You are on page 1of 115

TEAM

HARRY

ENVIRONMENTAL
LAW AND
CYBERCRIME
Presented by Joseph Sereño
Is a type of malicious software
(malware) that threatens to publish or
blocks access to data or a computer
system, usually by encrypting it, until
the victim pays a ransom fee to the
attacker.*

Phishing
Cryptojacking
Cyber espionage
Ransomware attack
Is a type of malicious software
(malware) that threatens to publish or
blocks access to data or a computer
system, usually by encrypting it, until
the victim pays a ransom fee to the
attacker.*

Phishing
Cryptojacking
Cyber espionage
Ransomware attack
The following are a violation to
Philippine Clean Air Act, EXCEPT*
Incineration in Public

Smoking in Public
Non-compliance to Emission
standard
All of the above
The following are a violation to
Philippine Clean Air Act, EXCEPT*
Incineration in Public

Smoking in Public
Non-compliance to Emission
standard
All of the above
Any person who willfully abets, aids,
or financially benefits in the
commission of any of the offenses
enumerated Republic Act 10175 shall
be held liable, except with respect to
Sections 4(c)(2) on Child Pornography
and 4(c)(4) on online Libel.*

Wholly true
Partially true
Wholly false
Partially false
Any person who willfully abets, aids,
or financially benefits in the
commission of any of the offenses
enumerated Republic Act 10175 shall
be held liable, except with respect to
Sections 4(c)(2) on Child Pornography
and 4(c)(4) on online Libel.*

Wholly true
Partially true
Wholly false
Partially false
The court shall have this period from
the filing of the complaint to try and
decide the case in relation to
environmental cases.*

15 days
2 months
1 year
5 years
The court shall have this period from
the filing of the complaint to try and
decide the case in relation to
environmental cases.*

15 days
2 months
1 year
5 years
Environmental laws may regulate and
protect wildlife populations.
Lawmakers determine who can hunt
and fish and how these activities are
regulated.*

Walking and running


Hiking and climbing
Hunting and Fishing
Crawling and Seeing
Environmental laws may regulate and
protect wildlife populations.
Lawmakers determine who can hunt
and fish and how these activities are
regulated.*

Walking and running


Hiking and climbing
Hunting and Fishing
Crawling and Seeing
Which among the following does not
belong to the group?*

Cyber-squatting
Cybersex
Libel
Computer-related Forgery
Which among the following does not
belong to the group?*

Cyber-squatting
Cybersex
Libel
Computer-related Forgery
This office shall serve as the
Cybercrime Operations Center of the
CICC.*

NBI
PNP
DOJ Office of Cybercrime
Regional Trial Court
This office shall serve as the
Cybercrime Operations Center of the
CICC.*

NBI
PNP
DOJ Office of Cybercrime
Regional Trial Court
The law aims to achieve and maintain
clean air that meets the National Air
Quality guideline values for criteria
pollutants, throughout the Philippines,
while minimizing the possible
associated impacts to the economy.*

RA 6969
RA 8749
RA 9275
RA 9003
The law aims to achieve and maintain
clean air that meets the National Air
Quality guideline values for criteria
pollutants, throughout the Philippines,
while minimizing the possible
associated impacts to the economy.*

RA 6969
RA 8749
RA 9275
RA 9003
The act of throwing trash or garbage
in a place not properly designated for
the same is a violation to*

REPUBLIC ACT 8749


REPUBLIC ACT 9275
REPUBLIC ACT 9003
REPUBLIC ACT 9512
The act of throwing trash or garbage
in a place not properly designated for
the same is a violation to*

REPUBLIC ACT 8749


REPUBLIC ACT 9275
REPUBLIC ACT 9003
REPUBLIC ACT 9512
The following are the common
example of crime violating certain law
on mining, EXCEPT*

Water system contamination


Mines waste
Mining operation without permit
Reforestation
The following are the common
example of crime violating certain law
on mining, EXCEPT*

Water system contamination


Mines waste
Mining operation without permit
Reforestation
A warrant that requires any person or
service provider to disclose
subscriber's information, traffic data,
or relevant data in his/her or its
possession or control within 72 hours
from receipt of the order.*

Warrant to Disclose Computer Data


Warrant to Intercept Computer Data
Warrant to Search, Seize, and
Examine Computer Data
Warrant to Examine Computer Data
A warrant that requires any person or
service provider to disclose
subscriber's information, traffic data,
or relevant data in his/her or its
possession or control within 72 hours
from receipt of the order.*

Warrant to Disclose Computer


Data
Warrant to Intercept Computer Data
Warrant to Search, Seize, and
Examine Computer Data
Warrant to Examine Computer Data
A warrant that requires any person or
service provider to disclose
subscriber's information, traffic data,
or relevant data in his/her or its
possession or control within 72 hours
from receipt of the order.*

Warrant to Disclose Computer


Data
Warrant to Intercept Computer Data
Warrant to Search, Seize, and
Examine Computer Data
Warrant to Examine Computer Data
These are devices used for entering
data or instructions to the central
processing unit. Are classified
according to the method they use to
enter data.*

Keying devices
Pointing devices
Input devices
Special (Control) keys
These are devices used for entering
data or instructions to the central
processing unit. Are classified
according to the method they use to
enter data.*

Keying devices
Pointing devices
Input devices
Special (Control) keys
It is the science of acquiring,
retrieving, preserving and presenting
data that has been processed
electronically and stored on digital
media*

Digital forensics
Cybercrime
Cyber
Computer system
It is the science of acquiring,
retrieving, preserving and presenting
data that has been processed
electronically and stored on digital
media*

Digital forensics
Cybercrime
Cyber
Computer system
means any part taken or substance
extracted from wildlife, in raw or in
processed form including stuffed
animals and herbarium specimens.*

Derivatives
Mineral
Wildlife
Product
means any part taken or substance
extracted from wildlife, in raw or in
processed form including stuffed
animals and herbarium specimens.*

Derivatives
Mineral
Wildlife
Product
Network Hacking is a way of
gathering all the critical information
about a network with an intent to
harm the network and block its
operations. The statement is the
opposite of not false.*

Wholly true
Partially true
Wholly false
Partially false
Network Hacking is a way of
gathering all the critical information
about a network with an intent to
harm the network and block its
operations. The statement is the
opposite of not false.*

Wholly true
Partially true
Wholly false
Partially false
The intentional acquisition, use,
misuse, transfer, possession,
alteration or deletion of identifying
information belonging to another,
whether natural or juridical, without
right.*

Computer-related Fraud
Computer-related Identity Theft
Computer-related Forgery
Cyber-squatting
The intentional acquisition, use,
misuse, transfer, possession,
alteration or deletion of identifying
information belonging to another,
whether natural or juridical, without
right.*

Computer-related Fraud
Computer-related Identity Theft
Computer-related Forgery
Cyber-squatting
Content data shall be similarly
preserved for six (6) months from the
date of receipt of the order from law
enforcement authorities requiring its
preservation.*

three (3) months


six (6) months
forty-eight (48) hours
thirty-six (36) hours
Content data shall be similarly
preserved for six (6) months from the
date of receipt of the order from law
enforcement authorities requiring its
preservation.*

three (3) months


six (6) months
forty-eight (48) hours
thirty-six (36) hours
The following are the threats to
Biodiversity*

Habitat degradation
Pollution
Climate Change
All of the above
The following are the threats to
Biodiversity*

Habitat degradation
Pollution
Climate Change
All of the above
refers to a judicially-approved
settlement between concerned parties
based on public interest and public
policy to protect and preserve the
environment.*

Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant
refers to a judicially-approved
settlement between concerned parties
based on public interest and public
policy to protect and preserve the
environment.*

Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant
It is a collective term describing the
network of treaties, statutes,
regulations, common and customary
laws addressing the effects of human
activity on the natural environment.*

Natural law
Resource law
Environmental law
All of the above
It is a collective term describing the
network of treaties, statutes,
regulations, common and customary
laws addressing the effects of human
activity on the natural environment.*

Natural law
Resource law
Environmental law
All of the above
One among many purposes of RA
No. 7586 is to reserve certain areas
exclusively for the environment, and
to exclude all other forms of land use
and utilization solely as places where
wildlife, flora, and fauna can grow,
and where the rich biodiversity of the
ecosystem can be preserved. The
following places where protected
areas under RA 7586, EXCEPT*

Natural park
Natural monument
Wildlife sanctuary
All of the above
One among many purposes of RA
No. 7586 is to reserve certain areas
exclusively for the environment, and
to exclude all other forms of land use
and utilization solely as places where
wildlife, flora, and fauna can grow,
and where the rich biodiversity of the
ecosystem can be preserved. The
following places where protected
areas under RA 7586, EXCEPT*

Natural park
Natural monument
Wildlife sanctuary
All of the above
One among many purposes of RA
No. 7586 is to reserve certain areas
exclusively for the environment, and
to exclude all other forms of land use
and utilization solely as places where
wildlife, flora, and fauna can grow,
and where the rich biodiversity of the
ecosystem can be preserved. The
following places where protected
areas under RA 7586, EXCEPT*

Natural park
Natural monument
Wildlife sanctuary
All of the above
is a criminal activity that either targets
or uses a computer, a computer
network or a networked device.*

Computer crime
Crime
Cybercrime
Computer virus
is a criminal activity that either targets
or uses a computer, a computer
network or a networked device.*

Computer crime
Crime
Cybercrime
Computer virus
refers to an order issued by the court
directing or enjoining any person or
government agency to perform or
desist from performing an act in order
to protect, preserve or rehabilitate the
environment.*

Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant
refers to an order issued by the court
directing or enjoining any person or
government agency to perform or
desist from performing an act in order
to protect, preserve or rehabilitate the
environment.*

Consent decree
Continuing Mandamus
Environmental protection Order
Warrrant
Very essential that an investigator
knows the crime he’s investigating.
The which among the following
describes Illegal Logging*

cutting, gathering, or collecting timber


or other forest products without the
necessary permit from the
government.
Transporting illegally cut timber and
forest products
All of the above
None of them
Very essential that an investigator
knows the crime he’s investigating.
The which among the following
describes Illegal Logging*

cutting, gathering, or collecting timber


or other forest products without the
necessary permit from the
government.
Transporting illegally cut timber and
forest products
All of the above
None of them
The following are the guidelines for
preservation of evidence for crimes
involving environmental laws, Except*

Investory
Limit the number of individual
handling evidence
Packing, labeling, sealing and
marking of evidence
Turn-over
The following are the guidelines for
preservation of evidence for crimes
involving environmental laws, Except*

Investory
Limit the number of individual
handling evidence
Packing, labeling, sealing and
marking of evidence
Turn-over
In relation to the previous question,
failure to timely file the returns for any
of the issued warrants under this Rule
or to duly turn over to the court’s
custody any of the items disclosed,
intercepted, searched, seized, and/or
examined as prescribed hereunder
shall subject the responsible law
enforcement authorities to an action
for-*

Obstruction of Justice
Contempt
Cybercrime
Neglect of Duty
In relation to the previous question,
failure to timely file the returns for any
of the issued warrants under this Rule
or to duly turn over to the court’s
custody any of the items disclosed,
intercepted, searched, seized, and/or
examined as prescribed hereunder
shall subject the responsible law
enforcement authorities to an action
for-*

Obstruction of Justice
Contempt
Cybercrime
Neglect of Duty
They are those who are hired and are
given permission to attack the system.
They can attack the system just to
expose the vulnerabilities that an
attacker can take advantage of.*

Ethical Hacker
State-sponsored hackers
Malicious Insider
Grey Hat Hacker
They are those who are hired and are
given permission to attack the system.
They can attack the system just to
expose the vulnerabilities that an
attacker can take advantage of.*

Ethical Hacker
State-sponsored hackers
Malicious Insider
Grey Hat Hacker
The law aims to protect the country's
water bodies from pollution from
land-based sources (industries and
commercial establishments,
agriculture and
community/household activities).*

RA 6969
RA 8749
RA 9275
RA 9003
The law aims to protect the country's
water bodies from pollution from
land-based sources (industries and
commercial establishments,
agriculture and
community/household activities).*

RA 6969
RA 8749
RA 9275
RA 9003
states that when human activities may
lead to threats of serious and
irreversible damage to the
environment that is scientifically
plausible but uncertain, actions shall
be taken to avoid or diminish that
threat.*

Strategic lawsuit
Environmental protection
Continuing mandamus
Precautionary principle
states that when human activities may
lead to threats of serious and
irreversible damage to the
environment that is scientifically
plausible but uncertain, actions shall
be taken to avoid or diminish that
threat.*

Strategic lawsuit
Environmental protection
Continuing mandamus
Precautionary principle
Violation of environmental laws will
be dealt with*

Judicial Body
Quasi-Judicial Body
Administrative body
all of the above
Violation of environmental laws will
be dealt with*

Judicial Body
Quasi-Judicial Body
Administrative body
all of the above
Effectivity of the Warrant to Intercept
Computer Data.*

10 days
15 days
72 hours
24 hours
Effectivity of the Warrant to Intercept
Computer Data.*

10 days
15 days
72 hours
24 hours
Law enforcement agencies were
solely responsible for conservation of
the environment. Is the statement
true?*

Yes, constitutionally
Yes, as construed in statutes
No, CJS is a mechanism responsible
for it.
No, the PNP was generally mandated
to enforce all laws.
Law enforcement agencies were
solely responsible for conservation of
the environment. Is the statement
true?*

Yes, constitutionally
Yes, as construed in statutes
No, CJS is a mechanism responsible
for it.
No, the PNP was generally
mandated to enforce all laws.
Where to file the Writ of Kalikasan?*

Supreme Court
Regional Trial Court
MTC or MCTC
DENR
Where to file the Writ of Kalikasan?*

Supreme Court
Regional Trial Court
MTC or MCTC
DENR
Which of the following activities
refers to the act of legally intercepting
computer data conducted by law
enforcement authorities?*

listening
recording
monitoring
surveillance
all of these
Which of the following activities
refers to the act of legally intercepting
computer data conducted by law
enforcement authorities?*

listening
recording
monitoring
surveillance
all of these
Blue Hat Hackers are types of
hackers who’re learning the ropes of
hacking. They are slightly different
from the Script Kiddies due to their
intention. The intent is to strive and
learn to become full-fledged hackers.*

Wholly true
Partially true
Wholly false
Partially false
Blue Hat Hackers are types of
hackers who’re learning the ropes of
hacking. They are slightly different
from the Script Kiddies due to their
intention. The intent is to strive and
learn to become full-fledged hackers.*

Wholly true
Partially true
Wholly false
Partially false
The integrity of traffic data and
subscriber information shall be kept,
retained and preserved by a service
provider for a minimum period of
____ from the date of the
transaction.*

three (3) months


six (6) months
forty-eight (48) hours
thirty-six (36) hours
The integrity of traffic data and
subscriber information shall be kept,
retained and preserved by a service
provider for a minimum period of
____ from the date of the
transaction.*

three (3) months


six (6) months
forty-eight (48) hours
thirty-six (36) hours
The unauthorized input, alteration, or
deletion of computer data or program
or interference in the functioning of a
computer system, causing damage
thereby with fraudulent intent.*

Computer-related Fraud
Computer-related Identity Theft
Computer-related Forgery
Cyber-squatting
The unauthorized input, alteration, or
deletion of computer data or program
or interference in the functioning of a
computer system, causing damage
thereby with fraudulent intent.*

Computer-related Fraud
Computer-related Identity Theft
Computer-related Forgery
Cyber-squatting
It is a hacking technique designed to
flood your web server with a myriad
of requests to the point that it
overloads the web server resulting in
a website crash.*

Denial of Service (DoS\DDoS) Attacks


Cookie Theft
Fake W.A.P.
Phishing
It is a hacking technique designed to
flood your web server with a myriad
of requests to the point that it
overloads the web server resulting in
a website crash.*

Denial of Service (DoS\DDoS) Attacks


Cookie Theft
Fake W.A.P.
Phishing
A warrant issued when a computer
device or system is previously seized
by another lawful method, such as a
warrantless arrest.*

Warrant to Disclose Computer Data


Warrant to Intercept Computer Data
Warrant to Search, Seize, and
Examine Computer Data
Warrant to Examine Computer Data
A warrant issued when a computer
device or system is previously seized
by another lawful method, such as a
warrantless arrest.*

Warrant to Disclose Computer Data


Warrant to Intercept Computer Data
Warrant to Search, Seize, and
Examine Computer Data
Warrant to Examine Computer Data
Where a search and seizure warrant is
properly issued, the law enforcement
authorities shall likewise have the following
powers and duties, except:*

Secure a computer system or a computer data


storage medium;
Make and retain a copy of those computer
data secured;
Conduct forensic analysis or examination of
the computer data storage medium:
Render accessibility on those computer data in
the accessed computer or computer and
communications network.
Where a search and seizure warrant is
properly issued, the law enforcement
authorities shall likewise have the following
powers and duties, except:*

Secure a computer system or a computer


data storage medium;
Make and retain a copy of those computer
data secured;
Conduct forensic analysis or examination of
the computer data storage medium:
Render accessibility on those computer data in
the accessed computer or computer and
communications network.
Violation of laws implies violation of
an individual's right. Thus, a person
throwing his garbage anywhere is
against the right of an individual to?*

Life
Liberty
Property
None of them
Violation of laws implies violation of
an individual's right. Thus, a person
throwing his garbage anywhere is
against the right of an individual to?*

Life
Liberty
Property
None of them
Is a collective term describing the
network of treaties, statutes,
regulations, common and customary
laws addressing the effects of human
activity on the natural environment.*

Biochemical law
Environmental Law
remedial law
Political Law
Is a collective term describing the
network of treaties, statutes,
regulations, common and customary
laws addressing the effects of human
activity on the natural environment.*

Biochemical law
Environmental Law
remedial law
Political Law
People modify the environment for
their purposes and obtain benefits
(Ecosystem Services) from it. Is the
statement true?*

Yes, the humans are responsible for


the development of ecosystem
Yes, actions of human disrupt the
function of the ecosystem
No, ecosystem is independent
No, Modification of environment to fit
with society is good
People modify the environment for
their purposes and obtain benefits
(Ecosystem Services) from it. Is the
statement true?*

Yes, the humans are responsible for


the development of ecosystem
Yes, actions of human disrupt the
function of the ecosystem
No, ecosystem is independent
No, Modification of environment to fit
with society is good
Features of Strategic Lawsuit Against
Public Participation (SLAPP)*

a legal action filed to harass, vex,


exert undue pressure or stifle any
legal recourse that any person,
institution or the government has
taken
Assertion of environmental rights
for the protection of the environment
All of the above
Features of Strategic Lawsuit Against
Public Participation (SLAPP)*

a legal action filed to harass, vex,


exert undue pressure or stifle any
legal recourse that any person,
institution or the government has
taken
Assertion of environmental rights
for the protection of the environment
All of the above
Wildlife animals of the earth pertains
to*

Flora
Sauna
Fauna
Floural
Wildlife animals of the earth pertains
to*

Flora
Sauna
Fauna
Floural
The warrants shall only be effective
for the length of time as determined
by the court, which shall not exceed
from its issuance.*

10 days
15 days
72 hours
24 hours
The warrants shall only be effective
for the length of time as determined
by the court, which shall not exceed
from its issuance.*

10 days
15 days
72 hours
24 hours
There must be a prohibition of
harmful actions of humans to
environment, the notion falls to the
principle of*

Ours is a finite earth


Nature knows best
All forms of life are important
Everything must go somewhere
There must be a prohibition of
harmful actions of humans to
environment, the notion falls to the
principle of*

Ours is a finite earth


Nature knows best
All forms of life are important
Everything must go somewhere
”Development that meets the needs of
the present without compromising the
ability of the future generations to
meet their own needs.” this quote falls
to the principle of*

Everything is connected to everything


else
All forms of life are important
Everything must go somewhere
Ours is a finite earth
”Development that meets the needs of
the present without compromising the
ability of the future generations to
meet their own needs.” this quote falls
to the principle of*

Everything is connected to everything


else
All forms of life are important
Everything must go somewhere
Ours is a finite earth
It is the main circuit board on the
computer.*

Motherboard
Random-Access Memory
Hard disk
Solid-State Drives
It is the main circuit board on the
computer.*

Motherboard
Random-Access Memory
Hard disk
Solid-State Drives
What is the nature of crime in
violation of environmental laws?*

Criminal
Civil
Administrative
Natural resource
What is the nature of crime in
violation of environmental laws?*

Criminal
Civil
Administrative
Natural resource
This system assures implementation
of environment-friendly projects*

Environment Impact Assessment


System
Environmental Compliance System
Environmental impact System
None of the above
This system assures implementation
of environment-friendly projects*

Environment Impact Assessment


System
Environmental Compliance System
Environmental impact System
None of the above
A set of integrated devices that input,
output, process, and store data and
information.*

Computer hardware
Computer software
Liveware
Computer system
A set of integrated devices that input,
output, process, and store data and
information.*

Computer hardware
Computer software
Liveware
Computer system
This office shall serve as the public
information arm of the EPA.*

Interim Officers
Public Affairs Office
Public Information Desk
DITC
This office shall serve as the public
information arm of the EPA.*

Interim Officers
Public Affairs Office
Public Information Desk
DITC
Fundamental basis in protecting
environment*

Natural
Statutory
Constitutional
All of the above
Except C
Fundamental basis in protecting
environment*

Natural
Statutory
Constitutional
All of the above
Except C
In this phase, the hacker tries to
exploit all the vulnerabilities of the
target system.*

Reconnaissance
Scanning
Gaining Access
Maintaining Access
In this phase, the hacker tries to
exploit all the vulnerabilities of the
target system.*

Reconnaissance
Scanning
Gaining Access
Maintaining Access
use of computer networks to gain
illicit access to confidential
information, typically that held by*

government or other organization.


Phishing
Cryptojacking
Cyber espionage
use of computer networks to gain
illicit access to confidential
information, typically that held by*

government or other organization.


Phishing
Cryptojacking
Cyber espionage

You might also like