0% found this document useful (0 votes)
39 views87 pages

Tgbforce

The document discusses collaborative development in information and communication technology (ICT). It defines collaboration as working with others to achieve common goals and describes web portals as websites that aggregate content from different sources in one location. It provides examples of popular web portals like Yahoo and MSN. It also outlines the functions of web portals and describes the typical team structure for ICT content development projects. These teams generally include a team manager, editorial manager, content curator, and other roles. The document discusses online collaborative tools that allow remote teams to work together and provides examples like Google Drive, Microsoft Office, and Trello. It presents the typical stages of an ICT project including initiation, planning, development, monitoring and closing.

Uploaded by

Josh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views87 pages

Tgbforce

The document discusses collaborative development in information and communication technology (ICT). It defines collaboration as working with others to achieve common goals and describes web portals as websites that aggregate content from different sources in one location. It provides examples of popular web portals like Yahoo and MSN. It also outlines the functions of web portals and describes the typical team structure for ICT content development projects. These teams generally include a team manager, editorial manager, content curator, and other roles. The document discusses online collaborative tools that allow remote teams to work together and provides examples like Google Drive, Microsoft Office, and Trello. It presents the typical stages of an ICT project including initiation, planning, development, monitoring and closing.

Uploaded by

Josh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 87

ICT Collaborative

Development

ETECH
2nd
QUARTER
Collaborative
This means to work with another person or
group in order to achieve or do something.

Web Portal
It is a website that contains information from
different sources and places them in one
location in a uniform way.

Web Portals are large multi-service web sites


designed to be comprehensive one-stop
destinations for users.

Continue

Collaborate Speak Create


YAHOO!
Yet Another Hierarchical Officious Oracle!
It is the largest and most comprehensive
information portal on the Web.
It offers a web portal where news, emails,
weather, etc. are found in one page.

News Email Weather Entertainment Trends

MSN
Microsoft Network
It is a web portal and related collection of
Internet services and apps for Windows
and mobile devices, provided by
Microsoft.
Functions of
Web Portal
 Search and Navigation
 Notifications
 Chat Facilities
 Subscription
 Personalization
 Collaboration
 Advertising System
 Mass Email

Continue
Team Structure and
Dynamics of ICT Content

Online collaboration is a
process where a team or
group of people work on
project/contents, does review
and modifications, made to
the entire team via online
platform, so that the team will
always have an update on
the project or content status.
Continue

Collaborate Speak Create


A team working on an ICT project
Team Structure and
is generally composed of the
Dynamics of ICT following:
Content
1. Team Manager (The Leader or Content
Strategist – he oversees how the entire
Online collaboration is a
team operates. He sets priorities and
process where a team or group
of people work on ensures that these are followed.
project/contents, does review
and modifications, made to the 2. Editorial Manager – implements the plan.
entire team via online platform, He ensures that the team’s work is done on
so that the team will always time.
have an update on the project
or content status.
3. Content Curator – suggests inputs on
what content will be included in the project.
He must always be updated on the latest.

Continue
A team working on an ICT project
Team Structure and
is generally composed of the
Dynamics of ICT following:
Content
4. Content Syndicator – enables the
content to be shared to external sites or
Online collaboration is a
third-party.
process where a team or group
of people work on 5. Analytics Expert – studies the data and
project/contents, does review ensures that the content is achieving its
and modifications, made to the objectives.
entire team via online platform,
so that the team will always
have an update on the project
6. Website Manager – makes the content
or content status. available to public. This may include
publishing the content to a website, to a
social media site or to a video streaming
site.

Continue
Online Google Drive and
Collaborative Microsoft Office Online
allow multiple people to
Sites like Trello offer
an online to-do
Tools work on different office
files and even their own
checklist for your
entire team.
group’s cloud storage
Working together does not other collaborative tools
necessarily mean you have to available on Google:
be physically together. Google Calendar, Tasks,
Google Meet and Google You can use Facebook
Online collaborative tools will Hangouts groups/page to create
help your group “go the group page that will
distance” and works as if you
allow people in your
already have your own place.
Wordpress allows group to communicate
you to multiple ideas.
Continue
contributors for a
single blog
Project Management for ICT Contents

Initiation Closing

Monitoring and
Planning Controlling

Development and
Implementation
ICT Collaborative Development
LESSON 2
ICT AS PLATFORM
FOR CHANGE
EMPOWERMENT TECHNOLOGIES
INTERACTIVE
MULTIMEDIA
Any computer-delivered electronic
system that allows the user to control,
combine, and manipulate different types
of media, such as text, sound, video,
computer graphics, and animation-
(Britannica.com)

USES OF
INTERACTIVE MULTIMEDIA
Education
Training
Games
Simulation
Information
Presentation
Corporate Presentation
MULTIMEDIA VIDEO
Through video hosting sites, you can
CONTENT take a video and show it to the entire
world (e.g. YouTube)
COURSEWARES SOUND
Online courses that simulate the If videos are too much for you, you
classroom online (e.g., E-learning can always record sounds. You can
Courses using a Learning share your sound bites to the entire
Management System) world (e.g. SoundCloud).

PODCASTS ONLINE GAMES


An episodic series of audio or text Game developers now create what is
files streamed online (e.g., Stuff called “browser-based games.” You
You Should Know, TED Talks, The do not need to install these games to
Starters, Ear Biscuits) your computer as they run in most
updated web browsers)
VODCASTS
An episodic series of video ONLINE TEST
streamed online (e.g., YouTube Online survey forms and tests that
series/shows like Video Game automatically display the results
High School, Good Mythical when finished (Online IQ and
Morning) Personality Tests).
WHAT IS AN
ADVOCACY?
Advocacy is a process of supporting and enabling people to:

Express their Access Defend and promote


views and information and their rights and
concerns services responsibilities.
WHAT IS AN
DEVELOPMENTAL
COMMUNICATION?
Developmental Communication is the intentional use of communication

Promote the
Find out
Assess risks exchange of
opportunities
information
ADVOCACY
DEVELOPMENTAL COM.
Define your goals.
Know your Audience.
Identify resources and
gaps. Craft your message
strategically.

Plan the next move.


Identify the messenger.

Evaluate Effectiveness. Identify the delivery


methods.
THE POWER OF
Social media reaches the world
SOCIAL MEDIA inexpensively

It engages and brings


people together
It awakens creativity and
criticality

It creates opportunity to better It informs and educate people in the


the lives of people world
GLOBAL DIGITAL
DIVIDE
It is defined as an unequal
distribution of information
and communication
technology across nations.
It is also commonly
described as the “gap
between information haves
and have-nots”
DIGITAL CITIZENSHIP
It refers to the utilization of
information technology (IT) in order
to engage in society, politics, and
government.
K. Mossberger, et al. define digital
citizens as "those who use the
Internet regularly and effectively".

DIGITAL CITIZENSHIP
PRINCIPLES:
ENGAGE POSITIVELY

Respect the rights of others to participate and have an opinion


Ask before tagging other people or posting photos
Report offensive or illegal content
Stand up and speak out about cyberbullying — protect your friends
Do not respond to hurtful or nasty comments — block and report cyberbullying

Speak to your parents or trusted adult about upsetting online experiences


Report threats of violence to the police (collect the evidence to show them)

DIGITAL CITIZENSHIP
PRINCIPLES

Engage Know Your Choose


Positively Online World Consciously
KNOW YOUR ONLINE WORLD

Learn how new skills will help you explore the online world
Recognize online risks and how to manage them
Look out for suspicious emails and scams
Use secure websites for financial and retail services
Keep passwords secret, strong and unique
Know how to report bullying behavior on social media sites.

DIGITAL CITIZENSHIP
PRINCIPLES

Engage Know Your Choose


Positively Online World Consciously
CHOOSE CONSCIOUSLY

Choose privacy and security settings carefully and check


them regularly
Choose friends wisely online — not everybody online is
who they claim to be, regularly review your connections,
and remove people
If you have made a mistake apologize and take down offensive
material as soon as possible
Ask for permission before uploading pictures of your friends.

DIGITAL CITIZENSHIP
PRINCIPLES

Engage Know Your Choose


Positively Online World Consciously
ELEMENTS OF
DIGITAL
CITIZENSHIP

9
Digital Access Digital Law
Digital Commerce Digital Rights and
Responsibilities
Digital Communication
Digital Health
Digital Literacy
Digital Security
Digital Etiquette
ELEMENTS OF
DIGITAL
CITIZENSHIP EMPOWEMENT
TECHNOLOGIES

This element deals with understanding


This is perhaps one of the most This is the ability for users to the variety of online communication
fundamental blocks to being a digital recognize that much of the economy mediums such as email, instant
citizen. However, due to is regulated online. It also deals with messaging, FB messenger, the variety
socioeconomic status, location, and the understanding of the dangers of apps, and so forth. There is a
other disabilities some individuals and benefits of online buying, using standard of etiquette associated with
may not have digital access. credit cards online, and so forth. each medium.

DIGITAL ACCESS DIGITAL COMMERCE DIGITAL COMMUNICATION


ELEMENTS OF
DIGITAL
CITIZENSHIP EMPOWEMENT
TECHNOLOGIES

This deals with the understanding of This is the expectation that various This is where enforcement occurs for
how to use various digital devices. It mediums require a variety of illegal downloads, plagiarizing,
is ability and knowledge needed to etiquette. Certain mediums demand hacking, creating viruses, sending
learn and teach using technology more appropriate behavior and spams, identity theft, cyberbullying,
tools language than others and so forth

DIGITAL LITERACY DIGITAL ETIQUETTE DIGITAL LAW


ELEMENTS OF
DIGITAL
CITIZENSHIP EMPOWEMENT
TECHNOLOGIES

This is the set of rights that Digital citizens must be aware of the This simply means that citizens
digital citizens have such as physical stress placed on their bodies
by internet usage. They must be aware
must take measures to be safe
privacy, speech, and so forth. to not become overly dependent on the by practicing using difficult
internet causing eye strain, headaches, passwords, virus protection,
stress problems, and so on. backing up data, and so forth.
DIGITAL RIGHTS AND
RESPONSIBILITIES DIGITAL HEALTH DIGITAL SECURITY
LESSON 3
This involves different
tasks including
conceptualizing your This Involves the actual
project, researching, DEVELOPMENT release of the website MAINTAINING
assigning people and for public view and
many more. promoting it.

01 02 03 04
This involves actual This involves responding to
creation of the websites, feedback of your site
production of images, visitors and continuing to
infographics, and video. improve your website.
PLANNING RELEASE AND
PROMOTION
It is a document used to convince a panel of potential funders
to help a product, program, or service become reality.

INTRODUCTION PURPOSE DESCRIPTION SUPPORT C O N TAC T I N F O

It includes all the


This includes This includes This contains the This includes
necessary
tour group’s the reasons information about
budget needed information on
mission and why this project for the project. how the group
the project. In ICT, it
Some concept
vision and a is worth your involves the sites be contacted.
papers do not
brief group and your you are going to
specify any Like gmail
introduction of sponsor’s time, produce and the
amount address or
your project. effort, and purpose of each and facebook link
requested from
money. how they work in
the sponsor.
unison.
The12 SOCIAL MEDIA
Personality Types
THE 12 SOCIAL MEDIA
Personality Types

ULTRAS DENIERS DIPPERS


This personality type is obsessed Very often, social media users This personality type uses their social
with Facebook or Twitter, checking deny the control social media accounts infrequently, maybe
news feeds very regularly networks have on their lives. only once every other day or even
throughout the day. once per week.
THE 12 SOCIAL MEDIA
Personality Types

VIRGINS LURKERS PEACOCK


This type mainly consists of people This group mainly hides and This personality type is competitive on
that are new to social networks and rarely participates in social Facebook and Twitter to get more
may find it difficult to make full use media conversations. friends and likes of followers than their
of them. friends.
THE 12 SOCIAL MEDIA
Personality Types

RANTERS GHOSTS CHANGELLINGS


This group is highly opinionated This social media personality uses fake This group, about 5% of Facebook and
online and use the opportunities of names in order to stay anonymous, Twitter users adopt entirely different
the networks as in real live, they are providing only little or no information personalities online as nobody will
not that opinionated. about themselves for security reasons. know about their real live identity.
THE 12 SOCIAL MEDIA
Personality Types

QUIZZER INFORMERS A P P R O VA L - S E E K E R
This group of Facebook and Twitter 22% of Facebook users and 20% of This group of social network users
users is actively asking questions on Twitter users share information and worries a lot about the feedback they
their networks instead of only links of interesting things with their will get when posting, commenting or
posting updates or messages. friends and followers. tweeting information.
LESSON 3
LESSON 3
LESSON 4

MAINTENANCE
EMPOW ERMENT TECHNOLOGIES
GOOGLE PROJECT
FORMS EVALUATION
ICT PROJECT MAINTENANCE

The internet will give you plenty of options


in gathering your audience’s feedback.
The only difference that you and your
group may notice is how these services are
presented.
Some of them, because they are free to
use, may have too many ads or some
features are lacking.
NEXT
ICT PROJECT MAINTENANCE

Form is a document, printed or


electronic with spaces in which to write
or enter data.

These will allow the audience to


answer a set of questions you
have set.
These are also tools used to get user’s
feedback.
NEXT
ICT PROJECT MAINTENANCE

Google offers one of the easiest ways to gather


user feedback. Google Forms allow your
audience to answer a set of questions you have
set.

These can be used for survey, feedback, online


registrations and customer care support.
NEXT
ICT PROJECT MAINTENANCE

Open your browser and go to https://drive.google.com


Sign in your Gmail account or click “More Options” the
create an account if in case you don’t have one yet
Once logged in, on the left – hand side of your
My Drive page, click New > Google Forms.
ICT PROJECT MAINTENANCE

You will be taken to Google Form Interface:

NEXT
PARTS OF GOOGLE FORMS

Preview
Settings G account
Forms Home Forms Title
Customize Theme

Star Send Button More

Question Title

Form Description Question Type

Question
Tools
Options

Duplicate

Section Delete Required Show


GOOGLE FORM TOOLS
ICT PROJECT MAINTENANCE

You may now fill out the form with Questions:

This includes the question that will be


answered by your audience.
11
GOOGLE FORMS

QUESTION TYPE
ICT PROJECT MAINTENANCE

TYPE
This changes the type of question according
to your preference. These options include:

A question that can be answered in a short text.


Example: Name, Age

A question that can be answered in a long of text.


Example: Comments, Paragraph

A question that can be answered by only


one answers in a set of options
ICT PROJECT MAINTENANCE TYPE

a question that can be answered with multiple


answers in a set of options

This is similar to a multiple-choice question but


the options are revealed in a drop-down list

This allows the person answering the form to


upload a file

A question that can be answered with a


numerical range (e.g.,1-5, 1- 10);
ICT PROJECT MAINTENANCE

TYPE

A question that contains sub-questions with


similar options;

This is similar to the multiple-choice grid but the


answer can be more than one;

A question that can be answered with a specific


date

A question that can be answered with a specific


time.
ICT PROJECT MAINTENANCE

Once you are done editing the question, you may click
another item. Google Form will automatically save your
form as long as you have internet connection
To add new question or item, Click Add Question
button on the sidebar.
ICT PROJECT MAINTENANCE

Click the Send button on the upper right corner. The send
Form dialog box will appear. Edit these options as you see
it.
ICT PROJECT MAINTENANCE

This requires the person who answered the form,


input their own email address so you can easily
contact them.

1. Email – send the form via email. Simply input the


email address subject, message and specify if you
want to include the form in the email.
2. Link – contains the URL of the Form that you can
share on your website or via private message;
Shorter URL option – generates a shorter link
necessary for limited spaces like sharing on
twitter;
3. Embed HTML – contains an embedded code that
you can attach on your html file.

This allows you to share the link to Google, Facebook and


Twitter.

It allows other to edit your form, necessary whenever


working in groups.
ICT PROJECT MAINTENANCE

CUSTOMIZE THEME
Changes the header, font style, Theme and Background color of
the form;
PREVIEW
This shows you how the form will look like to someone who will
answer it;
SETTINGS
Additional settings for your form which includes the following tabs:
i. General – options involving the person who will answer the
survey;
ii. Presentation – options involving how the form will look;
iii. Quizzes – make this form a quiz.
ICT PROJECT
MAINTENANCE

SEND
Send the form via email, link or embedded code;

MORE OPTIONS
Involves options that allow you to manipulate the
form and include add-ons; and

GOOGLE ACCOUNT SETTINGS


Allows you to add Google Account, switch to
another account, or to log off

NEXT
P E R F O R M A N C E T A S K 3

EVALUATION
EMPOWERMENT TECHNOLOGIES

GOOGLE PEER AND SELF


FORMS EVALUATION
LESSON 5
EMPOWERMENT TECHNOLOGIES

THE DISADVANTAGES
OF ICT
LESSON 5
E M P O W E R M E N T T E C H N O L O G I E S

THE DISADVANTAGES
OF
IC
T
What is
Cybercrime?
Cybercrime is criminal
activity that either targets or
uses a computer, a computer
network or a networked
device. Most, but not
all, cybercrime is committed
by cybercriminals or
hackers who want to make
money.

These are the illegal acts


done through the use of the
Internet.
In 2012, Stephen Nale (Complex.com) posted a list of ten most
common Internet Cybercrime as follows:

Phishing or Blackmail/ Sports Electronic


Spoofing Extortion Hacking Betting Harassment

Non-delivery of Child Drug Copyright


Merchandise Pornography Prostitution Trafficking Infringement
Click this image to
jump to slide 11

Phishing or Spoofing
01 The act of sending multiple emails to multiple
users in hopes of having a number of clicking
them on the links or malwares attached to the
email.

Blackmail or Extortion
02 The act of using the internet to threaten or
damage someone’s reputation to extort
money or anything else in value.

Hacking
03 The act of obtaining unauthorized access to data
from a computer network. This is typically done to
commercial and government sites to threaten its
owner.

THE DISADVANTAGES OF ICT Click this image to


E M P O W E R M E N T T E C H N O L O G I E S
jump to slide 12
B L AC K M AI L E X TO R T I O N
Occurs when a person
Occurs when one person threatens
threatens to physically harm
to reveal private information
or injure another unless the
about someone else unless he
extortioner receives
receives compensation to remain
compensation
silent.
PHISHING SPOOFING
Using trusted institutional names to They are using fake email sender names
elicit confidential information so the message appears to be from a
different source, so you will trust it.
Some common schemes look like
they are from your bank or any and If you don’t know the sender, don’t open it.
ask you to update your account.
Sports Betting
04 The act of wagering on any sports
event over the internet. In some
countries, gambling (including
sports betting) is illegal if you are
doing it over the internet.

Non-delivery of Merchandise
05 The act of devising a scheme wherein
a culprit posts on an item or service
for sale on the internet and once the
transactions have been done, does
not really give the item or service.

Electronic Harassment
06 The act of anonymously using the
internet to harass, abuse, threaten,
or annoy other people.
This is also an act of cyberbullying,
however, because the culprit is
THE DISADVANTAGES OF ICT anonymous, it is hard to detect who
E M P O W E R M E N T T E C H N O L O G I E S
is bullying you.
Child Pornography
07 The act of using the internet to show
child pornography. This act is highly
punishable by law.
Prostitution
The act of using the internet to
08 engage in prostitution.
Drug Trafficking
The act of selling illegal
09 substances using the
internet.
Copyright Infringement
It is the use of works protected
10 by copyright law without
permission for a usage where
such permission is required.
THE DISADVANTAGES OF ICT
E M P O W E R M E N T T E C H N O L O G I E S
Combatting
CYBERCRIMES
THE DISADVANTAGES OF ICT
E M P O W E R M E N T T E C H N O L O G I E S
Passwords

Security Data
Connections Encryption

Firewall Anti-malwares

Before a hacker can get through the


unauthorized files he or she is targeting, the
hacker has to get through several security
measures
THE DISADVANTAGES OF ICT
E M P O W E R M E N T T E C H N O L O G I E S
What is Firewall? Passwords
A firewall is a network security
device that monitors incoming
and outgoing network traffic
and decides whether to allow or Security Data
block specific traffic based on Connections Encryption
a defined set of security rules.

What is Data
E n c r yp t i o n ? Firewall Anti-malwares
Encryption is the process of
converting raw data into code.
Before a hacker can get through the unauthorized
files he or she is targeting, the hacker has to get
through several security measures

THE DISADVANTAGES OF ICT


E M P O W E R M E N T T E C H N O L O G I E S
I N V E S T I G AT I O N
URL tracing and logging are used by websites
to track your unique IP addresses

WHAT IS IP ADDRESS?
An IP address (Internet Protocol address) is
used to identify computers on the Internet.

When your computer or device sends a


request, like a search on Google, it tags the
request with your IP address. That way Google
knows where to send the response.

P E N A LT I E S
More and more laws are being created and
implemented today. Penalties include both fine
and imprisonment.

THE DISADVANTAGES OF ICT


E M P O W E R M E N T T E C H N O L O G I E S
What are the
Punishments?
What are the
Punishments?
Phishing or Spoofing
S.B 2451
SECTION 1:
Any person who shall commit the act of phishing in
the internet or instant messaging system shall be
punished with imprisonment of not less than two
(2) years nor more than ten (10) years, or a fine of
not less than fifty thousand pesos (Php 50,000.00)
but not more than five hundred thousand pesos
(Php 500,000.00) or both such imprisonment and
fine, at the discretion of the court.
What are the
Punishments?
Blackmail/Extortion
R.A 9194
SECTION 9:
The punishment of imprisonment ranging from
three (3) to eight (8) years and a fine of not less
than Five hundred thousand Philippine pesos
(Php500,000.00) but not more than One
million Philippine pesos (Php1,000,000.00) shall be
imposed on a person convicted for a violation
under Section 9(c).
What are the
Punishments?

Hacking
Republic Act No. 8792
A person who is found guilty of hacking is
“punished by a minimum fine of P100,000 and a
maximum commensurate to the damage incurred
and a mandatory imprisonment of six months to
three years.”
What are the
Punishments?
Sports Betting
Presidential Decree No. 1602 (1978)
creates harsher penalties for illegal gambling
activities. Section 1 lists activities that are
usually associated with legal gambling in the
Philippines: Basketball, Boxing, Slots,
Poker, Soccer, Football, Volleyball, Horse
racing, Pinball and about every other sport you
can think of. It states that the punishment for
wagering on those games without proper
licensing shall be punished by prison and a
fine up to 6 thousand pesos (PHP).
What are the
Punishments?
Non-Delivery of Merchandise
R.A 7394
Article 164- The Sanctions
The imposition of administrative fines in such
amount as deemed reasonable by the Secretary,
which shall in no case be less that Five hundred
pesos (P500.00) nor more than Three hundred
thousand pesos (P300,000.00) depending on the
gravity of the offense, and an additional fine of not
more than One thousand pesos (P1,000.00) or
each day of continuing violation.
What are the
Punishments?
Electronic Harassment
Republic Act No. 11313
Article 2 Section 14
Penalties for Gender-Based Online Sexual
Harassment. -The penalty of prison correctional in
its medium period or a fine of not less than One
hundred thousand pesos (₱100,000.00) but not
more than Five hundred thousand pesos
(₱500,000.00), or both, at the discretion of the
court shall be imposed upon any person found
guilty of any gender-based online sexual
harassment.
What are the
Punishments?
Child Pornography
Republic Act No. 9975
“Any person found guilty of violating Section (d),
(e), and (f) of this Act shall suffer the penalty of
reclusion temporal in its medium period and a fine
of not less than seven hundred fifty thousand
pesos (Php750,000.00) but not more than One
million pesos (Php1,000,000.00);”
What are the
Punishments?

Prostitution
Republic Act No. 9208
"(a) Any person found guilty of committing any of
the acts enumerated in Section 4 shall suffer the
penalty of imprisonment of twenty (20) years and a
fine of not less than One million pesos
(P1,000,000.00) but not more than Two million
pesos (P2,000,000.00);
What are the
Punishments?
Drug Trafficking
Republic Act No. 9165
Article 2 section 4
The penalty of imprisonment ranging from twelve
(12) years and one (1) day to twenty (20) years
and a fine ranging from One hundred thousand
pesos (P100,000.00) to Five hundred thousand
pesos (P500,000.00) shall be imposed upon any
person, who, unless authorized by law, shall import
any controlled precursor and essential chemical.
What are the
Punishments?

Copyright Infringement
Republic Act No. 8293
Under Philippine law, copyright infringement is
punishable by the following: Imprisonment of
between 1 to 3 years and a fine of between 50,000
to 150,000 pesos for the first offense.
Imprisonment of 3 years and 1 day to six years
plus a fine of between 150,000 to 500,000 pesos
for the second offense.

You might also like