Preview

Cybercrime

Powerful Essays
Open Document
Open Document
2446 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybercrime
Cybercrime Act: Features and issues
By JJ Disini
Philippine Daily Inquirer
9:49 pm | Saturday, October 6th, 2012
NETIZENS, bloggers and journalists hold a rally outside the Supreme Court to protest Republic Act No. 10175, also known as the Cybercrime Prevention Act. RAFFY LERMA
Recently, the President signed into law two key pieces of legislation—the Cybercrime Prevention Act and the Data Privacy Act, both of which were meant to assist the development of the business process outsourcing industry in the country.
As late as last year, the Philippines reigned as the country with the biggest number of seats in the call center industry, as the BPO industry grew in terms of total revenue, foreign exchange inflow and employment generation.
BPO lobby
It is believed that the BPO industry needs the Cybercrime Act (the “Act”) to respond to the demands of foreign clients for a strong legal environment that can secure their data from being stolen and sold.
As early as 2000, the E-Commerce Act (ECA) already punished hacking but the penalties were deemed too light. The persons convicted served no jail time if they opted to plead guilty in exchange for probation in lieu of imprisonment.
Law enforcement agencies also faced various roadblocks when investigating cybercrime incidents. Even during emergency situations, service providers were reluctant to cooperate with law enforcement officers, citing the need to protect subscriber privacy.
Theoretically, search warrants would have addressed that problem but they were difficult to procure and involved a lengthy process that would have given cybercrime offenders enough time to delete precious data and cover their tracks.
In cross-border cybercrime incidents, law enforcement efforts were even more challenging since foreign governments were not equipped to respond quickly to requests for assistance and no international framework was in place to address cross-border investigations and prosecution.
To be sure, no one

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    1. Identify and explain the factors that have limited local law enforcement efforts against digital crime.…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    |Cyber Security Industry Alliance. "The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime. "Opposing Viewpoints: Cyber |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Best Essays

    This study on Chromatographic Analysis of a Commercial Analgesic’s Active Component seeks to separate, identify, quantify and analyze the active component found in Biogesic®, which may be useful for public awareness despite its wide acceptance and availability in the market. Furthermore, this study applies thin layer chromatography (TLC) technique since it is the simplest, cheapest yet most effective approach in terms to the study’s objectives. The TLC method implies Rf (Rate of flow) values where it is given by the distance from origin to center of subtance spot over the distance from origin to solvent front. As a result, the TLC analysis of Biogesic® yields the following Rf values where the given distance from origin to solvent front measures 59 mm: 1.) acetaminophen has a Rf value of 0.48; 2.) aspirin has a Rf value of 0.64; 3.) caffeine has a Rf value of 0.22; 4.) Biogesic® sample has a Rf value of 0.48 ; 5.) ibuprofen has a Rf value of 0.73; and 6.) mefenamic Acid has a Rf value of 0.76. Thus, the study shows that by having equal Rf values of about 0.48, Biogesic®’s most active component is acetaminophen (paracetamol), a relatively polar compound having a molecular formula C8H9NO2(MW= 151.1626). [1]…

    • 1868 Words
    • 8 Pages
    Best Essays
  • Good Essays

    This allows the organisation to take action and take back whats rightfully there and also punish the hacker as they are covered by this law, this bring a sense of security as this law would put the hackers from obtaining information wrongly.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Unit VIII, Question 11

    • 444 Words
    • 2 Pages

    Transnational crime is a crime with multiple meaning, which is consider to be crime committed in one or more states, but extensive part of its preparation, planning, direction or control takes place in another state (Bohm & Haley, 2008, p. 532). It is an organized crime that have spread across borders that involving groups working in more than one country to arrange and carry out criminal dealing speculations. Transnational organized crime groups have also been involved in hijacking, terrorism, and civil wars (Bohm & Haley, 2008, p. 535). Some significant criminal activities of transnational crime groups are noticeable in numerous varieties, including as cybercrime, trafficking in drugs, attempt to damage government organizations, money laundering, smuggling weapons and even persons. For example, criminals over and over again use the internet to commit a large amount of offenses known as cyber crimes such as the recent activity of the Target scandal. In which thieves stole over 40 million of Target’s customer credit card numbers, and unfortunately I was one of the victims of that incident. Despairingly, in the future law enforcement agencies should enhance their fight against transnational organized crime.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    “One of the most important ways of reducing crime is trying to teach ethics and morality to our kids. That same principle needs to apply to the cyber world,” he said.…

    • 709 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Obviously, if law enforcement is unaware of some of the methods criminals are using means that crime is going to go undetected and individuals will not be prosecuted. People are committing cybercrime from the comfort of their own home, so it’s not easy for law enforcement to recognize that crime is occurring compared to a person breaking the law in public. Nowadays, almost every home has devices such as a desktop, laptop, iPad, and/or iPhone that allow access to the Internet, which makes it difficult to catch cybercriminals. Some victims may not even know they were affected by cybercrime or may not report incidents to law enforcement. It’s important for law enforcement to know as much as possible regarding the usage of technology, software, and information to better detect any criminal activity (Maras, 2015). In order to prosecute, first comes detection. It is possible for law enforcement to establish the IP address from the computer that is committing cybercrime, but at the same time there could not be enough evidence to prosecute. Sometimes, criminals will alter their IP addresses to remain anonymous or use what are called proxy servers to prevent their IP addressed from being detected (Maras,…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Cyber-crime, also known as e-crime, costs companies billions of dollars every year in stolen assets and lost business. Cyber-crime can thoroughly disrupt a company’s marketing actions. Additionally, when a business falls victim to cyber criminals, which could cause a…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    These laws were also setup for the protection of society (Melvin, p. 18, 2011). The most recent changes in business law involve the courts and the legislature on how to deal with how technology has impacted the law, particularly with computers and the Internet. Cyber law has been added as a separate topic in these standards because of its emerging importance in the workplace. Specifically, this area of the standards addresses intellectual property law, with an increased focus on patents, trade secrets, trademarks, and copyright law. Contract law, including legislation related to electronic transactions. Statutes dealing with the impact of computers on privacy and crimes and torts related to…

    • 752 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Law enforcement agencies face many challenges that deal with cybercrime. One of the greatest challenges facing law enforcement agencies in investigating exploitation, cyber stalking, and obscenity is the power of anonymity.…

    • 897 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Congress has enacted many laws to protect the ethics of the citizens of the United States within the age of technology. Several of these laws or acts are less than a decade old. As our nations technology progresses the laws on technology in the United States progress right along with it. Two of the acts are going to be discussed within this paper these acts are Computer Fraud and Abuse Act, 1986 and the other is Children’s Internet Protection Act, 2000.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Many expects have voiced their concerns about cybersecurity. The growing rate, sophistication and impacts of attacks on information systems that have happen in the United States consensus have built a framework for cybersecurity. The Federal role in cybersecurity includes assisting in protecting the organizations systems that are nonfederal and federal. This Individual Assignment will discuss cybersecurity laws, The Sarbanes-Oxley Act. Cybersecurity regulations, legal concepts, the reasons and methods of government interventions, the impacts and effects cybersecurity has on national security, and how the federal and state regulations create positive and negative effects for national security.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cybercrime Policing

    • 1066 Words
    • 5 Pages

    and Cybercrimes which transcend borders are dealt with by Interpol. And crimes involving child abuse on a global scale are handled by the Virtual Global Taskforce (VGTF); an international partnership Set up in 2003, between different police forces and other law enforcement agencies such as Interpol.…

    • 1066 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Digital Crime

    • 611 Words
    • 2 Pages

    There are a number of law enforcement agencies that focus on various types of cyber crime. Each of these agencies has specific areas of expertise or focus. Some of the areas do overlap between agencies, but the agencies do not always communicate effectively. So, their independence from each other does pose some problems when combating digital crime.…

    • 611 Words
    • 2 Pages
    Good Essays