GIT Lecture 9 Cybercrime Laws in The Philippines
GIT Lecture 9 Cybercrime Laws in The Philippines
GIT Lecture 9 Cybercrime Laws in The Philippines
in the Philippines
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
A brief retrospective view
How it all started
2
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The ILOVEYOU worm
3
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The ILOVEYOU worm
▣ The worm spread to e-mail accounts across the globe, affecting even the
accounts of U.S. Officials.
▣ This prompted the FBI to identify the source of the worm, which was then
traced back to the Philippines.
▣ It is believed that the estimated damages caused by the worm reached 10
billion USD.
4
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
5
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No
Onel De Guzman was caught but was released shortly afterwards
because there wasn’t any pre-existing laws in the country for which he
can be prosecuted.
6
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Want big impact?
Use big image.
7
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Beginnings of cybercrime in the philippines
8
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
Republict Act 8792
9
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
▣ R.A. 8792 is an act providing for the recognition and use of electronic
commercial and non-commercial transactions and documents, penalties for
unlawful use thereof and for other purposes.
▣ In addition, R.A. 8792 was also used to define certain illegal activities
concerning the use of various devices in an effort to provide a legal
provision to deter future actions similar to what Onel De Guzman did.
10
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important provisions of R.A. 8792
▣ Ch. II. Sec 6. Legal Recognition of Data Messages.
11
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important provisions of R.A. 8792
▣ Ch. II. Sec 6. Legal Recognition of Data Messages.
□ This provision gives text messages, e-mails, or any other similar modes
communication done through electronic means such as unaltered
screenshots, the same legal validity as physical messages.
12
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
▣ Ch. II. Sec 7. Legal Recognition of Electronic Documents.
13
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
▣ Ch. II. Sec 7. Legal Recognition of Electronic Documents.
14
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited acts: Hacking
▣ Hacking / Cracking
□ Unauthorized access into a computer system/server or information and
communication system;
□ Any access in order to corrupt, alter, steal, or destroy using a
computer, … , without the knowledge and consent of the owner [of
the computer system];
□ Introduction of computer viruses and the like, resulting in the
corruption, destruction, alteration, theft or loss of electronic data
messages or electronic document.
15
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited acts: Hacking
▣ Hacking / Cracking
17
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
▣ Penalties
18
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions: R.A. 8792
19
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
By merely accessing it, there was no clear intent to
“corrupt, alter, steal, or destroy”.
At least according to RA 8792, this is not illegal.
20
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
“
More recently, the following law is the most
comprehensive cybercrime law enacted in the
Philippines.
To date, this is the cornerstone of cybercrime
protection for citizens in the Philippines.
21
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Republict Act 10175
22
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
23
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
DEFINTION
▣ A cybercrime is a crime committed with or through the use of
information and communication technologies such as radio,
television, cellular phone, computer and network, and other
communication device or application.
24
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Three Types of Cybercrimes
1. Offenses against the confidentiality, integrity and availability
(CIA) of computer data and systems;
2. Computer-related offenses;
3. Content-related offenses;
** There is a fourth offense, which refers to “offenses related to infringements of copyright and
related rights”. This, however, is not included in the RA 10175 because a separate law is currently in
that punishes such offenses.
25
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Jurisdiction of RA 10175
Who can be charged with violations of this law?
1. Any violation committed by a Filipino national regardless of the place of
commission.
2. Any of the elements was committed within the Philippines or committed with the use
of any computer system wholly or partly situated in the country.
3. When by such commission any damage is caused to a natural or juridical person
who, at the time the offense was committed, was in the Philippines.
26
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Explanation
1. Pag isang Pilipino ang nagkasala, kahit nasaan pa siyang lupalop ng mundo, ay
pwedeng kasuhan ng paglabag sa RA 10175.
2. Kung may kahit na anong parte ng krimen na nangyari sa Pilipinas, kasama na ang
paggamit ng kahit na anong computer sa Pilipinas para sa gawaing maaaring
maparusahan ng paglabas sa bata s na ito.
3. Kung ang biktima, sa panahon na nangyari ang isang krimen, ay nasa loob ng
Pilipinas, ang sinumang gumawa ng krimen ay maaari din maparusahan.
27
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
1. Illegal Access
□ The access to the whole or any part of a computer system without right.
▪ Without right means having no consent from the owner of the computer
system.
▪ Access is the instruction, communication with, storing / retrieving data
from, or [making] use of any resources of a computer system or
communication network.
28
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions: R.A. 10175
29
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
Illegal access is to “make use of any resources” without right (consent).
Even if this is not punishable under RA 8792, it is under RA 10175.
30
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
2. Illegal Interception
□ The interception made by technical means without right of any non-
public transmission of computer data.
□ Interception is listening to, recording, monitoring or surveillance of
the content of communications, (…), through the use of electronic
eavesdropping or tapping devices, at the same time that the
communication is occurring.
31
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
32
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Example:
□ Have you experienced receiving coming from “bpionline.com.ph” with
a subject line of “Update your security details now”?
□ These e-mails ask the recipients to go to a site to login by placing their
credentials.
□ Unknown to many, the purpose of those websites is to intercept or to
just get your user credentials so they can access your real online banking
accounts.
33
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
3. Data Interference
□ The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data
message, without right, including the introduction or transmission of
viruses.
34
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions: R.A. 10175
▣ Consider this situation:
□ You have a friend who will send a file to you through a flash drive.
□ Unknown to both of you, the flash drive has a virus in it.
□ After you copied the file you need from the flash drive of your friend,
you noticed that your files and folders suddenly disappeared and only a
shortcut icon appeared on your personal folder.
▣ Is your friend liable for any violation of RA 10175?
35
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
Data interference includes “the intentional or reckless alteration, damaging, deletion or deterioration
of computer data.” In the situation, even if you friend lent you his/her flash drive in good faith (has no
intentions to infect your computer with a virus), it is still considered as recklessness in his/her part and
it also caused an “alteration”, or “deletion”, or even “deterioration” of data.
36
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
4. System Interference
□ The intentional alteration or reckless hindering or interference with the
functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering or
suppressing computer data or program, electronic document, or
electronic data message, without right or authority, including the
introduction or transmission of viruses
37
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Explanation
▣ This is more or less an extension of the previous offense, whereby the
affected entity is not just data but the whole system.
▣ The previous situation can also apply here if, instead of just having the files
“damaged” or “altered”, the whole computer system went into error.
38
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ Cryptojacking or Cryptomining Malware
39
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ When you download through torrent sites like “thepiratebay”, you basically
give them the authority to use your computer’s CPU (whether mobile or
desktop) to “mine” cryptocurrencies.
▣ This is one of the reasons why, in most cases, downloading a lot of files can
cause your computer to heat up. Your computer’s CPU is being used to
calculate and solve blocks of encrypted data to mine cryptocurrencies.
40
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ Website defacing
41
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
5. Misuse of Devices
□ The use, production, sale, procurement, distribution, or otherwise making
available, without right, of a device or computer password designed
primarily for the purpose of committing any of the offenses under this
Act;
□ The possession of an item referred to above.
42
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Misuse of Devices
▣ Use of Skimming Devices / Keyloggers
43
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Misuse of Devices
Use of Skimming Devices
□ Ivaylo Sashov Galapov was a
Bulgarian man arrested in
Pampanga, when the security
guards of BPI Family Savings Bank
noticed him inserting ATM cards in
succession.
□ He was arrested for violation of
R.A. 8792 and R.A. 10175.
Credits: ABS-CBN News Website
44
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
6. Cyber-squatting
□ The acquisition of a domain name over the internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the same, if
such a domain name is:
i. Similar, identical, to an existing trademark (…) at the time of the domain name
registration:
ii. Identical with the name of a person other than the registrant;
iii. Acquired without right or with intellectual property interests in it.
45
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ MikeRoweSoft
□ In January 2004, Mike Rowe was a grade 12 student who operated a
profitable web design business as a part time job. He registered the
website with the domain name MikeRoweSoft.com.
□ Lawyers from Microsoft asked him to stop using the website. Mike Rowe
asked for $10,000 in return.
□ Microsoft said no and proceeded to filing a case against him.
46
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ MikeRoweSoft
□ Perhaps due to the stress that the whole process would entail, not
withstanding the fact that this legal process would cost a lot of money,
Mike Rowe decided to give away the website.
□ News outlets reported that what he got in return was an XBOX console.
□ But after some research, the following reddit thread appears apparently
from Mike Rowe himself.
47
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ I found this on reddit, Mike Row had this to say:
48
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (b). Computer-Related Offense
7. Computer-Related Forgery
□ The input, alteration, or deletion of any computer data without right resulting
in inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic.
49
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Computer-Related Forgery
▣ Hacking into the iSLU portal to change your grade from 65 to 95.
□ This has no monetary value and is therefore considered as “forgery” and
not “fraud”.
50
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (b). Computer-Related Offense
8. Computer-Related Fraud
□ The unauthorized input, alteration, or deletion of computer data or program or
interference in the functioning of a computer system, causing damage thereby
with fraudulent intent.
51
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Computer-Related Fraud
The only difference between forgery and fraud, it is now considered fraud
instead of forgery if the damage incurred has “monetary value”.
Some examples include:
▣ Hacking into a bank’s database and changing your account balance
from “Php 500” to “Php 5,000”.
▣ Asking people to send you “prepaid load”, as they maliciously deceive
you from believing that they are your “relatives from abroad”.
52
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (b). Computer-Related Offense
53
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Computer-Related Identity Theft
▣ Fake profiles in Facebook, Instagram, and other websites.
□ There must be a use of “identifying information” which includes pictures of
another person and his/her other personal details but not someone’s NAME.
□ This is because it is completely possible for anyone to have the same name as
another person, as well as for fan pages bearing the name of another person.
□ If the intentions in the use of such profiles are for malicious purposes, such as
pretending to be the actual person even if not, is already a violation of this law .
54
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
10. Cybersex
□ The willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual activity,
with the aid of a computer system, for favor or consideration.
55
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
56
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
Even if both partied consented, and even if these acts are publicly denounced, they do not constitute to
cybersex since the act is not done for “any favour or consideration”. For the purposes of this law, there
must be an element of “engagement in business” for the act to be considered as prohibited.
57
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
11. Child Pornography
□ The unlawful or prohibited acts defined and punishable by Republic Act
No. 9775 or the Anti-Child Pornography Act of 2009, committed through
a computer system.
□ Any representation, whether visual, audio thereof, by electronic, … , or
any other means, of a child engaged or involved in real or simulated
explicit sexual activities.
58
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
59
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
UNLESS: the hentai clip itself contains a character which is explicitly identified as a minor. If so, the
said material is prohibited and the creator / distributor of the said material are liable for violations of
this law.
60
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
12. Online Libel
□ Libel is the public and malicious imputation of a crime, real or
imaginary, or any act, omission, condition, status, or circumstance
tending to cause the dishonor, discredit, or contempt of a natural or
juridical person, or to blacken the memory of one who is dead.
61
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
12. Online Libel
□ Elements of Libel:
1. Allegation of a discreditable act or condition
concerning another;
2. Publication of the charge;
3. Identity of the person defamed; and
4. Existence of malice.
62
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
▣ Consider the following post:
□ “Hoy Maria David! Ikaw malandi ka! Alam naman ng lahat
na kahit kanino pumapatol ka! Tuwing gabi nasa park ka,
kasama mo nanay mo! Magkano ba ang rate natin ngayon?
500 hundred, tatlong oras? Ha? Pokpok! Pokpok! Pokpok
kayo ng nanay mo!”
63
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
64
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
The statements in the post contains: 1. An allegation against Maria David; 2. Publicized since it was
posted in a social media site; 3. The identity of Maria David was clear; 4. There was no doubt that the
intentions were to defame Maria David, including her mother.
All elements of libel are existent in this post.
65
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
66
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
Liking or reacting may be a sign of approval to the said post, but no statement was mentioned in
anyway that makes any allegation towards Maria David. Hence, the first element of libel is not
present.
67
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
68
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
The shared post might contain a message that is already established as libelous, BUT the statements
were not made by the person who shared it. Thus, the person who shared the same post cannot be held
liable.
69
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
70
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
Similar to liking or reacting, commenting “oo” is a sign of approval but is not a statement that
discredits or alleges Maria David. Thus, the person is not liable.
71
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
72
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
This statement is not merely an approval but also states an allegation towards Maria David herself.
Thus making the person liable for libel since the comment can be seen publicly as well.
73
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The concept of PRIVACY
Privacy under the civil code
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The Right to Privacy
▣ This is the right of an individual "to be free from
unwarranted publicity, or to live without unwarranted
interference by the public in matters in which the public
is not necessarily concerned.”
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
The State recognizes the right of the people to be secure in their houses. No one, not even the State,
except "in case of overriding […] and only under the stringent procedural safeguards," can disturb
them in the privacy of their homes.
77
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Privacy in the Civil Code
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts under the Civil Code
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
▣ May an individual install surveillance cameras on his own property facing the
property of another?
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
A man’s house is his castle, where his right to privacy cannot be denied or even restricted
by others.
It includes any act of intrusion into, peeping or peering inquisitively into the
residence of another without the consent of the latter.
81
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Privacy in the Civil Code
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example Case
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes!
In the decision of the court: “A person, by contracting marriage, does not shed his/her
integrity or his right to privacy as an individual and the constitutional protection is ever
available to him or to her.”
87
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example Case
With respect to the legal separation case, what was the decision of the
court?
▣ The documents and papers are inadmissible as evidence.
▣ The Court said: “the intimacies between husband and wife do not justify any
one of them in breaking the drawers and cabinets of the other and in
ransacking them for any telltale evidence of marital infidelity.”
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Reasonable Expectation of Privacy
1. When the person believes that one could undress in privacy without being
concerned that an image of him or her is being taken;
2. When a reasonable person would believe that one’s private area would not be
visible regardless of whether the person is in a public or private place.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes!
A person would normally expect to change his or her clothes without worrying about
anyone who could see him / her.
In addition, a fitting room is properly secluded to ensure that no one else can see what a
person inside is doing. Thus, a person has a reasonable expectation of privacy inside a
fitting room
91
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Photo and Video Voyeurism Act of
2009
Republic Act 9995
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Punishable Acts: R.A. 9995
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Punishable Acts
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
The phrase “private area of a person” appears on the first punishable act under R.A.
9995.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes!
The mere copying or reproduction of said material will make one liable under the law
regardless of the reason or whether one profits or not from such act. In fact, the mere
showing of the material on one’s cellphone would violate the law.
98
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
The person merely consented to the taking of the photo or the video recording and did not
give written consent for its reproduction, distribution, and broadcasting.
100
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Penalty
The penalty for the commission of any of the said prohibited acts would
incur a penalty of:
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Data Privacy Act
Republic Act 10173
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Data Privacy Act of 2012
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important Definitions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important Definitions
3. Consent
▣ Where the data subject agrees to the collection and processing of his
personal data. The agreement must inform:
□ purpose, nature, and extent of processing;
□ period of consent/instruction;
□ rights as a data subject
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Definitions
4. Breach
▣ A security incident that:
□ Leads to unlawful or unauthorized processing of personal,
sensitive, or privileged information;
□ Compromises the availability, integrity, or confidentiality of
personal data.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
What is Personal Information?
Personal Information Sensitive Personal Information
▣ Refers to any information or opinion about ▣ This is a type of personal information that
a particular individual that can be used in may be used to harm or discriminate other
identifying a person. This includes: people when mishandled. This include:
□ name □ race or ethnic origin;
□ address □ political opinions
□ phone number □ religious affiliations;
□ date of birth □ criminal record;
□ E-mail address □ biometric information.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Processing Personal Information
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PRINCIPLE OF TRANSPARENCY
▣ The data subject must know:
□ The kind of personal data collected
□ How the personal data will be collected
□ Why personal data will be collected
▣ The data processing policies of the PIC must be known to
the data subject.
▣ The information to be provided to the data subject must be
in clear and plain language.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Legitimate Purpose Principle
▣ Data collected must be always be collected only for the specific, explicit, and
legitimate purposes of the PIC.
▣ Data that is not compatible with the purpose for which the data was collected
shall not be processed.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PRINCIPLE OF PROPORTIONALITY
▣ Efforts should be made to limit the processed data to the minimum necessary.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PROCESSING SENSITIVE PERSONAL INFO.
1. The data subject has given his or her consent;
2. The processing of personal information is necessary and
is related to the fulfillment of a contract with the data subject or in order to
take steps at the request of the data subject prior to entering into a contract;
3. The processing is necessary for compliance with a
legal obligation to which the personal information
controller is subject;
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PROCESSING SENSITIVE PERSONAL INFO.
4. The processing is necessary to protect vitally important interests of the data
subject, including life and health;
5. The processing is necessary in order to respond to national emergency, to
comply with the requirements of public order and safety, or to fulfill functions
of public authority (…); or
6. The processing is necessary for the purposes of the legitimate interests
pursued by the personal information controller (…), except where such
interests are overridden by fundamental rights and freedoms of the data
subject (…).
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Rights of the Data Subject
1. Right to be informed.
2. Right to object.
3. Right to access.
4. Right to rectification.
5. Right to erasure or blocking.
6. Right to damages.
7. Right to data portability.
8. Right to file a complaint.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
1. Right to be Informed
▣ This is the right to be informed that your personal data shall be, are being, or
have been processed, including the existence of automated decision-making
and profiling
▣ The disclosure must be made before the entry of the data into the processing
system or at the next practical opportunity
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
2. Right to Object
▣ The right to object to the processing of personal data, including processing for
direct marketing, automated processing, or profiling.
□ If you do not want to share any information, or you do not want any other person to
collect information from you, then you have the right to say NO.
▣ This includes the right to be given an opportunity to withhold consent to the
processing in case of any changes or any amendment to the information
supplied or declared.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
2. Right to Object
There are several exceptions where you cannot invoke your right to
object:
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
3. Right to Access
▣ The right to find out whether a PIC holds any personal
data about you.
▣ The right to reasonable access to personal data that were
processed, sources of personal data, names and addresses of recipients,
manner/method of processing, information on automated process, date when
personal data was last accessed and modified, designation, name or identity,
and address of the PIC
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
4. RIGHT TO RECTIFICATION
▣ This involves the right to dispute the inaccuracy or error in the personal
data and have the PIC correct it immediately.
▣ It also includes access to new and retracted information, and
simultaneous receipt thereof.
▣ Recipients previously given erroneous data must be
informed of inaccuracy and rectification upon reasonable
request of the data subject.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
5. RIGHT TO ERASURE OR BLOCKING
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
5. RIGHT TO ERASURE OR BLOCKING
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
6. RIGHT TO DAMAGES
▣ This is the right to be indemnified (receive compensation) for
any damages sustained due to inaccurate, incomplete, outdated,
false, unlawfully obtained, or unauthorized use of personal data.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
7. RIGHT TO DATA PORTABILITY
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
8. RIGHT TO FILE A COMPLAINT
▣ In circumstances wherein the PIC or the PIP has breached the privacy of the
data subject, a complaint may be filed through complaints@privacy.gov.ph
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
Any search through a student’s cellular phone without justification under a law or
regulation is UNLAWFUL, and may be considered as unauthorized processing of data.
126
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
Consent under the Data Privacy Act has three requirements, none of which are seen in an implied
consent:
Consent must be freely given;
Details about what consent is being asked must be specific.
And there must be an informed indication of will.
129
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
It is possible that one may share a similar signature as another person. Moreover, some
signatures do not, in any way, show signs of identity of a person. Nonetheless, these may
be considered personal information when used to identify an individual such as a
signature affixed on the name of a person.
131
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes*!
*Only when they are combined with other pieces of information that may allow an
individual to be distinguished from others.
Remember that a username, say “iloveyou3000”, does not identify any particular person
unless it is combined with other information.
133
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions
In addition:
▣ There are a lot of people who share the same birthday as others. This makes it
impossible to use birthdays to identify any person.
▣ IP addresses alone cannot identify who a person is because it is possible that
two or more people make use of a single computer / server.
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts: R.A. 10173
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts: R.A. 10173
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts: R.A. 10173
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era