SlideShare ist ein Scribd-Unternehmen logo
1 von 11
CYBERCRIME
Presented by:
JOHN FLORENTINO E. ECHON
SIMEON S. TAGUDA
GEOFF DANIEL RODENAS
CAYECELYN TAJA
LESLIE Q. QUEVAS
JENNIFER ADAON
Bataan Peninsula State University
bpsu
OVERview
• Meaning
• Types of cybercrime
• The Global Trend
• The Trend in PH
• The Trend in PH Part 2
• Cybercrime Related Laws
• The first recorded cybercrime in the Philippines
• Law penalizing computer crimes or cybercrimes
• Convicted cybercriminal in the PH
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
Cybercrime
 A cybercrime is a crime committed with or
through the use of information and
communication technologies such as radio,
television, cellular phone, computer and
network, and other communication device or
application.
bpsu
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
CYBERCRIME
OVERVIEW
Types of cybercrime
(1)offences against the confidentiality, integrity and
availability of computer data and systems;
(2)computer-related offences;
(3)content-related offences; and
(4)offences related to infringements of copyright
and related rights.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
The global trend of cybercrime
According to Norton Cyber Crime Report, 431
million adults worldwide were victims of
cybercrimes in 2011. The top cybercrimes in 2011
were (1) computer viruses or
malware - 54% overall; (2) online Scams - 11%
overall; and (3) phishing - 10% overall.
bpsu
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
CYBERCRIME
OVERVIEW
The trend of cybercrime in the Philippines
The Anti-Transnational Crime Division
(ATCD) of the Criminal Investigation and
Detection Group (CIDG) of the Philippine
National Police (PNP) has encountered
2,778 referred cases of computer crimes
from government agencies and private
individuals nationwide from 2003 to 2012.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
The trend of cybercrime in the Philippines
In a 2010 report of the security software firm
Symantec, 87% of Filipino internet users were
identified as victims of crimes and malicious
activities committed online. The following
activities were: (1) malware (virus and Trojan)
invasion; (2) online or phishing scams; (3) sexual
predation; and (4) services in social networking
site like Facebook and Twitter.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
Cybercrime-related laws in the Philippines
 (1) RA 10175 – Cybercrime Prevention Act of 2012, which is currently suspended
due to a TRO issued by the Supreme Court;
 (2) RA 9995 - Anti-Photo and Voyeurism Act of 2009;
 (3) RA 9725 - Anti-Child Pornography Act of 2009;
 (4) RA 9208 - Anti-Trafficking in Persons Act of 2003;
 (5) RA 8792 - E-Commerce Act of 2000;
 (6) RA 8484 - Access Device Regulation Act of 1998; and
 (7) RA 4200 or Anti-Wiretapping Law.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
The first recorded cybercrime in the
Philippines
In 2000, Onel de Guzman released the “I
Love You” virus. The
case filed against De Guzman was dismissed at the
first stage because there was no law punishing the
deed as of that time in May 2000, in the Philippines.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
Law penalizing computer crimes or
cybercrimes
On 14 June 2000, RA 8792 or the Electronic
Commerce Act was signed into law. RA 8792
positioned the Philippines as the third country to
enact an e-commerce law, next to Singapore
and Malaysia.
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW
Convicted cybercriminal in the PH
The first one was pursued by the PNP-CIDG; a
person was convicted in September 2005 for
pleading guilty of hacking the government
portal “gov.ph” and other government websites.
Be Aware!
Thank you for listening!
bpsu
CYBERCRIME
Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
OVERVIEW

Weitere ähnliche Inhalte

Was ist angesagt?

R.A. 8353 Lecture.ppt
R.A. 8353 Lecture.pptR.A. 8353 Lecture.ppt
R.A. 8353 Lecture.pptssusere10022
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornographyOmar Jacalne
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality reportJonan Momo
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
ONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptx
ONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptxONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptx
ONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptxAlanlovelyArazaampon
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and securityjovellconde1
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistanmahrukh rafique
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying griehl
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guidemjtheman
 
Human Trafficking Law and the Safe Spaces Act.pptx
Human Trafficking Law and the Safe Spaces Act.pptxHuman Trafficking Law and the Safe Spaces Act.pptx
Human Trafficking Law and the Safe Spaces Act.pptxCharisseTomaro
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldRownel Cerezo Gagani
 
Republic Act 7610
Republic Act 7610Republic Act 7610
Republic Act 7610M4R1V3L
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 

Was ist angesagt? (20)

R.A. 8353 Lecture.ppt
R.A. 8353 Lecture.pptR.A. 8353 Lecture.ppt
R.A. 8353 Lecture.ppt
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
ONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptx
ONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptxONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptx
ONLINE SEXUAL ABUSE AND EXPLOITATION OF CHILDREN.pptx
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime and laws in Pakistan
Cyber Crime and laws in PakistanCyber Crime and laws in Pakistan
Cyber Crime and laws in Pakistan
 
Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Internet safety guide
Internet safety guideInternet safety guide
Internet safety guide
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Republic act 8353
Republic act 8353Republic act 8353
Republic act 8353
 
Human Trafficking Law and the Safe Spaces Act.pptx
Human Trafficking Law and the Safe Spaces Act.pptxHuman Trafficking Law and the Safe Spaces Act.pptx
Human Trafficking Law and the Safe Spaces Act.pptx
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Republic Act 7610
Republic Act 7610Republic Act 7610
Republic Act 7610
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 

Andere mochten auch

E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the PhilippinesRaiaR
 
Case study about voyeurism
Case study about voyeurismCase study about voyeurism
Case study about voyeurismNeha Saleem
 
Voyeurism
VoyeurismVoyeurism
Voyeurismsdeabr2
 
Republic act no 8049 final report
Republic act no 8049 final reportRepublic act no 8049 final report
Republic act no 8049 final reportOmar Jacalne
 
Voyeurism in music video
Voyeurism in music videoVoyeurism in music video
Voyeurism in music videofjones11
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationTrix Rodriguez
 
E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017Janette Toral
 
Hazing Powerpoint
Hazing PowerpointHazing Powerpoint
Hazing Powerpointkristen
 

Andere mochten auch (12)

RA 8049 Antihazing Law
RA 8049 Antihazing LawRA 8049 Antihazing Law
RA 8049 Antihazing Law
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
Case study about voyeurism
Case study about voyeurismCase study about voyeurism
Case study about voyeurism
 
Voyeurism
VoyeurismVoyeurism
Voyeurism
 
Voyeurism
VoyeurismVoyeurism
Voyeurism
 
Voyeurism
VoyeurismVoyeurism
Voyeurism
 
Republic act no 8049 final report
Republic act no 8049 final reportRepublic act no 8049 final report
Republic act no 8049 final report
 
Voyeurism in music video
Voyeurism in music videoVoyeurism in music video
Voyeurism in music video
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentation
 
Voyeurism
VoyeurismVoyeurism
Voyeurism
 
E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017E-Commerce in the Philippines 2016-2017
E-Commerce in the Philippines 2016-2017
 
Hazing Powerpoint
Hazing PowerpointHazing Powerpoint
Hazing Powerpoint
 

Ähnlich wie Cybercrime

Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT SecutiryGranthamEdu
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearNIST, berhampur
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsGener Luis Morada
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet yadith_
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internetryangregory55
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internetryangregory55
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
 

Ähnlich wie Cybercrime (20)

Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT Secutiry
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
ICT, the Self, and Society.pdf
ICT, the Self, and Society.pdfICT, the Self, and Society.pdf
ICT, the Self, and Society.pdf
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
A Tale of One City
A Tale of One CityA Tale of One City
A Tale of One City
 
Internet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social ControlsInternet Governance, Surveillance, And Social Controls
Internet Governance, Surveillance, And Social Controls
 
Pornography on the Internet
Pornography on the Internet Pornography on the Internet
Pornography on the Internet
 
Porno
PornoPorno
Porno
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 

Kürzlich hochgeladen

一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理Airst S
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理Airst S
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理e9733fc35af6
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理Fir La
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理F La
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 

Kürzlich hochgeladen (20)

一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理一比一原版埃克塞特大学毕业证如何办理
一比一原版埃克塞特大学毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
一比一原版(Waterloo毕业证书)加拿大滑铁卢大学毕业证如何办理
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 

Cybercrime

  • 1. CYBERCRIME Presented by: JOHN FLORENTINO E. ECHON SIMEON S. TAGUDA GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON Bataan Peninsula State University bpsu
  • 2. OVERview • Meaning • Types of cybercrime • The Global Trend • The Trend in PH • The Trend in PH Part 2 • Cybercrime Related Laws • The first recorded cybercrime in the Philippines • Law penalizing computer crimes or cybercrimes • Convicted cybercriminal in the PH bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON
  • 3. Cybercrime  A cybercrime is a crime committed with or through the use of information and communication technologies such as radio, television, cellular phone, computer and network, and other communication device or application. bpsu Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON CYBERCRIME OVERVIEW
  • 4. Types of cybercrime (1)offences against the confidentiality, integrity and availability of computer data and systems; (2)computer-related offences; (3)content-related offences; and (4)offences related to infringements of copyright and related rights. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 5. The global trend of cybercrime According to Norton Cyber Crime Report, 431 million adults worldwide were victims of cybercrimes in 2011. The top cybercrimes in 2011 were (1) computer viruses or malware - 54% overall; (2) online Scams - 11% overall; and (3) phishing - 10% overall. bpsu Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON CYBERCRIME OVERVIEW
  • 6. The trend of cybercrime in the Philippines The Anti-Transnational Crime Division (ATCD) of the Criminal Investigation and Detection Group (CIDG) of the Philippine National Police (PNP) has encountered 2,778 referred cases of computer crimes from government agencies and private individuals nationwide from 2003 to 2012. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 7. The trend of cybercrime in the Philippines In a 2010 report of the security software firm Symantec, 87% of Filipino internet users were identified as victims of crimes and malicious activities committed online. The following activities were: (1) malware (virus and Trojan) invasion; (2) online or phishing scams; (3) sexual predation; and (4) services in social networking site like Facebook and Twitter. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 8. Cybercrime-related laws in the Philippines  (1) RA 10175 – Cybercrime Prevention Act of 2012, which is currently suspended due to a TRO issued by the Supreme Court;  (2) RA 9995 - Anti-Photo and Voyeurism Act of 2009;  (3) RA 9725 - Anti-Child Pornography Act of 2009;  (4) RA 9208 - Anti-Trafficking in Persons Act of 2003;  (5) RA 8792 - E-Commerce Act of 2000;  (6) RA 8484 - Access Device Regulation Act of 1998; and  (7) RA 4200 or Anti-Wiretapping Law. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 9. The first recorded cybercrime in the Philippines In 2000, Onel de Guzman released the “I Love You” virus. The case filed against De Guzman was dismissed at the first stage because there was no law punishing the deed as of that time in May 2000, in the Philippines. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 10. Law penalizing computer crimes or cybercrimes On 14 June 2000, RA 8792 or the Electronic Commerce Act was signed into law. RA 8792 positioned the Philippines as the third country to enact an e-commerce law, next to Singapore and Malaysia. bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW
  • 11. Convicted cybercriminal in the PH The first one was pursued by the PNP-CIDG; a person was convicted in September 2005 for pleading guilty of hacking the government portal “gov.ph” and other government websites. Be Aware! Thank you for listening! bpsu CYBERCRIME Presented by:JOHN FLORENTINO E. ECHON SIMEON S. TUGADI GEOFF DANIEL RODENAS CAYECELYN TAJA LESLIE Q. QUEVAS JENNIFER ADAON OVERVIEW