You are on page 1of 1

Cybercrime offense under (RA ACT 10175)

“Cybercrime Prevention Act of 2012”

Categories of Cybercrime:
1. Crimes against CIA (Confidentiality, Integrity and Availability)
2. Computer Related Offenses
3. Content Related Offenses
4. Other Cybercrime Offenses
Crimes against CIA:
A. Illegal Access- the unauthorized access to the whole or any part of a computer
- access of any application without right.
A. Illegal Interception – the interception by technical means without any NON-public transmission of computer data
to from or within a computer system
- unauthorized intercepting of a non-public communication
“Man-in-the middle attack (MITM) the one who eavesdrop the communication between the sender and receiver.
B. Data Interference – the intentional or reckless alteration, damaging deletion or deterioration of computer data.
Electronic documents or electronic data message without right.
- including the introduction of transmission of viruses.
- tampering of data intentionally or recklessly.
C. System Interference – the intentional alteration or reckless, hindering or interference with the functioning of a
computer or computer network by: inputting, transmitting, damaging, deleting or deteriorating.
- altering or suppressing computer data or program electronic document or electronic data without right or authority.

DOS- one source only


DDos: Distribution Denial of service attack.
- A cyber-attack a specific server or network. PURPOSE: to disrupt a normal operation

D. Misuse of Device- it is the use, production, sale, procurement, importation and distribution of a device including
computer programs for the purpose of committing offenses specified in this act.
“Includes computer passwords, access code any similar Data.”
A. Computer Related Forgery:
The unauthorized input, alteration deletion of any computer data without resulting in inauthentic data, with the intent that
be acted upon for the purpose to appear authentic.
B. Computer- Related Fraud- the unauthorized input, alteration, deletion of any computer data or program
interference in the functioning of a computer system, causing damage. PURPOSE: perpetuate fraud (with fraudulent
intent)
C. Computer Related Identity theft- the intentional acquisition, use, misuses, transfer, possess, alteration or
deletion of identifying information belonging to another.

Content Related Offenses:


A. Cybersex- the willful engagement, maintenance, control or operation (directly or indirectly) of any lascivious
exhibition of sexual organ or sexual activity with the aid of a computer system, for favor or consideration. Also known as
“INTERACTIVE PROSTITUTION”
B. Child Pornography- the unlawful or prohibited acts defined and punishable by RA 9775 (Anti-child
Pornography act of 2009) committed through computer system: PROVIDED: Penalty to be imposed shall be 1 degree
higher that that provided for the said law.
C. Unsolicited Commercial Communication – the transmission of commercial electronic communication with the
use of computer system which seeks to: advertise, sell, or offer for sale of products and services. Also known as “SPAMS”

Other CC Offenses
A. Aiding or Abetting in the Commission of the Cybercrime.
- any person who willfully abets or aids the commission of any of the offenses enumerated in this act shall be held liable.
B. Attempt to the Commission of Cybercrime
- any person who willfully attempts to commit any of the offenses enumerated in this Act shall be held Liable.
Nigerian SCAM- also known as advance fee fraud or 419. The Nigerian Prince scam is a phishing attack when swindlers
reach out to potential victims and promise a large sum of money in return for some help.

You might also like