UNIT 10 Flashcards
(116 cards)
On the year 2000 a Filipino named Onel De Guzman created a worm that sent messages
through email with an attachment: “LOVE-LETTER-FORYOU.txt.vbs”
When the attachment is opened, the file activates a code that sends an instruction to
forward the same email to all the contacts of the user
● The worm spread to e-mail accounts across the globe – including US and Europe –
overwhelming the email systems of private and government organizations causing them
to shut down resulting to estimated damages worth millions of USD
● This prompted the FBI to identify the source of the worm, which was then traced back to
the Philippines
The I LOVE YOU Worm
Onel De Guzman was eventually arrested by the Philippine government at the request of
the FBI but was released shortly afterwards because there was NO pre-existing Philippine
laws that he violated
The I LOVE YOU Worm
AN ACT PROVIDING FOR THE
RECOGNITION AND USE OF ELECTRONIC TRANSACTIONS AND DOCUMENTS,
PENALTIES FOR UNLAWFUL USE THEREOF AND OTHER PURPOSES.
NOTE: was used to define certain illegal activities concerning the use of various
devices in an effort to provide a legal provision to deter future actions similar to what
Onel De Guzman did
Republic Act 8792: Philippine E-Commerce Act Of 2000
Section 6. LEGAL RECOGNITION OF DATA MESSAGES
Republic Act 8792: Philippine E-Commerce Act Of 2000
text messages, e-mails, or any other similar modes of
communication done through electronic means [including unaltered screenshots] has the
same legal validity as physical messages
ELECTRONIC DATA MESSAGES
Section 7. LEGAL RECOGNITION OF ELECTRONIC DOCUMENTS
Republic Act 8792: Philippine E-Commerce Act Of 2000
shall have the legal effect, validity or enforceability as any other
document or legal writing.
NOTE: This provision gives softcopy of authentic documents the same legal validity as physical
documents
ELECTRONIC DOCUMENTS
Section 8. LEGAL RECOGNITION OF ELECTRONIC SIGNATURES
Republic Act 8792: Philippine E-Commerce Act Of 2000
An _____ on the electronic document shall be equivalent to the signature
of a person on a written document
ELECTRONIC SIGNATURE
Section 33. PENALTIES
The following acts shall be penalized by fine and/or imprisonment:
Republic Act 8792: Philippine E-Commerce Act Of 2000
● Unauthorized access into a computer system/server or information and communication
system
● Any access with the intent to corrupt, alter, steal, or destroy using a computer or computer
system without the knowledge and consent of the owner of the system
HACKING/CRACKING
Section 33. PENALTIES
Republic Act 8792: Philippine E-Commerce Act Of 2000
● Unauthorized copying, reproduction, storage, uploading, downloading, communication, or
broadcasting of protected material [..] through the use of telecommunication networks,
e.g. the Internet, in a manner that infringes intellectual property
PIRACY
Section 33. PENALTIES
Violations against R.A. 7394: The Consumer Act Of The Philippines
● R.A. 7394 was enacted primarily to protect the consumers …
… against hazards to health and safety, and
… against deceptive, unfair and unconscionable sales acts and practices.
Republic Act 8792: Philippine E-Commerce Act Of 2000
NOTE:
● Penalty for HACKING/CRACKING and PIRACY:
▪ Pay a fine amounting to a minimum of one hundred thousand pesos (PhP 100,000) and a
maximum that is commensurate to the damage incurred and …
▪ Mandatory imprisonment of 6 months to 3 years.
● Penalty for violations against R.A. 7394 will be the same penalties as provided by same law which
is to pay a fine of PhP 20,000 to PhP 2000,000 and/or imprisonment of 3 to 6 years
Republic Act 8792: Philippine E-Commerce Act Of 2000
Does connecting to an open WIFI network (e.g. WIFI with no password), without the consent
of the network owner, constitute a violation of RA 8792?
NO! By merely accessing it, there is no clear intent to “corrupt, alter, steal or destroy”
is an act that adopts sufficient powers to effectively prevent and combat cybercrime
offenses by facilitating their detection, investigation, and prosecution at both the domestic and
international levels
REPUBLIC ACT 10175: CYBERCRIME PREVENTION ACT OF 2012
REPUBLIC ACT 10175: CYBERCRIME PREVENTION ACT OF 2012
defines ____ as a crime committed with or through the use of information and
communication technologies such as radio, television, cellular phone, computer and network, and
other communication device or application
CYBERCRIME
Section 4. CYBERCRIME OFFENSES
The following acts constitute the offense of cybercrime punishable under this Act
(a) OFFENSES against the CONFIDENTIALITY, INTEGRITY and AVAILABILITY (CIA) of
COMPUTER DATA and COMPUTER SYSTEMS;
(b) COMPUTER-RELATED OFFENSES; and
(c) CONTENT-RELATED OFFENSES
REPUBLIC ACT 10175: CYBERCRIME PREVENTION ACT OF 2012
SECTION 4 (a) OFFENSES against the CONFIDENTIALITY, INTEGRITY, and AVAILABILITY (CIA) of
COMPUTER DATA and COMPUTER SYSTEMS
REPUBLIC ACT 10175: CYBERCRIME PREVENTION ACT OF 2012
The access to the whole or any part of a computer system without right.
NOTE:
● “access” is the instruction, communication with, storing/retrieving data from or use of
any resources of a computer system of network
● “without right” means having no consent from the owner of the computer system
ILLEGAL ACCESS
Does connecting to an open WIFI network (e.g. WIFI with no password), without the
consent of the network owner, constitute a violation of RA 8792?
NO! By merely accessing it, there is no clear intent to “corrupt, alter, steal or
destroy”
Does connecting to an open WIFI network (e.g. WIFI with no password), without the
consent of the network owner, constitute a violation of RA 10175?
YES! Illegal access is to “make use of any resources” without right (consent)
SECTION 4 (a) OFFENSES against the CONFIDENTIALITY, INTEGRITY, and AVAILABILITY (CIA) of
COMPUTER DATA and COMPUTER SYSTEMS
REPUBLIC ACT 10175: CYBERCRIME PREVENTION ACT OF 2012
The interception […] of computer data to, from, or within a computer system.
NOTE:
● Interception is listening to, recording, monitoring or surveillance of the content of
communications through the use of electronic eavesdropping or tapping devices at the same
time that the communication is occurring
ILLEGAL INTERCEPTION
SECTION 4 (a) OFFENSES against the CONFIDENTIALITY, INTEGRITY, and AVAILABILITY (CIA) of
COMPUTER DATA and COMPUTER SYSTEMS
REPUBLIC ACT 10175: CYBERCRIME PREVENTION ACT OF 2012
The intentional or reckless alteration, damaging, deletion or deterioration of computer
data, electronic document or electronic data message without right – including the
introduction or transmission of viruses
DATA INTERFERENCE
Consider the following situation:
A friend sent you a file on a flash drive infected with a virus
Both of you is not aware that the flash drive is infected
After you insert the flash drive in your computer, your computer get infected
and you lost your documents
Is your friend liable for any violation on RA 10175?
YES! Data interference includes “the intentional or reckless alteration, damaging,
deletion
or deterioration of computer data” – even if your friend has no malicious intent it is
still considered as “recklessness” in his/her part causing you to lose your file
SECTION 4 (a) OFFENSES against the CONFIDENTIALITY, INTEGRITY, and AVAILABILITY (CIA) of
COMPUTER DATA and COMPUTER SYSTEMS
REPUBLIC ACT 10175: CYBERCRIME PREVENTION ACT OF 2012
The intentional alteration or reckless hindering or interference with the functioning of a
computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document,
or electronic data message, without right or authority, including the introduction or
transmission of viruses
SYSTEM INTERFERENCE
Consider the same situation in the previous example:
A friend sent you a file on a flash drive infected with a virus
Both of you is not aware that the flash drive is infected
After you insert the flash drive in your computer, your computer get infected
and you lost all your files and the whole computer system went into error
Is your friend liable for any violation on RA 10175?
YES! Although it may be unintentional, data interference and system interference
was committed
SYSTEM INTERFERENCE EXAMPLE:
Refers to software programs and malware components developed to take over a
computer’s resources and use them for cryptocurrency mining without the user’s explicit
permission
CRYPTOJACKING or CRYPTOMINING MALWARE
SYSTEM INTERFERENCE EXAMPLE:
When you download through torrent sites like “thepiratebay”, you basically give them the
authority to use your computer’s CPU to “mine” cryptocurrencies – the reason why
downloading a lot of torrent file can cause your computer to heat up
CRYPTOJACKING or CRYPTOMINING MALWARE