You are on page 1of 9

“Cybercrime

Prevention
Act of 2012
Republic Act No. 10175

AN OVERVIEW OF THE CYBERCRIME LAW AND ITS PUNISHABLE ACTS

11:11PM
How many
internet users Global internet users have climbed to

in the world 4.95 billion at the start of 2022. Data


show that internet users have grown
as of January by 192 million (+4.0 percent) over the
past year, but ongoing restrictions to
2022? research and reporting due to
COVID-19 mean that actual growth
trends may be considerably higher
than these figures suggest.
Source: United Nations; US Census Bureau

Back to Agenda Page


How many There were 92.05 million social media
social media users in the Philippines in January 2022.

users are The number of social media users in the


there in the Philippines at the start of 2022 was
equivalent to 82.4 percent of the total
Philippines? population, but it’s important to note
that social media users may not
represent unique individuals.

Source: United Nations; US Census Bureau


https://datareportal.com/reports/digital-2022-philippines

Back to Agenda Page


*CYBER CRIME PREVENTION ACT*CYBER CRIME PREVENTION ACT*CYBER CRIME PREVENTION ACT*CYBER CRIME PREVENTION ACT*

Social Media users

Facebook Instagram

Tiktok Twitter
n Header • Section Header • Section Header • Section Header • Section Header • Section Header • Section Header • Section H

The legal framework of the Republic Act No. 10175 or “Cybercrime


Prevention Act of 2012” is in line with the Cybercrime Prevention
Act of the Budapest Convention, which took effect in February
2014.
The Philippine Congress enacted the Cybercrime Prevention Act
of 2012, which addresses entirely crimes committed against and
through the computer system on September 12, 2012, and signed
by President Benigno Aquino III. It includes substantive penal,
procedural, and international cooperation rules.

Back to Agenda Page

n Header • Section Header • Section Header • Section Header • Section Header • Section Header • Section Header • Section H
Declaration of Policy
The State recognizes the vital role of information and communications industries such as content production,
telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and
economic development.

The State also recognizes the importance of providing an environment conducive to the development, acceleration,
and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and
intelligible access to exchange and/or delivery of information;

and the need to protect and safeguard the integrity of computer, computer and communications systems, networks,
and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms
of misuse,abuse, and illegal access by making punishable under the law such conduct or conducts.

In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating
their detection, investigation, and prosecution at both the domestic and international levels, and by providing
arrangements for fast and reliable international cooperation.

Back to Agenda Page


PHISHING
Proliferation of misinformation or
fake news

TOP 3 CYBER CRIMES


IN THE PHILIPPINES

Online selling scam


Computer data Computer program
DEFINITION
OF TERMS
As used for the purposes of this act
Without right Cyber

Interception Cybersecurity

refers to a computer or a computer network, the electronic medium in which online communication
Cyber takes place.

refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance
Cybersecurity and technologies that can be used to protect the cyber environment and organization and user’s assets.

Computer
refers to a set of instructions executed by the computer to achieve intended results.
program

Computer efers to any representation of facts, information, or concepts in a form suitable for processing in a computer system
including a program suitable to cause a computer system to perform a function and includes electronic documents and/or
data electronic data messages whether stored in local computer systems or online.

refers to either: (i) conduct undertaken without or in excess of authority; or (ii) conduct not covered by established legal
Without right defenses, excuses, court orders, justifications, or relevant principles under the law.

refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the
Interception content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic
eavesdropping or tapping devices, at the same time that the communication is occurring.

You might also like