Unit 10: Cybercrime Law Flashcards
Who created the worm that sent messages through with an attachment: LOVE-LETTER-FORYOU.txt.vbs, that when opened, the file activates a code that sends an instruction to forward the same email to all the contacts of the user.
Onel de Guzman
What is the amount of estimated damages by the ILOVEYOU worm?
10 billion USD
Upon arrest of Onel de Guzman in 2000, were his actions illegal?
No. He was released shortly because there weren’t any pre-existing laws in the country for which he can be prosecuted.
This is an act providing for the recognition and use of electronic commercial and non-commercial transactions and documents, penalties for unlawful use thereof and for other purposes. This was also used to define certain illegal activities concerning the use of various devices.
RA 8792 or the Philippine E-Commerce Act of 2000
True or false: Electronic documents have the same legal effect, validity, and enforceability as any other document or legal writing.
True
For evidentiary purposes, an electronic document shall be the _______________ equivalent of a written document under existing laws.
Functional
This is the unauthorized access into a computer system/server or information and communication system. According to the law, it is the “access of a computer or computer system with the intention to corrupt, alter, steal, or destroy.
Hacking or Cracking
Without the intent to corrupt, alter, steal, or destroy, does the law consider unauthorized access to a computer hacking?
No. The intention is a requisite in order for the act to be considered hacking.
This is the unauthorized opying, reproduction, storage, uploading, downloading, communication, or broadcasting of protected material, … , through the use of telecommunication networks, such as, but not limited to, the internet, in a manner that infringes intellectual property rights.
Piracy
What are the prohibited acts in relation to RA 8792?
Hacking/Cracking
Piracy
Does connecting to an open WiFi Network (WiFi with no password), without the consent of the owner of the network, constitute to a violation of RA 8792?
No. There is no intention to corrupt, alter, steal, or destroy.
This law is the most comprehensive cybercrime law enacted in the Philippines. It is considered as the cornerstone of cybercrime protection for citizens in the Philippines.
RA 10175 or the Cybercrime Prevention Act of 2012
This is an act that adopts sufficient powers to effectively prevent and combat cybercrime offenses by facilitating their detection, investigation, and prosecution.
RA 10175
This is a crime committed with or through the use of information and communication technologies such as radio, television, cellular phone, computer and network, and other communication device or application.
Cybercrime
What are the 3 types of cybercrimes?
- Offenses against the confidentiality, integrity, and availability (CIA) of computer data and systems
- Computer-related offenses
- Content-related offenses