Professional Documents
Culture Documents
3. Makes banking transactions done through ATM switching networks absolute once consummated.
Section 16. Formation and Validity of Electronic Contracts
(2) Electronic transactions made through networking among banks, or linkages thereof with
other entities or networks, and vice versa, shall be deemed consummated upon the actual dispensing of
cash or the debit of one account and the corresponding credit to another, whether such transaction is
initiated by the depositor or by an authorized collecting party: Provided, that the obligation of one bank,
entity, or person similarly situated to another arising therefrom shall be considered absolute and shall not
be subjected to the process of preference of credits.
4. Parties are given the right to choose the type and level of security methods that suit their needs.
Section 24. Choice of Security Methods.
5. Provides the mandate for the electronic implementation of transport documents to facilitate carriage of
goods. This includes documents such as, but not limited to, multi-modal, airport, road, rail, inland waterway,
courier, post receipts, transport documents issued by freight forwarders, marine/ocean bill of lading,
nonnegotiable seaway bill, charter party bill of lading.
Section 25. Actions Related to Contracts of Carriage of Goods.
Section 26. Transport Documents.
Salient Features of Republic Act 8792:
6. Mandates the government to have the capability to do e-commerce within 2 years or before June 19,
2002.
Section 27. Government Use of Electronic Data Messages, Electronic Documents and Electronic
Signatures.
7. Mandates RPWeb to be implemented. RPWeb is a strategy that intends to connect all government offices
to the Internet and provide universal access to the general public. The Department of Transportation and
Communications, National Telecommunications Commission, and National Computer Center will come up
with policies and rules that shall lead to substantial reduction of costs of telecommunication and Internet
facilities to ensure the implementation of RPWeb.
Section 28. RPWEB To Promote the Use Of Electronic Documents and Electronic Data
Messages In Government and to the General Public.
8. Made cable, broadcast, and wireless physical infrastructure within the activity of telecommunications.
Section 28. RPWEB To Promote the Use Of Electronic Documents and Electronic Data
Messages In Government and to the General Public.
9. Empowers the Department of Trade and Industry to supervise the development of ecommerce in the
country. It can also come up with policies and regulations, when needed, to facilitate the growth of ecommerce.
Section 29. Authority of the Department of Trade and Industry and Participating Entities.
11. Authorities and parties with the legal right can only gain access to electronic documents, electronic data
messages, and electronic signatures. For confidentiality purposes, it shall not share or convey to any other
person.
Section 31. Lawful Access.
Section 32. Obligation of Confidentiality.
12. Hacking or cracking, refers to unauthorized access including the introduction of computer viruses, is
punishable by a fine from 100 thousand to maximum commensurating to the damage. With imprisonment from
6 months to 3 years.
Section 33. Penalties.
13. Piracy through the use of telecommunication networks, such as the Internet, that infringes intellectual
property rights is punishable. The penalties are the same as hacking.
Section 33. Penalties.
14. All existing laws such as the Consumer Act of the Philippines also applies to e-commerce transactions.
Section 33. Penalties.
Crime Penalty
Section 4 (a) - Offenses against the confidentiality,
integrity and availability of computer data and systems:
Illegal Access. - The access to the whole or any part of A). Imprisonment - Prision Mayor
a computer system without right. B). Fine – at least 200,000 pesos up to a
maximum amount commensurate to the damage
incurred.
C). Both Imprisonment and Fine
Illegal Interception. - The interception made by A). Imprisonment - Prision Mayor
technical means without right of any non-public B). Fine – at least 200,000 pesos up to a
transmission of computer data to, from, or within a maximum amount commensurate to the damage
computer system including electromagnetic emissions incurred.
from a computer system carrying such computer data. C). Both Imprisonment and Fine
System Interference. - The intentional alteration or A). Imprisonment - Prision Mayor
reckless hindering or interference with the functioning
of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering
or suppressing computer data or program, electronic
document, or electronic data message, without right or
authority, including the introduction or transmission of
viruses.
Data Interference. - The intentional or reckless A). Imprisonment - Prision Mayor
alteration, damaging, deletion or deterioration of B). Fine – at least 200,000 pesos up to a
computer data, electronic document, or electronic data maximum amount commensurate to the damage
message, without right, including the introduction or incurred.
transmission of viruses. C). Both Imprisonment and Fine
Misuse of Devices. – A). Imprisonment - Prision Mayor
(i) The use, production, sale, procurement, B). Fine – at least 500,000 pesos up to a
importation, distribution, or otherwise maximum amount commensurate to the damage
making available, without right, of: incurred.
(aa) A device, including a computer program, C). Both Imprisonment and Fine
designed or adapted primarily for the purpose of
committing any of the offenses under this Act; or
6
(bb) A computer password, access code, or similar
data by which the whole or any part of a
computer system is capable of being accessed
with intent that it be used for the purpose of
committing any of the offenses under this Act.
(ii) The possession of an item referred to in paragraphs
5(i)(aa) or (bb) above with intent to use said devices for
the purpose of committing any of the offenses under
this section.
If Crimes under Section 4(a) are committed against Critical Infrastructure:
a) Imprisonment – Reclusion Temporal
b) Fine – at least P 500,000.00 up to amount of damage
c) Both fine and Imprisonment
Crime Penalty
Section 4 (b) –Computer-related Offenses:
Computer-related Forgery. – A). Imprisonment - Prision Mayor
(i) The input, alteration, or deletion of any B). Fine – at least 200,000 pesos up to a
computer data without right resulting in maximum amount commensurate to the damage
inauthentic data with the intent that it be incurred.
considered or acted upon for legal C). Both Imprisonment and Fine
purposes as if it were authentic. regardless
whether or not the data is directly readable
and intelligible; or
(ii) The act of knowingly using computer
data; which is the product of computer-
related forgery as defined herein. for the
purpose of perpetuating a fraudulent or
dishonest design.
Computer· related Fraud. - The unauthorized input, A). Imprisonment - Prision Mayor
alteration, or deletion of computer data or program or B). Fine – at least 200,000 pesos up to a
interference in the functioning of a computer system maximum amount commensurate to the damage
causing damage thereby with fraudulent intent: Provided, incurred.
that if no damage has yet been caused, the penalty C). Both Imprisonment and Fine
imposable shall be one (1) degree lower.
Computer-related Identity Theft. - The intentional A). Imprisonment - Prision Mayor
acquisition, use, misuse, transfer, possession) alteration B). Fine – at least 200,000 pesos up to a
or deletion of identifying information belonging to maximum amount commensurate to the damage
another, whether natural or juridical, without right: incurred.
Provided, That if no damage has yet been caused, the C). Both Imprisonment and Fine
penalty imposable shall be one (1) degree lower.
Crime Penalty
Section 4 (c) –Content-related Offenses:
Cybersex. - The wilful engagement, maintenance, A). Imprisonment - Prision Mayor
control, or operation, directly or indirectly, of any B). Fine – at least 200,000 pesos up but not
lascivious exhibition of sexual organs or sexual activity, exceeding to one million pesos.
with the aid of a computer system, for favor or C). Both Imprisonment and Fine
consideration.
Child Pornography. - The unlawful or prohibited acts Any person found guilty shall be punished with
defined and punishable by Republic Act No. 9775 or the the penalties as enumerated in REPUBLIC Act
Anti-Child Pornography Act of 2009, committed through No. 9775 : Provided, That the penalty to be
a computer system: Provided, That the penalty to be imposed shall be one (1) degree higher than that
imposed. shall be (1) one degree higher than that provided for in Republic Act No. 9775, if
provided for in Republic Act No. 9775. committed through a computer system.
Unsolicited Commercial Communications. - The A). Imprisonment - Arrest Mayor
transmission of commercial electronic communication B). Fine – at least 50,000 pesos up but not
with the use of computer system which seek to advertise, exceeding 200,000 pesos.
sell, or offer for sale products and services are prohibited C). Both Imprisonment and Fine
unless:
(i) There is prior affirmative consent from the
recipient; or
(ii) The primary intent of the communication is
for service and/or administrative
announcements from the sender to its
existing users, subscribers or customers; or
(iii) The following conditions are present:
(aa) The commercial electronic communication
contains a simple, valid, and reliable way for the
recipient to reject receipt of further commercial
electronic messages (opt-out) from the same source;
(bb) The commercial electronic communication does
not purposely disguise the source of the electronic
message; and
(cc) The commercial electronic communication does
not purposely include misleading information in any part
of the message in order to induce the recipients to read
the message.
Libel- The unlawful or prohibited acts of libel as defined One degree higher than the penalty provided for
in Article 355 of the Revised Penal Code, as amended, the Libel under the Revised Penal Code
committed through a computer system or any other
similar means which may be devised in the future.
Crime Penalty
Section 5 - Other Offenses:
Aiding or Abetting in the Commission of Cybercrime. A). Imprisonment - One degree lower than that
- Any person who wilfully abets or aids in the of the prescribed penalty
commission of any of the offenses enumerated in this B). Fine – at least 100,000 pesos up but not
Act shall be held liable. exceeding 500,000 pesos.
C). Both Imprisonment and Fine
Attempt in the Commission of Cybercrime. - Any A). Imprisonment - One degree lower than that
person who wilfully attempts to commit any of the of the prescribed penalty
offenses enumerated in this Act shall be held liable. B). Fine – at least 100,000 pesos up but not
exceeding 500,000 pesos.
C). Both Imprisonment and Fine
Scope:
SEC. 4. Scope. – This Act applies to the processing of all types of personal information and to any natural
and juridical person involved in personal information processing including those personal information
controllers and processors who, although not found or established in the Philippines, use equipment that are
located in the Philippines, or those who maintain an office, branch or agency in the Philippines subject to
the immediately succeeding paragraph:
(b) Information about an individual who is or was performing service under contract for a government
institution that relates to the services performed, including the terms of the contract, and the name of the
individual given in the course of the performance of those services;
(c) Information relating to any discretionary benefit of a financial nature such as the granting of a license
or permit given by the government to an individual, including the name of the individual and the exact
nature of the benefit;
(d) Personal information processed for journalistic, artistic, literary or research purposes;
(e) Information necessary in order to carry out the functions of public authority which includes the
processing of personal data for the performance by the independent, central monetary authority and law
enforcement and regulatory agencies of their constitutionally and statutorily mandated functions. Nothing in
this Act shall be construed as to have amended or repealed Republic Act No. 1405, otherwise known as the
Secrecy of Bank Deposits Act; Republic Act No. 6426, otherwise known as the Foreign Currency Deposit
Act; and Republic Act No. 9510, otherwise known as the Credit Information System Act (CISA);
(f) Information necessary for banks and other financial institutions under the jurisdiction of the
independent, central monetary authority or Bangko Sentral ng Pilipinas to comply with Republic Act No.
9510, and Republic Act No. 9160, as amended, otherwise known as the Anti-Money Laundering Act and
other applicable laws; and
(g) Personal information originally collected from residents of foreign jurisdictions in accordance with
the laws of those foreign jurisdictions, including any applicable data privacy laws, which is being processed
in the Philippines.
» Created the National Privacy Commission to monitor the implementation of this law.
SEC. 7 - Functions of the National Privacy Commission. – To administer and implement the provisions of
this Act, and to monitor and ensure compliance of the country with international standards set for data
protection, there is hereby created an independent body to be known as the National Privacy Commission.
» Gave parameters on when and on what premise can data processing of personal information be
allowed. Its basic premise is when a data subject has given direct consent.
SEC. 12 - Criteria for Lawful Processing of Personal Information.
SEC. 13 -Sensitive Personal Information and Privileged Information.
» Companies who subcontract processing of personal information to 3rd party shall have full
liability and can’t pass the accountability of such responsibility.
SEC. 14 -Subcontract of Personal Information. – A personal information controller may subcontract the
processing of personal information: Provided, That the personal information controller shall be responsible
for ensuring that proper safeguards are in place to ensure the confidentiality of the personal information
processed, prevent its use for unauthorized purposes, and generally, comply with the requirements of this
Act and other laws for processing of personal information.
» Data subject has the right to know if their personal information is being processed. The person
can demand information such as the source of info, how their personal information is being used,
and copy of their information. One has the right to request removal and destruction of one’s
personal data unless there is a legal obligation that required for it to be kept or processed.
SEC. 16 – Rights of the Data Subject. – The data subject is entitled to:
(a) Be informed whether personal information pertaining to him or her shall be, are being or have been
processed;
(b) Be furnished the information indicated hereunder before the entry of his or her personal information
into the processing system of the personal information controller, or at the next practical opportunity:
(1) Description of the personal information to be entered into the system;
(2) Purposes for which they are being or are to be processed;
SEC. 18 – Right to Data Portability. – The data subject shall have the right, where personal information is
processed by electronic means and in a structured and commonly used format, to obtain from the personal
information controller a copy of data undergoing processing in an electronic or structured format, which is
commonly used and allows for further use by the data subject. The Commission may specify the electronic
format referred to above, as well as the technical standards, modalities and procedures for their transfer.
» If the data subject has already passed away or became incapacitated (for one reason or another),
their legal assignee or lawful heirs may invoke their data privacy rights.
SEC. 17 – Transmissibility of Rights of the Data Subject. – The lawful heirs and assigns of the data subject
may invoke the rights of the data subject for, which he or she is an heir or assignee at any time after the
death of the data subject or when the data subject is incapacitated or incapable of exercising the rights as
enumerated in the immediately preceding section.
» Personal information controllers must ensure security measures are in place to protect the
personal information they process and be compliant with the requirements of this law.
SEC. 20 –Security of Personal Information. –– (a) The personal information controller must implement
reasonable and appropriate organizational, physical and technical measures intended for the protection of
personal information against any accidental or unlawful destruction, alteration and disclosure, as well as
against any other unlawful processing.
SEC. 21 –Principle of Accountability. – Each personal information controller is responsible for personal
information under its control or custody, including information that have been transferred to a third party for
processing, whether domestically or internationally, subject to cross-border arrangement and cooperation.
» In case a personal information controller systems or data got compromised, they must notify the
affected data subjects and the National Privacy Commission.
SEC. 20 (f) The personal information controller shall promptly notify the Commission and affected data
subjects when sensitive personal information or other information that may, under the circumstances, be
used to enable identity fraud are reasonably believed to have been acquired by an unauthorized
person………The notification shall at least describe the nature of the breach, the sensitive personal
information possibly involved, and the measures taken by the entity to address the breach.
» Heads of government agencies must ensure their system compliance to this law (including security
requirements). Personnel can only access sensitive personal information off-site, limited to 1000
records, in government systems with proper authority and in a secured manner.
SEC. 22 - Responsibility of Heads of Agencies. – All sensitive personal information maintained by the
government, its agencies and instrumentalities shall be secured, as far as practicable, with the use of the
most appropriate standard recognized by the information and communications technology industry, and as
recommended by the Commission. The head of each government agency or instrumentality shall be
responsible for complying with the security requirements mentioned herein while the Commission shall
monitor the compliance and may recommend the necessary action in order to satisfy the minimum
standards.
» Government contractors who have existing or future deals with the government that involves
accessing of 1000 or more records of individuals should register their personal information
processing system with the National Privacy Commission.
» If at least 100 persons are harmed, the maximum penalty shall apply SECTION 35.
SEC. 35 - Large-Scale. – The maximum penalty in the scale of penalties respectively provided for the
preceding offenses shall be imposed when the personal information of at least one hundred (100) persons is
harmed, affected or involved as the result of the above-mentioned actions.
RA 10844 (DICT)
REPUBLIC ACT NO. 10844
AN ACT CREATING THE DEPARTMENT OF INFORMATION AND COMMUNICATIONS
TECHNOLOGY, DEFINING ITS POWERS AND FUNCTIONS APPROPRIATING FUNDS
THEREFOR, AND FOR OTHER PURPOSES
The “DICT Act” was signed into law on 23 May 2016.
Salient Features:
» The DICT Act created the Department of Information and Communications Technology
(“DICT”) which is mandated to be the primary policy, planning, coordinating, implementing and
administrative agency of the Executive Branch of the Philippine Government, and is tasked to
plan, develop, and promote the national Information and Communications Technology (“ICT”)
development agenda.
SEC. 4 - Creation of the Department of Information and Communications Technology (DICT). – There is
hereby created the Department of Information and Communications Technology, hereinafter referred to as
the Department.
SEC. 5 - Mandate. – The Department shall be the primary policy, planning, coordinating, implementing,
and administrative entity of the Executive Branch of the government that will plan, develop, and promote
the national ICT development agenda
» The new law also renames the existing Department of Transportation and Communications
(DOCT) to Department of Transportation, and abolishes all of its agencies and units dealing with
communications such as the National Computer Center (NCC), National Telecommunications
Training Institute (NTTI), Information and Communications Technology Office (ICTO),
Telecommunications Office (TELOF), and the National Computer Institute (NCI). The powers,
functions, appropriations, personnel, and property of these agencies are transferred to the DICT.
Existing agencies pertaining to ICT are also attached to the DICT for policy and program
coordination, such as the National Telecommunications Commission (NTC), National Privacy
Commission (NPC), and Cybercrime Investigation and Coordination Center (CICC).
SEC. 15 - Transfer of Agencies and Personnel.
» The DICT shall be composed of a Secretary, three (3) undersecretaries, and four (4) assistant
rsecretaries, all of whom shall be appointed by the President. The law requires that they shall
possess at least seven (7) years of experience in any of the following fields: information and
communications technology, information security management, e-commerce, human capital
development in the ICT sector, cybersecurity, data privacy, or information technology service
management.
SEC. 7.- Composition. – The Department shall be headed by a Secretary. The Department proper shall be
composed of the Office of the Secretary, the Offices of the Undersecretaries and the assistant secretaries.
SEC. 8 - Secretary of Information and Communications Technology. – The Secretary shall be appointed by
the President, subject to confirmation by the Commission on Appointments.
SEC. 9 - Undersecretaries. – The Secretary shall be assisted by three (3) undersecretaries, who shall be
appointed by the President upon the recommendation of the Secretary: Provided, That two (2) of the
undersecretaries shall be career officers.
SEC.10- Assistant Secretaries. – The Secretary shall be assisted by four (4) assistant secretaries who shall
be appointed by the President upon the recommendation of the Secretary: Provided, That two (2) of the
assistant secretaries shall be career officers: Provided, further, That at least one (1) of the assistant
secretaries shall be a licensed Professional Electronics Engineer (PECE), or any suitably qualified person in
accordance with Civil Service Commission (CSC) rules and regulations.
SEC.11- Qualifications. – No person shall be appointed Secretary, Undersecretary, or Assistant Secretary
of the Department unless he or she is a citizen and resident of the Philippines, of good moral character, of
proven integrity and with at least seven (7) years of competence and expertise in any of the following:
information and communications technology, information technology service management, information
security management, cybersecurity, data privacy. e-Commerce, or human capital development in the ICT
sector.
GOVERNMENT AGENCIES
The agency of the government in charge of the implementation of the Intellectual Property Code is the
Intellectual Property Office which replaced the Bureau of Patents, Trademarks and Technology Transfer. It is
divided into six [6] Bureaus, namely:
Bureau of Patents
Bureau of Trademarks
Bureau of Legal Affairs
Documentation, Information and Technology Transfer Bureau
Management Information System and EDP Bureau
Administrative, Financial and Personnel Services Bureau.
PATENTABLE INVENTIONS
SECTION 21. Patentable Inventions. — Any technical solution of a problem in any field of human
activity which is new, involves an inventive step and is industrially applicable shall be patentable. It may be,
or may relate to, a product, or process, or an improvement of any of the foregoing.
NON-PATENTABLE INVENTIONS
SECTION 22. Non-Patentable Inventions. — The following shall be excluded from patent protection:
22.1. Discoveries, scientific theories and mathematical methods;
22.2. Schemes, rules and methods of performing mental acts, playing games or doing business,
and programs for computers;
22.3. Methods for treatment of the human or animal body by surgery or therapy and diagnostic
methods practiced on the human or animal body. This provision shall not apply to products and composition
for use in any of these methods;
NON-PATENTABLE INVENTIONS
SECTION 22. Non-Patentable Inventions. — The following shall be excluded from patent protection:
22.4. Plant varieties or animal breeds or essentially biological process for the production of
plants or animals. This provision shall not apply to microorganisms and non-biological and microbiological
processes. Provisions under this subsection shall not preclude Congress to consider the enactment of a law
providing sui generis protection of plant varieties and animal breeds and a system of community intellectual
rights protection:
22.5. Aesthetic creations; and
22.6. Anything which is contrary to public order or morality.
TRADEMARK
TRADEMARKS "Mark" means any visible sign capable of distinguishing the goods (trademark) or
services (service mark) of an enterprise and shall include a stamped or marked container of goods.
A trademark is a tool used that differentiates goods and services from each other. It is a very important
marketing tool that makes the public identify goods and services.
A trademark can be one word, a group of words, sign, symbol, logo, or a combination of any of these.
Generally, a trademark refers to both trademark and service mark, although a service mark is used to
identify those marks used for services only.
TRADEMARK PROTECTION
A trademark can be protected through registration.
Registration gives the trademark owner the exclusive right to use the mark and to prevent others from using
the same or similar marks on identical or related goods and services
COPYRIGHT
Copyright is the legal protection extended to the owner of the rights in an original work.
“Original work” refers to every production in the literary, scientific and artistic domain. Among the literary
and artistic works enumerated in the IP Code includes books and other writings, musical works, films, paintings
and other works, and computer programs.
COPYRIGHT
WORKS COVERED BY COPYRIGHT PROTECTION:
Books, pamphlets, articles and other writings
Periodicals and newspapers
Lectures, sermons, addresses, dissertations prepared for oral delivery, whether or not reduced in writing
or other material form
Letters
Dramatic or dramatico-musical compositions; choreographic works or entertainment in dumb shows
Musical compositions, with or without words
Works of drawing, painting, architecture, sculpture, engraving, lithography or other work of art; models
or designs for works of art
Original ornamental designs or models for articles of manufacture, whether or not registrable as an
industrial design, and other works of applied art
Illustrations, maps, plans, sketches, charts and three-dimensional works relative to geography,
topography, architecture or science
Drawings or plastic works of a scientific or technical character
Photographic works including works produced by a process analogous to photography; lantern slides
Audiovisual works and cinematographic works and works produced by a process analogous to
cinematography or any process for making audio-visual recordings
Pictorial illustrations and advertisements
Computer programs
Other literary, scholarly, scientific and artistic works.
COPYRIGHT OWNERSHIP
SECTION 178. Rules on Copyright Ownership. — Copyright ownership shall be governed by the
following rules:
178.1. Subject to the provisions of this section, in the case of original literary and artistic works,
copyright shall belong to the author of the work;
178.2. In the case of works of joint authorship, the co-authors shall be the original owners of the
copyright and in the absence of agreement, their rights shall be governed by the rules on co-ownership.
If, however, a work of joint authorship consists of parts that can be used separately and the author of
each part can be identified, the author of each part shall be the original owner of the copyright in the part
that he has created;
178.3. In the case of work created by an author during and in the course of his employment, the
copyright shall belong to:
a. The employee, if the creation of the object of copyright is not a part of his regular
duties even if the employee uses the time, facilities and materials of the employer.
b. The employer, if the work is the result of the performance of his regularly-assigned
duties, unless there is an agreement, express or implied, to the contrary.
178.4. In the case of a work commissioned by a person other than an employer of the author and
who pays for it and the work is made in pursuance of the commission, the person who so commissioned
the work shall have ownership of the work, but the copyright thereto shall remain with the creator,
unless there is a written stipulation to the contrary;
178.5. In the case of audiovisual work, the copyright shall belong to the producer, the author of
the scenario, the composer of the music, the film director, and the author of the work so adapted.
However, subject to contrary or other stipulations among the creators, the producer shall exercise the
copyright to an extent required for the exhibition of the work in any manner, except for the right to
collect performing license fees for the performance of musical compositions, with or without words,
which are incorporated into the work; and
178.6. In respect of letters, the copyright shall belong to the writer subject to the provisions of
Article 723 of the Civil Code. (Sec. 6, P.D. No. 49a)
COPYRIGHT INFRIGEMENT
Copyright infringement consists in infringing any right secured or protected under the Code. It may also
consist in aiding or abetting such infringement.
The law also provides for the liability of a person who at the time when copyright subsists in a work has
in his possession an article which he knows, or ought to know, to be an infringing copy of the work for the
purpose of:
Selling or letting for hire, or by way of trade offering or exposing for sale or hire, the article
Distributing the article for the purpose of trade, or for any other purpose to an extent that will
prejudice the rights of the copyright owner in the work
Trade exhibit of the article in public.
Cyberpsychology is the branch of psychology that examines how we interact with others using technology,
how our behaviour is influenced by technology, how technology can be developed to best suit our needs, and
how our psychological states can be affected by technologies.
The most commonly studied technology in cyberpsychology research is the Internet, although the area
considers human interactions with many devices, including mobile computing, games consoles, virtual
reality and artificial intelligence.
Identity is the development of one’s self-concept, including one’s thoughts and feelings about oneself.
Three domains of Self by Higgins (1987):
1. actual self’ or ‘now self’ – Refers to the characteristics an individual actually possesses.
2. ‘ideal self’ – Refers to the characteristics a person would like to possess.
3. ‘ought self’ – Refers to the characteristics a person feels that they should possess.
Online anonymity gives people the chance to present any of these three selves and hence permits individuals to
better present aspects of their true selves than they would feel capable of doing in a face to face (F2F)
interaction.
‘True self’ has been used to refer to the ‘hidden aspects of what we need or wish to be, and ‘hidden’ has meant
‘anti-normative’ or ‘deviant’ in this context.
The person’s ‘true self’ is often inhibited in the real world because of the established norms in the
society that tells us how to act and behave.
In a fully anonymous online world where responsibility is absent, the masks people wear offline are
often discarded and their ‘true self’ allowed to emerge.
Online Disinhibition Effect (ODE) is a phenomenon where in an absence of face to face communication,
people tend to behave differently in the cyber world.
Some do things they don’t normally do and say things they don’t normally say. People are more
confident and feel uninhibited.
Categories of ODE:
1. The benign disinhibition demonstrates an attempt to comprehend and investigate oneself, to work
through issues and find better approaches.
People with benign inhibition tend to uncover secret feelings, wishes, or fear. Sometimes, they also
give unusual acts of goodness and generosity.
2. The toxic disinhibition demonstrates actions with disreputable needs and wishes without any personal
growth at all.
People tend to spill discourteous language and brutal reactions, outrage, disdain, or even threats. Also,
they are likely to explore things in the dark web, pornography sites, brutality sites, and other places they could
never visit in reality.