Académique Documents
Professionnel Documents
Culture Documents
10055
I.
General Provisions
-
3. When
was
approved?
R.A.
10175
Punishable Acts
2 Section 2.
1 Section 2.
3 Section 3.
III.
7. What
penalties
attach
to
offenses defined in R.A. 10175?
The various penalties range from
arresto mayor and/or a fine of at
least Php 250,000.00 to reclusion
temporal and/or a fine up to the
maximum amount commensurate
to the damage incurred.9
for
an
various
4 Section 4.
5 Section 5.
6 Section 6.
8 Section 7.
7 Ibid.
9 Section 8.
exclusive
cases.12
handle
R.A.
10175
11. How
are
activities
concerning cybercrime of the
NBI and PNP monitored?
The
units
responsible
for
investigating
cybercrimes
are
required to submit timely and
regular reports to the Department
of Justice (DOJ) for review and
monitoring.13
12. How do law enforcement
authorities monitor violations
of R.A. 10175?
Enforcement
Implementation
13.
Traffic
data
refers
to
the
communications
origin,
destination, route, time, date,
size,
duration,
or
type
of
underlying
service,
but
not
content, nor identities.
and
The
National
Bureau
of
Investigation (NBI) and the
Philippine National Police (PNP)
are responsible for enforcing the
Act. The NBI and PNP shall
organize a cybercrime unit to
12 Section 10.
13 Section 11.
10 Section 9.
14 Section 12.
11 Section 9.
15 Section 12.
14. How is
obtained?
court
warrant
the
or
the
the
16. May
the
period
preservation be extended?
of
Yes. Authorities may order a onetime extension for another six (6)
months. However, once computer
data is used as evidence in a case,
the mere furnishing to such service
provider
of
the
transmittal
document to the Office of the
Prosecutor shall be deemed a
notification
to
preserve
the
computer
data
until
the
termination of the case.19
16 Section 12.
17 (1) Any public or private entity
that provides to users of its service
the ability to communicate by
means of a computer system; and
(2) Any other entity that processes
or stores computer data on behalf
of such communication service or
users of such service.
18 Section 13.
19 Section 13.
20 Section 14.
search
20. What
happens
to
the
computer data upon expiration
of the custody period?
Upon expiration of the periods as
provided (see nos. 14, 15, and
18) service providers and law
enforcement authorities, as the
case may be, shall immediately
and
completely
destroy
the
computer data.23
Authorities
likewise
have
the
authority to order any person with
sufficient
knowledge
of
the
computer system to provide the
necessary information to enable
the undertaking of the search,
seizure and examination.21
19. What
are
governing
the
computer data?
the
rules
custody
of
22 Section 16.
23 Section 17.
21 Section 15.
24 Section 18.
23. What
happens
to
noncompliance
with
measures
conducted by authorities in
relation to enforcing R.A.
10175?
Failure to comply with the
provisions on enforcement and
orders from law enforcement
authorities shall be punished as a
violation of Presidential Decree
No. 1829 as obstruction of
justice.26
V.
Jurisdiction
VII.
26. What
is
Cybercrime?
the
Office
of
Competent Authorities
International Cooperation
25 Section 19.
26 Section 20.
28 Section 22.
27 Section 21.
29 Section 23.
of
the
(a) Executive
Director
of
the
Information
and
Communications
Technology
Office under the Department of
Science and Technology (ICTODOST) as Chairperson;
(b) Director of the NBI as ViceChairperson;
(c) Chief of the PNP;
(d) Head of the DOJ Office of
Cybercrime;
(e) One (1) representative from the
private sector; and
(f) One
representative
from
the
academe.31
28. What are the powers and
functions of the CICC?
(a)
(b)
(c)
(d)
(e)
Coordinate
the
support
and
participation of the business
sector, local government units and
nongovernment organizations in
cybercrime prevention programs
and other related projects;
(f)
(g)
(h)
30 Section 24.
31 Section. 25.
32 Section 26.
(4) System
Interference
(bb)
A
computer
password, access code,
or similar data by which
the whole or any part of
a computer system is
capable
of
being
accessed with intent
that it be used for the
purpose of committing
any of the offenses
under this Act.
(4) Computer-related
Identity Theft
(3) Unsolicited
Commercial
Communication
The transmission of
There is prior affirmative
commercial electronic
consent from the
communication with the use
recipient; or
10
(6) Libel
Other offenses
Aiding or Abetting
11
in the Commission
of Cybercrime.
Attempt in the
Commission of
Cybercrime.
12