Professional Documents
Culture Documents
Learning Objectives:
At the end of the lesson, the student should be able to:
1. Discuss prohibited acts as defined by various laws related to cybercrimes.
Concept/Discussion:
New technologies create new criminal opportunities but few new types of crime.
What distinguishes cybercrime from traditional criminal activity? Obviously, one
difference is the use of the digital computer, but technology alone is insufficient for any
distinction that might exist between different realms of criminal activity.
In 2012, the Philippines passed Republic Act No. 10173 or the Data Privacy Act of
2012 (DPA) “to protect the fundamental human right to privacy of communication while
ensuring free flow of information to promote innovation and growth [and] the [State’s]
inherent obligation to ensure that personal information in information and
communications systems in government and in the private sector are secured and
protected”.
The DPA was passed in accordance with the Philippines agreements under ASEAN
Vision 2020 and at the urging of the growing business process outsourcing industry. The
law was modeled after the Data Protection Directive (95/46/EC) with many of its
terminologies and provisions similar to privacy laws in other jurisdictions.
“Processing” is any operation/s performed upon personal data. These operations include,
but are not limited to the collection, recording, organization, storage, updating or
modification, retrieval, consultation, use, consolidation, blocking, erasure, or destruction
of data.
4. Creation of a data breach response team that will immediately address security
incidents or personal data breach;
5. Adoption of data protection policies that provide for data security measures and
security incident management;
The NPC may investigate the breach, depending on its nature or if there is a delay or
failure to notify. Inquiries may include on-site examination of systems and procedures.
The Philippines has a relatively young data privacy regime. The Data Privacy Act , as well
as RA No. 10175 or the Cybercrime Prevention Act, was only enacted in 2012, although
some countries passed data protection laws as early as the 70s. The Philippines’
regulatory body NPC was formally organized only in 2016, which issued IRRs and circulars
in the same year. Nevertheless, the country is on its way to developing a stable framework
of privacy protection as technological innovations liberalize information sharing.
Section 9. Prohibited Acts. – The following acts shall constitute access device fraud and are hereby
declared to be unlawful:
(a) producing, using, trafficking in one or more counterfeit access devices;
(b) trafficking in one or more unauthorized access devices or access devices fraudulently
applied for;
(c) using, with intent to defraud, an unauthorized access device;
(d) using an access device fraudulently applied for;
(e) possessing one or more counterfeit access devices or access devices fraudulently
applied for;
(f) producing, trafficking in, having control or custody of, or possessing device-making or
altering equipment without being in the business or employment, which lawfully deals with the
manufacture, issuance, or distribution of such equipment;
(g) inducing, enticing, permitting or in any manner allowing another, for consideration or
otherwise to produce, use, traffic in counterfeit access devices, unauthorized access devices or
access devices fraudulently applied for;
(h) multiple imprinting on more than one transaction record, sales slip or similar
document, thereby making it appear that the device holder has entered into a transaction other
than those which said device holder had lawfully contracted for, or submitting, without being an
affiliated merchant, an order to collect from the issuer of the access device, such extra sales slip
through an affiliated merchant who connives therewith, or, under false pretenses of being an
affiliated merchant, present for collection such sales slips, and similar documents;
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY College of Criminal Justice
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN Education
(i) disclosing any information imprinted on the access device, such as, but not limited to,
the account number or name or address of the device holder, without the latter’s authority or
permission;
(j) obtaining money or anything of value through the use of an access device, with intent
to defraud or with intent to gain and fleeing thereafter;
(k) having in one’s possession, without authority from the owner of the access device or
the access device company, an access device, or any material, such as slips, carbon paper, or any
other medium, on which the access device is written, printed, embossed, or otherwise indicated;
(l) writing or causing to be written on sales slips, approval numbers from the issuer of the
access device of the fact of approval, where in fact no such approval was given, or where, if given,
what is written is deliberately different from the approval actually given;
(m) making any alteration, without the access device holder’s authority, of any amount
or other information written on the sales slip;
(n) effecting transaction, with one or more access devices issued to another person or
persons, to receive payment or any other thing of value;
(o) without the authorization of the issuer of the access device, soliciting a person for the
purpose of:
1) offering an access device; or
2) selling information regarding or an application to obtain an access device; or
(p) without the authorization of the credit card system member or its agent, causing or
arranging for another person to present to the member or its agent, for payment, one or more
evidence or records of transactions made by credit card.
Section 4. Acts of Trafficking in Persons. — It shall be unlawful for any person, natural or judicial,
to commit any of the following acts.
(a) To recruit, transport, transfer, harbor, provide, or receive a person by any means, including
those done under the pretext of domestic or overseas employment or training or apprenticeship,
for the purpose of prostitution, pornography, sexual exploitation, forced labor, slavery,
involuntary servitude or debt bondage;
(b) To introduce or match for money, profit, or material, economic or other consideration, any
person or, as provided for under Republic Act No. 6955, any Filipino women to a foreign national,
for marriage for the purpose of acquiring, buying, offering, selling or trading him/her to engage in
prostitution, pornography, sexual exploitation, forced labor, slavery, involuntary servitude or debt
bondage;
(c) To offer or contract marriage, real or simulated, for the purpose of acquiring, buying, offering,
selling, or trading them to engage in prostitution, pornography, sexual exploitation, forced labor
or slavery, involuntary servitude or debt bondage;
(d) To undertake or organize tours and travel plans consisting of tourism packages or activities
for the purpose of utilizing and offering persons for prostitution, pornography or sexual
exploitation;
(f) To adopt or facilitate the adoption of persons for the purpose of prostitution, pornography,
sexual exploitation, forced labor, slavery, involuntary servitude or debt bondage;
(g) To recruit, hire, adopt, transport or abduct a person, by means of threat or use of force, fraud
deceit, violence, coercion, or intimidation for the purpose of removal or sale of organs of said
person; and
(h) To recruit, transport or adopt a child to engage in armed activities in the Philippines or
abroad.
Section 5. Acts that Promote Trafficking in Persons. — The following acts which promote or
facilitate trafficking in persons shall be unlawful:
(a) To knowingly lease or sublease, use or allow to be used any house, building or establishment
for the purpose of promoting trafficking in persons;
(b) To produce, print and issue or distribute unissued, tampered or fake counseling certificates,
registration stickers and certificates of any government agency which issued these certificates and
stickers as proof of compliance with government regulatory and pre-departure requirements for
the purpose of promoting trafficking in persons;
(c) To advertise, publish, print, broadcast or distribute, or cause the advertisement, publication,
printing broadcasting or distribution by any means, including the use of information technology
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY College of Criminal Justice
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN Education
and the internet, of any brochure, flyer, or any propaganda material that promotes trafficking in
persons;
(d) To assist in the conduct of misrepresentation or fraud for purposes of facilitating the
acquisition of clearances and necessary exit documents from government agencies that are
mandate to provide pre-departure registration and services for departing persons for the purpose
of promoting trafficking in persons;
(e) To facilitate, assist or help in the exit and entry of persons from/to the country at
international and local airports, territorial boundaries and seaports who are in possession of
unissued, tampered or fraudulent travel documents for the purpose of promoting trafficking in
persons;
(f) To confiscate, conceal, or destroy the passport, travel documents, or personal documents or
belongings of trafficked persons in furtherance of trafficking or to prevent them from leaving the
country or seeking redress from the government or appropriate agencies; and
(h) To knowingly benefit from, financial or otherwise, or make use of, the labor or services of a
person held to a condition of involuntary servitude, forced labor, or slavery.
(b) When the adoption is effected through Republic Act No. 8043, otherwise known as the “Inter-
Country Adoption Act of 1995” and said adoption is for the purpose of prostitution, pornography,
sexual exploitation, forced labor, slavery, involuntary servitude or debt bondage;
(c) When the crime is committed by a syndicate, or in large scale. Trafficking is deemed
committed by a syndicate if carried out by a group of three (3) or more persons conspiring or
confederating with one another. It is deemed committed in large scale if committed against three
(3) or more persons, individually or as a group;
(d) When the offender is an ascendant, parent, sibling, guardian or a person who exercise
authority over the trafficked person or when the offense is committed by a public officer or
employee;
(e) When the trafficked person is recruited to engage in prostitution with any member of the
military or law enforcement agencies;
(f) When the offender is a member of the military or law enforcement agencies; and
(g) When by reason or on occasion of the act of trafficking in persons, the offended party dies,
becomes insane, suffers mutilation or is afflicted with Human Immunodeficiency Virus (HIV) or
the Acquired Immune Deficiency Syndrome (AIDS).
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY College of Criminal Justice
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN Education
The highly publicized sex videos of celebrity physician Hayden Kho with various
celebrity partners rocked Philippine society in May 2009 and was quickly shared online
and later distributed through DVD in the streets and sidewalks. In response to this,
Congress passed Republic Act 9995 (Anti-Photo and Video Voyeurism Act of 2009) to
prevent the publication and distribution of similar material in the future.[1] The law
prohibits recording videos or taking photos of a sexual act, the male or female genitalia,
and of the female breast, among others, without consent of the persons featured in the
material. The law ultimately seeks to prevent the reproduction, distribution, and
publication of said material regardless of whether or not the persons featured consented
to the recording.
Prohibited Acts
Important Questions
Will one be liable for the non-commercial copying or reproduction of said photo or
video?
Yes. The mere copying or reproduction of said material will make one liable under
the law regardless of the reason or whether one profits or not from such act. Indeed, the
mere showing of the material on one’s cellphone would violate the law.
The persons in the photo knew and consented to the video recording or taking of the
photo; can I reproduce, distribute, or broadcast it?
If the person or persons in the photo or video gave written consent for the
reproduction, distribution, or broadcasting of said material, then one will not be held
liable under the Anti-Photo and Video Voyeurism Act. However, if the person merely
consented to the taking of the photo or the video recording and did not give written
consent for its reproduction, distribution, and broadcasting, then anyone committing the
said acts shall be held liable under R.A. 9995.
• Violation of the Consumer Act or Republic Act No. 7394 and other relevant or
pertinent laws through transactions covered by or using electronic data messages
or electronic documents, shall be penalized with the same penalties as provided
in those laws;
• Other violations of the provisions of this Act, shall be penalized with a maximum
penalty of One Million Pesos (P1,000,000.00) or six (6) years imprisonment.
Acting on the Memorandum dated 18 June 2001 of the Committee on the Revision
of the Rules of Court to Draft the rules on E-Commerce Law [R.A. No. 8792] submitting
the Rules on Electronic Evidence for this Court’s consideration and approval, the Court
Resolved to APPROVED the same.
ELECTRONIC DOCUMENTS
• Electronic documents as functional equivalent of paper-based documents. –
Whenever a rule of evidence refers to the term of writing, document, record,
instrument, memorandum or any other form of writing, such term shall be
deemed to include an electronic document as defined in these Rules.
• An electronic document is admissible in evidence if it complies with the rules on
admissibility prescribed by the Rules of Court and related laws and is
authenticated in the manner prescribed by these Rules.
• The confidential character of a privileged communications is not solely on the
ground that it is in the form of an electronic document.
ELECTRONIC SIGNATURES
Electronic signature. – An electronic signature or a digital signature authenticate din the
manner prescribed hereunder is admissible in evidence as the functional equivalent of
the signature of a person on a written document.
o The familiarity of the witness or the person who made the entry with the
communication and information system;
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY College of Criminal Justice
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN Education
o The nature and quality of the information which went into the
communication and information system upon which the electronic data
message or electronic document was based; or
o Other factors which the court may consider as affecting the accuracy or
integrity of the electronic document or electronic data message.
It shall be unlawful for any person, not being authorized by all the parties to any
private communication or spoken word, to:
o tap any wire or cable, or by using any other device or arrangement,
o to secretly overhear, intercept, or record such communication or spoken
word by using a device commonly known as a dictaphone or dictagraph or
dictaphone or walkie-talkie or tape recorder
o to knowingly possess any tape record, wire record, disc record, or any
other such record, or copies thereof, of any communication or spoken
word secured either before or after the effective date of this Act in the
manner prohibited by this law;
o to replay the same for any other person or persons; or to communicate the
contents thereof, either verbally or in writing, or to furnish transcriptions
thereof, whether complete or partial, to any other person
o Provided, That the use of such record or any copies thereof as
evidence in any civil, criminal investigation or trial of offenses
mentioned in section 3 hereof, shall not be covered by this
prohibition.
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY College of Criminal Justice
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN Education
Nothing contained in this Act, however, shall render it unlawful or punishable for
any peace officer, who is authorized by a written order of the Court, to execute any of the
acts declared to be unlawful in the two preceding sections in cases involving:
o treason,
o espionage,
o provoking war and disloyalty in case of war,
o piracy,
o mutiny in the high seas,
o rebellion,
o conspiracy and proposal to commit rebellion,
o inciting to rebellion,
o sedition,
o conspiracy to commit sedition,
o inciting to sedition,
o kidnapping as defined by the Revised Penal Code,
o violations of Commonwealth Act No. 616, punishing espionage and other
offenses against national security:
Provided, That such written order shall only be issued or granted upon written
application and the examination under oath or affirmation of the applicant and the
witnesses he may produce and a showing:
(1) that there are reasonable grounds to believe that any of the crimes
enumerated hereinabove has been committed or is being committed or is about to be
committed: Provided, however, That in cases involving the offenses of rebellion,
conspiracy and proposal to commit rebellion, inciting to rebellion, sedition, conspiracy to
commit sedition, and inciting to sedition, such authority shall be granted only upon prior
proof that a rebellion or acts of sedition, as the case may be, have actually been or are
being committed;
(2) that there are reasonable grounds to believe that evidence will be obtained
essential to the conviction of any person for, or to the solution of, or to the prevention
of, any of such crimes; and
(3) that there are no other means readily available for obtaining such evidence.
the order, unless extended or renewed by the court upon being satisfied that such
extension or renewal is in the public interest.
All recordings made under court authorization shall, within forty-eight hours after
the expiration of the period fixed in the order, be deposited with the court in a sealed
envelope or sealed package, and shall be accompanied by an affidavit of the peace officer
granted such authority stating the number of recordings made, the dates and times
covered by each recording, the number of tapes, discs, or records included in the deposit,
and certifying that no duplicates or copies of the whole or any part thereof have been
made, or if made, that all such duplicates or copies are included in the envelope or
package deposited with the court. The envelope or package so deposited shall not be
opened, or the recordings replayed, or used in evidence, or their contents revealed,
except upon order of the court, which shall not be granted except upon motion, with due
notice and opportunity to be heard to the person or persons whose conversation or
communications have been recorded.
Acts of Bullying
"bullying" shall refer to any severe or
repeated use by one or more students of a
written, verbal or electronic expression, or a
physical act or gesture, or any combination
thereof, directed at another student that has the
effect of actually causing or placing the latter in
reasonable fear of physical or emotional harm or
damage to his property; creating a hostile
environment at school for the other student;
infringing on the rights of the other student at
school; or materially and substantially disrupting
the education process or the orderly operation of a school; such as, but not limited to,
the following:
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY College of Criminal Justice
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN Education
a. Any unwanted physical contact between the bully and the victim like punching,
pushing, shoving, kicking, slapping, tickling, headlocks, inflicting school pranks, teasing,
fighting and the use of available objects as weapons;
b. Any act that causes damage to a victim’s psyche and/or emotional well-being;
c. Any slanderous statement or accusation that causes the victim undue emotional
distress like directing foul language or profanity at the target, name-calling, tormenting
and commenting negatively on victim’s looks, clothes and body; and
d. Cyber-bullying or any bullying done through the use of technology or any electronic
means.
Cybercrime Offenses
Offenses against the confidentiality, integrity and availability of computer data and
systems:
(1) Illegal Access. – The access to the whole or any part of a computer system without
right.
(2) Illegal Interception. – The interception made by technical means without right of any
non-public transmission of computer data to, from, or within a computer system including
electromagnetic emissions from a computer system carrying such computer data.
(i) The use, production, sale, procurement, importation, distribution, or otherwise making
available, without right, of:
(aa) A device, including a computer program, designed or adapted primarily for the
purpose of committing any of the offenses under this Act; or
(bb) A computer password, access code, or similar data by which the whole or any part of
a computer system is capable of being accessed with intent that it be used for the purpose
of committing any of the offenses under this Act.
(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent
to use said devices for the purpose of committing any of the offenses under this section.
(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to
profit, mislead, destroy reputation, and deprive others from registering the same, if such
a domain name is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with the
appropriate government agency at the time of the domain name registration:
(ii) Identical or in any way similar with the name of a person other than the registrant, in
case of a personal name; and
(i) The input, alteration, or deletion of any computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes as
if it were authentic, regardless whether or not the data is directly readable and intelligible;
or
(ii) The act of knowingly using computer data which is the product of computer-related
forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest
design.
damage has yet been caused, the penalty imposable shall be one (1) degree lower.
(3) Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying information belonging to another,
whether natural or juridical, without right: Provided, That if no damage has yet been
caused, the penalty imposable shall be one (1) degree lower.
(2) Child Pornography. — The unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a
computer system: Provided, That the penalty to be imposed shall be (1) one degree higher
than that provided for in Republic Act No. 9775.1âwphi1
(ii) The primary intent of the communication is for service and/or administrative
announcements from the sender to its existing users, subscribers or customers; or
(aa) The commercial electronic communication contains a simple, valid, and reliable way
for the recipient to reject. receipt of further commercial electronic messages (opt-out)
from the same source;
(bb) The commercial electronic communication does not purposely disguise the source of
the electronic message; and
(cc) The commercial electronic communication does not purposely include misleading
information in any part of the message in order to induce the recipients to read the
message.
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY College of Criminal Justice
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN Education
(4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised
Penal Code, as amended, committed through a computer system or any other similar
means which may be devised in the future.
Section 5. Other Offenses. — The following acts shall also constitute an offense:
(a) Aiding or Abetting in the Commission of Cybercrime. – Any person who willfully abets
or aids in the commission of any of the offenses enumerated in this Act shall be held liable.
(b) Attempt in the Commission of Cybercrime. — Any person who willfully attempts to
commit any of the offenses enumerated in this Act shall be held liable.
PhilCST
PHILIPPINE COLLEGE OF SCIENCE & TECHNOLOGY College of Criminal Justice
OLD NALSIAN ROAD, BRGY. NALSIAN, CALASIAO, PANGASINAN Education
Learning Sources:
https://www.toppr.com/guides/computer-aptitude-and-knowledge/basics-of-
computers/hardware-and-software/
https://www.idtech.com/blog/parts-of-a-computer