Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Cyber crimes are criminal offenses

committed via the Internet or otherwise


aided by various forms of computer
technology, such as the use of online
social networks to bully others or sending
sexually explicit digital photos with a
smart phone.

CYBER CRIME
TYPES OF CYBERIME
COMPUTER
CRIME SEXTING
Brief synopsis of the various It is the use of text
offenses that constitute messaging or similar
computer crime. networking technologies to
send and receive sexually
explicit messages or
CYBER IDENTITY
photographs.
BULLYING THEFT
the act of using computer The crime of obtaining the
networking technology and online personal or financial
social networks to harass, information of another person
intimidate and otherwise bully for the sole purpose of
classmates or other peers. assuming that person's name
or identity to make
SOURCE: http://criminal.findlaw.com/criminal- transactions or purchases
charges/cyber-crimes.html
CYBER CRIME
PREVENTION OF 2012
“RA 10175”
RA 10175 punishes content-related offenses such as cybersex,
child pornography and libel which may be committed through a
computer system. It also penalizes unsolicited commercial
communication or content that advertises or sells products or
services.

SOURCE: https://technology.inquirer.net/34360/in-the-know-the-
DIGITAL SECURITY
Digital security is the protection of this online identity.
Criminals are finding new ways to operate and steal
information from digital users for their own personal
gain. Digital security is an all-encompassing term
which includes the tools you can use to secure your
identity, assets and technology in the online and
mobile world.
TOOLS THAT ARE USED TO PROVIDE
DIGITAL SECURITY
● Anti-virus Software

● Web Services

● Biometrics

● Securing Personal Devices


DATA PRIVACY
ACT
Republic Act No. 10173, otherwise known as
the Data Privacy Act is a law that seeks to protect
all forms of information, be it private, personal, or
sensitive. It is meant to cover both natural and
juridical persons involved in the processing of
personal information

https://iapp.org/news/a/summary-philippines-data-protection-
act-and-implementing-regulations/
PENALTIES
Section 52. Unauthorized Processing of Personal Information and Sensitive Personal
Information.
a. A penalty of imprisonment ranging from one (1) year to three (3) years and a fine of
not less than Five hundred thousand pesos (Php500,000.00) but not more than Two
million pesos (Php2,000,000.00) shall be imposed on persons who process personal
information without the consent of the data subject, or without being authorized under
the Act or any existing law.
b. A penalty of imprisonment ranging from three (3) years to six (6) years and a fine of
not less than Five hundred thousand pesos (Php500,000.00) but not more than Four
million pesos (Php4,000,000.00) shall be imposed on persons who process sensitive
personal information without the consent of the data subject, or without being authorized
under the Act or any existing law.
Section 53. Accessing Personal Information and Sensitive Personal Information Due to
Negligence.
a. A penalty of imprisonment ranging from one (1) year to three (3) years and a fine of not
less than Five hundred thousand pesos (Php500,000.00) but not more than Two million
pesos (Php2,000,000.00) shall be imposed on persons who, due to negligence, provided
access to personal information without being authorized under the Act or any existing law.
b. A penalty of imprisonment ranging from three (3) years to six (6) years and a fine of not
less than Five hundred thousand pesos (Php500,000.00) but not more than Four million
pesos (Php4,000,000.00) shall be imposed on persons who, due to negligence, provided
access to sensitive personal information without being authorized under the Act or any
existing law.

SOURCE:https://www.privacy.gov.ph/implementing-rules-regulations-data-privacy-act-
2012/
THANK
YOU!

You might also like