Professional Documents
Culture Documents
Module 3 - Unit 9: CYBER CRIME LAWS: Republic Act 8792: Philippine E-Commerce Act of 2000
Module 3 - Unit 9: CYBER CRIME LAWS: Republic Act 8792: Philippine E-Commerce Act of 2000
PIRACY
• Unauthorized copying, reproduction, storage, uploading, downloading, communication, or broadcasting of
protected material [..] through the use of telecommunication networks, e.g. the Internet, in a manner that
infringes intellectual property.
R.A. 10175 defines CYBERCRIME as a crime committed with or through the use of information and
communication technologies such as radio, television, cellular phone, computer and network, and other
communication device or application.
The following and similar acts, though they may not constitute a criminal offense, shall produce a cause of
action for damages, prevention and other relief:
(1) Prying into the privacy of another's residence;
(2) Meddling with or disturbing the private life or family relations of another;
(3) Intriguing to cause another to be alienated from his friends;
(4) Vexing or humiliating another on account of his religious beliefs, lowly station in life, place of birth,
physical defect, or other personal condition.
DEFINITION OF TERMS.
1. PERSONAL INFORMATION CONTROLLER (PIC)
The individual, corporation, or body who decides what to do with data.
2. PERSONAL INFORMATION PROCESSOR (PIP)
One who processes data for a PIC. The PIP does not process information for the PIP’s own purpose.
3. CONSENT OF THE DATA SUBJECT
Any freely given, specific, informed indication of will, whereby the data subject agrees to the collection
and processing of personal information about and/or relating to him or her.
The agreement must inform:
a. Purpose, nature, and extent of processing;
b. Period of consent/instruction;
c. Rights as a data subject.
4. BREACH
A security incident that:
a. Leads to unlawful or unauthorized processing of personal, sensitive, or privileged information;
b. Compromises the availability, integrity, or confidentiality of personal data.
2. LEGITIMATE PURPOSE.
Data collected must be always be collected only for the specific, explicit, and legitimate purposes of the
PIC.
Data that is not compatible with the purpose [of the data collection] shall not be processed.
3. PROPORTIONALITY.
The amount of data collected for processing should be adequate, relevant, and not excessive in
proportion to the purpose of the data processing.
Efforts should be made to limit the processed data to the minimum necessary.