You are on page 1of 11

MODULE 6 products and then try to get a court order to shut down

Threats to Computers and Communication Systems the bulletin boards.


1. ERRORS & ACCIDENTS • They also look for organizations that “soft lift”—
In general, errors and accidents in computer systems companies, colleges, or other institutions that buy one
may be classified as human errors, procedural errors, software copy of a program and make copies for many
errors, “dirty data” problems, and electromechanical problems. computers.
THEFT OF ONLINE MUSIC & MOVIES
HUMAN ERRORS • Many students may feel that illegally downloading
• Humans often are not good at assessing their own information music and movies is a victimless crime, but to the
needs entertainment industry it is just plain piracy or theft.
• Human emotions affect performance. THEFT OF TIME & SERVICES
• Humans act on their perceptions. • The theft of computer time is more common than you
• Human perception may be affected by might think. Probably the biggest instance is people
information overload It may also be affected by using their employer’s computer time to play games, do
unwarranted self-assurance about one’s own abilities online shopping, or dip into web pornography. Some
people even operate sideline businesses.
PROCEDURAL ERRORS THEFT OF INFORMATION
- Some spectacular computer failures have occurred They have infiltrated the files of the Social Security
because someone didn’t follow procedures Administration, stolen confidential personal records, and sold
the information. On college campuses, they have snooped on or
SOFTWARE ERRORS stolen private information such as grades. They have broken
- We are forever hearing about “software glitches” or into computers of the major credit bureaus and stolen credit
“software bugs.” information and have then used the information to charge
- A software bug is an error in a program that causes it purchases or have resold it to other people. They have
not to work properly. plundered the credit card numbers of millions of Americans and
sold stolen identity data to conspirators in other countries.
“DIRTY DATA” PROBLEMS INTERNET-RELATED FRAUD
- Dirty data is incomplete, outdated, or otherwise Internet or online service fraud is a runaway problem,
inaccurate data. accounting for 90% of all consumerfraud complaints to the
- Although databases are a timesaving resource for Federal Trade Commission in 2008. The most common
information seekers, they can also act as catalysts, complaints, according to the Internet Crime Complaint Center,
speeding up and magnifying bad data. were non delivery of merchandise and/or payment (32.9%),
internet auction fraud (25.5%), and credit/debit card fraud
ELECTROMECHANICAL PROBLEMS: ARE “NORMAL (9.0%).
ACCIDENTS” INEVITABLE? TAKING OVER YOUR PC: ZOMBIES, BOTNETS, &
Mechanical systems, such as printers, and electrical BLACKMAIL
systems, such as circuit boards, don’t always work. They may • A zombie, or drone, a computer taken over covertly
be faultily constructed, get dirty or overheated, wear out, or and programmed to respond to instructions sent
become damaged in some other way. Two examples: remotely, often by instant-messaging channels.
• Electrical problems: Power failures (brownouts and • Botnet, short for “robot network,” a network of
blackouts) can shut a system down. Power surges can also burn computers compromised by means of a Trojan horse
out equipment. that plants instructions within each PC to wait for
• Voting machine breakdowns: As examples of how badly commands from the person controlling that network.
information technology can work, we have only to consider • These remote-controlled networks are best detected
failures in voting machines, when printers jammed, servers by the internet access provider, which can block the
crashed, and poorly designed touch-screen ballots led voters to illicit network connections and help users disinfect their
make mistakes that invalidated their votes. PCs.
• The zombie computers and botnet are used to
2. NATURAL HAZARDS launch phishing attacks or send spam messages. They
• Some disasters do not merely lead to temporary can also be used to launch denial-of-service attacks,
system downtime; they can wreck the entire system. perhaps to extort money from the targeted sites in
• Whatever is harmful to property (and people) is return for halting the attacks.
harmful to computers and communications systems. • Blackmail has also been used in conjunction with the
This certainly includes natural disasters: fires, floods, theft of credit card numbers or documents.
earthquakes, tornadoes, hurricanes, blizzards, and the CRIMES OF MALICE: CRASHING ENTIRE SYSTEMS
like. If they inflict damage over a wide area, as have ice • Sometimes criminals are more interested in
storms in eastern Canada or hurricanes in the Gulf abusing or vandalizing computers and
Coast states, natural hazards can disable all the telecommunications systems than in profiting from
electronic systems we take for granted. them. For example, a student at a Wisconsin campus
• Without power and communications connections, deliberately and repeatedly shut down a university
cellphones, automated teller machines, credit card computer system, destroying final projects for dozens
verifiers, and bank computers are useless. of students; a judge sentenced him to a year’s
probation, and he left the campus.
3. COMPUTER CRIMES
A computer crime can be of two types. (1) It can be an 4. COMPUTER CRIMINALS
illegal act perpetrated against computers or INDIVIDUALS OR SMALL GROUPS
telecommunications, or (2) it can be the use of computers • individuals or members of small groups who use
or telecommunications to accomplish an illegal act. fraudulent email and websites to obtain personal
The following are crimes of both types. information that can be exploited, either for monetary
THEFT OF HARDWARE gain or sometimes simply to show off their power and
• Hardware theft can range from shoplifting an accessory give them bragging rights with other members of the
in a computer store to removing a laptop or cellular hacker/ cracker community.
phone from someone’s car. EMPLOYEES
• Professional criminals may steal shipments of • Workers may use information technology for
microprocessor chips off a loading dock or even pry personal profit or to steal hardware or information to
cash machines out of shopping-center walls. sell.
THEFT OF SOFTWARE • They may also use it to seek revenge for real or
• Pirated software, is software obtained illegally, as imagined wrongs, such as being passed over for
when you make an illegal copy of a commercial video promotion; indeed, the disgruntled employee is a
game. principal source of computer crime.
• This is so commonplace that software makers secretly OUTSIDE PARTNERS & SUPPLIERS
prowl electronic bulletin boards in search of purloined

1
•Suppliers and clients may also gain access to a 2. IDENTIFICATION & ACCESS
company’s information technology and use it to commit The systems try to authenticate your identity by determining
crimes, especially since intranets and extranets have (1) what you have, (2) what you know, or (3) who you are.
become more commonplace.
• Partners and vendors also may be the inadvertent WHAT YOU HAVE—CARDS, KEYS, SIGNATURES, &
source of hacker mischief because their systems may BADGES
not be as well protected as the larger partner’s Credit cards, debit cards, and cash-machine cards all
networks and computers, and so a third party may have magnetic strips or built-in computer chips that identify you
penetrate their security. to the machine. Of course, credit cards, keys, and badges can
CORPORATE SPIES be lost or stolen. Signatures can be forged. Badges can be
• Competing companies or individuals may break into counterfeited.
a company’s computer system to conduct industrial WHAT YOU KNOW—PINs & PASSWORDS
espionage—obtain trade secrets that they can use for • To gain access to your bank account through an automated
competitive advantages. teller machine (ATM), you key in your PIN.
ORGANIZED CRIME • A PIN (personal identification number) is the security
• Members of organized crime rings not only steal number known only to you that is required to access the
hard ware, software, and data; they also use spam, system.
phishing, and the like to commit identity theft and online • Telephone credit cards also use a PIN.
fraud. • passwords are special words, codes, or symbols required
• Even street gangs now have their own web sites, to access a computer system. Passwords are one of the
most of them perfectly legal, but some of them possibly weakest security links, and most can be easily guessed or
used as chat rooms for drug distribution. In addition, stolen.
gangs use computers the way legal businesses do— WHO YOU ARE—PHYSICAL TRAITS
as business tools—but they use them for illegal • Biometrics is the science of measuring individual body
purposes, such as keeping track of gambling debts and characteristics.
stolen goods. • Biometric authentication devices authenticate a
CYBERWAR FIGHTERS person’s identity by verifying his or her physical or
• Cyberwarfare, or cyberwar, is the use of behavioral characteristics with a digital code stored in a
computers and the internet to attack an enemy’s computer system.
information systems.
• Cyberwar may be conducted on the level of 3. ENCRYPTION
psychological warfare, as has happened in the • Encryption is the process of altering readable data
Middle East, for instance, where Israeli and into unreadable form to prevent unauthorized access, and
Palestinian opponents in the Gaza war have used it is what has given people confidence to do online
cellphones to warn the other side of impending shopping and banking. Encryption is clearly useful for
attacks. some organizations, especially those concerned with trade
secrets, military matters, and other sensitive data.
SECURITY: Safeguarding Computers & Communications
The ongoing dilemma of the Digital Age is balancing Protection of Software & Data
convenience against security. CONTROL OF ACCESS
• Security is a system of safeguards for Access to online files is restricted to those who have a
protecting information technology against disasters, legitimate right to access—because they need them to do their
system failures, and unauthorized access that can jobs. Many organizations have a system of transaction logs for
result in damage or loss. recording all accesses or attempted accesses to data.
We consider five components of security AUDIT CONTROLS
1. DETERRENTS TO COMPUTER CRIME Many networks have audit controls for tracking which
What are some ways to deter computer crime? programs and servers were used, which files opened, and so on.
As information technology crime has become more This creates an audit trail, a record of how a transaction was
sophisticated, so have the people charged with preventing it and handled from input through processing and output.
disciplining its outlaws. PEOPLE CONTROLS
ENFORCING LAWS Because people are the greatest threat to a computer
• Law enforcement agencies regularly cruise online system, security precautions begin with the screening of job
bulletin boards and chat rooms looking for pirated applicants.
software, stolen trade secrets, child molesters, and • Résumés are checked to see if people did what they
child pornography. said they did.
• separate employee functions, so that people are not
TOOLS FOR FIGHTING FRAUDULENT & UNAUTHORIZED allowed to wander freely into areas not essential to their
ONLINE USES jobs.
• Rule-based-detection software: In this technique, users • Manual and automated controls—input controls,
such as merchants create a “negative file” that states the criteria processing controls, and output controls—are used to
each transaction must meet. (mga last digit ng sa resibo) check if data is handled accurately and completely during
• Predictive-statistical-model software: In this technique, tons the processing cycle.
of data from previous transactions are examined to create • Printouts, printer ribbons, and other waste that may
mathematical descriptions of what a typical fraudulent reveal passwords and trade secrets to outsiders are
transaction is like. The software then rates incoming orders disposed of through shredders or locked trash barrels.
according to a scale of risk based on their resemblance to the 4. DISASTER-RECOVERY PLANS
fraud profile. A disaster-recovery plan is a method of restoring
• Employee internet management (EIM) software: Programs information-processing operations that have been halted by
made by Websense, SmartFilter, and Pearl Echo-Suite are used destruction or accident.
to monitor how much time workers spend on the web and even Mainframe computer systems are operated in separate
block access to gambling and porn sites. departments by professionals, who tend to have disaster plans.
• Internet filtering software: Some employers use special Whereas mainframes are usually backed up, many personal
filtering software to block access to pornography, bootleg-music computers, and even entire local area networks, are not, with
download, and other unwanted internet sites that employees potentially disastrous consequences.
may want to access. • A disaster-recovery plan is more than a big fire drill. It
• Electronic surveillance: Employers use various kinds of includes a list of all business functions and the hardware,
electronic surveillance that includes visual and audio monitoring software, data, and people that support those functions, as
technologies, reading of email and blogs, and recording of well as arrangements for alternate locations.
keystrokes. Some companies even hire undercover agents to • The disaster recovery plan also includes ways for backing
pretend to be coworkers. up and storing programs and data in another location, ways
of alerting necessary personnel, and training for those
personnel.

2
Privacy & Surveillance Primary key
Surveillance implies an agent who accesses (whether - assigned to a field, uniquely identifies each record in a
through discovery tools, rules or physical/logistical settings) table. It tells the database program how your records
personal data. Privacy, in contrast, involves a subject who will be sorted, and it prevents duplicate entries.
restricts access to personal data through the same means. - In the image, the primary key is the Contact ID field.

• Privacy is the right of people not to reveal information ➢ When you start Access, the window you see is similar to
about themselves other Microsoft Office applications in several ways – it
displays a title bar, the Ribbon and a status bar.
Data Collectors and Spies ➢ Unlike Word, Excel and Powerpoint, however, Access does
The rise of Big Data has led to continuing threats to not have a standard document view with the database.
privacy from three giant sources there are considered as the Furthermore, many of the Ribbon buttons are unique to
society’s data collectors and spies: Access.
1. From business organizations Using the data stored in the table, you can use Access
2. From governments, local to national to create the following objects: queries, forms and reports. A
3. From foreign governments and criminal groups query asks a question about the data stored in the table. The
Business & Cyberspying database program searches for and retrieves information from a
1. Almost everything we do online is being scooped table or tables to answer the questions. You use forms to enter
up and recorded for use by marketers, and it’s data into a table a report to print selected data. All of these
difficult to know what parts of our own lives still objects – tables, forms, queries and reports – are stored in a
belong to us. single file, which is the database.
2. Whatever the impact on your personal privacy, it EXPLORE MS ACCESS ENVIRONMENT
seems unlikely that you can claim ownership of a
lot of data that’s being collected about you. At
work, for instance, you basically have no rights.
Government & Cyber spying
• Governments at all levels spy on their citizens, sometimes
encouraged by the law, sometimes in spite of the law, often
unknown to us.
• Local police, national ID cards, National Security Agency
(NSA), FBI, drones, and so on
Spying, Hacking, & Cyberwarfare by Foreign Governments
& Groups
• The world is so interconnected that it is a constant struggle for
technology managers to keep us secure against cyber invasions
of all sorts.
• Governments get involved in cyberwarfare —warfare involving
computers and the Internet in which one nation attacks another’s
information systems.
CHAPTER SUMMARY
• Threats to computers and communication systems
includes errors and accidents, natural hazards,
computer crimes and computer criminals.
• The five components of security to protect computer
and communications are the deterrents to computer
crime, identification and access, encryption, protection
of software and data and disaster-recovery plans.
• Data collectors and spies in our society include
business organizations, governments and foreign
governments and criminal groups. Microsoft Access is a "relational" database
application.
MODULE 7 • Relational means we can link together sets of data, we
DATABASE CONCEPTS can relate the data.
• collection of related information organized in a • Access allows us to relate our data, without the
manner that provides for rapid search a retrieval. repetition that may occur anywhere else. In an Access
• A database management system (DBMS) is a database, we can create both of the datasets and link
software program that is used to create, maintain and them
provide controlled access to data.
• A database and spreadsheet are somewhat
similar.
• A database however, provides additional
comprehensive functions for manipulating data.
• In Access the data is saved in Tables. As the data in
Database Structure the Tables change, the rest of the Access database will
• A table is composed of columns and rows, reflect the newest information
referred to as fields and records in Access. • A Query can pull from multiple Tables and allow you to
limit the records (rows) display by using criteria and
showing only the fields (columns) you want
• Forms can be created to provide a "user‐friendly" side
to your database. They are used to view and enter your
data in an interactive formatted structure.

Following is a description of the three table


components identified in the above image:
• The rows in the table are called records.
• Each record is a group of related fields, such as all
of the information regarding each member in a
membership database or each customer in a customer
table.
• The columns in the table are called fields. Each field
contains a specific piece of information within a record
within a record.

3
Forms
• used to make menus and search windows that turn
a simple data collection tool into a more interactive
user‐friendly application.
Reports
• created to print out your data in a formatted structure.
• They allow you to group and organize your data.
• Access works beautifully with Word for mail merges,
but the Reports tool allows for the multi‐level
summaries
Planning the Database
1. Input ‐ What data do I already have for the database?
2. Output ‐ What information do I want to get out of the
database?
3. Process ‐ What do I need to do to get there?

Basic Access Objects Access consists of four main Reports


database objects: Tables, Queries, Forms, and Reports. • Reports are designed to create an organized output of
• Each object has at least two views, Design and data from your database.
"Data". • With a Report, you can group and summarize
• The Design View is where we build the structure information.
of that database object. • You can't edit the data in a Report, but if you make the
• The data view shows the output of the data and modifications in the Table, Query, or Form you will see
is different for each object. the results when you open the Report again.
• Tables and Queries have a Datasheet View • Reports have four basic views: Report View, Print
• Forms have a Form View, and Reports have a Preview, Layout View, and Design View
Report View, or a Print Preview view.

Tables
MANAGING DATA IN A TABLE
• Tables store data.
The Navigation Pane:
• The Tables are the true 'database' (base of data).
The Navigation Pane is a list containing every object
• These need to be created and properly linked (related) in your database. For easier viewing, the objects are organized
in order to effectively use the other Access tools. into groups by type. You can open, rename, and delete objects
• Tables are the core of your database everything else in using the Navigation Pane.
Access depends on the Tables. To Minimize and Maximize the Navigation Pane:
The Design View of a Table allows you to create and modify: ‐ Click the double arrow in the upper-right corner of the
• Field Names (the column headings) Navigation Pane to minimize and maximize.
• The type of data stored in a field (Data Type).
Sorting the Objects in the Navigation Pane:
By default, objects are sorted by type, with the tables
in one group, the forms in another, etc. However, you can
change how the objects are sorted. Click the drop-down arrow
to the right of the All Access Objects and click on a sort option
from the list.

Understanding Views:
There are multiple ways to view a database object.
The two views for tables are Design View and Datasheet View.
• Design View is used to set the data types, insert or delete
fields, and set the Primary Key
• Datasheet View is used to enter and view the data for the
records
Switching Between Design View and Datasheet View:
Click the View arrow on the Home tab and click on
either Datasheet View or Design View

4
2. When you have completed the record (row), press Enter
3. You can also click on the New record icon on the Home tab
in the Records group

Navigating in a Table:
Use the arrows at the bottom of the table to navigate
among records.
Sorting Records in a Table:
1. Position your cursor in the field that you wish to sort
by clicking on any record in the table
2. Click either the Sort Ascending or Sort Descending
icon on the Home tab in the Sort & Filter group
Creating a Table:
A table is a collection of data about a specific topic,
such as employee information, products or customers. The first CREATE FORM AND REPORT
step in creating a table is entering the fields and data types. This Creating a Form:
can be done in either Datasheet View or Design View but it is A form is a database object that is used to enter or
recommended to set up the table in Design View. display data in a database. To Create a Form:
1. Open the table or query on which you are basing the form
2. Click on the Create tab
3. Click on Form in the Forms group
A form is created and opens in Layout View.
Sample Form

Reports:
To Create a Table in Design View: Reports can be based on tables or queries. To Create
1. Click on the Create tab a Report:
2. Click on Table 1. Open the table or query on which you are basing the report
3. Switch over to Design View on the Home tab 2. Click on the Create tab
4. If prompted to save the table, enter a name and click on OK 3. Click on Report in the Reports group
5. Type the field names and select the appropriate data type for A report is created in Layout View.
each field Sample Report
6. Continue until all fields are added Note: The order that you
enter the field names is the order the fields will appear in the
table.
Setting a Primary Key:
The Primary Key is the unique identifier for each record
in a table. Access will not allow duplicate entries in a primary key
field. When creating a new table, Access automatically creates
a field “ID” with the autonumber data type, and assigns this as
the Primary Key. Printing Reports:
To Set a Primary Key: To Print a Report:
1. In Design View, position your cursor in the field you 1. Switch to Print Preview from View on the Design tab under
wish to set as the Primary Key Report Layout Tools
2. Click the Primary Key button on the toolbar 2. Click the Print icon
3. Save the table 3. Click on OK
Note: To turn off the Primary Key simply click on the Primary Key
button again. Different Views:
Input Masks: Print Preview – allows you see what the report would look like
An input mask is used to pre-format a field to “look/act” on a printed piece of paper
a certain way when a user inputs data. Examples: Social Report View – allows you to see the data without having to
Security Number input mask automatically inserts the dashes; display it in
phone numbers automatically inserts the parentheses and Print Preview Layout View – allows you make design changes
dashes. The input mask data can either be stored in the table or while browsing your data
simply displayed and not stored. Design View - gives you a more detailed view of the structure
To Create an Input Mask for a Field: of your report
1. In Design View, click in a field for which you’d like to apply QUERY
an input mask Queries: You use queries to view, change, and analyze data in
2. In the Field Properties section at the bottom of the screen, different ways. You can also use them as a source of records for
click in the Input Mask line and notice the Build button that forms and reports. To Create a Query:
appears at the right end of the line 1. Click on the Create tab
3. Click the Build button to start the Input Mask Wizard 2. Click on Query Design in the Queries group
4. Select the appropriate input mask 3. Select the table that you would like to base your query on
5. Click Next 4. Click Add
6. Click Next for additional screens on which you can set 5. Repeat steps 3 and 4 until all tables are added
options for the input mask 6. Close the Show Table window
7. Click Finish on the last screen of the input mask wizard The table(s) will now be displayed in the upper part of
To Save the Table: the Query Design Screen by boxes containing the
1. Click the Save icon on the toolbar tables’ fields
2. Enter a name for the table if you haven’t done so already 7. Double-click on the field names in the field list window which
3. Click OK you would like to include in the query
Entering Data in a Table:
1. In Datasheet View, start typing the data into the table by Sample Query
pressing the tab key to move to the next cell

5
communications, to intercept, disclose, or use that
communication in the normal course of his employment while
engaged in any activity that is necessary to the rendition of his
service or to the protection of the rights or property of the service
provider, except that the latter shall not utilize service observing
or random monitoring except for mechanical or service control
quality checks.
3. Data interference - the intentional or reckless alteration of
computer data without right.
4.System Interference - the intentional or reckless hindering
Defining Criteria in the Query: without right of the functioning of a computer system by
In order to control which records are displayed, you
inputting, transmitting, deleting or altering computer data or
must define criteria in a query. The most common type of query
program.
is the Select Records query which will be discussed below. 5. Misuse of Devices –
To Define Criteria for Your Query: a. The use, production, sale, procurement, importation,
1. Position your cursor in the criteria row in the field for which
distribution, or otherwise making available, without right, of:
you wish to define the criteria for
i. a device, including a computer program, designed or
2. Type the criteria Example: To find all Excel courses: adapted primarily for the purpose of committing any of the
3. Position your cursor in the criteria row of the Course ID field offenses under this Act; or
4. Type Excel (Access adds the quote marks to the criteria
ii. a computer password, access code, or similar data
automatically when you tab to the next column)
by which the whole or any part of a computer system is capable
5. Click the Run Query button of being accessed with intent that it be used for the purpose of
committing any of the offenses under this Act.
To Save the Query:
b. The possession of an item referred to in paragraphs 5(a) (i)
1. Click the Save icon
or (ii) above with intent to use said devices for the purpose of
2. Enter a name for the query committing any of the offenses under this Section.
3. Click OK Provided, That no criminal liability shall attach when the use,
CHAPTER SUMMARY
production, sale, procurement, importation, distribution, or
• A database is a collection of related information otherwise making available, or possession of computer
organized in a manner that provides for rapid search a devices/data referred to is for the authorized testing of a
retrieval. A database management system (DBMS) is computer system. Any person found guilty of any of the
a software program that is used to create, maintain and punishable acts enumerated in Section 4A of this Act shall be
provide controlled access to data. punished with imprisonment of prision mayor or a fine of at least
• • Microsoft Access is a "relational" database Two Hundred Thousand Pesos (Php200, 000.00) up to a
application. Relational means we can link together sets maximum amount commensurate to the damage incurred or
of data, we can relate the data. both.
• • Basic Access Objects Access consists of four main B. Computer-related Offenses:
database objects: Tables, Queries, Forms, and 1. Computer-related Forgery –
Reports. Each object has at least two views, Design a. the intentional input, alteration, or deletion of any
and "Data". computer data without right resulting in inauthentic
MODULE 8 data with the intent that it be considered or acted upon
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE for legal purposes as if it were authentic, regardless
PREVENTION, INVESTIGATION, SUPPRESSION AND THE whether or not the data is directly readable and
IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER intelligible;
PURPOSES b. the act of knowingly using computer data which is
(Republic Act No. 10175) the product of computer-related forgery as defined
PRELIMINARY PROVISIONS herein, for the purpose of perpetuating a fraudulent or
Title. – This Act shall be known as the “Cybercrime Prevention dishonest design.
Act of 2012.” 2. Computer-related Fraud – the intentional and unauthorized
input, alteration, or deletion of computer data or program or
Declaration of Policy. – The State recognizes the vital role of interference in the functioning of a computer system, causing
information and communications industries such as content damage thereby, with the intent of procuring an economic
production, telecommunications, broadcasting, electronic benefit for oneself or for another person or for the perpetuation
commerce, and data processing, in the nation’s overall social of 6 a fraudulent or dishonest activity; Provided, that if no
and economic development. The State also recognizes the damage has yet been caused, the penalty imposable shall be
importance of providing an environment conducive to the one degree lower.
development, acceleration, and rational application and 3. Computer-related Identity Theft – the intentional
exploitation of information and communications technology to acquisition, use, misuse, transfer, possession, alteration or
attain free, easy, and intelligible access to exchange and/or deletion of identifying information belonging to another, whether
delivery of information; and the need to protect and safeguard natural or juridical, without right; Provided, that if no damage has
the integrity of computer, computer and communications yet been caused, the penalty imposable shall be one degree
systems, networks, and databases, and the confidentiality, lower.
integrity, and availability of information and data stored therein, Any person found guilty of any of the punishable acts
from all forms of misuse, abuse, and illegal access by making enumerated in Section 4B of this Act shall be punished with
punishable under the law such conduct or conducts. In this light, imprisonment of prision mayor or a fine of at least Two Hundred
the State shall adopt sufficient powers to effectively prevent and Thousand Pesos (Php200, 000.00) up to a maximum amount
combat such offenses by facilitating their detection, commensurate to the damage incurred or both.
investigation, and prosecution at both the domestic and C. Content-related Offenses:
international levels, and by providing arrangements for fast and 1. Cybersex – Any person who knowingly undertakes,
reliable international cooperation. organizes or facilitates directly or indirectly, any
PROHIBITED ACTS operation for the lascivious exhibition of sexual organs
Cybercrime Offenses. – The following acts constitute the or for sexual activity with the aid of or through the use
offense of cybercrime punishable under this Act: of a computer system, for a favor or consideration.
A. Offenses against the confidentiality, integrity and
availability of computer data and systems: Any person found guilty of any of this punishable
1. Illegal Access - The intentional access to the whole or any offense shall be punished with imprisonment of prision
part of a computer system without right. mayor or a fine of at least Five Hundred Thousand
2. Illegal Interception - without right of any non-public Pesos (Php500,000.00) but not exceeding One Million
transmission of computer data to, from, or within a computer Pesos (Php1,000,000.00) or both.
system including electromagnetic emissions from a computer
system carrying such computer data; Provided, however, That it Provided, that any person found guilty of committing
shall not be unlawful for an officer, employee, or agent of a this punishable offense against three (3) or more
service provider, whose facilities are used in the transmission of persons, individually or collectively, shall be punished

6
with imprisonment one degree higher than that of the assistance in obtaining information necessary for the
prescribed penalty for the offense or a fine of more than proper discharge of its responsibilities under this Act,
One Million Pesos (Php1,000,000.00) but not and examine, if necessary, the pertinent records and
exceeding Two Million Pesos (Php2,000,000.00) or documents in the possession of such government
both. agency;
g. To require the PNP Cybercrime Center and the NBI
2. Unsolicited Commercial Communications - The Cybercrime Division to submit timely and regular
transmission of commercial electronic communication reports including pre-operation, post-operation and
with the use of computer system which seek to investigation results and such other documents for
advertise, sell, or offer for sale products and services review and monitoring;
are prohibited unless: a. There is a prior affirmative h. To facilitate international cooperation on intelligence,
consent from the recipient; or b. The following investigations, training and capacity building related to
conditions are present: cybercrime prevention, suppression and prosecution;
and
i. The commercial electronic communication i. To perform such other functions as it may deem
contains a simple, valid, and reliable way for the appropriate and necessary for the proper enforcement
recipient to reject receipt of further commercial of this Act.
electronic messages (‘opt-out’) from the same j.
source; Information and Communications Technology Office. – The
ii. The commercial electronic communication does Information and Communications Technology Office (ICTO)
not purposely disguise the source of the electronic shall be responsible for formulating and implementing a national
message; and cyber security plan and extending immediate assistance for the
iii. iii. The commercial electronic communication does suppression of real-time commission of cybercrime offenses
not purposely include misleading information in through a computer emergency response team (CERT).
any part of the message in order to induce the Cybercrime Courts. – There shall be designated special courts
recipients to read the message. manned by cyber-trained judges to handle cybercrime cases.
Any person found guilty of any of this punishable offense shall Preservation of Computer Data. – The integrity of traffic data
be punished with a fine of at least Fifty Thousand Pesos and subscriber information relating to communication services
(Php50,000.00) but not exceeding Two Hundred Fifty Thousand provided by a service provider shall be preserved for a minimum
Pesos (Php250,000.00) for each transmission. period of six (6) months from the date of the transaction. Content
IMPLEMENTING AGENCIES data shall be similarly preserved for six (6) months from the date
Law Enforcement Authorities. – There is created a Cybercrime of receipt of the order from the central authority requiring its
Center in the Philippine National Police (PNP), a Cybercrime preservation.
Division in the National Bureau of Investigation (NBI) and an The central authority may order a one-time extension for another
Office of Cybercrime in the Department of Justice (DOJ) to six (6) months provided that once computer data preserved,
implement the provisions of this Act. The specialized units shall transmitted or stored by a service provider is used as evidence
be adequately resourced and staffed with cyber-trained in a case, the service provider shall transmit and endorse the
personnel. computer data to central authority.
Powers and Functions. – The PNP Cybercrime Center and NBI The service provider ordered to preserve computer data shall
Cybercrime Division shall have the following powers and keep confidential the order and its compliance.
functions
a. To investigate all cybercrimes where computer Disclosure of Computer Data. – The central authority shall
systems are involved; issue an order requiring any person or service provider to
b. To conduct data recovery and forensic analysis on disclose or submit subscriber’s information, traffic data or
computer systems and other electronic evidence relevant data in his/its possession or control within seventy two
seized as provided under Chapter IV of this Act; (72) hours from receipt of the order in relation to a valid
c. To formulate guidelines in investigation, forensic complaint officially docketed and assigned for investigation and
evidence recovery, and forensic data analysis the disclosure is necessary and relevant for the purpose of
consistent with industry standard practices; investigation.
d. To provide technological support to investigate units Search, Seizure and Examination of Computer Data. –
within the PNP and NBI including the search, seizure, Where a search and seizure warrant is properly issued, the law
evidence preservation, forensic recovery of data from enforcement authorities shall likewise have the following powers
crime scenes and systems used in crimes and to and duties: Within the time period specified in the warrant, to
provide testimonies; conduct interception, as defined in this Act, content of
e. To develop public, private sector, and law enforcement communications, procure the content of data either directly,
agency relations in addressing cybercrimes; through access and use of computer system, or indirectly,
f. To maintain necessary and relevant databases for through the use of electronic tapping devices, in real time or at
statistical and/or monitoring purposes; and the same time that the communication is occurring and:
g. To develop capacity within their organizations in order a. To secure a computer system or a computer data
to perform such duties necessary for the enforcement storage medium;
of this act. b. To make and retain a copy of those computer data
secured;
The DOJ Office of Cybercrime shall have the following powers c. To maintain the integrity of the relevant stored
and functions: computer data;
a. To act as a central authority for all requests for d. To conduct examination of the computer data storage
assistance for investigation or proceedings concerning medium; and
criminal offenses, facilitate the provisions of legal or e. To render inaccessible or remove those computer data
technical advice, preservation and production of data, in the accessed computer or computer and
collection of evidence, giving legal information and communications network.
locating suspects; Law enforcement authorities may request for an extension of
b. To act on complaints/referrals of cybercrime offenses time to complete the examination of the computer data storage
and other violations of this Act; medium and to make a return thereon but in no case for a period
c. To issue preservation and production orders longer than thirty (30) days from date of approval by the court.
addressed to service providers, subpoena duces Restricting or Blocking Access to Computer Data. – When a
tecum, subpoena ad testificandum and summon computer data is prima facie found to be violative of the
witnesses to appear in any investigation or provisions of this Act, the central authority shall issue an order
proceedings for cybercrime offenses; to restrict or block access to such computer data.
d. To cause the filing of complaints for the prosecution of Non-compliance. – Failure to comply with the provisions of
cybercrime offenses; Chapter IV shall be punished as a violation of P.D. No. 1829 with
e. To punish any person who fails to comply with the imprisonment of prision correccional in its maximum period or a
orders under Chapter IV of this Act, for direct and fine of One Hundred Thousand Pesos (Php100,000.00) or both,
indirect contempt; for each and every non-compliance with such an order
f. To request the different government agencies for

7
INTERNATIONAL COOPERATION The CISSP — an organization of computer security
professionals — has used the commandments as a foundation
General Principles Relating to International Cooperation — for its own ethics rules.
All relevant international instruments on international Commandment 1
cooperation in criminal matters, arrangements agreed on the Simply put: Do not use the computer in ways that may
basis of uniform or reciprocal legislation, and domestic laws, to harm other people.
the widest extent possible for the purposes of investigations or Explanation: This commandment says that it is
proceedings concerning criminal offenses related to computer unethical to use a computer to harm another user. It is
systems and data, or for the collection of evidence in electronic not limited to physical injury. It includes harming or
form of a criminal, offense shall be given full force and effect. corrupting other users' data or files. The
commandment states that it is wrong to use a computer
to steal someone's personal information. Manipulating
COMPETENT AUTHORITIES
or destroying files of other users is ethically wrong. It is
unethical to write programs, which on execution lead to
Department of Justice (DOJ). — There is hereby created an stealing, copying or gaining unauthorized access to
Office of Cybercrime within the DOJ designated as the central other users' data. Being involved in practices like
authority in all matters related to international mutual assistance hacking, spamming, phishing or cyber bullying does
and extradition. not conform to computer ethics.
Examples: Sending virus in order to hack personal
Cybercrime Investigation and Coordinating Center. information and exposing to the others.
— There is hereby created, within thirty (30) days from the • Commandment 2
effectivity of this Act, an inter-agency body to be known as the Simply put: Do not use computer technology to cause
Cybercrime Investigation and Coordinating Center (CICC), interference in other users' work.
under the administrative supervision of the Office of the Explanation: Computer software can be used in ways
President, for policy coordination among concerned agencies that disturb other users or disrupt their work. Viruses,
and for the formulation and enforcement of the national for example, are programs meant to harm useful
cybersecurity plan. computer programs or interfere with the normal
functioning of a computer. Malicious software can
Composition. — The CICC shall be headed by the Executive disrupt the functioning of computers in more ways than
Director of the Information and Communications Technology one. It may overload computer memory through
Office under the Department of Science and Technology (ICTO- excessive consumption of computer resources, thus
DOST) as Chairperson with the Director of the NBI as Vice slowing its functioning. It may cause a computer to
Chairperson; the Chief of the PNP; Head of the DOJ Office of function wrongly or even stop working. Using malicious
Cybercrime; and one (1) representative from the private sector software to attack a computer is unethical.
and academe, as members. The CICC shall be manned by a Examples: Deleting friend's essay document and
secretariat of selected existing personnel and representatives saying I was just playing.
from the different participating agencies. • Commandment 3
Simply put: Do not spy on another person's computer
FINAL PROVISIONS data.
Explanation: We know it is wrong to read someone's
personal letters. On the same lines, it is wrong to read
Waiver of Bank Secrecy. – Any investigation of cybercrime
someone else's email messages or files. Obtaining
offenses under this Act that necessarily includes an inquiry to
data from another person's private files is nothing less
any particular deposit or investment with any banking institution
than breaking into someone's room. Snooping around
or non-bank financial institution shall be considered as an
in another person's files or reading someone else's
exception to the absolute confidential nature of all deposits
personal messages is the invasion of his privacy. There
provided under R.A. No. 1405.
are exceptions to this. For example, spying is
TEN COMMANDMENTS OF COMPUTER ETHICS necessary and cannot be called unethical when it is
done against illegitimate use of computers. For
The Ten Commandments of Computer Ethics were created example, intelligence agencies working on cybercrime
in 1992 by the Computer Ethics Institute. The commandments cases need to spy on the internet activity of suspects.
were introduced in the paper "In Pursuit of a 'Ten Examples: Look for students' grades from the teachers'
Commandments' for Computer Ethics" by Ramon C. Barquin as computers
a means to create "a set of standards to guide and instruct
• Commandment 4
people in the ethical use of computers." They followInternet
Simply put: Do not use computer technology to steal
Advisory Board's memo on ethics from 1987. The Ten
information.
Commandments of Computer Ethics copies the archaic style of
Explanation: Stealing sensitive information or leaking
the Ten Commandments from the King James Bible.
confidential information is as good as robbery. It is
The commandments have been widely quoted in wrong to acquire personal information of employees
computer ethics literature but also have been criticized by both from an employee database or patient history from a
the hacker community and some in academia. For instance, Dr. hospital database or other such information that is
Ben Fairweather of the "Centre for Computing and Social meant to be confidential. Similarly, breaking into a bank
Responsibility" has described them as "simplistic" and overly account to collect information about the account or
restrictive. account holder is wrong. Illegal electronic transfer of
funds is a type of fraud. With the use of technology,
stealing of information is much easier. Computers can
be used to store stolen information.
Examples: Taking someone's personal information or
idea to use without any approval
• Commandment 5
Simply put: Do not contribute to the spread of
misinformation using computer technology.
Explanation: Spread of information has become viral
today, because of the Internet. This also means that
false news or rumors can spread speedily through
social networking sites or emails. Being involved in the
circulation of incorrect information is unethical. Mails
and pop-ups are commonly used to spread the wrong
information or give false alerts with the only intent of
selling products. Mails from untrusted sources
advertising certain products or spreading some hard-

8
to-believe information, are not uncommon. Direct or others' time and resources. Also, one should be
indirect involvement in the circulation of false considerate with a novice computer user.
information is ethically wrong. Giving wrong
information can hurt other parties or organizations that Examples: Chatting with someone using curse words
are affected on that particular theme. Republic Act No. 8293 [An Act Prescribing the Intellectual
Examples: Posting something like "He or she did ...." Property Code and Establishing the Intellectual Property
without any proves Office, Providing for Its Powers and Functions, and for
Other Purposes]otherwise known as the Intellectual
• Commandment 6 Property Code of the Philippines.
Simply put: Refrain from copying software or buying Intellectual Property (IP)
pirated copies. Pay for software unless it is free. Philippine Definition: Intellectual Property is an intangible
Explanation: Like any other artistic or literary work, asset that can be protected from theft or unauthorized use. Any
software is copyrighted. A piece of code is the original person can own IP and have the right to sell or give it to others.
work of the individual who created it. It is copyrighted American Definition: Intellectual property is a property right
in his name. In case of a developer writing software for that can be protected under federal and state law, including
the organization he works for, the organization holds copyrightable works, ideas, discoveries, and inventions. The
the copyright for it. Copyright holds true unless its term intellectual property relates to intangible property such as
creators announce it is not. Obtaining illegal copies of patents, trademarks, copyrights, and trade secrets. Thus, in
copyrighted software is unethical. It is not easy to do today's legal marketplace most registered patent attorneys hold
such things and in the end it will just be copied illegally. themselves out as intellectual property law attorneys, as
Examples: Cracking demo program and using it opposed to merely a patent attorney.
forever
• Commandment 7 State policy declaration:
Simply put: Do not use someone else's computer
resources unless authorized to. The State recognizes that an effective intellectual and
Explanation: Multi-user systems have user specific industrial property system is vital to the development of
passwords. Breaking into some other user's password, domestic and creative activity, facilitates transfer of
thus intruding his private space is unethical. It is not technology, attracts foreign investments, and ensures
ethical to hack passwords for gaining unauthorized market access for our products. It shall protect and
access to a password-protected computer system. secure the exclusive rights of scientists, inventors,
Accessing data that you are not authorized to access artists and other gifted citizens to their intellectual
or gaining access to another user's computer without property and creations, particularly when beneficial to
his permission is not ethical. Privacy will always be the people, for such periods as provided in this Act.
applied to such resources and were not supposed to
get exposed and hack in such ways that is not yours.
The use of intellectual property bears a social
Examples: Using site's information and publishing a
function. To this end, the State shall promote the
book without the source to earn benefit
diffusion of knowledge and information for the
• Commandment 8 promotion of national development and progress and
Simply put: It is wrong to claim ownership on a work the common good.
which is the output of someone else's intellect.
Explanation: Programs developed by a software
It is also the policy of the State to streamline
developer are his/her property. If he is working with an
administrative procedures of registering patents,
organization, they are the organization's property.
trademarks and copyright, to liberalize the registration
Copying them and propagating them in one's own
on the transfer of technology, and to enhance the
name is unethical. This applies to any creative work,
enforcement of intellectual property rights in the
program or design. Establishing ownership on a work
Philippines.
which is not yours is ethically wrong. Originality of any
Effect on international conventions and on principle
software/programs are to be keep safe and trying to
of reciprocity:
claim ownership will cause a viral disputes.
Examples: Posting New movie that just came out on
Youtube Any person who is a national or who is domiciled or has
a real and effective industrial establishment in a
• Commandment 9
country which is a party to any convention, treaty or
Simply put: Before developing a software, think about
agreement relating to intellectual property rights or the
the social impact it can have.
repression of unfair competition, to which the
Explanation: Looking at the social consequences that
Philippines is also a party, or extends reciprocal rights
a program can have, describes a broader perspective
to nationals of the Philippines by law, shall be entitled
of looking at technology. A computer software on
to benefits to the extent necessary to give effect to any
release, reaches millions. Software like video games
provision of such convention, treaty or reciprocal law,
and animations or educational software can have a
in addition to the rights to which any owner of an
social impact on their users. When working on
intellectual property right is otherwise entitled by this
animation films or designing video games, for example,
Act.
it is the programmer's responsibility to understand his
Parts of the law:
target audience/users and the effect it may have on
them. For example, a computer game for kids should
not have content that can influence them negatively. The Intellectual Property Code of the Philippines is
Similarly, writing malicious software is ethically wrong. divided into five [5] parts, to wit:
A software developer/development firm should
consider the influence their code can have on the PART I - The Intellectual Property Office
society at large. PART II - The Law on Patents
Examples: Making program that can spy on other PART III - The Law on Trademarks, Service
people's computer Marks and Trade Names
• Commandment 10 PART IV - The Law on Copyright
Simply put: In using computers for communication, be PART V - Final Provisions
respectful and courteous with the fellow members. Government Agencies:
Explanation: The communication etiquette we follow in
the real world applies to communication over The agency of the government in charge of the
computers as well. While communicating over the implementation of the Intellectual Property Code is the
Internet, one should treat others with respect. One Intellectual Property Office which replaced the Bureau
should not intrude others' private space, use abusive of Patents, Trademarks and Technology Transfer. It is
language, make false statements or pass irresponsible divided into six [6] Bureaus, namely:
remarks about others. One should be courteous while
communicating over the web and should respect

9
[1] Bureau of Patents; mark, whether or not it is registered. This is common law
[2] Bureau of Trademarks; protection. Registration is proof of ownership and makes
[3] Bureau of Legal Affairs; ownership rights easier to enforce. The basic question in
[4] Documentation, Information and Technology lawsuits over marks is whether or not the general public is likely
Transfer Bureau; to be confused as to the origin of the service or product.
[5] Management Information System and EDP c) Geographic Indications; Indications which identify a good
Bureau; and as originating in the territory of a Member, or a region or locality
[6] Administrative, Financial and Personnel in that territory, where a given quality, reputation or other
Services Bureau characteristic of the good is essentially attributable to its
POWERS AND FUNCTIONS OF THE INTELLECTUAL geographic origin. Geographical indications are quality
PROPERTY OFFICE FROM SEC. 5 OF THE INTELLECTUAL indicators, are widely used by producers, distributors and
PROPERTY LAW (RA 8293) AS AMENDED: retailers as an advertising or promotional tool to attract
Section 5. Functions of the Intellectual Property Office (IPO). consumers and investors.
- 5.1. To administer and implement the State policies declared d) Industrial Designs; The industrial design as any composition
in this Act, there is hereby created the Intellectual Property of lines or colors or any three-dimensional form, whether or not
Office (IPO) which shall have the following functions: associated with lines or colors; provided that such composition
a) Examine applications for grant of letters patent for inventions or form gives a special appearance to and can serve as pattern
and register utility models and industrial designs; for an industrial product or handicraft. Simply put, it is that aspect
b) Examine applications for the registration of marks, geographic of a useful article which is ornamental or aesthetic.
indication, integrated circuits; Generally, industrial designs are important for handicrafts,
c) Register technology transfer arrangements and settle jewelry, mobile phones, packaging materials, furniture, electrical
disputes involving technology transfer payments covered by the appliances, accessories, boxes, architectural structures and
provisions of Part II, Chapter IX on Voluntary Licensing and other products. It is important to protect an industrial design
develop and implement strategies to promote and facilitate because it enables the owner to prevent others from copying or
technology transfer; imitating the industrial design without his consent. He can also
d) Promote the use of patent information as a tool for technology prevent parties from importing, selling, manufacturing or making
development; products bearing his industrial design
e) Publish regularly in its own publication the patents, marks, e) Patents; A Patent is a grant issued by the government
utility models and industrial designs, issued and approved, and through the Intellectual Property Office of the Philippines (IP
the technology transfer arrangements registered; Philippines). It is an exclusive right granted for a product,
f) Administratively adjudicate contested proceedings affecting process or an improvement of a product or process which is
intellectual property rights; and new, inventive and useful. This exclusive right gives the inventor
g) Coordinate with other government agencies and the private the right to exclude others from making, using, or selling the
sector efforts to formulate and implement plans and policies to product of his invention during the life of the patent. A patent has
strengthen the protection of intellectual property rights in the a term of protection of twenty (20) years providing an inventor
country. significant commercial gain. In return, the patent owner must
5.2. The Office shall have custody of all records, books, share the full description of the invention. This information is
drawings, specifications, documents, and other papers and made available to the public in the form of the Intellectual
things relating to intellectual property rights applications filed Property Official Gazette and can be utilized as basis for future
with the Office. (n) research and will in turn promote innovation and development.
DIFFERENT RIGHTS PROTECTED BY THE INTELLECTUAL f) Layout-Designs (Topographies) of Integrated Circuits;
PROPERTY OFFICE FROM SEC. 4.1 OF THE and Integrated Circuits are commonly known as “chips” or
INTELLECTUAL PROPERTY LAW (RA 8293) AS “micro-chips”. They are the electronic circuits in which all the
AMENDED: The term "intellectual property rights" consists of: components (transistors, diodes and resistors) have been
a) Copyright and Related Rights; Copyright relates to literary assembled in a certain order on the surface of a thin semi-
and artistic creations, such as books, music, paintings and conductor material (usually silicon).
sculptures, films and technology-based works (such as g) Protection of Undisclosed Information (n, TRIPS) This
computer programs and electronic databases). In certain refers to a process, formula, tool, plan, mechanism or compound
languages, copyright is referred to as authors’ rights. Although that is only known by the owner or disclosed to a selected
international law has brought about some convergence, this number of employees. The trade secret is used to produce a
distinction reflects an historic difference in the evolution of these service or product with commercial value.
rights that is still reflected in many copyright systems. The Significant features of the law:
expression copyright refers to the act of copying an original work 1. A shift was made from the "first-to-invent
which, in respect of literary and artistic creations, may be done system" under R. A. 165 [old law] to "first-to-file
only by the author or with the author’s permission. Related system" under the new law.
rights, also referred to as neighboring rights, protect the legal 2. In the case of inventions, the period of the grant
interests of certain persons and legal entities that contribute to was increased from 17 years from grant under the old
making works available to the public or that produce subject law to 20 years from date of filing under the new law.
matter which, while not qualifying as works under the copyright 3. In the case of utility models, the previous grant
systems of all countries, contains sufficient creativity or technical of 5 years plus renewals of 5 years each under the old
and organizational skill to justify recognition of a copyright-like law was changed to 7 years without renewal under the
property right. The law of related rights deems that the new law.
productions that result from the activities of such persons and 4. In the case of industrial designs, the previous
entities merit legal protection as they are related to the grant of 5 years plus renewals of 5 years each was
protection of works of authorship under copyright. Some laws maintained.
make clear, however, that the exercise of related rights should 5. Under the old law, there was no opposition
leave intact, and in no way affect, the protection of copyright. proceedings and the examination is mandatory; under
b) Trademarks and Service Marks; A trademark is a tool used the new law, the examination is made only upon
that differentiates goods and services from each other. It is a request [possibly with or without examination].
very important marketing tool that makes the public identify 6. Under the old law, publication is made after the
goods and services. A trademark can be one word, a group of grant; under the new law, publication is effected after
words, sign, symbol, logo, or a combination of any of these. 18 months from filing date or priority date.
Generally, a trademark refers to both trademark and service 7. Under the old law, the penalties for repetition of
mark, although a service mark is used to identify those marks infringement are: PhP10,000 and/or 5 years of
used for services only. Trademark is a very effective tool that imprisonment and the offense prescribes in 2 years;
makes the public remember the quality of goods and services. under the present law, the penalties range from
Once a trademark becomes known, the public will keep on PhP100,000 to PhP300,000 and/or 6 months to 3 years
patronizing the products and services. If utilized properly, a of imprisonment and the offense prescribes in 3 years.
trademark can become the most valuable business asset of an Significant changes in the trademark law:
enterprise. In addition to making goods and services distinctive, The significant changes in the trademark law under
the owner of a mark may earn revenues from the use of the mark the old law [R. A. No. 166] and the present law are as
by licensing its use by another or though franchising follows:
agreements. One can be an owner of a trademark or service

10
1. Under the former, the element of use before
filing a local application is a requirement although this
is not required when the application is based on foreign
registration; while under the latter, the element of use
has been eliminated as a requirement for application.
2. Under the former, the term granted is 20 years
renewable for 20-year periods; while under the latter,
the term is for 10 years, renewable for 10-year periods.
3. Under the former, the affidavit of use or non-use
is required on the 5th, 10th and 15th anniversaries;
while under the latter, proof of use within 3 years from
the filing of the application is required and the affidavit
of use should be filed within 1 year from the 5th
anniversary.
4. Under the former, a Supplemental Register is
required to be maintained; while under the latter, it is
no longer required.
5. Under the former law, penalties for
infringement, unfair competition, false designation of
origin and false description or representation range
from fine of PhP500 to PhP2,000 and/or 6 months to 3
years and 4 months of imprisonment; while under the
latter law, the penalties range from fine of PhP50,000
to PhP200,000 and/or 2 to 5 years of imprisonment.

Significant changes in the copyright law:

It is now required that after the first public dissemination of


performance by authority of the copyright owner of certain
specified work, there shall, for the purpose of completing the
records of the National Library and the Supreme Court library,
within three (3) weeks, be registered and deposited with it, by
personal delivery or by registered mail, two (2) complete copies
or reproductions of the work in such form as the directors of said
libraries may prescribe.

The scheme of penalties for infringement has also been


changed. From the previous fine of Php200 to Php2,000 and/or
imprisonment of 1 year, the current range of penalties are as
follows:
For first offenders - fine of PhP50,000 to
PhP150,000 and/or imprisonment of 1 to 3 years
For second offenders - fine of PhP150,000 to
PhP500,000 and/or imprisonment of 3 to 6
years
For third and subsequent offenders - fine of
PhP500,000 to PhP1.5 Million and/or
imprisonment of 6 to 9 years.
In case of insolvency, the offender shall furthermore suffer
subsidiary imprisonment.

CHAPTER SUMMARY
• (Republic Act No. 10175) or the Cybercrime
Prevention Act of 2012 is the law that govern
Cybercrime, Providing For The Prevention,
Investigation, Suppression And The Imposition Of
Penalties Therefor And For Other Purposes

• The Ten Commandments of Computer Ethics were


created in 1992 by the Computer Ethics Institute. The
commandments were introduced in the paper "In
Pursuit of a 'Ten Commandments' for Computer
Ethics" by Ramon C. Barquin as a means to create "a
set of standards to guide and instruct people in
the ethical use of computers."

• Republic Act No. 8293 [An Act Prescribing the


Intellectual Property Code and Establishing the
Intellectual Property Office, Providing for Its Powers
and Functions, and for Other Purposes]otherwise
known as the Intellectual Property Code of the
Philippines which governs Intellectual property in the
Philippines.

11

You might also like