review Flashcards

1
Q

republic act no.10175 is

A

-Cybercrime Prevention Act of 2012
-Approved on September 12 2012
-focuses on the pre-emption, prevention, and prosecution of cybercrimes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Republic act 10175 includes:

A

-Illegal access
-Illegal interception
-Data interference
-System interference
-Misuse of device
-Cyber-squatting
-Cybersex
-Child Pornography
-Identity Theft
-Cyber Libel
-Cyber bullying
-Hacking
-Phising
-Illegal Downloading
-Digital Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accessing the whole or any part pf the computer system without right.

A

Illegal access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

interception made by technical means without right.

A

Illegal interception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intentional or reckless alteration damaging, deletion or deterioration of computer data, including the introduction or transmission of viruses

A

Data interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

intentional alteration or reckless hindering with functioning of computer system or computer network

A

System interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Use, production, sale, procurement, importation, distribution, or otherwise making available without right.

A

Misuse of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

acquisition of a domain name over the internet in bad faith to profit, misled destroy reputation, and deprive other from registering the same.

A

Cyber-squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

willful engagement, maintenance, control, or operation, directly pr indirectly of any lascivious exhibition sexual activity with the aid of a computer system m, the favor or consideration

A

Cybersex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

any usual depiction of minor engaging in sexually explicit activity

A

Child pornography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural pr juridical without right.

A

Identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

it is the act of making false and malicious statements online that harm anothers reputation.

A

Cyber libel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

relating to or involving computers or computer networks

A

Cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

refers to the virtual computer would an electronic medium used to form a global computer network to facilitate online communication

A

Cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

refers to the criminal activities carried out by means of computers of the internet

A

Cyber crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the persona you create about yourself virtually

A

virtual self

17
Q

use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature

A

Cyber bullying

18
Q

refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective

A

Hacking

19
Q

is the attempt to obtain sensitive information such as usernames passwords and credit card details and indirectly money often for malicious reasons by disguising as a trustworthy entity in an electronic communication

A

Phising

20
Q

refers to obtaining files that you do not have the right to use from the internet

A

Illegal downloading

21
Q

Illegal Downloading Sites

A

-The Pirate Bay
-TorrentDownloads.me
-Kickass.to
-Yts.ag
-RARBG.to

22
Q

Legal Downloading Sites

A

-iTunes
-Yahoo Music
-Amazon
-Netflix
-Ruckus

23
Q

the practice pf illegally copying and selling digital music, video, computer software etc.

A

Digital Piracy

24
Q

is the deliberate use of someone else identity usually as a method to gain a financial advantage or obtain credit and other benefits on the other persons name, and perhaps to the other persons disadvantages or loss

A

Identity Theft

25
Q

is registering, trafficking in, or using an internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else

A

cyber-squatting

26
Q

•Also called computer sex, internet sex, net sex
• is a virtual sex encounter in which two or more people connected remotely via internet send each otter sexually explicit
contents or sexually explicit acts.

A

Cybersex

27
Q

is a form of child sexual exploitation.

A

child pornography

28
Q

who signed ra 10175

A

Benigno Simeon Aquino III

29
Q

Unsolicited communication is punishable by

A

one month to six months in prison, a fine of not less than P50,000 but not more than P250,000, or both.

30
Q

Child pornography through computer systems has a penalty of

A

one degree higher than what is provided in RA 9775, or the Anti-Child Pornography Act of 2009.

31
Q

The Cybercrime Prevention Act of 2012 sanctions content-related offenses performed using a computer system,

A

such as cybersex, child pornography, and libel

32
Q

Individuals found guilty of cybersex face a minimum prison sentence of

A

six years and one day, a maximum prison of 12 years, and a fine of at least P200,000 but not more than P1,000,000.

33
Q

Individuals found guilty of cybersex face a minimum prison sentence of

A

six years and one day, a maximum prison of 12 years, and a fine of at least P200,000 but not more than P1,000,000.

34
Q

SALIENT POINTS OF RA 10175

A

-internationally consistent definitions for cybercrime
-nuanced liability for cybercrime offenders
-increased penalties
-enhanced authority granted to law enforcement authorities
-expanded jurisdictional authority for prosecution
-provision for international cybercrime coordination effort and greater ability to combat cybercrimes.