SlideShare ist ein Scribd-Unternehmen logo
1 von 18
LAW

LAW
PHILIPPINE SETTINGS
CYBERCRIME
TYPES OF CYBER CRIME

PENALTIES

 Illegal access
 Unauthorized access

 (imprisonment of six

(without right) to a
computer system or
application.

years and 1 day up to 12
years) or a fine of at least
Two hundred thousand
pesos (P200,000) up to a
maximum amount
commensurate to the
damage incurred
 Illegal interception

Unauthorized
interception of any
non-public
transmission of
computer data to, from,
or within a computer
system.

 (imprisonment of six

years and 1 day up to 12
years) or a fine of at
least Two hundred
thousand pesos
(P200,000) up to a
maximum amount
commensurate to the
damage incurred
 Data Interference

Unauthorized alteration,
damaging, deletion or
deterioration of
computer data,
electronic document, or
electronic data message,
and including the
introduction or
transmission of viruses.

 SAME AS ABOVE
 System Interference
Unauthorized hindering or
interference with the
functioning of a computer or

computer network by inputting,
transmitting, damaging,
deleting, deteriorating, altering
or suppressing computer data
or program, electronic
document, or electronic data
messages, and including the
introduction or transmission of
viruses.

 SAME AS ABOVE
 Misuse of devices

The unauthorized use,
possession, production,
sale, procurement,
importation, distribution, or
otherwise making available,
of devices, computer
program designed or
adapted for the purpose of
committing any of the
offenses stated in Republic
Act 10175.Unauthorized use
of computer password



same as above
except fine should be
no more than Five
hundred thousand
pesos (P500,000).
 Cyber-squatting

Acquisition of domain name
over the Internet in bad faith to
profit, mislead, destroy
reputation, and deprive others
from the registering the same.
This includes those existing
trademark at the time of
registration; names of persons
other than the registrant; and
acquired with intellectual
property interests in it.

 SAME AS ABOVE
 Computer-related

Fraud

Unauthorized input,
alteration, or deletion of
computer data or
program or interference
in the functioning of a
computer system,
causing damage thereby
with fraudulent intent.

 same as above

Provided, That if no
damage has yet been
caused, the penalty
imposed shall be one (1)
degree lower.
 Computer-related

Identity Theft

Unauthorized
acquisition, use, misuse,
transfer, possession,
alteration or deletion of
identifying information
belonging to another,
whether natural or
juridical.

 SAME AS ABOVE
 Cybersex

Willful engagement,
maintenance, control, or
operation, directly or
indirectly, of any lascivious
exhibition of sexual organs or
sexual activity, with the aid of
a computer system, for favor
or consideration. There is a
discussion on this matter if it
involves “couples” or “people
in relationship” who engage in
cybersex.

 . For as long it is not done for
favor or consideration, I don’t
think it will be covered.
However, if one party (in a
couple or relationship) sues
claiming to be forced to do
cybersex, then it can be
covered.
 PENALTY
 (imprisonment of six years and
1 day up to 12 years) or a fine of
at least Two hundred thousand

pesos (P200,000) but not
exceeding One million pesos
(P1,000,000) or BOTH.
 Child Pornography

Unlawful or prohibited
acts defined and
punishable by Republic
Act No. 9775 or the AntiChild Pornography Act of
2009, committed
through a computer
system.

 imposed shall be

one (1) degree
higher than that
provided for in
Republic Act 9775,
if committed
through a
computer system.
CYBERCRIME LAW
UNITED STATES SETTINGS
CYBERCRIMES
 4. Online Gambling
 5. Intellectual property crimes such as theft of

computer source code, software piracy,
copyright infringement, trademark violations
 6. Harassments such as cyber stalking, cyber
defamation, indecent and abusing mails
CYBERCRIMES
 7. Cyber frauds such as forgery of

documents including currency and any other
documents
 8. Launching of virus, worms and Trojans
 9. Denial-of-service attacks

 10. Cyber attacks and cyber terrorism
CYBERCRIMES
 11. Economic espionage
 12. Consumer harassment and consumer

protection
 13. Privacy of citizens

 14. Sale of illegal articles such as narcotics,

weapons, wildlife, etc
Cyber crimes that can generally occur within
organizations are as follows;
 E-mail abuse
 2. Spam mails
 3. Cyber defamation
 4. Theft of source code

 5. Exchange of business secrets and documents
CYBERCRIMES
 6. Insider attacks on personal database
 7. Use of office computer for running other business
 8. Transmission and viewing of pornographic materials
 9. External cyber attacks on an organization resulting in

denial-of-service

 10. Information espionage

Weitere Àhnliche Inhalte

Was ist angesagt?

Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
Omar Jacalne
 
Article III part 3
Article III part 3Article III part 3
Article III part 3
Noel Jopson
 
ARTICLE III - Sections11-16
ARTICLE III - Sections11-16ARTICLE III - Sections11-16
ARTICLE III - Sections11-16
tzeri_apple
 
Orientation ra 9208 ii
Orientation ra 9208 iiOrientation ra 9208 ii
Orientation ra 9208 ii
Omar Jacalne
 
Edited rape law lectures
Edited  rape law lecturesEdited  rape law lectures
Edited rape law lectures
JoyCee8
 
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
Special laws on children   8353, 9262, 9231, 7877, 7610, 920Special laws on children   8353, 9262, 9231, 7877, 7610, 920
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
Omar Jacalne
 

Was ist angesagt? (20)

On the cybercrime act
On the cybercrime actOn the cybercrime act
On the cybercrime act
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
 
RA 9775 - Anti-Child Pornography Act of 2009
RA 9775 - Anti-Child Pornography Act of 2009RA 9775 - Anti-Child Pornography Act of 2009
RA 9775 - Anti-Child Pornography Act of 2009
 
Cybercrime Prevention Act
Cybercrime Prevention ActCybercrime Prevention Act
Cybercrime Prevention Act
 
Article III part 3
Article III part 3Article III part 3
Article III part 3
 
Cybersex law
Cybersex lawCybersex law
Cybersex law
 
FOR FINALS PSCN
FOR FINALS PSCN FOR FINALS PSCN
FOR FINALS PSCN
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
ARTICLE III - Sections11-16
ARTICLE III - Sections11-16ARTICLE III - Sections11-16
ARTICLE III - Sections11-16
 
Polsc2 11 introduction to bill of rights
Polsc2   11 introduction to bill of rightsPolsc2   11 introduction to bill of rights
Polsc2 11 introduction to bill of rights
 
Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)Philippine Constitution 1987 (Article 3 - Bill of Rights)
Philippine Constitution 1987 (Article 3 - Bill of Rights)
 
Orientation ra 9208 ii
Orientation ra 9208 iiOrientation ra 9208 ii
Orientation ra 9208 ii
 
ADJ 201-63 Criminology Lesson 1
ADJ 201-63 Criminology Lesson 1ADJ 201-63 Criminology Lesson 1
ADJ 201-63 Criminology Lesson 1
 
Edited rape law lectures
Edited  rape law lecturesEdited  rape law lectures
Edited rape law lectures
 
Bill of Rights - 1987 Philippine Constitution
Bill of Rights - 1987 Philippine ConstitutionBill of Rights - 1987 Philippine Constitution
Bill of Rights - 1987 Philippine Constitution
 
Writ of Habeas Corpus and Amparo-Philippines
Writ of Habeas Corpus and Amparo-PhilippinesWrit of Habeas Corpus and Amparo-Philippines
Writ of Habeas Corpus and Amparo-Philippines
 
R.A. 8353 Lecture.ppt
R.A. 8353 Lecture.pptR.A. 8353 Lecture.ppt
R.A. 8353 Lecture.ppt
 
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
Special laws on children   8353, 9262, 9231, 7877, 7610, 920Special laws on children   8353, 9262, 9231, 7877, 7610, 920
Special laws on children 8353, 9262, 9231, 7877, 7610, 920
 
CRIMINAL-LAW-II-BOOK-2.pptx
CRIMINAL-LAW-II-BOOK-2.pptxCRIMINAL-LAW-II-BOOK-2.pptx
CRIMINAL-LAW-II-BOOK-2.pptx
 
Digital law
Digital lawDigital law
Digital law
 

Andere mochten auch

WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampWSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
Sonnie Santos
 
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
sabtolinux
 
Bullying and teacher practices
Bullying and teacher practicesBullying and teacher practices
Bullying and teacher practices
Siti Khalijah Zainol
 
Johnson, d. preventing bullying
Johnson, d. preventing bullying Johnson, d. preventing bullying
Johnson, d. preventing bullying
EDITHA HONRADEZ
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpoint
torremalku
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
derekdreak
 
Cyber Wellness Program for the philippines
Cyber Wellness Program  for the philippinesCyber Wellness Program  for the philippines
Cyber Wellness Program for the philippines
Sonnie Santos
 

Andere mochten auch (20)

Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot CampWSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
WSPH Anti Cyber Bullying and Cyber Wellness Boot Camp
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6Latihan7 comp-forensic-bab6
Latihan7 comp-forensic-bab6
 
Bullying and teacher practices
Bullying and teacher practicesBullying and teacher practices
Bullying and teacher practices
 
Bullying presentation
Bullying presentationBullying presentation
Bullying presentation
 
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre..."The Effects of Bullying Among Middle School Gifted and Talented Childre...
"The Effects of Bullying Among Middle School Gifted and Talented Childre...
 
Casenote Bullying
Casenote BullyingCasenote Bullying
Casenote Bullying
 
Johnson, d. preventing bullying
Johnson, d. preventing bullying Johnson, d. preventing bullying
Johnson, d. preventing bullying
 
Cyberbullypowerpoint
CyberbullypowerpointCyberbullypowerpoint
Cyberbullypowerpoint
 
OSI models
OSI modelsOSI models
OSI models
 
Abstract
AbstractAbstract
Abstract
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)Anti-Child Porn Act & Privacy (slides from ICT4PHD)
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
 
Accomplishments
AccomplishmentsAccomplishments
Accomplishments
 
Cyber Wellness Program for the philippines
Cyber Wellness Program  for the philippinesCyber Wellness Program  for the philippines
Cyber Wellness Program for the philippines
 
Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)Intellectual Property and Cybrecrime Law (introduction)
Intellectual Property and Cybrecrime Law (introduction)
 
Cyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells UsCyberbullying 2010: What the Research Tells Us
Cyberbullying 2010: What the Research Tells Us
 

Ähnlich wie Cybercrime law legality report

Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
GissaMaeCastino
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
akashsaqi444
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
badangayonmgb
 

Ähnlich wie Cybercrime law legality report (20)

Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber Laws in Pakistan
Cyber Laws in PakistanCyber Laws in Pakistan
Cyber Laws in Pakistan
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social mediaCyber Crime Laws in Pakistan regarding electronic and social media
Cyber Crime Laws in Pakistan regarding electronic and social media
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
p Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdfp Project Presentatimnkhihihihihihon.pdf
p Project Presentatimnkhihihihihihon.pdf
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Computer Crimes and Data Protection
Computer Crimes and Data ProtectionComputer Crimes and Data Protection
Computer Crimes and Data Protection
 
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
PED-8-GROUP-4-REPORT.pptxPED-8-GROUP-4-REPORT.pptx
 

KĂŒrzlich hochgeladen

Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Health
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
AshtonCains
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 

KĂŒrzlich hochgeladen (20)

Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
International Airport Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
International Airport Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelInternational Airport Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
International Airport Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
Vellore Call Girls Service ☎ 82500–77686 ☎ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ 82500–77686 ☎ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ 82500–77686 ☎ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ 82500–77686 ☎ Enjoy 24/7 Escort Service
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎ 9205541914 ☎ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎ 9205541914 ☎ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎ 9205541914 ☎ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎ 9205541914 ☎ Independent Esco...
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
 
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >àŒ’8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >àŒ’8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >àŒ’8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >àŒ’8448380779 Escort Service
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Finance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdfFinance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdf
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 

Cybercrime law legality report

  • 3. CYBERCRIME TYPES OF CYBER CRIME PENALTIES  Illegal access  Unauthorized access  (imprisonment of six (without right) to a computer system or application. years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred
  • 4.  Illegal interception Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system.  (imprisonment of six years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred
  • 5.  Data Interference Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses.  SAME AS ABOVE
  • 6.  System Interference Unauthorized hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, and including the introduction or transmission of viruses.  SAME AS ABOVE
  • 7.  Misuse of devices The unauthorized use, possession, production, sale, procurement, importation, distribution, or otherwise making available, of devices, computer program designed or adapted for the purpose of committing any of the offenses stated in Republic Act 10175.Unauthorized use of computer password  same as above except fine should be no more than Five hundred thousand pesos (P500,000).
  • 8.  Cyber-squatting Acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same. This includes those existing trademark at the time of registration; names of persons other than the registrant; and acquired with intellectual property interests in it.  SAME AS ABOVE
  • 9.  Computer-related Fraud Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.  same as above Provided, That if no damage has yet been caused, the penalty imposed shall be one (1) degree lower.
  • 10.  Computer-related Identity Theft Unauthorized acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical.  SAME AS ABOVE
  • 11.  Cybersex Willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. There is a discussion on this matter if it involves “couples” or “people in relationship” who engage in cybersex.  . For as long it is not done for favor or consideration, I don’t think it will be covered. However, if one party (in a couple or relationship) sues claiming to be forced to do cybersex, then it can be covered.  PENALTY  (imprisonment of six years and 1 day up to 12 years) or a fine of at least Two hundred thousand pesos (P200,000) but not exceeding One million pesos (P1,000,000) or BOTH.
  • 12.  Child Pornography Unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the AntiChild Pornography Act of 2009, committed through a computer system.  imposed shall be one (1) degree higher than that provided for in Republic Act 9775, if committed through a computer system.
  • 14. CYBERCRIMES  4. Online Gambling  5. Intellectual property crimes such as theft of computer source code, software piracy, copyright infringement, trademark violations  6. Harassments such as cyber stalking, cyber defamation, indecent and abusing mails
  • 15. CYBERCRIMES  7. Cyber frauds such as forgery of documents including currency and any other documents  8. Launching of virus, worms and Trojans  9. Denial-of-service attacks  10. Cyber attacks and cyber terrorism
  • 16. CYBERCRIMES  11. Economic espionage  12. Consumer harassment and consumer protection  13. Privacy of citizens  14. Sale of illegal articles such as narcotics, weapons, wildlife, etc
  • 17. Cyber crimes that can generally occur within organizations are as follows;  E-mail abuse  2. Spam mails  3. Cyber defamation  4. Theft of source code  5. Exchange of business secrets and documents
  • 18. CYBERCRIMES  6. Insider attacks on personal database  7. Use of office computer for running other business  8. Transmission and viewing of pornographic materials  9. External cyber attacks on an organization resulting in denial-of-service  10. Information espionage