RA 10175 (Cybercrime Prevention Act of 2012) – Key Concepts (Video Notes)

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts, definitions, offenses, penalties, procedural provisions, and related legal context of the Philippine Cybercrime Prevention Act (RA 10175) as presented in the lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

What is RA 10175?

The Cybercrime Prevention Act of 2012 in the Philippines, providing a legal framework for prevention and investigation of cybercrimes and aligning Philippine laws with international efforts.

2
New cards

When was RA 10175 signed into law and when did it take effect?

Signed on September 12, 2012; took effect in October 2012.

3
New cards

When was the IRR for RA 10175 promulgated?

August 12, 2015.

4
New cards

What are the policy aims stated in Section 2 of RA 10175?

Protect the integrity of computer systems; ensure confidentiality, integrity, and availability of data and systems; adopt powers to prevent and combat cybercrime; respect privacy and freedom of expression within the law.

5
New cards

How is 'Computer System' defined in RA 10175?

Any device or group of interconnected or related devices that automatically processes data or information.

6
New cards

What is 'Computer Data' as used in RA 10175?

Any representation of facts, concepts, or information (including programs) in a form suitable for processing in a computer system.

7
New cards

What does 'Without Right' mean in RA 10175?

Conduct undertaken without or in excess of authority; or not covered by lawful defenses, orders, justifications, or permissions.

8
New cards

Fill in the blank: Illegal Access refers to __.

Accessing a computer system without right.

9
New cards

Fill in the blank: Illegal Interception refers to interception of any non-public transmission of data __ a computer system.

to, from, or within

10
New cards

What is Data Interference?

Intentional or reckless alteration, damage, deletion, or deterioration of computer data or electronic documents without right.

11
New cards

What is System Interference?

Intentional or reckless hindering or interference with the functioning of a computer or computer network by manipulating data or programs.

12
New cards

What does 'Misuse of Devices' cover?

Unauthorized production, sale, procurement, importation, distribution, or use of devices designed for committing cyber offenses, or possession with intent to use them for illegal purposes.

13
New cards

Define Cyber-squatting.

Acquiring a domain name in bad faith to profit, mislead, or deprive others, especially if identical or confusingly similar to a name owned by another person.

14
New cards

Name two Computer-Related Offenses.

Computer-Related Forgery (input/alteration/deletion of data to pass off as authentic) and Computer-Related Fraud (unauthorized input/alteration/deletion causing damage to obtain economic benefit).

15
New cards

What is Computer-Related Identity Theft?

Unauthorized acquisition, use, misuse, or appropriation of another person’s identifying information.

16
New cards

What are the Content-Related Offenses listed in RA 10175?

Cybersex; Child Pornography (also addressed by the Anti-Child Pornography Act but punished under RA 10175 when via a computer); Unsolicited Commercial Communications (Spam); Online Libel.

17
New cards

What is a key note about Online Libel from Disini v. Secretary of Justice?

The Supreme Court held that those who merely receive or react to libelous content (e.g., likers or commenters) can be liable; the original author is primarily responsible.

18
New cards

How do penalties under RA 10175 generally compare to offline penalties?

Punishments under RA 10175 are typically one degree higher than their offline counterparts.

19
New cards

Name one enforcement/procedural provision related to data preservation.

Preservation of Computer Data: service providers must preserve computer data for at least six months, extendable by court order.

20
New cards

What is a WDCD and its basic purpose?

Warrant to Disclose Computer Data; authorizes disclosure of subscriber information and traffic data with conditions and time limits (valid up to 10 days, extendable once).

21
New cards

What is the purpose of a WICD?

Warrant to Intercept Computer Data; permits real-time collection of traffic data under strict conditions (identity, necessity, minimization, etc.), valid up to 30 days and extendable once.

22
New cards

What are two key principles governing search and seizure of computer data under RA 10175?

Warrants must be court-issued and incorporate digital forensics to preserve data integrity; the procedures require due process and privacy safeguards.

23
New cards

Which laws are RA 10175’s main legal relationships with?

Replaces or augments traditional RPC crimes (libel, estafa, falsification, threats) as computer-related offenses with higher penalties; also interacts with RA 10173 (Data Privacy Act) and the Anti-Child Pornography Act (RA 9775); aligns with E-Commerce Act (RA 8792).

24
New cards

What is the scope of jurisdiction for RA 10175?

Within Philippine territory; outside PH if the offender is Filipino, the computer system is in PH, or any elements of the crime occurred in PH.

25
New cards

What is the status of restricting or blocking access under RA 10175?

The provision was struck down by the Supreme Court as unconstitutional for due process concerns (no hearing/court order).

26
New cards