Introduction To Cybercrime
Introduction To Cybercrime
Introduction To Cybercrime
What is Cybercrime?
is criminal activity that either targets or uses a computer, a computer network or a networked
device.
What are the types of cybercrime?
There are various types and kinds of cybercrimes. The 2001 Budapest Convention on Cybercrime
categorizes cybercrime offenses into four: (1) offences against the confidentiality, integrity and
availability of computer data and systems; (2) computer-related offences; (3) content-related
offences; and (4) offences related to infringements of copyright and related rights.
What and when was the first recorded cybercrime in the Philippines?
In 2000, Onel de Guzman released the “I Love You” virus. The case filed against De Guzman was
dismissed at the first stage because there was no law punishing the deed as of that time in May
2000, in the Philippines.
When was a law penalizing computer crimes or cybercrimes passed?
On 14 June 2000, RA 8792 or the Electronic Commerce Act was signed into law. RA 8792
positioned the Philippines as the third country to enact an e-commerce law, next to Singapore
and Malaysia. The E-Commerce Act placed the Philippines on the list countries which penalize
cybercrime.
Cybercrime Offenses
Republic Act 10175- Cybercrime Prevention Act of 2012
Categories
A. Offenses against the confidentiality, integrity, and availability of computer data and systems.
B. Computer-related offenses
C. Content-related offenses
D. Other Cybercrime offenses
A. Offenses against the confidentiality, integrity, and availability of computer data and systems.
(1) Illegal Access. – The access to the whole or any part of a computer system without right.
(2) Illegal Interception. – The interception made by technical means without right of any non-public
transmission of computer data to, from, or within a computer system including electromagnetic
emissions from a computer system carrying such computer data.
(4) System Interference. — The intentional alteration or reckless hindering or interference with the
functioning of a computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document, or electronic
data message, without right or authority, including the introduction or transmission of viruses.
(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to profit, mislead,
destroy reputation, and deprive others from registering the same, if such a domain name is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate
government agency at the time of the domain name registration:
(ii) Identical or in any way similar with the name of a person other than the registrant, in case of a
personal name; and
(iii) Acquired without right or with intellectual property interests in it.
B. Computer-related offenses
(2) Computer-related Fraud. — The unauthorized input, alteration, or deletion of computer data or
program or interference in the functioning of a computer system, causing damage thereby with
fraudulent intent: Provided, that if no damage has yet been caused, the penalty imposable shall be one
(1) degree lower.
(3) Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer, possession,
alteration or deletion of identifying information belonging to another, whether natural or juridical,
without right: Provided, that if no damage has yet been caused, the penalty imposable shall be one (1)
degree lower.
C. Content-related offenses
(1) Cybersex. — The willful engagement, maintenance, control, or operation, directly or indirectly, of
any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor
or consideration.
(4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code,
as amended, committed through a computer system or any other similar means which may be devised
in the future.
D. Other Cybercrime offenses
(a) Aiding or Abetting in the Commission of Cybercrime. – Any person who willfully abets or aids in the
commission of any of the offenses enumerated in this Act shall be held liable.
(b) Attempt in the Commission of Cybercrime. — Any person who willfully attempts to commit any of
the offenses enumerated in this Act shall be held liable.
C. Prosecution
Cyber Warrants
1. Warrant to Disclose Computer Data (WDCD)
An order to disclose and accordingly, require any person or service provider to disclose or submit
subscriber’s information, traffic data, or relevant data in his/her controversial or is possession or
control
Preservation Order
An order requiring a service provider to keep, retain and preserve:
The integrity of traffic data and subscriber’s information for a minimum period of 6 months from the
date of transaction
Content data for 6 months from the date of receipt of the order
DEFINITION OF TERMS
Access refers to the instruction, communication with, storing data in, retrieving data from, or
otherwise making use of any resources of a computer system or communication network.
Alteration refers to the modification or change, in form or substance, of an existing computer
data or program.
Communication refers to the transmission of information through ICT media, including voice,
video and other forms of data.
Computer refers to an electronic, magnetic, optical, electrochemical, or other data processing or
communications device, or grouping of such devices, capable of performing logical, arithmetic,
routing, or storage functions and which includes any storage facility or equipment or
communications facility or equipment directly related to or operating in conjunction with such
device. It covers any type of computer device including devices with data processing capabilities
like mobile phones, smart phones, computer networks and other devices connected to the
internet.
Computer data refers to any representation of facts, information, or concepts in a form suitable
for processing in a computer system including a program suitable to cause a computer system to
perform a function and includes electronic documents and/or electronic data messages whether
stored in local computer systems or online.
Computer program refers to a set of instructions executed by the computer to achieve intended
results.
Computer system refers to any device or group of interconnected or related devices, one or
more of which, pursuant to a program, performs automated processing of data. It covers any
SOURCE/S:
REPUBLIC ACT NO. 10175
Combating Cybercrime in the Philippines by Karla T. Cabel
Primer on Cybercrime
Rule on Cybercrime Warrants (A.M. No.17-11-03-S)