Preview

Cybercrime Law, Dapat Bang Ipatupad?

Good Essays
Open Document
Open Document
611 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybercrime Law, Dapat Bang Ipatupad?
The Cybercrime Prevention Act of 2012 is the first law in the Philippines which specifically criminalizes computer crime, which prior to the passage of the law had no strong legal precedent in Philippine jurisprudence. While laws such as the Electronic Commerce Act of 2000 (Republic Act No. 8792 regulated certain computer-related activities, these laws did not provide a legal basis for criminalizing crimes committed on a computer in general: for example, Onel de Guzman, the computer programmer charged with purportedly writing the ILOVEYOU computer worm, was ultimately not prosecuted by Philippine authorities due to a lack of legal basis for him to be charged under existing Philippine laws at the time of his arrest.
The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in the Philippines approved on 12 September 2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.The Act, divided into 31 sections split across eight chapters, criminalizes several types of offenses, including illegal access (hacking), data interference, device misuse, cybersquatting, computer-related offenses such as computer fraud, content-related offenses such as cybersex and spam, and other offenses. The law also reaffirms existing laws against child pornography, an offense under Republic Act No. 9779 (the Anti-Child Pornography Act of 2009), and libel, an offense under Section 355 of the Revised Penal Code of the Philippines, also criminalizing them when committed using a computer system. Finally, the Act provides for a "catch-all" clause, wherein all offenses currently punishable under the Revised Penal Code are likewise punishable under the Act when committed using a computer, with corresponding stricter penalties than if the crimes were punishable under

You May Also Find These Documents Helpful

  • Good Essays

    Robinson, E. (2012, September 20). What is a computer hacker [Blog post]. Retrieved from http://blog.lifestore.aol.com/2012/09/20/what-is-a-hacker/…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computers have become a big part of our lives. They are being used more and more and the Internet has brought with it a big amount of computer criminals. In 1988, Victoria created the first Australian computer crime laws.…

    • 1206 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The No Electronic Theft (NET) Act was enacted by Congress in 1997 to help prosecute of copyright violations on the internet. It makes it a federal crime to copy, distribute, and share copies of electronic works that are copyrighted, such as movies, games, and music. Also applicable in means of making copyrighted material available over networks. Before this Act was passed people who purposely distributed copied software over the internet did not face criminal penalties if they didn’t make profit off of it. Violation of the electronic copyrighting will carry out a maximum penalty of three years in prison and a fine of $250,000 ("University Information Technology Services",…

    • 277 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    capstone analysis

    • 535 Words
    • 2 Pages

    A cybercrime is a crime that is committed on a computer. There are several different types of crimes that are considered cybercrimes. A few examples of these crimes are virus spreading, hacking, fraud, and cyber bullying. A large amount of identity theft is committed online, and this has become a huge problem. According to "What Is Cyber Crime?" (2015), “reports of alleged computer crime have been a hot news item of late. Especially alarming is the realization that many of the masterminds behind these criminal acts are mere kids. In fact, children no longer need to be highly skilled in order to execute cybercrimes. "Hacker tools" are easily available on the Net and, once downloaded, can be used by even novice computer users” (para. 3).…

    • 535 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Regulation of Internet

    • 680 Words
    • 3 Pages

    The usage of computer, internet, smart phones and other related devices are now an integral part of our daily lives. With the exponential raise in technology, there is also a corresponding rise in Crimes specific to new technologies. The laws prevailing till 1999 proved to be inadequate to address the growing threat of the new realm of crimes in cyber space. Therefore, the Information Technology Act, 2000 came to be enacted. This Act was further amended in 2008.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cybercrime refers to criminal use of a computer and the internet. Cybercrime as credit card scams, identity theft, unauthorized access to computer and if a company that has a website is convicted of a cybercrime then the company will lose money. The cyber law are one of the newest form of global law, escorting in the greater regulation of the Internet related legal guideline worldwide to lodge e-commerce, globalization, and the extent of western independent ideals. The correct trademark can protect a business or company against cyber infringement, patent issues in cyberspace. Some fear that the cyber law will profit the welfares of large, international industry and constabularies’ observation. Cyber jurisdiction is a law that impact over activities taking residence on the internet.…

    • 343 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Many issues surrounding this kind of crime has maintain a significant profile mainly toward hacking, copyright and infringement, for the most part this type of computer crime can be placed in two different categories. Crimes that target computer networks or devices directly (i.e. malware-malicious code, denial of service attacks, and computer viruses); Richtel, M and S Robinson, 2002) and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (i.e. cyber stalking, fraud and identity theft, an information warfare). (Messmer, E 2002)…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    (Siegel, Introduction to Criminal Justice, 2011) I had no idea that pornography and prostitution was mentioned along with copyright infringement. The second cybercrime mentioned is cyber vandalism. Cyber vandalism is a malicious attacks, disrupting-defacing, and destroying technology. This crime is motivated by malice not greed. (Siegel, Introduction to Criminal Justice, 2011) Some examples of cyber vandalism are:…

    • 741 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cyber Law in India

    • 4036 Words
    • 17 Pages

    Cyber law India is an organization that is dedicated to the passing of relevant and dynamic Cyber laws in India. Considering India is one of the biggest economies impacting electronic commerce and the biggest markets to target, it is but natural to accept that India should have in place appropriate enabling legal provisions for effective and secure cyber transactions.…

    • 4036 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Cybercrime in Indonesia

    • 1297 Words
    • 6 Pages

    Even if Indonesia has not ratified or signed the Convention on Cybercrime yet, officially Indonesia has implemented almost all cyber crime provisions set forth in the Convention. These provisions are set out in several articles in Law No. 11 Year 2008 on Information and Electronic Transaction. The seven provisions, among others; offense related to child pornography, illegal access, illegal interception, data interference, system interference, misuse of devices, and computer related forgery. The provisions of computer-related fraud and attempt and aiding or abetting are no longer regulated under this Act due consideration has been accommodated by the existing provisions in the Penal Code. Likewise, some offenses related to infringements of copyright and related rights are deemed to have been sufficiently set forth in the Law on Intellectual Property Rights.…

    • 1297 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Revised Penal Code

    • 820 Words
    • 4 Pages

    Not all crimes in the Philippines are penalized under the Code. Certain acts, such as the illegal possession of firearms, are penalized under special legislation contained in Republic Acts. The most notable crimes now excluded from the Revised Penal Code are those concerning illegal drug use or trafficking, which are penalized instead under the Dangerous Drugs Act of 1972 and later the Comprehensive Dangerous Drugs Act of 2002.…

    • 820 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cyber Law

    • 662 Words
    • 3 Pages

    In a landmark judgment in the case of National Association of Software and Service Companies vs Ajay Sood & Others, delivered in March, ‘05, the Delhi High Court declared `phishing’ on the internet to be an illegal act, entailing an injunction and recovery of damages.…

    • 662 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What the cyber law in the Philippines is trying to do is to put a restriction in what people do in the internet.…

    • 877 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cybercrime

    • 2446 Words
    • 10 Pages

    Law enforcement agencies also faced various roadblocks when investigating cybercrime incidents. Even during emergency situations, service providers were reluctant to cooperate with law enforcement officers, citing the need to protect subscriber privacy.…

    • 2446 Words
    • 10 Pages
    Powerful Essays