Electronic Commerce Act (RA 8792)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

The E-commerce Law aims to facilitate domestic and international dealings, transactions, arrangements, agreements, contracts and exchanges and storage of information through the utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize the authenticity and _______ of electronic data messages or electronic documents related to such activities and to promote the universal use of electronic transaction in the government and by the general public.

a. Confidentiality

b. Accessibility

c. Validity

d. Reliability

d. Reliability

2
New cards

It refers to a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent. The term does not include a person acting as an intermediary with respect to that electronic document.

a. Data subject

b. Originator

c. Addressee

d. Intermediary

b. Originator

3
New cards

The E-Commerce law expressly provides that for evidentiary purposes, an electronic document shall be the _______________________ under existing laws.

a. equivalent of the public document

b. equivalent of a registered document

c. exact duplicate of a notarized document

d. functional equivalent of a document in writing

d. functional equivalent of a document in writing

4
New cards

Authorities and parties with the legal right can only gain access to electronic documents, electronic data messages, and electronic data messages, and electronic signatures. For confidentiality purposes, it shall not share or convey to any other person.

a. Obligation of Reliability

b. Obligation of Confidentiality

c. Obligation of Authenticity

d. Obligation of Security

b. Obligation of Confidentiality

5
New cards

Hacking or ________ refers to the unauthorized access into or interference in a computer system / server or information and communication system; or any access in order to corrupt, alter, seal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic document.

a. Blocking

b. Erasure

c. Cracking

d. Piracy

e. Interference

c. Cracking

6
New cards

he following are essential features of the E- Commerce Law, except:

a. Legal recognition of electronic documents

b. Use in transactions involving carriage of goods

c. Admissibility as evidence

d. Permanent insurance fund

e. Electronic transactions in government

d. Permanent insurance fund

7
New cards

This refers to information generated, sent, received or stored by electronic, optical or similar means.

a. Electronic document

b. Electronic signature

c. Electronic data message

d. Electronic contract

c. Electronic data message

8
New cards

Electronic transactions made through networking among banks is deemed consummated upon:

a. receipt of the email confirmation about the transaction.

b. sending the confirmation code to the bank.

c. the actual dispensing of cash or the debit of one account and the corresponding credit to another.

d. placing of electronic signature in the electronic document.

c. the actual dispensing of cash or the debit of one account and the corresponding credit to another.

9
New cards

I. Another term for hacking is cracking.
II. The introduction of computer viruses is also categorized as hacking.

a. Both statements are correct.

b. Both statements are incorrect.

c. Statement I is correct while statement II is incorrect.

d. Statement I is incorrect while statement II is correct.

a. Both statements are correct.

10
New cards

It is the unauthorized copying, reproduction, alteration and importation of protected material.

a. Photocopying

b. Cracking

c. Piracy

d. Hacking

c. Piracy

11
New cards

The following are the illegal activities under ECommerce Act except:

a. Hacking

b. Photocopying

c. Piracy

d. Violation of the Consumer Act

b. Photocopying

12
New cards

The unauthorized copying, reproduction, dissemination, distribution of protected material, electronic signature or copyrighted works including legally protected sound recordings or phonograms or information material on protected works, through the use of telecommunication networks.

a. Hacking

b. Infringement

c. Piracy

d. Forgery

c. Piracy

13
New cards

I. Another term for hacking is cracking.
II. The introduction of computer viruses is also categorized as hacking.

a. Both statements are correct.

b. Both statements are incorrect.

c. Statement I is correct while statement II is incorrect.

d. Statement I is incorrect while statement II is correct.

a. Both statements are correct.