Midterms CpELaws
Midterms CpELaws
Midterms CpELaws
“Intermediary” refers to a person who in behalf of another 3. Makes banking transactions done through ATM switching
person and with respect to a particular electronic data message networks absolute once consummated. (section 16)
or electronic document sends, receives and/or stores Sec. 16. Formation and Validity of Electronic
“Originator” refers to a person by whom, or on whose behalf, Contracts.
the electronic document purports to have been created, 4. Parties are given the right to choose the type and level of
generated and/or sent. security methods that suit their needs. (section 24)
Sec. 24. Choice of Security Methods
“Service provider” refers to a provider of — 5. Provides the mandate for the electronic implementation of
Online services or network access, or the operator of transport documents to facilitate carriage of goods.(section 25
facilities therefor, including entities offering the and 26)
Sec. 25. Actions Related to Contracts of Carriage of
Goods.
Sec. 26. Transport Documents.
6. Mandates RPWeb to be implemented. RPWeb is a strategy
that intends to connect all government offices to the Internet
and provide universal access to the general public. (section
28)
Sec. 28. RPWEB To Promote the Use Of Electronic
Documents and
7. Made cable, broadcast, and wireless physical infrastructure
within the activity of telecommunications. (section 28)
Sec. 28. RPWEB To Promote the Use Of Electronic
Documents and
8. Empowers the Department of Trade and Industry to
supervise the development of e-commerce in the country.
(section 29)
Sec. 29. Authority of the Department of Trade and
Industry and Participating Entities
10. Provided guidelines as to when a service provider can be
liable. (section 30)
Sec. 30. Extent of Liability of a Service Provider.
11. Authorities and parties with the legal right can only gain
access to electronic documents, electronic data messages, and
electronic signatures. For confidentiality purposes, it shall not
share or convey to any other person.
Sec. 31. Lawful Access.
Sec. 32. Obligation of Confidentiality.
12. Hacking or cracking, refers to unauthorized access
including the introduction of computer viruses, is punishable
by a fine from 100 thousand to maximum commensurating to
the damage. With imprisonment from 6 months to 3 years.
Sec. 33. Penalties
13. Piracy through the use of telecommunication networks,
such as the Internet, that infringes intellectual property rights
is punishable. The penalties are the same as hacking. (section
33)
Sec. 33. Penalties
14. All existing laws such as the Consumer Act of the
Philippines also applies to e-commerce transactions. (section
33)
Sec. 33. Penalties
(b) Alteration refers to the modification or change, in form or (a) Offenses against the confidentiality, integrity and
substance, of an existing computer data or program. availability of computer data and systems:
(1) Illegal Access. – The access to the whole or any part of a
(c) Communication refers to the transmission of information computer system without right.
through ICT media (2) Illegal Interception. – The interception made by technical
means without right of any non-public transmission of
(d) Computer refers to an electronic, magnetic, optical, computer data
electrochemical, or other data processing or communications (3) Data Interference. — The intentional or reckless
device alteration, damaging, deletion or deterioration of computer
data
(e) Computer data refers to any representation of facts, (4) System Interference. — The intentional alteration or
information, or concepts in a form suitable for processing in a reckless hindering or interference with the functioning of a
computer system computer or computer network
(6) Cyber-squatting. – The acquisition of a domain name
(f) Computer program refers to a set of instructions executed over the internet in bad faith to profit, mislead, destroy
by the computer to achieve intended results. reputation, and deprive others from registering the same
(g) Computer system refers to any device or group of (b) Computer-related Offenses:
interconnected or related devices, one or more of which, (1) Computer-related Forgery. —
pursuant to a program, performs automated processing of (i) The input, alteration, or deletion of any computer data
data. without right resulting in inauthentic data with the intent that
it be considered or acted upon for legal purposes
(h) Cyber refers to a computer or a computer network, the (ii) The act of knowingly using computer data which is the
electronic medium in which online communication takes product of computer-related forgery as defined herein, for the
place. purpose of perpetuating a fraudulent or dishonest design.
(2) Computer-related Fraud. — The unauthorized input,
(i) Critical infrastructure refers to the computer systems, alteration, or deletion of computer data or program or
and/or networks, whether physical or virtual, and/or the interference in the functioning of a computer system, causing
computer programs, computer data and/or traffic data so vital damage thereby with fraudulent intent
to this country that the incapacity or destruction of or (3) Computer-related Identity Theft. – The intentional
interference with such system and assets would have a acquisition, use, misuse, transfer, possession, alteration or
debilitating impact on security, national or economic security, deletion of identifying information belonging to another,
national public health and safety, or any combination of those whether natural or juridical
matters.
(c) Content-related Offenses:
(j) Cybersecurity refers to the collection of tools, policies, (1) Cybersex. — The willful engagement, maintenance,
risk management approaches, actions, training, best practices, control, or operation, directly or indirectly, of any lascivious
assurance and technologies that can be used to protect the exhibition of sexual organs or sexual activity, with the aid of a
cyber environment and organization and user’s assets. computer system, for favor or consideration.
(2) Child Pornography. — The unlawful or prohibited acts
(k) Database refers to a representation of information, defined and punishable by Republic Act No. 9775 or the Anti-
knowledge, facts, concepts, or instructions which are being Child Pornography Act of 2009, committed through a
prepared, processed or stored or have been prepared, computer system
processed or stored in a formalized manner and which are (3) Unsolicited Commercial Communications. — The
intended for use in a computer system. transmission of commercial electronic communication with
the use of computer system which seek to advertise, sell, or
(l) Interception refers to listening to, recording, monitoring offer for sale products and services are prohibited unless:
or surveillance of the content of communications,through the (4) Libel. — The unlawful or prohibited acts of libel as
use of electronic eavesdropping or tapping devices defined in Article 355 of the Revised Penal Code, as
amended, committed through a computer system or any other
(o) Subscriber’s information refers to any information similar means which may be devised in the future.
contained in the form of computer data or any other form that
is held by a service provider, relating to subscribers of its
(1) Description of the personal information to be entered into
the system;
(a) Commission shall refer to the National Privacy (5) Methods utilized for automated access, if the same is
Commission created by virtue of this Act. allowed by the data subject, and the extent to which such
access is authorized;
(b) Consent of the data subject refers to any freely given,
specific, informed indication of will, whereby the data subject (6) The identity and contact details of the personal
agrees to the collection and processing of personal information controller or its representative;
information about and/or relating to him or her.
(7) The period for which the information will be stored; and
(c) Data subject refers to an individual whose personal
information is processed. (8) The existence of their rights, i.e., to access, correction, as
well as the right to lodge a complaint before the Commission.
(d) Direct marketing refers to communication by whatever
means of any advertising or marketing material which is
directed to particular individuals.