Professional Documents
Culture Documents
Submitted by:
ADAM PAUL G. HERMOSADA
Submitted to:
IVAN ALEN C. HONRADA RCrim
Professor
INTRODUCTION
perpetrators who design their assaults with the specific intention of taking advantage of
any potential flaws in the infrastructure's global nature. It poses a threat to the public's,
information.
In Asia, cybercrime is one of the non-violent crimes with the greatest rate of
growth. In order to solve such issues, a lot of technological know-how and collaboration,
country’s law implementation, different countries are affected by this crime to varying
degrees. In the Philippines, new laws must be passed or current laws must be amended
in order to fully handle cyber dangers as the technical and electronic environments
change.
The Internet is increasingly being used for political, military, and economic
NATO, the FBI, the Center for Education and Research in Information Assurance and
Security (CERIAS), the Serious Organized Crime Agency (SOCA), the International
report. According to the research, these actions are becoming increasingly complex. It
The Philippines National Police (PNP) reports that cybercrimes rose sharply in 2010
and continue to rise annually. According to the findings of the Criminal Investigation and
Detection Group (CIDG), the Philippine police reported 4,673 cases of cybercrime in
2006. In contrast, only $27 cases of cybercrime were reported in 2006, a threefold
increase in a single year. Between 2005 and 2010, 2,624 cases were reported,
according to the police. Only 37 cases were reported in 2004, but they continued to rise
each year, reaching 56 in 2004 and 161 in 2005. The PNP looked into 195 computer
crimes between 2004 and 2006, including a variety of cases involving credit and debt
A survey from the software company Symantec claimed that every year, an
increasing number of Filipinos become the targets of online crimes and other dangerous
attacks. Filipinos have been victims of numerous assaults, including virus infiltration,
phishing scams, and “sexual predation” (Brenner, 2009). Social networking sites, like
Facebook, which has at least 16 million users in the Philippines as of right now, are
among the areas where these crimes are most likely to occur for private users.
FRAMEWORK
Cybercrime offenses
The Cybercrime Prevention Act of 2012 also Penalizes offenses against the
privacy, confidentiality, integrity, and availability of computer data and systems, such as
cybersquatting.
malicious activities committed online, according to DOJ, which quoted a 2010 report of
the security software firm Symantec. These include victims of malware invasion, sexual
As to illegal access
For the purposes of Article 184, computer system means any device or
access to the computer information protected by law, i.e. the information reflected in
data-carrier, computer, computer system or their network that has caused a loss,
Provider network means an affiliated group of varied health care providers that
Service Level means the standard set forth below by which IBM measures the
As to Data interference
Unauthorized action can also be covered by this clause if the person's action went
beyond the agreed-upon scope and caused the damages listed in this clause.
offense of system interference, the acts of “the input, alteration, deletion, or suppression
of computer datas” constitute the crime of computer-related forgery. And the act of
related fraud. Even though the text is slightly different, it appears that the same material
acts are the root of all crimes: computer data input, deletion, damage, or modification.
Further, the fact that the crime of data interference does not predict "input of data"
or that the crime of system interference predicts transmitting in a way that the other
crimes do not does not seem relevant. The majority of the material acts that are
included in these crimes’ legal definitions are the same (cybercrime, 2015).
As to system interference
covered by this provision if the person's action exceeded the agreed-upon scope and
In addition, Computer fraud is one of the first generations of computer crimes, and in
this generation, the computer is only seen as a tool for committing crimes. As a result,
computer fraud can be viewed as one of the computer crimes following the computer’s
undeniable interference in people’s daily lives (Alipour, 2004). Hackers first attempted to
break into computer networks. Some did it only for the joy of getting into high-security
networks, while others wanted to get their hands on important or secret information.
As to misuse of devices
Further, Unauthorized use of computer passwords, access codes, or other similar data
that allows access to all or a portion of a computer system with the intent that it be used
for the purpose of committing any of the offenses listed in Republic Act 10175.
Unauthorized use of computer programs that are designed or modified for the purpose
hacking into someone’s Facebook account and posting pornographic content). The
Computer Misuse Act of 1990 may be applicable in certain circumstances. This law
forbids accessing computer data with the goal to facilitate or commit a crime, altering
data, and creating, getting, or supplying anything that could be used to misuse
computers
As to cybersquatting
Purchasing a domain name online with the intent to profit, deceive, damage reputation,
or prevent others from registering the name. This includes names of people other than
the registrant, acquired with intellectual property interests in it, and trademarks that
were already in existence at the time of registration. Those who obtain domain names of
well-known brands and people, which are then used to harm their reputation, may be
held liable under this provision. Note that freedom of expression and infringement on
trademarks or names of people are typically treated separately. A party can utilize their
right to free speech without necessarily infringing on other people’s names or brand’s
trademarks.
conventional infringement to use a branded name to boost search results for another
(Cybersquatting 2020).
In addition, the legislation relating to computer crime does not specifically address this
situation. In this instance, it is stated that since only a person may be victimized by the
fraud crime, machines cannot be deceived. Furthermore, it has been asserted that the
commission of the fraud crime is ruled out during computer fraud since individuals are
not in contact with one another in order to be able to deceive or trick one another, and
only it may be proposed in the law linked to computer fraud (Goldouzian, 2005).
ANALYSIS
Multinational corporations, financial institutions, and embassies are among the targets
laws that do not cover information and communication technology (ICT). Business
process outsourcing (BPO) and information technology (IT)—two of the most important
sectors, such as banking and investment institutions, are also vulnerable. Despite the
fact that the websites of the Philippine government’s agencies have been compromised,
the government's response to the issue is lackluster. The general public relies on these
organizations for urgent assistance. The public’s confidence in the government’s efforts
to efficiently provide services that are quick, accurate, safe, and timely is undermined by
one of its more potent effects. Traditional methods for obstructing justice include the
deleting court records to get rid of criminal charges or convictions, and threatening
judges and law enforcement; stifling crime-reporting systems and submitting false
reports of crimes. Additionally, it can assume the persona of a public official or law
enforcement officer. Malicious minds frequently use computer technology to carry out
infrastructures, decrease its responding capacity in the event of foreign invasions, and
crack its fiscal stability. When a criminal breaks into the classified systems of the
national defense system and extracts data of top secrets and exchanges with foreign
including voluntary and legally mandated cooperation. Since there are currently
cybercrime offenses.
Congress has yet to act on the pending bills aimed at enacting cybercrime law in the
Philippines despite all of the consolidation, revisions, and re-filing of the improved bills
When litigating cybercrime cases, judges and prosecutors must have technical
expertise.
To fight such a technical war, law enforcement agencies require specialized training and
equipment.
Lastly, capacity building efforts will be enhanced by tapping into all government-allied
RECOMMENDATIONS
Law enforcement agencies should be given enough money to buy the tools,
equipment, and technical skills they need to protect network systems from
In order for everyone to become responsible and ethical users of computers and
BIBLIOGRAPHY
Electronic Sources:
Sherman. (2005). Organized crime has globalized and turned into a security
threat. United Nations : Office on Drugs and Crime. Retrieved on
February 21, 2023 from https://tinyurl.com/mu6yc9yy
Alipour H (20044). Cybercrime. Legal Studies. Retrieved on February 18, 2023 from:
https://tinyurl.com/muy3epbmmuy3epbm
Asam, A. E., & Samara, M. (2016, December 1). Cyberbullying and the law: A review of
psychological and legal challenges. Computers in Human Behavior; Elsevier BV.
Retrieved on February 20, 2023 from:https://tinyurl.com/yy8v5bpu
Cybersquatting Cases, Law, Lawsuit. (2020, May 3). California Trademark Attorneys.
Retrieved on February 23, 2023 from: https://www.mandourlaw.com/cybersquatting/
Goldouzian I (2005). Specific criminal law. Retrieved on February 22, 2023 from:
https://tinyurl.com/mr49x33n