You are on page 1of 15

WHAT TYPES OF

DATA THAT ARE


TYPICALLY GETS
STOLEN?
Roland T. Abela II
PAYMENT DATA

AUTHENTICATION
DETAILS

COPYRIGHTED
MATERIAL

MEDICAL RECORDS

CLASSIFIED INFORMATION
PAYMENT DATA
Card fraud can be divided into two types: card-present fraud (which is less common nowadays) and card-
not-present fraud (more common). The compromise can happen in a variety of ways, and it usually happens
without the cardholder's knowledge. Database security errors have become particularly costly due to the
internet; in certain situations, millions of accounts have been compromised.

Cardholders may report stolen cards promptly, but the details of a compromised account may be stored by a
fraudster for months before being stolen, making it impossible to pinpoint the source of the compromise. The
cardholder may not notice fraudulent activity until he or she receives a statement. Cardholders can reduce the
risk of fraud by regularly reviewing their accounts to ensure that no strange or unusual transactions have
occurred.
To identify, prevent, and minimize fraud attempts,
each stage in the remote payment process –
account creation, enrollment, and transaction –
AUTHENTICATI should include customer and payment method
ON DETAILS authentication. Authentication fraud occurs when
criminals take advantage of lawful owners who
engage in digital financial activities, such as using
a mobile phone app, a mobile browser, or a PC
Remote authentication fraud occurs
when a person who is not the legitimate internet browser.
owner of an identity or financial account
creates a new account or fraudulently
takes control of an existing digital
account with the sole intent of
committing an illegal act using stolen
payment credentials or unauthorized
payment information.
COPYRIGHTED MATERIAL
A copyfraud is when someone or something Copyright infringement (also known as
makes a bogus copyright claim on content that piracy) occurs when works protected by
is already in the public domain. Such copyright are used without permission for a
statements are false, at least under copyright purpose for which permission is required,
law in the United States and Australia, because thereby infringing on the copyright holder's
anything that is not copyrighted is free to use, exclusive rights, such as the right to reproduce,
edit, and reproduce by anybody. Copyfraud distribute, display, or perform the protected
also involves claims by publishers, museums, work, or the right to create derivative works.
and others that go beyond what the law The work's originator, or a publisher or other
permits, such as when a genuine copyright business to whom copyright has been granted,
owner asserts rights beyond what the law is usually the copyright holder. To prevent and
allows deliberately or with constructive punish copyright infringement, copyright
awareness. holders frequently use legal and technological
methods.
MEDICAL
RECORDS Thieves could use your credentials to access
medical treatments and devices for themselves and
others, or charge insurance companies for fictitious
services in your name.

Medical identity theft is more serious than financial


identity theft because consumers have less legal
protections. Many victims are compelled to pay for
health services obtained by the fraudsters out of pocket,
or risk losing their insurance and/or credit scores.
CLASSIFIED
INFORMATION

This might include information like your


company's top-secret product idea or the
code for your security door, depending on
how you define classified. In any case, you
don't want information to get into the hands
of cyber thieves if it's marked classified.
CONSEQUENCES
OF DATA THEFT
For organizations that suffer a data breach,
consequences can be severe:
 
For individuals whose data has been
Potential lawsuits from customers whose breached, the main consequence is
information has been exposed that it could lead to identity theft,
causing financial loss and
emotional distress.
Ransomware demands from attackers
 
Recovery costs

Reputational damage and loss of


customers

Fines or penalties from regulatory bodies


(depending on the industry)

Downtime while data is recovered


 
DATA THEFT COPYRIGHT
Persons who, after having knowledge of a security Copyright infringement happens when one of the copyright
breach and of the obligation to notify the Commission owner's exclusive economic or moral rights is violated, according
to Philippine law. It could also mean assisting or abetting an
pursuant to Section 20(f), intentionally or by omission
infringement. The IP Code also makes a person liable if he has in
conceal the fact of such security breach shall face a his possession, at the time when copyright exists in a work, an
penalty of imprisonment for one (1) year and six (6) article that he knows, or should know, is an infringing copy of the
months to five (5) years and a fine of not less than Five work for the following purposes: (a) selling or letting for hire, or
Hundred Thousand Pesos (Php500,000.00) but not more by way of trade offering or exposing for sale or hire, the article; (b)
than One Million Pesos (Php1,000,000.00). distributing the article for the purpose of trade, or for any other
purpose that prejudices the rights of the author. (c) trade exhibit of
the article in public
Imprisonment of between 1 to 3 years and a fine of between
50,000 to 150,000 pesos for the first offense.
Imprisonment of 3 years and 1 day to six years plus a fine of
between 150,000 to 500,000 pesos for the second offense.
Imprisonment of 6 years and 1 day to 9 years plus a fine ranging
from 500,000 to 1,500,000 pesos for the third and subsequent
offenses.
COMPUTER ‐ RELATED
COPYRIGHT OR
TRADEMARK OFFENCES
Article 10 of the Council of Europe Cybercrime Convention criminalizes “offences
related to infringements of copyright and related rights.” Similarly, Article 17 of the
Arab Convention on Combating Information Technology Offences prohibits “offences
related to copyrights and adjacent rights. ”Copyrights“ relate to literary and artistic
creations, such as books, music, paintings and sculptures, films and technology-based
works (such as computer programs and electronic databases)” (WIPO, 2016, p. 4).
 
There are several international treaties relating to copyright protection, including the
Berne Convention for the Protection of Literary and Artistic Works of 1886, the World
Intellectual Property Organization (WIPO) Agreement on Trade-Related Aspects of
Intellectual Property Rights of 1994, and the WIPO Copyright Treaty of 1996.
Regional laws also exist with respect to intellectual property. A notable example of the
infringement of copyright protection is digital piracy (e.g., the unauthorized copying,
duplication, or distribution of a movie protected by copyright law).
Copyrighted works are considered a form of intellectual
property, which is defined by WIPO as “creations of the mind,
such as inventions; literary and artistic works; designs; and
symbols, names and images used in commerce.” Article 2(viii) of
the Convention Establishing the World Intellectual Property
Organization (WIPO) of 1967 holds that

Intellectual property includes rights relating to: literary, artistic


and scientific works, performances of performing artists,
phonograms and broadcasts, inventions in all fields of human
endeavor, scientific discoveries, industrial designs, trademarks,
service marks and commercial names and designations,
protection against unfair competition, and all other rights
resulting from intellectual activity in the industrial, scientific,
literary or artistic fields.
Intellectual property, therefore, includes not only copyrights (books, music, film, software,
etc.), but also trademarks (names, symbols or logos belonging to a brand, service, or good),
patents (novel and unique creations, innovations, and inventions) and trade secrets (valuable
information about business processes and practices that are secret and protect the business’
competitive advantage). Intellectual property is explored in greater detail in Cybercrime
Module 11 on Cyber-Enabled Intellectual Property Crime.
THANK YOU

You might also like