0% found this document useful (0 votes)
244 views32 pages

STS Symp.

This document discusses cybercrime in three paragraphs. It begins by defining humanity and human nature, and how technology has become integrated into daily life. The second paragraph outlines the learning objectives of the lesson, which are to understand cybercrime law in the Philippines, the importance of technology in upholding human dignity, punishable acts under RA 10175, related penalties, and common cybercrimes. The third paragraph provides a definition of cybercrime and an overview of the Cybercrime Prevention Act of 2012.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
244 views32 pages

STS Symp.

This document discusses cybercrime in three paragraphs. It begins by defining humanity and human nature, and how technology has become integrated into daily life. The second paragraph outlines the learning objectives of the lesson, which are to understand cybercrime law in the Philippines, the importance of technology in upholding human dignity, punishable acts under RA 10175, related penalties, and common cybercrimes. The third paragraph provides a definition of cybercrime and an overview of the Cybercrime Prevention Act of 2012.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

.

.
OVERVIEW
• Humanity is defined as the quality or condition of
being human, human nature. Human nature is the
concept that there is a set of inherent distinguishing
characteristics, including ways of thinking, feeling
and acting, which all humans tend to have.    
OVERVIEW
• The advances in information and communication technologies
are fully integrated into our daily lives and have transformed
how we do business, how we manage our finances, how we
shop, how we communicate with each other and how we live our
daily lives. As technology advances, so do the methods adopted
by criminals who seek to exploit gaps in technology security for
their own gain.
LEARNING OUTCOMES/OBJECTIVES

At the end of the lesson presentation students would have:

• Understanding the cybercrime law in the Philippines.


• Verbalized importance of technology in uplifting the value of human
dignity.
• The Cybercrime Prevention Act of 2012.
• What are the punishable acts according to RA 101751?
• What the penalties to punishable acts are as enshrined in RA 101751?
• Common Cybercrimes in the Philippines
What is
CYBERCRIME?
What is CYBERCRIME?
• A criminal activity that either
targets or uses a computer, a
computer network or a networked
device.
• Occasionally aims to damage
computers or networks for
reasons other than profit.
THE CYBERCRIME PREVENTION
ACT OF 2012
sanctions content-related offenses
performed using a computer system, such as
cybersex, child pornography,
libel, unsolicited commercial
communications or content that advertises
or sells products or services is punished.
REPUBLIC ACT NO. 10175
• AN ACT DEFINING CYBERCRIME, PROVIDING
FOR THE PREVENTION, INVESTIGATION,
SUPPRESSION AND THE IMPOSITION OF
PENALTIES THEREFOR AND FOR OTHER
PURPOSES
What are some PUNISHABLE acts
under RA 10175?
• Offenses against the confidentiality, integrity and
availability of computer data and systems(Section
4a):

(1) Illegal Access


(2) Illegal Interception
(3) Data Interference
(4) System Interference
(5) Misuse of Devices
Illegal Access
• Unauthorized access is when someone gains
access to a website, program, server, service,
or other system using someone else's account
or other methods.
• For example, if someone kept guessing a
password or username for an account that
was not theirs until they gained access, it is
considered unauthorized access.
Illegal Interception
• A type of data theft, referring to information that is
captured during transmission.
• Illegal Interception. – The interception made by technical
means without right of any non-public transmission of
computer data to, from, or within a computer system
including electromagnetic emissions from a computer
system carrying such computer data.
• Example: Man-in-the-middle-attack
Data Interference
• A person commits the criminal offense of interference
with a computer system when he or she:

(a) without right;


(b) seriously hinders the functioning of a computer system;
(c) by inputting, transmitting, damaging, deleting,
deteriorating, altering, or suppressing computer data.
What are the PENALTIES to
punishable acts under RA 10175?
• Any person found guilty of any of the punishable acts
enumerated in Sections 4(a) of this Act shall be punished
with imprisonment of prision mayor or a fine of at least Two
hundred thousand pesos (PhP200,000.00) up to a maximum
amount commensurate to the damage incurred or both.
Other PUNISHABLE acts under
RA 10175?
• Content-related offenses(Section 4c):

(1) Cybersex
(2) Child Pornography
(3) Unsolicited Commercial
Communications
(4) Libel
COMMON
CYBERCRIME
S
IN THE PHILIPPINES
Phishing
• criminals send fraudulent
emails pretending to be from
legitimate businesses, in an
attempt to collect sensitive,
personal information. 
Harassment
• Use electronic communication,
such as email, social media, or
websites to stalk and harass
people. 
• Sentences for cyberstalking can
include jail time and hefty fines.
Ransomware
• Cyber criminals can install
malicious software on your
system that will essentially hold
your important information
hostage until you meet their
demands. 
Child Pornography
• Perpetrators will use the Internet
to gain access to sexually
explicit images of children, and
sometimes even arrange for a
face-to-face meeting.
Intellectual Property
Theft
• commonly known as piracy, the
Internet abounds with books,
music, movies, and more that
have been illegally obtained and
made available for free
download. 
Credit Card Fraud
• begins with spyware that runs in
the background, collecting your
data and sending it back to the
criminal, who then uses your
card to make fraudulent
purchases.
MEANS TO

PREVENT
BEING A VICTIM OF
CYBERCRIME
KEEP SOFTWARE AND
OPERATING SYSTEM
UPDATED
USE ANTI-VIRUS
USE STRONG PASSWORDS
NEVER OPEN ATTACHMENTS
IN SPAM EMAILS
DO NOT CLICK LINKS ON
UNTRUSTED WEBSITES
DO NOT GIVE OUT PERSONAL
INFORMATION UNLESS
SECURE
KEEP AN EYE ON YOUR BANK
STATEMENTS
.
THANK YOU .

You might also like