You are on page 1of 27

TOPIC:

ICT: SECURITY

EMPOWERMENT TECHNOLOGIES
ONLINE SAFETY AND
SECURITY
NETIQUETTE
• the use of good manners in
online communication such as e-
mail, forums, blogs, and social
networking sites.

• one of the channel network who


exercised netiquette is the GMA
News TV on their tagline “Think
before you click.”
QUESTION
WHY DO YOU THINK WE
NEED TO UPGRADE OUR
SECURITY IN TERMS OF
ICT?
PERSONAL INFORMATION
ONE REASON WHY
PEOPLE BECOME A
VICTIM OF
CYBERCRIME IS
GIVING OF PERSONAL
INFORMATION.

THAT LEADS TO A THREAT


CALLED DIGITAL
FOOTPRINTS ( TRACES OF
ALL YOUR INFORMATION)
MOST FREQUENTLY COMMITTED CYBER
CRIMES
Phishing scams
• Phishing is a practice of a cybercriminal or hacker attempting to obtain
sensitive or personal information from a computer user.
Identity Theft scams
• Cybercrooks who may have gained access to your credit card or banking
account information may use that information to make purchases in your
name.
Social Network Fraud
• It is also a crime to create fake profiles or to send fake messages to other
users on social media.
Cyberbullying
• Cyberbullying occurs when people use social media or the internet to
intimidate, harass, threaten, or belittle others.
Cyber Extortion
• Cyber extortion, known by the rather less interesting name of
“threatening to damage a computer,” a crime to threaten to damage
someone’s computer in order to extort money, information, or
anything else of value from a person.
Creating or Possessing Child Pornography
• Creating, possessing, or distributing pornographic images of a minor
child is illegal, but this crime is still unfortunately committed far too
often.
Identity Theft
• Identity thieves often use computers to steal and/or sell social security
numbers, bank account information, or credit card information.

Unauthorized System Access


• Under both federal and state law, it is illegal to knowingly access a computer,
computer network, or computer system without the consent of the owner.

Internet Piracy
• Though this crime is much less common than it used to be in the early 90s,
internet piracy still occurs in certain areas of the internet. Internet piracy
involves the unlawful dissemination of copyrighted material without the
permission of the owner.
THREATS
• IDENTITY THEFT
(PERSONAL INFORMATION)

• PHISHING
(SENSITIVE INFORMATION)
CYBERCRIME LAW
• R.A. 10175

• CYBERCRIME PREVENTION ACT OF 2012

• A LAW IN THE PHILIPPINES APPROVED ON SEPTEMBER 12,


2012 WHICH AIMS TO ADDRESS LEGAL ISSUES
CONCERNING ONLINE INTERACTIONS AND THE INTERNET

• AUTHORED BY REPRESENTATIVE SUSAN YAP-SULIT OF THE


SECOND DISTRICT OF TARLAC AND PROPOSED BY SENATOR
EDGARDO ANGARA.
INTELLECTUAL
PROPERTY RIGHTS

• R.A. 8293
INTELLECTUAL PROPERTY RIGHTS

COPYRIGHT
• RIGHTS GIVEN TO THE CREATOR FOR
THEIR WORK NOT TO PUBLISH,
DUPLICATE, PRINT AND RESELL.

• VIOLATION OF COPYRIGHT IS CALLED


INFRINGEMENT.
INTELLECTUAL PROPERTY RIGHTS

COPYRIGHTS EXEMPTION
• UNDER THE SECTION 107 OF 1976
CONSTITUTION (COPYRIGHT ACT)
• PERMITS CERTAIN VIDEO, IMAGE,
SONGS INTO A PURPOSEFUL EVENT OR
ACTIVITY IT MUST BE EDUCATIONAL
PURPOSES ONLY.
INTELLECTUAL PROPERTY RIGHTS

PATENT
• INVENTION

• CANNOT DO THE SAME


INTELLECTUAL PROPERTY RIGHTS

TRADEMARK
• COPYING OF A KNOWN
BRAND LOGO
INTELLECTUAL PROPERTY RIGHTS

TRADE SECRET

• CONFIDENTIALITY OF
SENSITIVE INFORMATION
CYBERCRIME LAW
• 11 YEARS IN THE MAKING

• SECTION 19 ( YOU WILL BE ARRESTED WITHOUT


WARRANT OF ARREST, SUBPOENA OR COURT ORDER)
STRENGTHEN BY PRIMA FACIE
PRIMA FACIE (LEGAL TERM) EVIDENCE THAT POINTING A PERSON THAT HE/SHE DID THE CRIME.

• LIKE, SHARE AND REACT ON A POST


• SCREENSHOTS
DEFAMATION
• UNPRIVILEDGED FALSE STATEMENT OF FACTS
WHICH TENDS TO HARM THE REPUTATION OF
A PERSON OR COMPANY.

2 TYPES:

1. LIBEL- WRITTEN
2. SLANDER- VERBAL
FAKE NEWS
• CONSIDERED AS CYBER LIBEL
• UNDER THE ARTICLE 154 OF REVISE PENAL
CODE (UNLAWFUL MEANS OF PUBLICATION
AND UTTEREDNESS)
2 MAJOR CYBERCRIME
CONCERN
1. CYBERSEX
2. CHILD PORNOGRAPHY
PUNISHMENT: LONG TIME IMPRISONMENT
(40 YEARS-ABOVE)
REASONS
1. NO KNOWLEDGE CYBERCRIME

2. DIGITAL LITERATE

3. POOR
BEST WAY OF ICT AND
SECURITY

“CREATE NOT
RECREATE”
VISIT OUR GOOGLE CLASSROOM FOR ASSIGNMENT
AND UPDATES

You might also like