RA For Guidance Counselors
RA For Guidance Counselors
THREATS TO
PRIVACY
AND
SECURITY
In 2018…
Of the 106,512,074 Filipinos,
67,000,000 are active internet
users, 62,000,000 of whom
are active on Facebook.
REPUBLIC ACT NO. 10173
Clients have their very right to ask where and how will the school
use their data.
More Cybercrimes
1. Revised Penal Code - ACT No. 3815 (December 8, 1930);
Art. 353. LIBEL -
The penalty of arresto mayor or a fine from 200 to 2,000 pesos, or both,
shall be imposed upon any person who threatens another to publish a libel
concerning him or the parents, spouse, child, or other members of the
family of the latter or upon anyone who shall offer to prevent the
publication of such libel for a compensation or money consideration. (1 mo &
1 day to 6 mos + fine)
Art. 282. GRAVE THREATS. — Any person who shall threaten another with the
infliction upon the person, honor or property of the latter or of his family of
any wrong amounting to a crime,
Art. 283. LIGHT THREATS. — Any threat to commit a wrong not constituting a
crime…
2. Access Device Regulation Act of 1998 - RA. 8484 February 11, 1998;
Access Device – means any card, plate, code, account number, electronic serial
number, personal identification number, or other telecommunications service,
equipment, or instrumental identifier, or other means of account access that
can be used to obtain money, good, services, or any other thing of value or to
initiate a transfer of funds
2. Access Device Regulation Act of 1998 - RA. 8484 February 11, 1998;
Examples of acts that constitute access DEVICE FRAUD and are hereby declared to be unlawful:
- disclosing any information imprinted on the access device, such as, but not limited to,
the account number or name or address of the device holder, without the latter's
authority or permission;
- obtaining money or anything of value through the use of an access device, with intent
to defraud or with intent to gain and fleeing thereafter;
- effecting transaction, with one or more access devices issued to another person or
persons, to receive payment or any other thing of value;
(6 yrs to 20 yrs)
Fact
No person may be imprisoned for non–payment of credit card debt
(under RA 8484) unless there is an attendant fraudulent act.
Example:
xxx
(Examples)
- To introduce or match for money, profit, or material, economic or other consideration, any
person or, any Filipino woman to a foreign national, for marriage for the purpose of acquiring,
buying, offering, selling or trading him/her to engage in prostitution,
- To offer or contract marriage, real or simulated, for the purpose of acquiring, buying, offering,
selling, or trading them to engage in prostitution, pornography, sexual exploitation, forced labor
or slavery, involuntary servitude or debt bondage;
- To adopt or facilitate the adoption of persons for the purpose of prostitution, pornography,
sexual exploitation, forced labor, slavery, involuntary servitude or debt bondage;
Anti-Wire Tapping Law - RA 4200 June 19, 1965
It shall be unlawful for any person, not being authorized by ALL the parties to any private
communication or spoken word, to tap any wire or cable, or by using any other device or
arrangement, to secretly overhear, intercept, or record such communication or spoken word
xxx
It shall also be unlawful for any person, be he a participant or not in the act or acts penalized in
the next preceding sentence, to knowingly possess any tape record, wire record, disc record, or
any other such record, or copies thereof, of any communication or spoken word secured either
before or after the effective date of this Act in the manner prohibited by this law; or to replay
the same for any other person or persons; or to communicate the contents thereof, either
verbally or in writing, or to furnish transcriptions thereof, whether complete or partial, to any
other person: Provided, That the use of such record or any copies thereof as evidence in any
civil, criminal investigation or trial of offenses mentioned in section 3 hereof, shall not be
covered by this prohibition.
REPUBLIC ACT NO. 10175
or the "Cybercrime Prevention Act of 2012″.
DECLARATION OF POLICY.
DECLARATION OF POLICY.
- The need to protect and safeguard the integrity of computer, computer and
communications systems, networks, and databases, and the confidentiality,
integrity, and availability of information and data stored therein, from all
forms of misuse, abuse, and illegal access by making punishable under the
law such conduct or conducts.
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
I - Cybercrime Offenses.
(a) Offenses against the confidentiality, integrity and availability of computer data and systems:
(1) Illegal Access. – The access to the whole or any part of a computer system without right.
Access refers to the instruction, communication with, storing data in, retrieving
data from, or otherwise making use of any resources of a computer system or
communication network.
(2) Illegal Interception. – The interception made by technical means without right
of any non-public transmission of computer data to, from, or within a computer
system including electromagnetic emissions from a computer system carrying such
computer data.
WILL THIS SECTION JEOPARDIZE THE WORK OF ETHICAL HACKERS, PROFESSIONALS WHO
EMPLOY TOOLS AND TECHNIQUES USED BY CRIMINAL HACKERS, WHO WOULD NEITHER DAMAGE
THE TARGET SYSTEMS NOR STEAL INFORMATION?
No. Ethical hackers evaluate the target system’s security and report back to the owners the
vulnerabilities they found in it and give instructions for how these can be remedied. Ethical hackers
are the equivalent of independent auditors who come into an organization to verify its bookkeeping
records.
Besides, a client’s engagement of an ethical hacker requires an agreement between them as to the
extent of the search, the methods to be used, and the systems to be tested. This is referred to as
the "get out of jail free card." Since the ethical hacker does his job with prior permission from the
client, such permission would insulate him from the coverage of this restriction. (G.R. No.
203335 February 11, 2014 JOSE JESUS M. DISINI, JR vs. THE SECRETARY OF JUSTICE)
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
DOES THIS INTRUDE INTO THE AREA OF PROTECTED SPEECH AND EXPRESSION, CREATING A
CHILLING AND DETERRENT EFFECT ON THESE GUARANTEED FREEDOMS?
No. This does not encroach on these freedoms at all. It simply punishes what essentially is a form
of vandalism, the act of willfully destroying without right the things that belong to others, in this
case their computer data, electronic document, or electronic data message. Such act has no
connection to guaranteed freedoms. There is no freedom to destroy other people’s computer
systems and private documents.
All penal laws, like the cybercrime law, have of course an inherent chilling effect, an in terrorem
effect or the fear of possible prosecution that hangs on the heads of citizens who are minded to
step beyond the boundaries of what is proper. But to prevent the State from legislating criminal
laws because they instill such kind of fear is to render the state powerless in addressing and
penalizing socially harmful conduct. (DISINI, JR vs. THE SECRETARY OF JUSTICE)
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
(bb) A computer password, access code, or similar data by which the whole or
any part of a computer system is capable of being accessed with intent that it
be used for the purpose of committing any of the offenses under RA 10175.
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
(ii) The possession of an item used for “Misuse of Devices” referred to above with
intent to use said devices for the purpose of committing any of the offenses
described as Cybercrime Offenses
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
(6) Cyber-Squatting. – The acquisition of a domain name over the internet in bad
faith to profit, mislead, destroy reputation, and deprive others from registering the
same, if such a domain name is:
(ii) Identical or in any way similar with the name of a person other than the
registrant, in case of a personal name; and
(6) Cyber-Squatting.
“You see, it's all part of the game. The Philippine Daily Inquirer doesn't own www.inquirer.com
because the Philadelphia Inquirer beat us to it. And of course, the Philippine Long Distance
Telephone Co. doesn't own www.pldt.com because Gerry Kaimo beat them to it. Philadelphia
Inquirer never intended to sell its domain to us. Neither did Gerry to PLDT.
So how come Mario Cruz owns www.titosotto.com and not Tito Sotto, the senator? Because he was
faster than the Spanish restaurant, faster than the Latin singer, faster than the kid who's got an
uncle named Sotto and, yes, sadly, faster than Senator Sotto's staff.”
(6) Cyber-Squatting.
It is the evil purpose for which he uses the name that the law
condemns. The law is reasonable in penalizing him for acquiring the
domain name in bad faith to profit, mislead, destroy reputation, or
deprive others who are not ill-motivated of the rightful opportunity of
registering the same. (DISINI, JR vs. THE SECRETARY OF
JUSTICE)
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
I - Cybercrime Offenses.
b. Computer Related Offenses
(i) The input, alteration, or deletion of any computer data without right resulting in inauthentic
data with the intent that it be considered or acted upon for legal purposes as if it were
authentic, regardless whether or not the data is directly readable and intelligible; or
(ii) The act of knowingly using computer data which is the product of computer-related forgery
as defined herein, for the purpose of perpetuating a fraudulent or dishonest design.
(2) Computer-Related Fraud. — The unauthorized input, alteration, or deletion of computer data or
program or interference in the functioning of a computer system, causing damage thereby with
fraudulent intent:
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
(3) Computer-Related Identity Theft. – The intentional acquisition, use, misuse, transfer, possession,
alteration or deletion of identifying information belonging to another, whether natural or juridical,
without right: Provided,
- The usual identifying information regarding a person includes his name, his citizenship, his
residence address, his contact number, his place and date of birth, the name of his spouse if any,
his occupation, and similar data. The law punishes those who acquire or use such identifying
information without right, implicitly to cause damage. What this section regulates are specific
actions: the acquisition, use, misuse or deletion of personal identifying data of another. There is no
fundamental right to acquire another’s personal data.
- Evidently, the theft of identity information must be intended for an illegitimate purpose.
Moreover, acquiring and disseminating information made public by the user himself cannot be
regarded as a form of theft. As such, the press, whether in quest of news reporting or social
investigation, has nothing to fear since a special circumstance is present to negate intent to gain
which is required by law. (DISINI, JR vs. THE SECRETARY OF JUSTICE)
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
I - Cybercrime Offenses.
(c) Content-related Offenses:
(1) Cybersex. — The willful engagement, maintenance, control, or operation, directly or indirectly, of
any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for
favor or consideration.
I - Cybercrime Offenses.
(c) Content-related Offenses:
(1) Cybersex. -
Q: Are private communications of sexual character between husband and wife or
consenting adults, punishable.?
A: The drafting of the law show a lack of intent to penalize a "private showing x x x
between and among two private persons x x x although that may be a form of
obscenity to some." The understanding of those who drew up the cybercrime law
is that the element of "engaging in a business" is necessary to constitute the illegal
cybersex. The Act actually seeks to punish cyber prostitution, white slave trade,
and pornography for favor and consideration. This includes interactive prostitution
and pornography, i.e., by webcam. (DISINI, JR vs. THE SECRETARY OF JUSTICE)
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
I - Cybercrime Offenses.
(c) Content-related Offenses:
(1) Cybersex.
The criminalization of lascivious exhibition of sexual organs or sexual activity—is not novel -
- Article 201 of the RPC punishes "obscene publications and exhibitions and indecent
shows."
- The Anti-Trafficking in Persons Act of 2003 penalizes those who "maintain or hire a
person to engage in prostitution or pornography."
The law defines prostitution as any act, transaction, scheme, or design involving the use of
a person by another, for sexual intercourse or lascivious conduct in exchange for money,
profit, or any other consideration.
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
I - Cybercrime Offenses.
(c) Content-related Offenses:
(2) Child Pornography. — The unlawful or prohibited acts defined and punishable by Republic Act
No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system:
Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in
Republic Act No. 9775.
Actually, ACPA’s definition of child pornography already embraces the use of "electronic, mechanical,
digital, optical, magnetic or any other means." Notably, no one has questioned this ACPA provision. Of
course, the law makes the penalty higher by one degree when the crime is committed in cyberspace.
The potential for uncontrolled proliferation of a particular piece of child pornography when uploaded in
the cyberspace is incalculable. (DISINI, JR vs. THE SECRETARY OF JUSTICE)
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
(3) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal
Code, as amended, committed through a computer system or any other similar means which may be
devised in the future.
“Art. 353. Definition of libel. — A libel is public and malicious imputation of a crime, or of a vice or
defect, real or imaginary, or any act, omission, condition, status, or circumstance tending to cause the
dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who
is dead. (RPC)”
(3) Libel. —
Libel is not a constitutionally protected speech and that the government has an obligation to
protect private individuals from defamation. Indeed, cyber libel is actually not a new crime
since Article 353, in relation to Article 355 of the penal code, already punishes it. In effect the
provision on cyber liber above merely affirms that online defamation constitutes "similar
means" for committing libel.
But the Court’s acquiescence goes only insofar as the cybercrime law penalizes the author of
the libelous statement or article. Cyber libel brings with it certain intricacies, unheard of when
the penal code provisions on libel were enacted. The culture associated with internet media is
distinct from that of print.
(b) Attempt in the Commission of Cybercrime. — Any person who willfully attempts to commit any of
the offenses enumerated in this Act shall be held liable.
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
II - Other Offenses. — The following acts shall also constitute an offense:
(a) Aiding or Abetting in the Commission of Cybercrime and Libel
3. But if the "Comment" does not merely react to the original posting but
creates an altogether new defamatory story then that should be considered an
original posting published on the internet.
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
III - All crimes defined and penalized by the Revised Penal Code, as amended, and
special laws, if committed by, through and with the use of information and
communications technologies shall be covered by the relevant provisions of the
Cybercrime Prevention Act of 2012: Provided, That the penalty to be imposed shall
be one (1) degree higher than that provided for by the Revised Penal Code, as
amended, and special laws, as the case may be.
The provision merely makes commission of existing crimes through the internet a qualifying
circumstance. As the Solicitor General points out, there exists a substantial distinction between crimes
committed through the use of information and communications technology and similar crimes
committed using other means. In using the technology in question, the offender often evades
identification and is able to reach far more victims or cause greater harm. The distinction, therefore,
creates a basis for higher penalties for cybercrimes. (DISINI, JR vs. THE SECRETARY OF JUSTICE)
"CYBERCRIME PREVENTION ACT OF 2012″.
PUNISHABLE ACTS
IV - Liability under Other Laws. — A prosecution under the Cybercrime Prevention Act of 2012 shall be
without prejudice to any liability for violation of any provision of the Revised Penal Code, as amended,
or special laws.
"CYBERCRIME PREVENTION ACT OF 2012″.
The National Bureau of Investigation (NBI) and the Philippine National Police
(PNP) shall be responsible for the efficient and effective law enforcement of the
provisions of this Act. The NBI and the PNP shall organize a cybercrime unit or
center manned by special investigators to exclusively handle cases involving
violations of this Act.
"CYBERCRIME PREVENTION ACT OF 2012″.
Jurisdiction.
The Regional Trial Court shall have jurisdiction over any violation of the provisions of this Act.
including any violation committed by a Filipino national regardless of the place of commission.
Jurisdiction shall lie if any of the elements was committed within the Philippines or committed
with the use of any computer system wholly or partly situated in the country, or when by such
commission any damage is caused to a natural or juridical person who, at the time the offense
was committed, was in the Philippines.
There shall be designated special cybercrime courts manned by specially trained judges to
handle cybercrime cases.
Cases
Can an Employer open the computer of his employees?
The guideline in the case of O’Connor v. Ortega (480 U.S. 709 (1987) is Is there a reasonable
expectation of privacy as to the computer files? ;
The employees’ privacy interest in an office is to a large extent circumscribed by the company’s
work policies, the collective bargaining agreement, if any, entered into by management and the
bargaining unit, and the inherent right of the employer to maintain discipline and efficiency in
the workplace. Their privacy expectation in a regulated office environment is, in fine, reduced;
and a degree of impingement upon such privacy has been upheld. G.R. No. 181881 October 18,
2011 BRICCIO "Ricky" A. POLLO vs. CHAIRPERSON KARINA CONSTANTINO-DAVID
But not when what is searched if the personal computer the employee. The court cannot use the
evidence obtained from his personal computer against him for it violates his constitutional right.
G.R. No. 181881 October 18, 2011, POLLO. vs. CONSTANTINO-DAVID
.
Cases
Accountability for Facebook Posts
Atty. Guevarra posted insulting and abusive remarks on Facebook, Dr. Belo by calling her a
quack doctor, “adik sa botox”, etc. He also insinuated that Dr. Belo has been bribing
government officials for cases to tilt to her favor and threatened to seek out her patients and
ask them to boycott her. Further, Atty. Guevarra insinuated malpractices done by the doctor
against her patients, and threatened her with lawsuits.
Cases
V. Belo-Henares vs Atty. “Argee” Guevarra
According to Atty. Guevarra.
He likewise added that Dr. Belo is a public figure, and thus subject to fair comment
Cases
V. Belo-Henares vs Atty. “Argee” Guevarra
According to the court
Cases
V. Belo-Henares vs Atty. “Argee” Guevarra
Cases
V. Belo-Henares vs Atty. “Argee” Guevarra
Cases
V. Belo-Henares vs Atty. “Argee” Guevarra
Maria Victoria G. Belo-Henares vs. Atty. Roberto “Argee” Guevarra AC no. 11394, December 1,
2016
Cases
Privacy
Case: Petitioner Ople prays for the invalidation of Administrative Order No. 308 entitled "Adoption of a
National Computerized Identification Reference System" as it, it impermissibly intrudes on our
citizenry's protected zone of privacy.
Ruling: Well to note, the computer linkage gives other government agencies access to the
information. Yet, there are no controls to guard against leakage of information. When the access
code of the control programs of the particular computer system is broken, an intruder, without fear
of sanction or penalty, can make use of the data for whatever purpose, or worse, manipulate the
data stored within the system.
The possibilities of abuse and misuse of the PRN, biometrics and computer technology are
accentuated when we consider that the individual lacks control over what can be read or placed on
his ID, much less verify the correctness of the data encoded. They threaten the very abuses that the
Bill of Rights seeks to prevent. G.R. No. 127685 July 23, 1998 BLAS F. OPLE, vs. RUBEN D. TORRES
Cases
Informational Privacy
a. The Right to Informational Privacy - usually defined as the right of individuals to control
information about themselves
b. It is through the availability of the privacy tools that many OSN users are said to have a subjective
expectation that only those to whom they grant access to their profile will view the information
they post or upload thereto. Before one can have an expectation of privacy in his or her OSN
activity, it is first necessary that said user, manifest the intention to keep certain posts private,
through the employment of measures to prevent access thereto or to limit its visibility G.R. No.
202666 September 29, 2014 RHONDA AVE S. VIVARES and SPS. MARGARITA and DAVID SUZARA
vs. ST. THERESA'S COLLEGE, MYLENE RHEZA T. ESCUDERO, and JOHN DOES