Weeks 4 5
Weeks 4 5
Weeks 4 5
Weeks
ETHICAL CODES
1
Buraga, R. Social and Professional Issues for Information Technology
Learning Outcomes:
Learning Content
R.A. No. 10175: The Cybercrime Prevention Act: The Net Commandments
The Republic Act 10175 or the Cybercrime Prevention Act of 2012 was approved on
September 12, 2012 which aims to address legal issues concerning online interactions
through the use of internet in the Philippines (lawstudentsnotes.wordpress.com, 2020).
The RA 10175 focuses on the pre-emption, prevention, and prosecution of
2
Buraga, R. Social and Professional Issues for Information Technology
Violation in the RA 10175 could sentence internet users to up to 12 years in prison for
posting defamatory commentaries on social media.
List of the offenses that fall under the Cybercrime Prevention Act of 2012 (Gravino &
Villanueva, 2022)
(a) Offenses against the confidentiality, integrity and availability of computer data
and systems
(1) Illegal access – the access to the whole or any part of a computer system
without right
3
Buraga, R. Social and Professional Issues for Information Technology
(6) Cyber Squatting – the acquisition of a domain name over the internet in
bad faith to profit, mislead, destroy reputation and deprive others from
registering the same, if such a domain name is:
4
Buraga, R. Social and Professional Issues for Information Technology
(c ) Content-related Offenses:
(2) Child Pornography – The unlawful or prohibited acts defined and punishable by RA
9775 or the Anti-Child Pornography Act of 2009, committed through a computer
system: Provided, that the penalty to be imposed shall be (1) one degree higher
than that provided for in RA 9775
(bb) The CEC does not purposely disguise the source of the
electronic message; and
SECTION 5 - OTHER OFFENSES – The following acts shall also constitute an offense:
(a) Aiding or abetting in the Commission of Cybercrime – Any person who willfully
abets or aids in the commission of any of the offenses enumerated in this Act shall
be held liable.
5
Buraga, R. Social and Professional Issues for Information Technology
(b) Attempt in the Commission of Cybercrime – Any person who willfully attempts to
commit any of the offenses enumerated in this Act shall be held liable
The Penalties prescribed in the Art. 355 of the Revised Penal Code
(lawstudentsnotes,2020)
E-Commerce Law
6
Buraga, R. Social and Professional Issues for Information Technology
systems, and many other technologies and innovative business systems. (HG.org,
2022)
E-Tailing
Also known as "virtual storefronts," this is the practice of listing products for sale in
a catalog format on a website. Some e-tail sites (perhaps most notably
Amazon.com) take this a step further and aggregate numerous smaller stores into
a unified system like a "virtual mall." (HG.org, 2022). Other examples of e-
commerce include subscription sites, mobile application sales, electronic book
purchases, online auctions, and the procurement of various services via the web.
Payment solutions
Payment solutions to facilitate the E-commerce transactions.
• e-wallets and e-money (digital wallets approved and registered with the BSP)
• online banking (bank-to-bank transfers)
• payment gateways which refer to the process of authenticating and
processing payments in online transactions, e.g., Paymaya
• cash on delivery (COD)
• credit and debit cards
7
Buraga, R. Social and Professional Issues for Information Technology
Product liability
Product liabilities involving food and drugs/medicine are governed by the Food,
Drug and Cosmetic Act of the Philippines, as amended, and its implementing rules
and regulations. The law provides for the prohibited acts in the manufacture, sale,
offer for sale or transfer of any food and drug, as well as the requirement for
registration of each food and drug that would be introduced and circulated in
the Philippine market.
The Consumer Act of the Philippines sets out the various rights accorded to
consumers, such as protection against deceptive, unfair and unconscionable
sales acts and practices, and minimum standards a product manufacturer,
importer, or supplier or seller should comply with, such as observance of truth and
accuracy in advertising (Zico Law,2023)
Personal Information refers to any information from which the identity of an individual is
apparent or can be reasonably and directly ascertained, or when put together with
other information would directly and certainly identify an individual (National Privacy
Commission, n.d.)
Sensitive Personal Information (SPI) refers to information of an individual such as: Ethnic
origin, Marital status, Race, Age, Color, Religious, philosophical or political affiliations,
Health, education and genetic or sexual life.
Internet Pornography
It refers to the pornography that is accessible over the internet, primarily via websites, FTP
servers peer-to-peer file sharing, or Usenet newsgroups. The availability of widespread
public access to the World Wide Web in late 1990s led to the growth of internet
pornography (Scholarly Community Encyclopedia, 2023).
8
Buraga, R. Social and Professional Issues for Information Technology
Porn is the abbreviation for pornography, which is sexual material that is explicitly
portrayed for the primary purpose of sexual arousal. Sexually explicit material can be
presented in different ways, such as magazines, photographs, films, writings, sculptures,
animation, sound recordings and video games (LICCV Digital Safety,n.d.)
LICCV Digital Safety, listed the four categories of porn that can be determined illegal,
including indecency, obscenity, material that is harmful to minors and child pornography.
1. Julia borrowed a $100,000 from Maria at a 5% interest rate. Julia promised to repay
her debt in six months. However, after six months and possibly a year, Julia has still
not paid the debt and has not shown up to Maria for one year. Maria posted it on
social media in order to locate Julia, along with other details about Julia, such as
the amount of her debt, full name and address.
➢ Meet as a group and analyze the situation above. The group should identify
from the members who will serve as a Lawyer, complainant and respondent.
Try also to consider the following questions: Who is to blame? What did they
violate? What case can be filled to Maria or Julia?
Activity 2- Cybercrime
1. Meet as group and identify the top five cybercrimes affecting businesses and
individuals, Which ones are the most common threats today? Why?
9
Buraga, R. Social and Professional Issues for Information Technology
- Clarity
Reasons/ Justifications are well
explained
- ACM Codes
1. Philippine Legal Research. Can be retrieved at
https://legalresearchph.com/2021/12/05/r-a-no-10175-the-cybercrime-
prevention-act-the-net-commandments/
- Cybercrime Law
2. https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
3. Republic-act-10175-cybercrime-prevention-act-of-2012_-salient-features
- E-Commerce
1. https://lawphil.net/statutes/repacts/ra2000/ra_8792_2000.html
2. Laws and Policies and E-COMMERCE & BUSINESS REGULATIONS. Retrieved from
https://ecommerce.dti.gov.ph/related-laws-policy-issuance/
3. https://www.zicolaw.com/resources/alerts/the-state-of-e-commerce-in-
philippines/
- Data Privacy Act
1. https://www.privacy.gov.ph/data-privacy-act/
2. https://www.privacy.gov.ph/wp-
content/files/quickguide/DPA_QuickGuidefolder_insideonly.pdf
10
Buraga, R. Social and Professional Issues for Information Technology
References:
1. EurekAlert.2018. World's largest computing association updates code of ethics.
Retrieved https://www.eurekalert.org/news-releases/537371
11
inprotected.com