Preview

Cybercrime: Computer and Data

Good Essays
Open Document
Open Document
978 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybercrime: Computer and Data
CYBER CRIME LAW
Republic Act No. 10175
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES
CHAPTER I
PRELIMINARY PROVISIONS
SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012″.
SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and communications industries such as content production, telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts. In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels, and by providing arrangements for fast and reliable international cooperation.
SEC. 3. Definition of Terms. — For purposes of this Act, the following terms are hereby defined as follows:
(a) Access refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network.
(b) Alteration refers to the modification or change, in form or substance, of an existing computer data or program.
(c) Communication refers to the transmission of information through ICT

You May Also Find These Documents Helpful

  • Good Essays

    Historians have argued inconclusively for years over the prime reason for Confederate defeat in the Civil War. The book Why the North Won the Civil War outlines five of the most agreed upon causes of Southern defeat, each written by a highly esteemed American historian. The author of each essay does acknowledge and discuss the views of the other authors. However, each author also goes on to explain their botheration and disagreement with their opposition. The purpose of this essay is to summarize each of the five arguments presented by Richard N. Current, T. Harry Williams, Norman A. Graebner, David Herbert Donald, and David M. Potter. Each author gives his insight on one of the following five reasons: economic, military, diplomatic, social, and political, respectively.…

    • 1300 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Once there was a time where there was a kid from Willacoochee, Georgia, that had great talent for baseball. He played left field, first base, and pitcher. His name was Conner Johnson ,he lived in a small town named Willacoochee, and going to the starting ninth grade. Conner was six feet tall and could four feet into the air. His first year, he played a excellent first game.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Waleski, B. (2006). The legal implications of information security: Regulatory compliance and liability. In H. Bidgoli (Ed.), Handbook of information security (Vol 1). New York, NY: John Wiley & Sons…

    • 2575 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    Aimed at reducing hacking and the threat from viruses, there are 3 main offences covered by the Act:…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber-crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web. There isn’t really a fixed definition for cyber-crime. The Nigerian Harmonized Cyber Security Bill of 2011 explains Cyber Crime as all crime emarginated offline which can be achieved with the use of computer networks as a tool, threats to lives and properties, disruption of critical services, terrorism and economic sabotage, propaganda and theft of information.…

    • 4691 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Detection of Cyber Crime

    • 1029 Words
    • 5 Pages

    The term 'cyber crime' has not been defined in any Statute or Act. A simple yet sturdy definition of cyber crime would be “unlawful acts wherein the computer is either a tool or a target or both”. These acts committed are punishable by the IT Act.…

    • 1029 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Patents act 1970

    • 58569 Words
    • 235 Pages

    (3) It shall come into force on such date as the Central Government may, by notification…

    • 58569 Words
    • 235 Pages
    Good Essays
  • Good Essays

    Republic Act

    • 920 Words
    • 4 Pages

    1. SECTION Short Title. - This Act shall be known a s the "Anti-Red Tape Act of 2007".…

    • 920 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Sarkar

    • 1580 Words
    • 7 Pages

    (2) They shall come into force on the date of their publication in the Official Gazette. 2. Definitions — (1) In these rules, unless the context otherwise requires,-(a) "Act" means the Information Technology Act, 2000 (21 of 2000); (b) "Appropriate Government" means the Central Government or the State Government or an Union Territory Administration; (c) "Cyber Cafe" means cyber cafe as defined in clause (na) of sub-section (1) of section 2 of the Act; (d) "computer resource" means a computer resource as defined in clause (k) of subsection (1) of section 2 of the Act; (e) "Data" means data as defined in clause (o) of sub-section (1) of section 2 of the Act; (f) "Information" means information as defined in clause (v) of sub-section (1) of section 2 of the Act; (g) "Intermediary" means an intermediary as defined in clause (w) of sub-section (1) of section 2 of the Act; (h) "Registration Agency" means an agency designated by the Appropriate Government to register cyber cafe for their operation; (i) "Log Register" - means a register maintained by the Cyber Cafe for access and use of computer resource;…

    • 1580 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Freedom of Information Bill

    • 5333 Words
    • 22 Pages

    SECTION. 1. Short Title. – This Act shall be known as the “Freedom of Information…

    • 5333 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    Event Plan

    • 382 Words
    • 2 Pages

    To show public what the Cyber Crime is, in which way it comes out and how to avoid it.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in the Philippines approved on 12 September 2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines. Among the cybercrime offenses included in the bill are cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.The Act, divided into 31 sections split across eight chapters, criminalizes several types of offenses, including illegal access (hacking), data interference, device misuse, cybersquatting, computer-related offenses such as computer fraud, content-related offenses such as cybersex and spam, and other offenses. The law also reaffirms existing laws against child pornography, an offense under Republic Act No. 9779 (the Anti-Child Pornography Act of 2009), and libel, an offense under Section 355 of the Revised Penal Code of the Philippines, also criminalizing them when committed using a computer system. Finally, the Act provides for a "catch-all" clause, wherein all offenses currently punishable under the Revised Penal Code are likewise punishable under the Act when committed using a computer, with corresponding stricter penalties than if the crimes were punishable under…

    • 611 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sec. 3. Definition of Terms. — As used in this Act the following terms and shall mean:…

    • 3500 Words
    • 10 Pages
    Powerful Essays