

refers to the application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context;

A

Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

also known as a forensic copy, refers to an exact bit-by-bit copy of a data carrier, including slack, unallocated space and unused space.

A

FORENSIC IMAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

refers to the mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a “digital fingerprint” or “digital DNA” for that information

A

HASH VALUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

It is a one way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values;

A

HASH VALUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

refers to any name or number that may be used alone or in conjunction with any other information to identify any specific individual, including any of the following:

A

IDENTIFYING INFORMATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

IDENTIFYING INFORMATION may have the following infos

A
  1. Name, date of birth, driver’s license number, passport number or tax identification number;
  2. Unique biometric data
  3. Unique electronic identification number, address or routing code
  4. Telecommunication identifying information or access device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

refers to system intended for, and capable of, generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents, and includes the computer system or other similar device by or in which data is recorded or stored, and any procedures related to the recording or storage of electronic data message or electronic document;

A

Information and communication technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

refers to listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a computer system

A

Interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

refers to a person who hosts or who proposes to host
internet content in the Philippines;

A

Internet content host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

refers to the National Bureau of Investigation (NBI) and the Philippine National Police (PNP) under Section 10 of the Act;

A

Law enforcement authorities

37
Q

The law enforcement agencies involved in this act are (2)

A

National Bureau of Investigation (NBI)
Philippine National Police (PNP)

38
Q

refers to the person who created or is the origin of the
assailed electronic statement or post using a computer system;

A

ORIGINAL AUTHOR

39
Q

refers to the keeping of data that already exists in a stored
form, protected from anything that would cause its current quality or condition to change or deteriorate.

A

PRESERVATION

40
Q

It is the activity that keeps that stored data secure and safe;

A

PRESERVATION

41
Q

any public or private entity that provides users of its service with the
ability to communicate by means of a computer system; and

A

SERVICE PROVIDER

42
Q

any other entity that processes or stores computer data on behalf of
such communication service or users of such service.

A

SERVICE PROVIDER

43
Q

refers to any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services

A

SUBSCRIBER’S INFORMATION

44
Q

subscriber’s information can be (3) the following

A
  1. The type of communication service used
  2. The subscriber’s private information
  3. Any other available information on the site of the installation of communication equipment that is available on the basis of the service agreement or arrangement.
45
Q

refers to any computer data other than the content of the communication, including, but not limited to the communication’s origin, destination, route, time, date, size, duration, or type of underlying service; and

A

TRAFFIC DATA OR NON-CONTENT DATA

46
Q

Refers to conduct undertaken without or in excess of authority

A

WITHOUT RIGHT

47
Q

Refers to conduct not covered by established legal defenses, excuses, court orders, justifications or relevant principles under the law.

A

WITHOUT RIGHT

48
Q

5The 4 Offenses against the confidentiality, integrity and availability of computer data and systems

A
  1. Illegal Access
  2. Illegal Interception
  3. Data Interference
  4. System Interference
  5. Misuse of Devices
49
Q

The access to the whole or any part of a computer system without right.

A

ILLEGAL ACCESS

50
Q

The interception made by technical means and without right, of any non-public transmission of computer data to, from, or within a computer system, including electromagnetic emissions from a computer system carrying such computer data:

A

Illegal Interception

51
Q

The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document or electronic data message, without right, including the introduction or transmission of viruses.

A

Data Interference

52
Q

The intentional alteration, or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document or electronic

A

System Interference

53
Q

which shall be punished with imprisonment of prision mayor, or a fine of not more than Five Hundred Thousand Pesos (P500,000.00), or both

A

Misuse of Devices

54
Q

Offenses which shall be punished with imprisonment of prision mayor, or a fine of at least Two Hundred Thousand Pesos (P200,000.00) up to a maximum amount commensurate to the damage incurred, or both

A

COMPUTER RELATED OFFENSES

55
Q

The input, alteration or deletion of any computer data without right,

A

Computer Related Forgery

56
Q

The act of knowingly using computer data, which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design.

A

Computer Related Forgery

57
Q

The unauthorized input, alteration or deletion of computer data or program, or interference in the functioning of a computer system, causing damage thereby with fraudulent intent

A

COMPUTER RELATED FRAUD

58
Q

The intentional acquisition, use,
misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without righ

A

COMPUTER RELATED IDENTITY THEFT

59
Q

Any person found guilty of Child Pornography shall be punished through ___________

A

RA 9775

60
Q

The acquisition of a domain name over the internet, in bad faith, in order to profit, mislead, destroy reputation, and deprive others from registering the same

A

Cyber-squatting

61
Q

3 characteristics that qualify as cyber squatting

A
  1. Similar, identical, or confusingly similar to an existing trademark ;
  2. Identical or in any way similar with the name of a person\
  3. Acquired without right
62
Q

refers to a medium-level penalty imposed on individuals convicted of certain crimes in the Philippines

A

PRISION MAYOR

63
Q

Cyber-squatting shall be punished with imprisonment of ___________, or a fine of at least ____________up to a maximum amount commensurate to the damage incurred

A

prision mayor
at least Two Hundred Thousand Pesos (P200,000.00)

64
Q

Cyber squatting committed against critical infrastructure will have a penalty of

A

reclusion temporal
at least Five Hundred Thousand Pesos (P500,000.00)

65
Q

if the detention shall have exceeded six years, then it is called ___________

A

RECLUSION TEMPORAL

66
Q

Imprisonment of 12 years 1 day to 20 years is called by the latin name _____________

A

reclusion temporal

67
Q

Penalties of cybersex

A

PRISION MAYOR
200K - 1MILLION

68
Q

Penalties of Libel

A

prision correccional - prision mayor
at least 6000 pesos fines

69
Q

Penalties of other offenses

A

One Hundred Thousand Pesos (P100,000.00) but not exceeding Five Hundred Thousand Pesos (P500,000.00)

70
Q

Penalty of Corporate Liability

A

10 MILLION PESOS

71
Q

Penalty of a higher up officer due to lack of supervision

A

UP TO 5 MILLION PESOS

72
Q

The NBI shall create a cybercrime division headed by

A

HED AGENT

73
Q

The PNP shall create a anti cybercrime unit headed by

A

POLICE DIRECTOR

74
Q

In section 10, how many Powers and Functions of the Law Enforcement Agencies do have

A

9

75
Q

ISPs Must keep traffic data and subscriber information (like phone numbers) for ______________

A

6 months.

76
Q

ISPs Must keep content data (like messages or emails) for ____________, but only if ordered by law enforcement.

A

6 months.

77
Q

In Section 14 Disclosure of Computer Data, Service providers must disclose or submit the data within ___________ of receiving the order.

A

72 hours

78
Q

In section 15, Law enforcement authorities may request for an extension of time to complete the examination of the computer data storage medium and to make a return thereon, but in no case for a period longer than ______________ from date of approval by the court.

A

thirty (30) days

79
Q

IN Section 16, Within _________ after the warrant expires, the collected computer data (both content and traffic data) must be sealed and deposited with the court.

A

48 hours

80
Q

IN Section 16, Within 48 hours after the warrant expires, the collected computer data (both content and traffic data) must be _____ and _____ with the court.

A

sealed and deposited with the court.

81
Q

The sealed package cannot be opened, played, used as evidence, or have its contents revealed without a ______________

A

court order.

82
Q

SECTION 26 DESCRIBES

A

CYBERCRIME INVESTIGATION AND COORDINATING CENTER

83
Q

the CICC shall have how many powers and functions, as described by SECTION 27

A

9

84
Q

RA 10175 BEGUN HEARING IN

A

Monday, July 25 2011

85
Q

RA 10175 was approved in

A

SEPTEMBER 12, 2012

86
Q

This act is a consolidation of Senate Bill no.

A

2796

87
Q

This act is a consolidation of House bill no

A

5808

88
Q

This act has how many Sections in total

A

36

89
Q
A