SlideShare una empresa de Scribd logo
1 de 47
Descargar para leer sin conexión
Sunday, October 7, 12
Sunday, October 7, 12
Cybercrime Prevention
                             Act of 2012
                                Computer Professionals’ Union
                                      5 October 2012




         *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court
         Petitions at mga imahe mula sa Pixel Offensive.

Sunday, October 7, 12
Sunday, October 7, 12
Background
         Passed House of Representatives on 04 June 2012

              Senate Bill No. 2796 and House Bill No. 5808


         Passed Senate on 05 June 2012

         Signed into law on 12 September 2012

              An Act Defining Cybercrime, Providing for the Prevention,
              Investigation, Suppression, and the Imposition of Penalties therefor
              and for other Purposes


         Implemented: October 3, 2012
Sunday, October 7, 12
Endorsed by these
         senators.



         “TG” Guingona III
         voting against it.




Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
We fight back!

                  SC petitions to Junk/Repeal/Amend

                        Senate Bill No. 2796 and House Bill No. 5808




Sunday, October 7, 12
We fight back!


                         Online blackout campaign




Sunday, October 7, 12
We fight back!

               Silent protest in SC




Sunday, October 7, 12
We fight back!

            Protest in SC




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
We fight back!
                        Social Media




Sunday, October 7, 12
“Anonymous” fights back!




Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
What is the RA 10175 ?
            Section 4: Cybercrime Offenses

                  Illegal access, illegal interception, data interception, data
                  interference (a)(3), system interference, misuse of devices

                  Computer-related forgery, computer-related fraud, computer-
                  related identity theft

                  Cybersex, child pornography, unsolicited commercial
                  communications

                  Libel



Sunday, October 7, 12
What is the RA 10175 ?
            Section 5: Other Offenses

                  aiding or abetting in the commission of cybercrime, attempt
                  in the commission of cybercrime


            Section 6: All crimes in RPC if committed by, through and with
            the use of ICT

                  Penalty: one degree higher




Sunday, October 7, 12
What is the RA 10175 ?
           Section 4(a)(3) on Data Interference:                   intrudes into
                                                                   people’s freedom
           The intentional or reckless alteration,
           damaging, deletion or deterioration of computer data,   of speech
           electronic document, or electronic data message,
           without right including the introduction or                       alterations
           transmission of viruses


           vague, “sweep unnecessarily broadly”

           “it becomes very burdensome, onerous
           and patently discouraging, specially if
           the act is for purposes of social and
           political criticisms”

     Source: BAYAN SC Petition
Sunday, October 7, 12
What is the RA 10175 ?
           Section 4(b)(3) on Computer-related
           Identity Theft:
                                                                  intrudes into
                                                                  people’s freedom
           The intentional       acquisition, use, misuse,        of speech
           transfer, possession, alteration, or deletion of
           identifying information belonging to                   politician’s full name, age,
           another, whether natural or juridical without right.   education, employment
           Provided, that if no damage has yet been caused, the   background, names of parents,
           penalty imposable shall be one (1) degree lower.       siblings, wife, children and other
                                                                  members of immediate family) of
                                                                  another person (e.g. by
                                                                  intentionally obtaining such
                                                                  identifying information, without
                                                                  any consent, from Facebook,
                                                                  website, or any online article or
                                                                  document)



Sunday, October 7, 12
What is the RA 10175 ?

           Section 4(c)(4) on Libel

             makes anyone a target of prosecution and punishment


             chilling effect on the exercise of freedom of speech

             General Comment   No.   34   of   the   United   Nations   Human   Rights  
             Committee states that   “State   parties should consider the
             decriminalization of defamation

             “a violation or disregard of the Philippine government’s obligations under
             the International Convention on Civil Political Rights to promote and
             protect freedom of expression”
          Source: BAYAN SC Petition
Sunday, October 7, 12
What is the RA 10175 ?
         Section 5(a) on Aiding or        intrudes into people’s
         Abetting in the commission of
         cybercrime:                      freedom of speech
         Section 5(b) on Attempt in the
         commission of cybercrime:




Sunday, October 7, 12
What is the RA 10175 ?
         Section 6 on all crimes defined                    violation of the right
         in Revised Penal Code (RPC),
         if committed by, through and                      of the people not to
         with the use of ICT shall be                      be subjected to
         covered by this Act                               double jeopardy

         Section 7 on Liability under
         other Laws

         A prosecution under this Act shall be without
         prejudice to any liability for violation of any
         provision of RPC etc




Sunday, October 7, 12
What is the RA 10175 ?
         Section 12 (1)                           violation of the right
         Real-Time Collection of Traffic
         Data                                     of the people against
                                                  unreasonable
         Law enforcement authorities, with due
                                                  searches and seizure
         cause, shall be authorized to
         collect or record by technical
         or electronic means traffic               violation of the right
         data in real-time associated with        to privacy
         specified communications transmitted by
         means of a computer system




Sunday, October 7, 12
What is the RA 10175 ?

         Section 17 (1)                                 deprivation of
         Destruction of computer data
                                                        property without due
         Upon expiration of periods authorities shall   process of law
         immediately and completely
         destroy the computer data subject
         to prevention and examination.




Sunday, October 7, 12
What is the RA 10175 ?
         Section 19 (1)
         Restricting of Blocking Access to                 intrudes into
         Computer Data                                     people’s freedom of
         When a computer          data is prima            speech
         facie found to be in violation of the provision
         of this Act, the DOJ shall issue an               grant of unbridled
         order to restrict or block access
         to such computer data.                            power to
                                                           Department of
                                                           Justice
         “take down clause”



Sunday, October 7, 12
Sunday, October 7, 12
Who are affected?

               all users of “mobile phones, computers, computer data
               storage devises (e.g. USB, external hard disks), emails,
               social media and anything that is related to the internet,
               cyberspace and information and communications
               technology”




             Source: BAYAN SC Petition

Sunday, October 7, 12
Threats to ICT professionals

                  For computer professionals and hackers working with
                  information security and network administration our sets
                  of tools can be misinterpreted as tools to commit
                  cybercrime. It should be noted that crackers (bad
                  hackers) and hackers almost use the same set of tools.
                  We can be punished for “misuse of devices”...




                  Source: CP-UNION.COM

Sunday, October 7, 12
Threats to ICT professionals
                  Computer technicians are not spared. They should start
                  asking waivers if they repair, reformat, and troubleshoot
                  computer systems and networks. They could be punished
                  for “system interference” in Section 4 (a) (4).


                  It “adds a broken tool to current computer security
                  toolbox used by computer professionals. It opened new
                  mechanisms for misinterpretations (intentional or not)
                  by State authorities wherein innocent computer users
                  and hackers can be tagged to crimes and punished
                  without due process.”


                  Source: CP-UNION.COM

Sunday, October 7, 12
Can an IRR fix RA 10175 ?
               “As such, Akbayancalls on President Aquino to
               address the infirmities of the law by
               inviting media people and organizations,
               social movements and civil society groups to
               participate in the crafting of the law’s
               implementing rules and regulations (IRR) to
               negate the law’s repressive provisions and safeguard the
               rights and welfare of internet users. The Aquino
               government must swiftly act to salvage this law or
               otherwise the people will have no option left but to bring
               this to court.”
               September 20, 2012 Statement, AKBAYAN
Sunday, October 7, 12
Can an IRR fix RA 10175 ?

                No.


               @natoreyes:
               “The IRR cannot accomplish more than what the law sets
               out to do. If the law intends to criminalize online libel,
               the IRR cannot reverse or negate this. If the law allows
               the take-down of websites by the DOJ sans a court order,
               the IRR cannot reverse or negate this.”
               ... “We’re being drawn to a path that leads to a cliff. Huwag
               magpaloko.”
               Source: http://natoreyes.wordpress.com



Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
We have bigger problems but they decided to prioritize
                 punishment of cybercrime.



Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Sunday, October 7, 12
Binuo ng Computer Professionals’ Union
                              www.cp-union.com




           Ref: http://www.facebook.com/PixelOffensive
           BAYAN Supreme Court Petition
           Bloggers and Netizens vs Aquino Supreme Court Petition

           *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions
           *Mga imahe mula sa Pixel Offensive.




Sunday, October 7, 12
On the Cybercrime Law by Computer Professionals’ Union
                   and Rick Bahague is licensed under a Creative Commons
                 Attribution-NonCommercial-ShareAlike 3.0 Unported License.
                            Based on a work at www.cp-union.com.



Sunday, October 7, 12

Más contenido relacionado

La actualidad más candente

Orientation ra 9208 ii
Orientation ra 9208 iiOrientation ra 9208 ii
Orientation ra 9208 iiOmar Jacalne
 
Republic act no 8049 final report
Republic act no 8049 final reportRepublic act no 8049 final report
Republic act no 8049 final reportOmar Jacalne
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornographyOmar Jacalne
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)Can R. PAHALI
 
Cyber harassment ppt umt
Cyber harassment ppt umtCyber harassment ppt umt
Cyber harassment ppt umtMuhammad Ahmad
 
RA 9208
RA 9208RA 9208
RA 9208F Mad
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationTrix Rodriguez
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 ps
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 psModyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 ps
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 psDhon Reyes
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004Sharon Geroquia
 
9 republic act 9208.pptx eman pogi anti-trafficking
9   republic act 9208.pptx eman pogi anti-trafficking9   republic act 9208.pptx eman pogi anti-trafficking
9 republic act 9208.pptx eman pogi anti-traffickinghanahgail
 

La actualidad más candente (20)

Orientation ra 9208 ii
Orientation ra 9208 iiOrientation ra 9208 ii
Orientation ra 9208 ii
 
Law of-cybercrime
Law of-cybercrimeLaw of-cybercrime
Law of-cybercrime
 
Cybercrime law
Cybercrime lawCybercrime law
Cybercrime law
 
Republic act no 8049 final report
Republic act no 8049 final reportRepublic act no 8049 final report
Republic act no 8049 final report
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
R.A. 7610
R.A. 7610R.A. 7610
R.A. 7610
 
Cyber harassment ppt umt
Cyber harassment ppt umtCyber harassment ppt umt
Cyber harassment ppt umt
 
RA 9208
RA 9208RA 9208
RA 9208
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Anti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentationAnti-voyeurism in the Philippines presentation
Anti-voyeurism in the Philippines presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
OSAEC - pptx
OSAEC - pptxOSAEC - pptx
OSAEC - pptx
 
Ley 1273 de 2009
Ley 1273 de 2009Ley 1273 de 2009
Ley 1273 de 2009
 
Ra 7610
Ra 7610Ra 7610
Ra 7610
 
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 ps
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 psModyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 ps
Modyul 2 sub modyul 2.4 paksa 2 sesyon 2 ra 9775 presentation 4 ps
 
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
VIOLENCE AGAINST WOMEN AND THEIR CHILDREN ACT of 2004
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
9 republic act 9208.pptx eman pogi anti-trafficking
9   republic act 9208.pptx eman pogi anti-trafficking9   republic act 9208.pptx eman pogi anti-trafficking
9 republic act 9208.pptx eman pogi anti-trafficking
 

Destacado

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoPaola Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancementsguest5f7bf4
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkingHamid Zainudin
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...Frances Coronel
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2SMITA V MORE
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry BenRay95
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Arniel Ping
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Arniel Ping
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Arniel Ping
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rightsharshhanu
 

Destacado (18)

Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - FurlanettoAuditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto
 
Facebook Privacy Enhancements
Facebook Privacy EnhancementsFacebook Privacy Enhancements
Facebook Privacy Enhancements
 
lecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networkinglecture 3:understanding ethical issue in networking
lecture 3:understanding ethical issue in networking
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
osn-threats-solutions-2
osn-threats-solutions-2osn-threats-solutions-2
osn-threats-solutions-2
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Legal issues in the media industry
Legal issues in the media industry Legal issues in the media industry
Legal issues in the media industry
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
Media and Information Literacy (MIL) - 8. Opportunities ,Challenges, and Powe...
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
Media and Information Literacy (MIL) 7. Legal, Ethical, and Societal Issues i...
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar a On the cybercrime act

Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement toolsMarkDennielMontiano
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackAnna Manley
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case StudyEddan Katz
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptxTheMuslimLady
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillTeeth Maestro
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )Megan Espinoza
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human rightAgustina
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protectionatuljaybhaye
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 

Similar a On the cybercrime act (20)

Chapter 3 legal framework of cybercrime and law enforcement tools
Chapter 3   legal framework of cybercrime and law enforcement toolsChapter 3   legal framework of cybercrime and law enforcement tools
Chapter 3 legal framework of cybercrime and law enforcement tools
 
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hackLife is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
Life is Short... Sue Everyone: Legal Perspectives on the Ashley Madison hack
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 
Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case Study
 
Hackbama Cyber Crimes Investigations
Hackbama Cyber Crimes InvestigationsHackbama Cyber Crimes Investigations
Hackbama Cyber Crimes Investigations
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Important issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime BillImportant issues in Pakistan's Cyber Crime Bill
Important issues in Pakistan's Cyber Crime Bill
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
3170725_Unit-5.pptx
3170725_Unit-5.pptx3170725_Unit-5.pptx
3170725_Unit-5.pptx
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
2009 case law overview
2009 case law overview2009 case law overview
2009 case law overview
 
The house believes that internet acces is a human right
The house believes that internet acces is a human rightThe house believes that internet acces is a human right
The house believes that internet acces is a human right
 
Right to privacy on internet and Data Protection
Right to privacy on internet and Data ProtectionRight to privacy on internet and Data Protection
Right to privacy on internet and Data Protection
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 

Más de CP-Union

James Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonJames Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonCP-Union
 
Albert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisAlbert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisCP-Union
 
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...CP-Union
 
Jojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaJojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaCP-Union
 
Gerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerGerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerCP-Union
 
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryEladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryCP-Union
 
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardRep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardCP-Union
 
Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.CP-Union
 
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.CP-Union
 
Foss and ict for the people
Foss and ict for the peopleFoss and ict for the people
Foss and ict for the peopleCP-Union
 
Drupal for Non-Profits
Drupal for Non-ProfitsDrupal for Non-Profits
Drupal for Non-ProfitsCP-Union
 

Más de CP-Union (11)

James Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on PythonJames Jesus Bermas on Crash Course on Python
James Jesus Bermas on Crash Course on Python
 
Albert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and AnalysisAlbert Gavino on FOSS in Data Science and Analysis
Albert Gavino on FOSS in Data Science and Analysis
 
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
Tito Mari Escaño on The Better Alternative Development and Startup Platform; ...
 
Jojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to WikimediaJojit Ballesteros on Introduction to Wikimedia
Jojit Ballesteros on Introduction to Wikimedia
 
Gerald Villorente on Intro to Docker
Gerald Villorente on Intro to DockerGerald Villorente on Intro to Docker
Gerald Villorente on Intro to Docker
 
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard StoryEladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
Eladio Abquina on FOSS TOOL for Mining Big Data;OCC PORTAL Dashboard Story
 
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways ForwardRep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
Rep. Carlos Zarate on FOSS and FOI Bill: Status and Ways Forward
 
Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.Renan Mara on What is FOSS and SFD.
Renan Mara on What is FOSS and SFD.
 
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
Almondz Almodal on Change We Need: FOSS, Better Internet, Data Privacy, atbp.
 
Foss and ict for the people
Foss and ict for the peopleFoss and ict for the people
Foss and ict for the people
 
Drupal for Non-Profits
Drupal for Non-ProfitsDrupal for Non-Profits
Drupal for Non-Profits
 

Último

Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Último (20)

Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

On the cybercrime act

  • 3. Cybercrime Prevention Act of 2012 Computer Professionals’ Union 5 October 2012 *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions at mga imahe mula sa Pixel Offensive. Sunday, October 7, 12
  • 5. Background Passed House of Representatives on 04 June 2012 Senate Bill No. 2796 and House Bill No. 5808 Passed Senate on 05 June 2012 Signed into law on 12 September 2012 An Act Defining Cybercrime, Providing for the Prevention, Investigation, Suppression, and the Imposition of Penalties therefor and for other Purposes Implemented: October 3, 2012 Sunday, October 7, 12
  • 6. Endorsed by these senators. “TG” Guingona III voting against it. Sunday, October 7, 12
  • 9. We fight back! SC petitions to Junk/Repeal/Amend Senate Bill No. 2796 and House Bill No. 5808 Sunday, October 7, 12
  • 10. We fight back! Online blackout campaign Sunday, October 7, 12
  • 11. We fight back! Silent protest in SC Sunday, October 7, 12
  • 12. We fight back! Protest in SC Sunday, October 7, 12
  • 13. We fight back! Social Media Sunday, October 7, 12
  • 14. We fight back! Social Media Sunday, October 7, 12
  • 15. We fight back! Social Media Sunday, October 7, 12
  • 16. We fight back! Social Media Sunday, October 7, 12
  • 17. We fight back! Social Media Sunday, October 7, 12
  • 21. What is the RA 10175 ? Section 4: Cybercrime Offenses Illegal access, illegal interception, data interception, data interference (a)(3), system interference, misuse of devices Computer-related forgery, computer-related fraud, computer- related identity theft Cybersex, child pornography, unsolicited commercial communications Libel Sunday, October 7, 12
  • 22. What is the RA 10175 ? Section 5: Other Offenses aiding or abetting in the commission of cybercrime, attempt in the commission of cybercrime Section 6: All crimes in RPC if committed by, through and with the use of ICT Penalty: one degree higher Sunday, October 7, 12
  • 23. What is the RA 10175 ? Section 4(a)(3) on Data Interference: intrudes into people’s freedom The intentional or reckless alteration, damaging, deletion or deterioration of computer data, of speech electronic document, or electronic data message, without right including the introduction or alterations transmission of viruses vague, “sweep unnecessarily broadly” “it becomes very burdensome, onerous and patently discouraging, specially if the act is for purposes of social and political criticisms” Source: BAYAN SC Petition Sunday, October 7, 12
  • 24. What is the RA 10175 ? Section 4(b)(3) on Computer-related Identity Theft: intrudes into people’s freedom The intentional acquisition, use, misuse, of speech transfer, possession, alteration, or deletion of identifying information belonging to politician’s full name, age, another, whether natural or juridical without right. education, employment Provided, that if no damage has yet been caused, the background, names of parents, penalty imposable shall be one (1) degree lower. siblings, wife, children and other members of immediate family) of another person (e.g. by intentionally obtaining such identifying information, without any consent, from Facebook, website, or any online article or document) Sunday, October 7, 12
  • 25. What is the RA 10175 ? Section 4(c)(4) on Libel makes anyone a target of prosecution and punishment chilling effect on the exercise of freedom of speech General Comment   No.   34   of   the   United   Nations   Human   Rights   Committee states that   “State   parties should consider the decriminalization of defamation “a violation or disregard of the Philippine government’s obligations under the International Convention on Civil Political Rights to promote and protect freedom of expression” Source: BAYAN SC Petition Sunday, October 7, 12
  • 26. What is the RA 10175 ? Section 5(a) on Aiding or intrudes into people’s Abetting in the commission of cybercrime: freedom of speech Section 5(b) on Attempt in the commission of cybercrime: Sunday, October 7, 12
  • 27. What is the RA 10175 ? Section 6 on all crimes defined violation of the right in Revised Penal Code (RPC), if committed by, through and of the people not to with the use of ICT shall be be subjected to covered by this Act double jeopardy Section 7 on Liability under other Laws A prosecution under this Act shall be without prejudice to any liability for violation of any provision of RPC etc Sunday, October 7, 12
  • 28. What is the RA 10175 ? Section 12 (1) violation of the right Real-Time Collection of Traffic Data of the people against unreasonable Law enforcement authorities, with due searches and seizure cause, shall be authorized to collect or record by technical or electronic means traffic violation of the right data in real-time associated with to privacy specified communications transmitted by means of a computer system Sunday, October 7, 12
  • 29. What is the RA 10175 ? Section 17 (1) deprivation of Destruction of computer data property without due Upon expiration of periods authorities shall process of law immediately and completely destroy the computer data subject to prevention and examination. Sunday, October 7, 12
  • 30. What is the RA 10175 ? Section 19 (1) Restricting of Blocking Access to intrudes into Computer Data people’s freedom of When a computer data is prima speech facie found to be in violation of the provision of this Act, the DOJ shall issue an grant of unbridled order to restrict or block access to such computer data. power to Department of Justice “take down clause” Sunday, October 7, 12
  • 32. Who are affected? all users of “mobile phones, computers, computer data storage devises (e.g. USB, external hard disks), emails, social media and anything that is related to the internet, cyberspace and information and communications technology” Source: BAYAN SC Petition Sunday, October 7, 12
  • 33. Threats to ICT professionals For computer professionals and hackers working with information security and network administration our sets of tools can be misinterpreted as tools to commit cybercrime. It should be noted that crackers (bad hackers) and hackers almost use the same set of tools. We can be punished for “misuse of devices”... Source: CP-UNION.COM Sunday, October 7, 12
  • 34. Threats to ICT professionals Computer technicians are not spared. They should start asking waivers if they repair, reformat, and troubleshoot computer systems and networks. They could be punished for “system interference” in Section 4 (a) (4). It “adds a broken tool to current computer security toolbox used by computer professionals. It opened new mechanisms for misinterpretations (intentional or not) by State authorities wherein innocent computer users and hackers can be tagged to crimes and punished without due process.” Source: CP-UNION.COM Sunday, October 7, 12
  • 35. Can an IRR fix RA 10175 ? “As such, Akbayancalls on President Aquino to address the infirmities of the law by inviting media people and organizations, social movements and civil society groups to participate in the crafting of the law’s implementing rules and regulations (IRR) to negate the law’s repressive provisions and safeguard the rights and welfare of internet users. The Aquino government must swiftly act to salvage this law or otherwise the people will have no option left but to bring this to court.” September 20, 2012 Statement, AKBAYAN Sunday, October 7, 12
  • 36. Can an IRR fix RA 10175 ? No. @natoreyes: “The IRR cannot accomplish more than what the law sets out to do. If the law intends to criminalize online libel, the IRR cannot reverse or negate this. If the law allows the take-down of websites by the DOJ sans a court order, the IRR cannot reverse or negate this.” ... “We’re being drawn to a path that leads to a cliff. Huwag magpaloko.” Source: http://natoreyes.wordpress.com Sunday, October 7, 12
  • 39. We have bigger problems but they decided to prioritize punishment of cybercrime. Sunday, October 7, 12
  • 46. Binuo ng Computer Professionals’ Union www.cp-union.com Ref: http://www.facebook.com/PixelOffensive BAYAN Supreme Court Petition Bloggers and Netizens vs Aquino Supreme Court Petition *Mula sa mga datos ng BAYAN at Bloggers and Netizens vs Aquino Supreme Court Petitions *Mga imahe mula sa Pixel Offensive. Sunday, October 7, 12
  • 47. On the Cybercrime Law by Computer Professionals’ Union and Rick Bahague is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Based on a work at www.cp-union.com. Sunday, October 7, 12