Introduction to Cybercrime
and Environmental Laws
What does computer mean?
• A computer is a machine or device that performs processes,
calculations and operations based on instructions provided by a
software or hardware program.
• It is designed to execute applications and provides a variety of
solutions by combining integrated hardware and software
components.
A computer is made up of multiple
parts and components that facilitate
user functionality
• A computer has two primary categories:
• Hardware
• Software
• Hardware:
physical structure that houses a computer's processor, memory,
storage, communication ports and peripheral devices.
• Software:
includes operating system (OS) and software applications
A computer works with software programs that are
sent to its underlying hardware architecture for
reading, inter pretation and execution.
Computers are classified according to computer
power, capacity, size, mobility and other factors, as
personal computers, desktop computers, laptop
computers, minicomputers, handheld computers and
devices, mainframes or supercomputers.
Computer fundamentals
• A computer is an electronic machine that accepts data, stores and
processes data into information.
• The computer is able to work because there are actions in its memory
directing it.
• The parts of the computer that you can see and touch, such as the
keyboard, monitor and the mouse are called hardware.
• The instructions that direct the computer are called software or
computer program.
• Data which is raw facts that the user enters into the computer is
called input.
• These includes:
• words,
• numbers,
• sound and
• pictures.
• When the data is entered into the computer, the computer processes the data to produce
information which is output.
• For example, you enter 2 + 2 into the computer as data the computer processes it and the result is
information.
Computers are usually categorized into
three general categories:
•Supercomputer
•Mainframe computer
•Personal computer
•Supercomputer -
the fastest, largest,
most powerful and
most expensive
computer.
• Mainframe computer -
this is a little smaller and less
powerful than the super computer,
but, like the supercomputer it is
also expensive.
Personal computer -
this is the computer that most
people use in their daily lives.
This computer is much smaller,
less powerful and less expensive
than the supercomputer and the
mainframe computer.
There are two main types of
personal computers.
1. Macintosh (Macs)
2. PC compatibles.
• The main difference between the two is the operating systems and
the processors they use.
• This category of computer has two additional types of computers.
• These are mobile computer and handheld computer.
• The most popular type of mobile computer is the notebook or laptop
computer, and the handheld computer is a very small pc that you can
hold in your hand.
• It is important to note that, any computer regardless of its size has an
input device, output device and a system unit.
• Computer hardware
• You learned earlier that a computer has electronic and
mechanical parts known as hardware.
• Hardware also includes input devices, output devices,
system unit, storage devices and communication
devices. Without these components we would not be
able to use the computer.
• Input device-
• an input device is any hardware component that allows you the user
to enter data into the computer.
There are many input devices.
• Six of the most widely used input devices are:
a.Keyboard
b. Mouse
c. Scanner
d. Microphone
e. Digital camera
f. PC video camera
•Keyboard- you use the
keyboard to type letters,
numbers, and symbols
into the computer.
• Mouse - the mouse is the pointing device that
has a pointer that changes into different shape
as you use the mouse.
You click the mouse by pressing and releasing
the button.
This action allows you to enter data when using
a mouse.
•Scanner- this input device
copies from paper into your
computer.
•Microphone- the microphone is
usually used for voice input into
the computer.
•Digital camera- the digital
ca m e ra a l l o ws yo u to ta ke
pictures that you can input into
your computer.
•P C v i d e o c a m e r a - t h e v i d e o
camera allows you to take both
video and still images that you can
input onto your computer.
Output devices - an output device is
any hardware component that gives
information to the user.
• Three commonly used output devices are as follow:
• Monitor - this output device displays the information on a screen
• Printer- this output device print information on paper. This type of
printed output is called a hardcopy.
• Speaker- sound is the type of output you will get from a speaker.
Computer software
• The computer will not work without software. Software also called programs.
• These are the instructions that tell the computer what to do and how to do it.
• The two main categories of software are system software and application
software.
• The system software also called operating system actually runs the computer.
• This software controls all the operations of the computer and its devices.
• All computers use system software and without the system software the
application software will not work.
• The most common OS on a PC is the Windows operating system and for the
MAC computer it would be the MAC operating system.
• Application software is a program that allows users to a specific task
on the computer.
• There are a number of different types of application software
available to do many of the task we do daily.
• Four examples of common application software and what they are used for are:
• Word processing application: one word processing program is Microsoft Word.
This program allows you to type letters, assignments and do any other written
activity on the computer.
• Spreadsheet application: Microsoft excel is an example of a spreadsheet
program. One can use this program to create charts and do calculations.
• Email application: outlook express is an email program that allows you to
receive and send email.
• Internet application: internet explorer is a program that allows you to get
connected to the internet and look at web site like the one you are reading now.
•It is important to note that when you buy a
computer the computer comes with the
operating system and some software already
installed. You may have to buy more software
install them on the computer.
•Install means to load the software onto the
hard disk of the computer so that you can run
or use the software.
Like any other equipment the computer needs to be cared for;
let us discuss how we should do about caring for our
computer.
• Storage media
• Storage data, information and instructions for use in the future. Computer use
storage to keep the software that make the hardware work.
• As a user you store a variety of data and information on your computer or on a
storage media.
• Storage media are the physical materials on which data, information and
instructions are kept. When a user receives information or data to a storage
medium he or she is storing a file, and this process is called writing.
• When the file is opened the process is called reading.
Common storage media are:
• Hard drive: This medium comes with the computer and is always inside the computer. It stores all
the programs that the computer needs to work. In addition, users store their data and information
on the hard drive.
• Floppy disk: this storage medium is considered to be a portable storage medium. You put it into the
computer save your information on it, take it out, and take it with you wherever you go.
• CD and DVD: these types of storage media hold much more information than a floppy disk they are
also considered portable storage. Types of storage media come in different forms. This means that
there are cds and dvds that you can only save information on but you cannot erase information. In
addition these are those that can both save information on and erase the information you had saved.
• USB flash drive: this is a storage medium that is very easy to carry around and it also holds more data
than a floppy disk as you can see from the picture below it is very small when compared with the
others.
• Computer care
• Taking care of your computer is just as important as taking care of
your books.
• Both the internal and external parts of the computer have to be cared
for. Scanning, defragging and reformatting are some of the activities
performed to clean up the hard drive.
• These activities are best left to a grownups and such you should not
attempt them.
However, there are certain tasks you can perform
to ensure your computer is clean; here are a few:
• 1. Keep dust away: dust your computer to keep it free of dust and dirt.
• 2. Keep food away: do not eat or drink while working on the computer.
• 3. Use clean hands: make sure your hands are clean before you type on the
keyboard or click the mouse.
• 4. Treat with respect: if you are having problems with your computer, ask for
help. Do not bang or hit the computer.
• 5. Keep off: seeing that the computer is connected to electricity, this means
that lightning could be conducted to your computer through the electrical
connection. For this reason it is best not to use your computer during a storm.
• 6. Stop virus attack: a computer virus is a program written by a person on
purpose to harm other people's computers. A computer virus is passed from
one computer to another when you share and download files without the
protection of an antivirus software. For this reason you should get permission
before downloading files.
• 7. Handle with care: the way you handle your cds will determine how long
they will last. Always hold the cd correctly.
CHAPTER III
The Hacker, Hacking Tactics and the Victim
At the end of this chapter, the students should be able to comply
with the following:
1.Who is the hacker?;
2.Enumerate Types of Hacker; and
3.Define Cybercrime.
Who is the hacker?
Hacking emerged with the invention of computers.
Among computer professionals, it is applied to someone who is
proficient at software programming, debugging systems, or
identifying vulnerabilities in a given computer, software
application, or computer network.
Who is the hacker?
However, “hacker” has taken on a negative meaning among the
public and in the media.
Outside the computer industry, the term is now generally used to
describe a person with these skills who decides to apply them
toward a damaging or illegal purpose.
Who is the hacker?
The term hacker may refer to anyone with technical skills, but it
often refers to a person who uses his or her abilities to gain
unauthorized access to systems or networks in order to commit
crimes.
First Filipino Convicted in Hacking
The conviction of JJ Maria G. Giner was
considered a landmark case, as he is the
under Section 33(a)
of R.A. No. 8792 (E-Commerce Act ) which was
investigated by ATCD-CCU.
3 Types of Hackers
The security community has informally used references to hat
color as a way different types of hacker are identified, usually
divided into three types:
1 White hat
2. Black hat
3. Gray hat
White hat
White hat hackers, also known as ethical hackers, strive to
operate in the public's best interest, rather than to create
turmoil.
Many white hat hackers work doing penetration, hired to
attempt to break into the company's networks to find and
report on security vulnerabilities.
Black hat
Black hat hackers intentionally gain unauthorized access to networks
and systems with malicious intent, whether to steal data, spread
malware or profit from ransomware, vandalize or otherwise damage
systems or for any other reason including gaining notoriety.
Black hat hackers are criminals by definition because they violate laws
against accessing systems without authorization, but they may also
engage in other illegal activity, including identity theft and distributed
denial-of-service attacks.
Gray hat
Gray hat hackers
While their motives may be similar to those of white hat hackers, gray
hats are more likely than white hat hackers to access systems without
authorization, at the same time, they are more likely than black hat
hackers to avoid doing unnecessary damage to the systems they hack.
Criminal hackers
These scripts can be found posted on the internet for anyone, usually
entry-level hackers, to use, Hackers with limited skills are sometimes
called script kiddies, referring to their need to use malicious scripts
and their inability to create their own code.
Advanced hackers might study these scripts and then modify them to
develop new methods.
The Hacker Attitude
1. The world is full of fascinating problems waiting to be solved
2. No problem should ever have to be solved twice
3. Boredom and drudgery are evil
4. Freedom is good
5. Attitude is no substitute for competence
Hacking techniques that are commonly used to get
your personal information in an unauthorized way.
1. Bait and switch;
2. Cookie theft;
3. Clickjacking Attacks
4. Virus, Trojan etc.
5. Phishing Eavesdropping (Passive Attacks)
6. Eavesdropping (Passive Attacks)
7. Fake WAP VPN service
8. Waterhole attacks
9. Denial of Service (DoS\DDOS)
10. Keylogger
Bait and switch
Using bait and switch hacking technique, an attacker can buy
Later, when a ,
he might get
This way, they can further install malware or adware on your
computer. Th ads and download links shown in this technique are
very attractive and users are expected to end up clicking on the same.
Bait and switch
Using bait and switch hacking technique, an attacker can buy
Later, when a ,
he might get
This way, they can further install malware or adware on your
computer. Th ads and download links shown in this technique are
very attractive and users are expected to end up clicking on the same.
Cookie theft
The such as browsing history,
username, and passwords for different sites that we access.
Once the hacker gets the access to your cookie, he can even authenticate
himself as you on a browser. A popular method to carry out this attack is to
encourage a user's IP packets to pass through attacker's machine Also
known as Side Jacking or Session Hijacking, this attack is easy to carry out if
the user is not using SSL (https) for the complete session.
On the websites where you enter your password and banking details, it's
of utmost importance for them to make their connections encrypted.
Clickjacking
Clickjacking is also known by a different name, UI Redress. In this attack,
the hacker This
behavior is very common in app download, movie streaming, and torrent
websites.
While they mostly employ this technique to earn advertising dollars,
others
In another word, in this type of hacking,
that aren't meant for the exact page,
It works by fooling an internet user into
performing an undesired action by clicking on hidden link.
Clickjacking
Virus or trojans
Virus or trojans are
They can also lock your files serve fraud advertisement, divert traffic, sniff
your data, or spread on all the computer connected to your network.
Malicious software that attaches itself to other software .
Phishing
Phishing is a hacking technique using which a
Combined with social engineering, it becomes one of the most commonly
used and deadliest attack vectors.
Once the victim tries to login or enters some data, the hacker gets that
private information of the target victim using the trojan running on the
fake site. Phishing via iCloud and Gmail account was the attack route taken
by hackers who targeted the “Fappening" leak, which involved numerous
Hollywood female celebrities.
Actual Website
www.facebook.com
Deceptive Website
www.faceb00k.com
Eavesdropping (Passive Attacks)
Unlike other attacks which are active in nature, using a passive attack, a
hacker just monitors the computer systems and networks to gain some
unwanted information.
The motive behind eavesdropping is not to harm the system but to get
some information without being identified. These types of hackers can
target email, instant messaging services, phone calls, web browsing, and
other methods of communication. Those who indulge in such activities are
generally black hat hackers, government agencies, etc.
Fake WAP VPN service
Even just for fun,
This WAP connects to the official public place WAP. Once you get
connected the fake WAP, a hacker can access your data, just like in the
above case.
It's one of the easier hacks to accomplish and one just needs a simple
software and wireless network. Anyone can name their WAP as some legit
name like " Heathrow Airport WIFI or " Starbucks Wi-Fi " and start spying
on you. One of the best ways to protect yourself from such attacks is using
a quality VPN service.
Waterhole attacks
If you are a big fan of Discovery or National Geographic channels, you
could relate easily with the waterhole attacks. To poison a place, in this
case, the
In the same way, hackers target the most accessed physical location to
attack the victim. That point could be a coffee shop, a cafeteria, etc.
Once hackers are aware of your timings, using this type of hacking, they
might create a fake Wi-Fi access point and modify your most visited
website to redirect them to you to get your personal information.
Denial-of-Service attack
A Denial-of-Service attack is a hacking technique to
with a lot of traffic that the server is
unable to process all the requests in the real time and finally crashes
down.
This is an act by the criminal, who floods the bandwidth of the
victim’s network of fills his e-mail box with spam mail depriving him
of the services he is entitled to access or provide.
Keylogger
Keylogger is a simple software that
These log files might
even contain your personal email IDs and passwords. Also known as
keyboard capturing, it can be either software or hardware. While
software-based keyloggers target the programs installed on a computer,
hardware devices target keyboards, electromagnetic emissions,
smartphone sensors, etc.
Keylogger is one of the main reasons why online banking sites give you an
option to use their virtual keyboards. So, whenever you're operating a
computer in public setting, try to take extra caution.
Environmental laws and
Protection
Taking care of the environment is important for human
existence. For proper environmental care, it is important to
have some legislation in place.
The laws that we have regarding the environment provide a
guideline so that we can take care of the environment in an
e f f e c t i v e m a n n e r .
Environmental laws are also in the front line to make sure
that the law is followed when it comes to taking care of the
environment.
These topics focuses the three
important aspects of
Philippines environment laws
Green laws are those that deal with the protection,
conservation, utilization and development of forests,
other land-based natural resources, and wildlife. Green
is the color used since lands and forests are generally
s u p p o s e d t o b e g r e e n .
Land-based wildlife also consider the forests as their
habitat, thus, they are included under the green laws.
Blue Laws are referring to the color of the seas, oceans,
and other bodies of water.
Blue laws refer to laws which deal with the protection,
conservation and utilization of waters, marine life, and
aquatic resources.
Blue laws encompass both inland waters such as rivers,
lakes, and streams, and the seas and oceans, whether part
of the country’s territory or not.
Brown laws refer to laws and rules which deal with pollution control
and the regulation of activities which could affect the environment.
These laws and rules include those which control hazardous and toxic
wastes and chemicals, solid waste management, and rules on the
conduct of environmental impact assessments.
Green laws
Green laws are those that deal with the protection, conservation, utilization
and development of forests, other land-based natural resources, and
wildlife.
PD 705 The Revised Forestry Code
RA 9175 the Chain Saw Act
REPUBLIC ACT NO. 9147 The Wildlife Conservation Act
RA No. 7586 The National Integrated Protected Areas System (NIPAS) Act
REPUBLIC ACT NO. 7942 The Philippine Mining Act of 1995
REPUBLIC ACT No. 3571 An Act to Prohibit the Cutting, Destroying or
Injuring of Planted or Growing Trees, Flowering Plants and Shrubs or Plants
of Scenic Value Along Public Roads, in Plazas, Parks, School Premises or in
Any Other Public Pleasure Ground
Presidential Decree No. 705 : Revised
Forestry Code of the Philippines is the
protection, development and
rehabilitation of forest lands shall be
emphasized so as to ensure their
continuity in productive condition.
Most commonly violated
Section 68. Cutting, gathering and/or collecting timber or other
products without license.
Any person who shall cut, gather, collect, or remove timber or other
forest products from any forest land, or timber from alienable and
disposable public lands, or from private lands, without any authority
under a license agreement, lease, license or permit, shall be guilty of
qualified theft as defined and punished under Articles 309 and 310 of
the Revised Penal Code.
Section 69. Unlawful occupation or destruction of forest lands.
Any person who enters and occupies or possesses, or makes kaingin for his
own private use or for others any forest land without authority under a
license agreement, lease, license or permit, or in any manner destroys such
forest land or part thereof, or causes any damage to the timber stand and
other products and forest growths found therein, or who assists, aids or abets
any other person to do so, or sets a fire, or negligently permits a fire to be set
in any forest land shall, upon conviction, be fined in an amount of not less
than five hundred pesos (P500.00) nor more than twenty thousand pesos
(P20,000.00) and imprisoned for not less than six (6) months nor more than
two (2) years for each such offense.
Section 72. Destruction of wildlife resources.
Any person violating the provisions of Section
55 of this Code, or the regulations promulgated
thereunder, shall be fined not less than one
hundred (P100.00) pesos for each such violation
and in addition shall be denied a permit for a
period of three (3) years from the date of the
violation.
S e c t i o n 5 5 . W i l d l i fe . W i l d l i fe m ay b e
destroyed, killed, consumed, eaten or
otherwise disposed of, without the necessity
of permit, for the protection of life, health,
safety and property, and the convenience of
the people.
Republic Act no. 9175 This Act shall be known
as the "Chain Saw Act of 2002"
An act that regulate the ownership, possession,
sale, transfer, importation and/or use of chain
saws to prevent them from being used in
illegal logging or unauthorized clearing of
forests
Most commonly violated
Actual Unlawful Use of Chain Saw. - Any person who is found to
be in possession of a chain saw and uses the same to cut trees
and timber in forest land or elsewhere except as authorized by
the DENR shall be penalized with imprisonment of six (6) years
and one (1) day to eight (8) years or a fine of not less that Thirty
thousand pesos (P30,000.00) but not more than Fifty thousand
pesos (P50,000.00) or both at the discretion of the court without
prejudice to being prosecuted for a separate offense that may
have been simultaneously committed. The chain saw unlawfully
used shall be likewise confiscated in favor of the government.
REPUBLIC ACT NO. 9147 This act shall be known as the
"Wildlife Resources Conservation and Protection Act." An act
providing for the conservation and protection of wildlife
resources and their habitats
The primary law governing the protection of wildlife and their
h a b i tat s i s R A N o . 9 1 4 7 , o r t h e W i l d l i fe Re s o u rc e s
Conservation and Protection Act. The law covers all wildlife
species found in all areas of the country, including protected
areas and critical habitats.
Section 27 Prohibition RA 9147
Killing and destroying wildlife species, except in the following instances;
(i) when it is done as part of the religious rituals of established tribal groups
or indigenous cultural communities;
(ii) when the wildlife is afflicted with an incurable communicable disease;
(iii) when it is deemed necessary to put an end to the misery suffered by
the wildlife;
(iv) when it is done to prevent an imminent danger to the life or limb of a
human being; and
(v) when the wildlife is killed or destroyed after it has been used in
authorized research or experiments.
Effecting any of the following acts in critical habitat(s)
(i) dumping of waste products detrimental to wildlife;
(ii) squatting or otherwise occupying any portion of the critical
habitat;
(iii) mineral exploration and/or extraction;
(iv) burning;
(v) logging; and
(vi) quarrying
Transporting of wildlife : This is committed when wildlife species are
transported without the necessary permits, papers, and documentation from
the DENR.
There is a need to designate spaces and areas in the country solely as places
where wildlife, flora, and fauna can grow, and where the rich biodiversity of the
ecosystem can be preserved. There is also a need to reserve certain areas
exclusively for the environment, and to exclude all other forms of land use and
utilization. In the Philippines, the primary law that does this is RA No. 7586, or
the National Integrated Protected Areas System (NIPAS) Act. Enacted in 1992.
REPUBLIC ACT NO. 7586 This Act shall be known and referred
to as the "National Integrated Protected Areas System (NIPAS)
Act of 1992″.
N I PA S s e r ve s a s t h e b a s i s fo r t h e c l a s s i f i cat i o n a n d
administration of all designated protected areas to maintain
essential ecological processes and life support systems, to
preserve genetic diversity, to ensure sustainable use of
resources found therein, and to maintain their natural
conditions to the greatest extent possible.
Section 3. Categories of protected areas
a. Strict nature reserve;
b. Natural park;
c. Natural monument;
d. Wildlife sanctuary;
e. Protected landscapes and seascapes;
f. Resource reserve;
g. Natural biotic areas; and
h. Other categories established by law, conventions or international
agreements which the Philippine Government is a signatory.
The law specifically punishes the following acts most commonly violated:
Section 20 RA 7586
Hunting, destroying, disturbing, or mere possession of plants or animals
without permits
Common example is illegal logging in protected areas, since this is where the
tress and the wildlife species are located.
Dumping of waste products, destroying objects of natural beauty or of interest
to cultural communities, leaving refuse and debris: These violations affect the
physical conditions and characteristics of the protected area. They either cause
immediate damage or harm, not only to the physical environment but also to
wildlife, plants, and other living organisms. Most common example is mining
and logging and some cases in remote areas, they are used as dumping sites for
hazardous and toxic substances.
Section 21. Penalties. Whoever is found guilty by a
competent court of justice of any of the offenses in the
preceding section shall be fined in the amount of not less
than Five thousand pesos (P5,000) nor more than Five
hundred thousand pesos (P500,000), exclusive of the value
of the thing damaged or imprisonment for not less than one
(1) year but not more than six (6) years, or both, as
determined by the court.
REPUBLIC ACT NO. 7942 This Act shall be known as the "Philippine Mining Act
of 1995."
The Philippine Mining Act of 1995 is the main policy/ legislation which governs
all mining operations in the country and includes various measures to protect
the environment and areas in which mining can be allowed.
The most common violation in relation to environment is the Violation of the
Terms and Conditions of the Environmental Compliance Certificate which
causes environmental damage through pollution (Mine waste and other water
system contaminated with chemical used in mining) and shall suffer the
penalty of imprisonment of six (6) months to six (6) years or a fine of Fifty
thousand pesos (P50,000.00) to Two hundred thousand pesos (P200,000.00),
or both, at the discretion of the court.
REPUBLIC ACT No. 3571 An Act to Prohibit the Cutting, Destroying or Injuring
of Planted or Growing Trees, Flowering Plants and Shrubs or Plants of Scenic
Value Along Public Roads, in Plazas, Parks, School Premises or in Any Other
Public Pleasure Ground. In order to promote and conserve the beauty of
objects of scenic and ornamental value along public places and help preserve
cool, fresh and healthful climate
Not every act of cutting, destroying or injuring is punishable, however. When
the cutting is necessary for public safety or the pruning is necessary to
enhance the tree’s beauty, no crime is committed, provided that prior
approval is given by the Director of Parks and Wildlife. (Sec. 3)
Blue Laws
Blue laws refer to laws which deal with the protection, conservation and
utilization of waters, marine life, and aquatic resources.
REPUBLIC ACT NO. 10654 An act to prevent, deter and eliminate illegal,
unreported and unregulated fishing, amending republic act no. 8550,
otherwise known as "the Philippine fisheries code of 1998," and for other
purposes
RA No. 4850 The Laguna Lake Development Authority (LLDA) Act
REPUBLIC ACT No. 3931 An act creating the national water and air pollution
control commission
Presidential Decree No. 979 otherwise known as the Marine Pollution
REPUBLIC ACT NO. 10654 AN ACT TO PREVENT, DETER AND ELIMINATE ILLEGAL,
UNREPORTED AND UNREGULATED FISHING, AMENDING REPUBLIC ACT NO.
8550, OTHERWISE KNOWN AS "THE PHILIPPINE FISHERIES CODE OF 1998," AND
FOR OTHER PURPOSES
The law seeks to manage the country’s fishery and aquatic resources in a
manner consistent with an integrated coastal area management and to protect
the right of fisherfolk, especially of the local communities.
And It seeks to “prevent, deter and eliminate illegal, unreported and
unregulated” fishing in the country. Also it provides for a national policy on
sustainable use of fishery resources to meet the growing food needs of the
population.
Prohibition in connection with public safety (Chapter IV, RA 10654)
Fishing Through Explosives, Noxious or Poisonous Substance, or Electricity. It shall
be unlawful for any person to catch, take or gather or cause to be caught, taken
or gathered fish or any fishery species in Philippine waters with the use of
explosives, noxious or poisonous substance which will kill, render unconscious
fish or fishery species.
Ban on Coral Exploitation and Exportation. – It shall be unlawful for any person or
corporation to gather, possess, commercially transport, sell or export ordinary,
semi-precious and precious corals, whether raw or in processed form, except for
scientific or research purposes. It shall also be unlawful for any person,
corporation or entity to commit any activity that damage coral reefs.
Aquatic Pollution: The introduction by human or machine,
directly or indirectly, of substances or energy to the aquatic
environment which result or is likely to result in such
deleterious effects as to harm the marine environment and
human health.
Failure to Comply with Minimum Safety Standards. – The
owner and captain of a commercial fishing vessel engaged in
fishing who, upon demand by proper authorities, fails to
exhibit or show proof of compliance with the safety standards
provided in this Code shall be liable administratively and
criminally.
The Laguna Lake Development Authority (LLDA) Act
The LLDA was established through RA No. 4850 in 1966 as a quasi-government
agency that leads, promotes, and accelerates sustainable development in the
Laguna de Bay Region. Regulatory and law enforcement functions are carried
out with provisions on environmental management, particularly on water
quality monitoring, conservation of natural resources, and community-based
natural resource management.
General prohibitions (Section 27, Resolution No 33): The prohibitions include:
undertaking development or a project without LLDA clearance; disposal or
throwing of any organic or inorganic substance in water form that causes
pollution; disposal of toxic and/or hazardous substances without authorization
from the LLDA.
REPUBLIC ACT No. 3931 AN ACT CREATING THE NATIONAL WATER AND AIR POLLUTION
CONTROL COMMISSION
The Act declares as national policy " to maintain reasonable standards of purity for the waters
and of this country with their utilization for domestic, agricultural, industrial and other
legitimate purposes".
Section 9. Prohibitions.
No person shall throw, drain, or otherwise dispose into any of the water and/or atmospheric
air of the Philippines, or any substance in gaseous or liquid form that shall cause pollution of
such waters or atmospheric air.
No person shall perform the activities without first securing a permit from the city or district
engineer for the discharge of all industrial wastes and other wastes into the waters or
atmospheric air of the Philippines, which could cause pollution. Including the construction,
installation, or operation of any industrial or commercial establishments which would cause
an increase in the discharge of wastes directly into the waters or atmospheric air of the
Philippines.
Presidential Decree No. 979 otherwise known as the Marine Pollution Decree of
1976
Declared a national policy to prevent and control the pollution of seas by the
dumping of wastes and other matter which create hazards to human health,
harm living resources and marine life, damage amenities, or interfere with the
legitimate uses of the sea within the territorial jurisdiction of the Philippines.
Because the marine environment and the living organisms which it supports are
vital of importance to humanity, and all people have an interest in assuring that
it is managed and protected. And knowing that the marine pollution originates
from many sources, such as dumping and discharging through the rivers.
This law also help to prevent, mitigate or eliminate the increased damages of
marine resources as a result of pollution.
Brown laws
Brown laws refer to laws and rules which deal with pollution control and the
regulation of activities which could affect the environment.
Republic act no. 6969 This Act shall be known as the “Toxic Substances and
Hazardous and Nuclear Wastes Control Act of 1990.”
Republic Act No. 8749 This Act shall be known as the "Philippine Clean Air Act
of 1999."
Republic Act No. 9275 The Philippine Clean Water Act of 2004
Republic act no. 9003 This Act shall be known as the “Ecological Solid Waste
Management Act of 2000.”
Presidential Decree No. 825 Providing penalty for improper disposal of garbage
and other forms of uncleanliness and for other purposes.
REPUBLIC ACT NO. 6969 This Act shall be known as the “Toxic Substances and
Hazardous and Nuclear Wastes Control Act of 1990.”
This Act shall cover the importation, manufacture, processing, handling, storage,
transportation, sale, distribution, use and disposal of all unregulated chemical
substances and mixtures in the Philippines, that present unreasonable risk
and/or injury to health or the environment, including the entry, even in transit,
as well as the keeping or storage and disposal of hazardous and nuclear wastes
into the country for whatever purpose. And to control, supervise and regulate
activities on toxic chemicals and hazardous waste.
Because they may cause damage during inadequate storage, transportation,
treatment, or disposal operations. Improper hazardous-waste storage or
disposal frequently contaminates surface water and groundwater supplies as
harmful water pollution and can also be a source of dangerous land pollution.
Republic Act No. 8749 This Act shall be known as the "Philippine
Clean Air Act of 1999."
Republic Act No. 8749, otherwise known as the Philippine Clean Air
Act 1999, is a comprehensive air quality management policy and
program which aims to achieve and maintain healthy air for all
Filipinos.
Most commonly violated: Violation of Standards for Motor Vehicles;
like Failure to comply or meet the emission standards set by the
authorized department.
The Philippine Clean Water Act of 2004 (Republic Act No.
9275) aims to protect the country’s water bodies from
pollution from land-based sources (industries and
commercial establishments, agriculture and
community/household activities). It provides for a
comprehensive and integrated strategy to prevent and
m i n i m i ze p o l l u t i o n t h ro u g h a m u l t i - s e c to ra l a n d
participatory approach involving all the stakeholders.
SEC. 27. Prohibited Acts. - The following acts are hereby prohibited:
Discharging or depositing any water pollutant to the water body, or such which
will impede natural flow in the water body
Discharging, injecting or allowing to enter into the soil, anything that would
pollute groundwater
Operating facilities that discharge regulated water pollutants without the valid
required permits
Disposal of potentially infectious medical waste into sea by vessels
Unauthorized transport or dumping into waters of sewage sludge or solid waste.
Transport, dumping or discharge of prohibited chemicals, substances or
pollutants listed under Toxic Chemicals, Hazardous and Nuclear
REPUBLIC ACT NO. 9003 This Act shall be known as the “Ecological Solid Waste
Management Act of 2000.”
RA 9003 declares the policy of the state in adopting a systematic,
comprehensive and ecological solid waste management program that ensures
the protection of public health and the environment and the proper
segregation, collection, transport, storage, treatment and disposal of solid
waste through the formulation and adoption of best environmental practices.
The law specifically punishes the following acts: (Section 48)
Illegal dumping and disposal of wastes: This includes littering, open burning of
solid waste, and dumping in flood prone areas.
Illegal dumpsites and waste disposal facilities: This includes establishing and
operating open dumps and construction and operation of a landfill near a
watershed
Presidential Decree No. 825 Providing penalty for improper disposal
of garbage and other forms of uncleanliness and for other purposes.
In fact, this law enjoins all citizens and residents of the Philippines,
educational institutions and commercial and industrial establishments
to clean their own surroundings, as well as the canals, roads or streets
in their immediate premises.
Section 2 prohibit of any person, who shall litter or throw garbage,
filth, or other waste matters in public places, such as roads, canals
esteros or parks, shall suffer an imprisonment of not less than 5 days
nor more than one year or a fine of not less than P100 nor more than
P2,000.00 or both such fine and imprisonment at the discretion of the
Court.
END OF PRESNTATION...