0% found this document useful (0 votes)
77 views9 pages

Computer Hackers and The Cybercrime Law

This document discusses cybercrime and the Cybercrime Prevention Act of 2012. It notes that internet use in the Philippines has grown rapidly, but this growth has also led to an increase in cybercrime. Cybercrime involves illegal activities where technology is used as a tool or target. Computers are being misused for activities like financial crimes, pornography, intellectual property theft, and hacking. The Cybercrime Prevention Act of 2012 aims to address these issues and regulate illegal activities in cyberspace.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views9 pages

Computer Hackers and The Cybercrime Law

This document discusses cybercrime and the Cybercrime Prevention Act of 2012. It notes that internet use in the Philippines has grown rapidly, but this growth has also led to an increase in cybercrime. Cybercrime involves illegal activities where technology is used as a tool or target. Computers are being misused for activities like financial crimes, pornography, intellectual property theft, and hacking. The Cybercrime Prevention Act of 2012 aims to address these issues and regulate illegal activities in cyberspace.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

COMPUTER

HACKERS AND Prof. Rose Bella T. Lacanilao


THE CYBERCRIME
LAW
INTRODUCTION
• Internet use in the Philippines has grown
rapidly
• It has given rise to countless opportunities
• It has served as venue for growth and
development
• It has since been an integral part of our
daily lives
• Internet has its own disadvantages and
one these is cybercrime
INTRODUCTION
• any illegal and criminal activity committed
on the Internet
• Include unlawful acts where information
technology is used either a tool or target,
or, both, in the commission of such
unlawful acts
INTRODUCTION
• Criminal activities in the cyberspace are
on the rise

• Computers are being misused for illegal


activities (e-mail espionage, credit card
fraud, spams, software piracy)
INTRODUCTION
• Criminal activities in the cyberspace are
on the rise

• Computers are being misused for illegal


activities (e-mail espionage, credit card
fraud, spams, software piracy)
INTRODUCTION
Computers have been utilized as an instrument
in the following illegal activities:

• Financial crimes
• Sale of illegal or stolen articles
• Pornography
• Online gambling
• Crimes infringing on intellectual property
rights
• E-mail spoofing
• Forgery
• Cyber defamation
• Cyber stalking
INTRODUCTION
Computers may has also been the object
of other unlawful acts such as:

• Illegal access or hacking


• Theft of information contained in
electronic form
• E-mail bombing
• Virus attacks
• Internet time thefts
INTRODUCTION
Examples of these types of conducts include:
• Illegal access of access to the whole or
any part of a computer system without
proper authorization
• Illegal interception
• Data interference
• System interference
Cybercrime Prevention Act of 2012

You might also like