Finals Flashcards
(41 cards)
Criminal activity that either targets or uses a computer or a network device to commit cyber violations
Cybercrime
The hacker who created the i love you virus
Onel de guzman
The law emphasizes the broad consequences of crimes done via computers or the internet
RA 10175 CYBERCRIME PREVENTION ACT OF 2012
Processing of all types of personal information
Ra 10173 data privacy act of 2012
Any natural or juridical person involved in personal information processing
Ra 10173 data privacy act of 2012
Criminalizes the unauthorized recording taking or capturing a photos or videos of a person’s private areas without their content to view share or distribute such materials
Ra 9995 anti photo and video voyeurism act of 2009
Prohibits actions of producing using or trafficking in one or more counterfeit unauthorized or fraudulently apply for access devices
Ra 8484 access devices regulation act of 1998
This law establishes the intellectual property office and provides the protection of intellectual property rights including copyright
Ra 8293 intellectual property code of the philippines
Any information that can identify a person
Personal information
The person or organization who controls the processing of personal data
Personal information controller
To explain how the company collects uses or protects personal data
Purpose of privacy policy
Not sharing personal data freely on social media
Protecting personal data online
Role of national privacy commissioner or npc in the philippines
To enforce data privacy laws and regulations
Penalty for unauthorized disclosure
10 million pesos fine and imprisonment of up to 10 years
Must be free given specific informed and unambiguous
Valid consent
Any incident where data is accessed by unauthorized parties
Data breach
Data that must be protected to safeguard privacy or security
Sensitive information data
You access to the whole or any part of a computer system without right
Illegal access
The interception of computer data to from or within a computer system
Illegal interception
The intentional or reckless alteration imaging deletion or deterioration of computer data electronic document or electronic data messages without right
Data interference
The unauthorized use production seal procurement distribution or otherwise making available of a device
Misuse of device
The acquisition of a domain name on the internet in bad faith to profit mislead destroy reputation and deprived others from registering the same
Cyber squatting
Input alteration or deletion of many computer data without right resulting inauthentic data
Computer related forgery
The unauthorized input alteration or deletion of computer data or program or interference in the functioning of a computer system causing damage thereby with fraudulent intent
Computer related fraud