Professional Documents
Culture Documents
OUTCOME-BASED EDUCATION
QUARTER 2
WEEK 8
Development Team
Writers: Florendo D. Damaso, Jr.
Editor: Eliza G. Salvador
Reviewers: Michael G. Calipjo
Illustrator: Florendo D. Damaso Jr.
Layout Artist: Jhone Terence C. Marucut
Management Team:
Vilma D. Eda Arnel S. Bandiola
Lourdes B. Arucan Juanito V. Labao
Marju R. Miguel
Important Reminder
DO NOT WRITE ANYTHING IN THIS MODULE. This module is government
property and other learners will use it again. You may use any clean sheet of paper
that is available in your home for your answers in the given activities. The rubrics and
answer key for the activities are found in the latter page of this module for you to self-
check your answers. This module will be retrieved by the end of the week.
Lesson Motivation
In various aspects, ICT and technology as a whole brought us comfort and
consequences to life. We, as Filipinos, have been known to be avid users of
technology. Some even have made a name as an internet sensation. However, aside
from those successes are the downfalls of users.
Be honest with yourself and share in class the “bad things” or any unwarranted
acts (like piracy) you have done using ICT. Ask yourself why you did them and why
your classmates did them.
What Is It
Lesson Discussion
Walking on a sidewalk does not pose danger as opposed to walking in the
middle of the street. Remove the sidewalk and you are left to dodge approaching
vehicles. That is probably how much of us deal with the internet. In the internet, there
are no sidewalks; just a huge superhighway where information freely flows through. If
in the real world we have the police or the military to monitor us, the Internet is
unmonitored making it one of the most abused technology we use.
Cybercrimes
Cybercrimes are illegal acts done through the use of the Internet. In 2012,
Stephen Nale (Complex.com) posted a list of ten most common internet cybercrimes
as follows:
4. Sports Betting – The act of wagering on any sports event over the Internet. In
some countries, gambling (including sports betting) is illegal even if you are
doing it over the Internet.
7. Child Pornography – the act of using the internet to show child pornography.
This act is highly punishable by law.
9. Drug Trafficking – the act of selling illegal substances using the Internet.
10. Criminal Copyright Infringement – the act of piracy mainly for financial gain.
In late 2014, the number one pirate website, ThePirateBay, was raided for the
second time due to years of pirating movies, music, games, books, and other
software. These kinds of websites earn money through advertising
The Internet is the present and the future of your generation and you define
what impact it can do to shape our society, whether it is negative or positive. The future
is in your hands.
Combatting Cybercrimes
There are several ways the authorities can help solve or prevent cybercrimes.
Here are some of them:
1. Network Security. Before a hacker can get through the unauthorized files he
or she is targeting, the hacker has to get through several security measures
like firewalls, secure connections, passwords, anti-malwares, and data
What’s More
2. Illegal interception
Unauthorized interception of any non-public
transmission of computer data to, from, or – same as above
within a computer system.
4. System Interference
Unauthorized hindering or interference with the
functioning of a computer or computer network
by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer
data or program, electronic document, or
– same as above
electronic data messages, and including the
introduction or transmission of viruses.
Authorized action can also be covered by this
provision if the action of the person went
beyond agreed scope resulting to damages
stated in this provision.
5. Misuse of devices
The unauthorized use, possession, production,
sale, procurement, importation, distribution, or
otherwise making available, of devices,
computer program designed or adapted for the
purpose of committing any of the offenses
stated in Republic Act 10175.Unauthorized use
of computer password, access code, or similar
data by which the whole or any part of a – same as above except fine should be
computer system is capable of being accessed no more than Five hundred thousand
with intent that it be used for the purpose of pesos (P500,000).
committing any of the offenses under Republic
Act 10175.
7. Computer-related Forgery
Unauthorized input, alteration, or deletion of
computer data resulting to inauthentic data with
Prision mayor (imprisonment of six years
the intent that it be considered or acted upon
and 1 day up to 12 years) or a fine of at
for legal purposes as if it were authentic,
least Two hundred thousand pesos
regardless whether or not the data is directly
(P200,000) up to a maximum amount
readable and intelligible; or The act of
commensurate to the damage incurred or
knowingly using computer data which is the
BOTH.
product of computer-related forgery as defined
here, for the purpose of perpetuating a
fraudulent or dishonest design.
8. Computer-related Fraud
– same as above Provided, That if no
Unauthorized input, alteration, or deletion of
damage has yet been caused, the
computer data or program or interference in the
penalty imposed shall be one (1) degree
functioning of a computer system, causing
lower.
damage thereby with fraudulent intent.
12. Libel
Unlawful or prohibited acts of libel as defined in
Article 355 of the Revised Penal Code, as
amended committed through a computer
system or any other similar means which may
be devised in the future. Revised Penal Code
Art. 355 states Libel means by writings or
similar means. — A libel committed by means
of writing, printing, lithography, engraving,
radio, phonograph, painting, theatrical
exhibition, cinematographic exhibition, or any Penalty to be imposed shall be one (1)
similar means, shall be punished by prision degree higher than that provided for by
correccional in its minimum and medium the Revised Penal Code, as amended,
periods or a fine ranging from 200 to 6,000 and special laws, as the case may be.
pesos, or both, in addition to the civil action
which may be brought by the offended party.
The Cybercrime Prevention Act strengthened
libel in terms of penalty provisions. The
electronic counterpart of libel has been
recognized since the year 2000 when the E-
Commerce Law was passed. The E-Commerce
Law empowered all existing laws to recognize
its electronic counterpart whether commercial
or not in nature.
Key Terms
Lesson Summary
The Internet can sometimes be used for wrong deeds. These cybercrimes
damage not just individuals but the society as a whole.
Cybercrimes can be in the form of the following: phishing or spoofing is an act
of spamming emails; blackmail or extortion is the act of asking something in return of
not showing something that could damage someone’s reputation; hacking is the act of
obtaining authorized information; sports betting is gambling over sports results; non-
delivery of merchandise is faking a sale over the Internet; electronic harassment is the
act of anonymous cyberbullying; child pornography is the exploitation of the youth;
prostitution is the act of using the Internet to engage in sexual acts; drug trafficking is
using the internet for selling illegal substances; and criminal copyright infringement is
an act of piracy mainly for financial gain.
Assessment
Write a reflective essay about everything you have learned about ICT and its
possible impact to our society. Discuss how ICT can change the world for better or for
worse. Talk about its positive and negative impacts and the youth’s role in helping
promote its responsible use.
Write a final video blog post about everything you have learned about ICT and
its possible impact to our society. Discuss how ICT can change the world for better or
for worse. Talk about its positive and negative impacts and the youth’s role in helping
promote its responsible use. Upload it in your website.
Rubrics
Category 4 3 2 1
Content The output is The output is The output is The output is not
clear and clear and somewhat clear clear and
complete and complete. and complete. incomplete.
exceeds the
expectations.
Correctness The output is The output The output has The output
free from errors. contains no fewl errors. contains many
And no errors. errors.
Efficiency The output is The output is The output is The output is not
done in the done in the in done but used done completely
most effective the effective way methods that which exceeded
way ahead of just on time consumed more the required time
the set time time of finish
ONLINE
https://www.connectontech.com/2016/04/04/2016-4-2-philippine-government-issues-
implementing-rules-under-cybercrime-law-part-ii/