0% found this document useful (0 votes)
9 views112 pages

Introduction To Cybercrime and Environmental Laws and Protection

The document provides an overview of cybercrime, defining it as the use of computers for illegal activities such as fraud and identity theft. It discusses the history, types of cybercrime, and relevant laws like the Cybercrime Prevention Act of 2012 and the Anti-Child Pornography Act. Additionally, it outlines preventive measures individuals can take to protect themselves against cybercrime.

Uploaded by

dammangkinda416
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views112 pages

Introduction To Cybercrime and Environmental Laws and Protection

The document provides an overview of cybercrime, defining it as the use of computers for illegal activities such as fraud and identity theft. It discusses the history, types of cybercrime, and relevant laws like the Cybercrime Prevention Act of 2012 and the Anti-Child Pornography Act. Additionally, it outlines preventive measures individuals can take to protect themselves against cybercrime.

Uploaded by

dammangkinda416
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 112

INTRODUCTION TO

CYBERCRIME AND
ENVIRONMENTAL LAWS AND
PROTECTION
PREPARED BY: SHARRA MEI R. MAHINAY, RCRIM., CCS
Cybercrime, also called computer crime, the
use of a computer as an instrument to further
illegal ends, such as committing fraud,
trafficking in child pornography and intellectual
property, stealing identities, or violating
privacy. Cybercrime, especially through the
Internet, has grown in importance as the
computer has become central to commerce,
entertainment, and government
Cyberspace is just a richer version of the space where a
conversation takes place, somewhere between the 2 people
having the conversation. As a planet spanning network, the
web offers criminals multiple hiding places within the world
also as within the network itself. However, even as
individuals walking on the bottom leave marks that a
talented tracker can follow, cybercriminals leave clues on
their identity and site, despite their best efforts to hide their
tracks. so as to follow such clues across national boundaries,
though, international cybercrime treaties must be ratified.
Who is a Cyber criminal?
Cybercriminals are individuals or teams of people who use technology
to commit malicious activities on digital systems or networks with the
intention of stealing sensitive company information or personal data,
and generating profit. Cybercriminals are known to access the
cybercriminal underground markets found in the deep web to trade
malicious goods and services, such as hacking tools and stolen data.
Cybercriminal underground markets are known to specialize in certain
products or services. Laws related to cybercrime continue to evolve
across various countries worldwide. Law enforcement agencies are also
continually challenged when it comes to finding, arresting, charging,
and proving cybercrimes.
HISTORY AND NATURE OF CYBERCRIMES

When Did Cyber Crime Begin?


The malicious association with hacking became evident in the
1970s when early computerized phone systems became a
target. Technologically savvy individuals, called “phreakers,”
discovered the correct codes and tones that would result in
free long-distance service. They impersonated operators, dug
through Bell Telephone company garbage to find secret
information, and performed countless experiments on early
telephone hardware to learn how to exploit the system and
steal long-distance telephone time.
TYPES OF CYBERCRIME

1. Identity theft and invasion of privacy


Identity theft occurs when someone uses another
person's personal identifying information, like their
name, identifying number, or credit card number,
without their permission, to commit fraud or other
crimes. The term identity theft was coined in 1964.
2. Internet fraud
Identity fraud (also known as identity theft or crime)
involves someone using another individual's
personal information without consent, often to
obtain a benefit.
3. ATM fraud

ATM fraud is described as a fraudulent activity where


the criminal uses the ATM card of another person to
withdraw money instantly from that account. This is
done by using the PIN. The other type of ATM fraud is
stealing from the machine in the ATM by breaking in.
4. Wire fraud

Wire fraud is a type of fraud that involves the use of


some form of telecommunications or the internet.
These can include a phone call, a fax, an email, a
text, or social media messaging, among many other
forms. Wire fraud is punishable by prison and/or
fines.
5. File sharing and piracy
Illegal file sharing is similar to internet piracy in
terms of distributing illegal copies of certain files
and products to others in a network
6. Child pornography
Child pornography is pornography that
unlawfully exploits children for sexual
stimulation. It may be produced with the direct
involvement or sexual assault of a child or it may
be simulated child pornography.
6. Child pornography
Child pornography is pornography that
unlawfully exploits children for sexual
stimulation. It may be produced with the direct
involvement or sexual assault of a child or it may
be simulated child pornography.
REPUBLIC ACT No. 9775
AN ACT DEFINING THE CRIME OF CHILD
PORNOGRAPHY, PRESCRIBING
PENALTIES THEREFOR AND FOR
OTHER PURPOSES
Section 4. Unlawful or Prohibited Acts. – It shall be
unlawful for any person:
(a)To hire, employ, use, persuade, induce or
coerce a child to perform in the creation or
production of any form of child pornography;

(b) To produce, direct, manufacture or create any


form of child pornography;

(c) To publish offer, transmit, sell, distribute,


broadcast, advertise, promote, export or import
any form of child pornography;
(d) To possess any form of child pornography with the intent to sell,
distribute, publish, or broadcast: Provided. That possession of three
(3) or more articles of child pornography of the same form shall be
prima facie evidence of the intent to sell, distribute, publish or
broadcast;

(e) To knowingly, willfully and intentionally provide a venue for the


commission of prohibited acts as, but not limited to, dens, private
rooms, cubicles, cinemas, houses or in establishments purporting to
be a legitimate business;

(f) For film distributors, theaters and telecommunication companies,


by themselves or in cooperation with other entities, to distribute any
form of child pornography;
(g) For a parent, legal guardian or person having
custody or control of a child to knowingly permit
the child to engage, participate or assist in any
form of child pornography;

(h) To engage in the luring or grooming of a child;

(i) To engage in pandering of any form of child


pornography;

(j) To willfully access any form of child pornography;


(k) To conspire to commit any of the prohibited acts
stated in this section. Conspiracy to commit any
form of child pornography shall be committed
when two (2) or more persons come to an
agreement concerning the commission of any of
the said prohibited acts and decide to commit it;
and

(l) To possess any form of child pornography.


7. Hacking
Hacking is the gaining of unauthorized
access to data in a system or computer.
8.. Computer viruses
Virus is a piece of code which is capable of copying
itself and typically has a detrimental effect, such as
corrupting the system or destroying data.
Resident Virus
Resident viruses set up shop in your RAM and
meddle with your system operations. They’re so
sneaky that they can even attach themselves to
your anti-virus software files.
Browser Hijacker
Easily detected, this virus type infects your browser
and redirects you to malicious websites.
Web Scripting Virus
This sneaky virus disguises itself in the coding of
links, ads, images, videos, and site code. It can infect
systems when users download malicious files or visit
malicious websites.
9. Denial of service attacks.
A Denial-of-Service (DoS) attack is an attack meant to
shut down a machine or network, making it inaccessible
to its intended users. DoS attacks accomplish this by
flooding the target with traffic, or sending it
information that triggers a crash.
10. Phishing
The most common way email gets hacked are
through phishing schemes. Phishing is the most
widely used technique because it's simple, affordable,
and attacks the weakest link in any security system –
people.
Preventive measures against Cybercrimes

Causes of Cybercrime.
Cybercriminals always opt for an easy way to make big money.
They target rich people or rich organizations like banks, casinos,
and financial firms where a huge amount of money flows daily
and hack sensitive information. Catching such criminals is
difficult. Hence, that increases the number of cyber-crimes
across the globe. Computers are vulnerable, so laws are required
to protect and safeguard them against cybercriminals. We could
list the following reasons for the vulnerability of computers:
Easy to access – The problem behind safeguarding a computer
system from unauthorized access is that there are many
possibilities of breach due to the complex technology. Hackers
can steal access codes, retina images, advanced voice
recorders, etc. that can fool biometric systems easily and
bypass firewalls can be utilized to get past many security
systems.
Capacity to store data in comparatively small space –
The computer has the unique characteristic of storing
data in a very small space. This makes it a lot easier for
the people to steal data from any other storage and use
it for their own profit.
Complex – The computers run on operating systems
and these operating systems are programmed of
millions of codes. The human mind is imperfect, so
they can do mistakes at any stage. Cybercriminals
take advantage of these gaps.
Negligence – Negligence is one of the characteristics of
human conduct. So, there may be a possibility that
protecting the computer system we may make any
negligence which provides cyber-criminal access and
control over the computer system.
Loss of evidence – The data related to the crime can be
easily destroyed. So, Loss of evidence has become a very
common & obvious problem which paralyzes the system
behind the investigation of cyber-crime.
HOW TO PROTECT YOURSELF AGAINST CYBERCRIME

Anyone using the internet should exercise some


basic precautions. Here are the tips you can use to
help protect yourself against the range of
cybercrimes out there.
Use strong passwords

Don’t repeat your passwords on different sites, and change your


passwords regularly. Make them complex. That means using a
combination of at least 10 letters, numbers, and symbols.
A password management application can help you to keep your
passwords locked down.
Keep your software updated

This is especially important with your operating systems


and internet security software. Cybercriminals frequently
use known exploits, or flaws, in your software to gain
access to your system. Patching those exploits and flaws
can make it less likely that you’ll become a cybercrime
target.
Manage your social media settings

Keep your personal and private information locked


down. Social engineering cybercriminals can often get your
personal information with just a few data points, so the less
you share publicly, the better. For instance, if you post your
pet’s name or reveal your mother’s maiden name, you
might expose the answers to two common security
questions.
Strengthen your home network

It’s a good idea to start with a strong encryption password


as well as a virtual private network. A VPN will encrypt all
traffic leaving your devices until it arrives at its destination.
If cybercriminals do manage to hack your communication
line, they won’t intercept anything but encrypted data. It’s
a good idea to use a VPN whenever you a public Wi-Fi
network, whether it’s in a library, café, hotel, or airport.
RA 10175- The Cybercrime Prevention Act of 2012

The Cybercrime Prevention Act of 2012, officially recorded as


Republic Act no. 10175, is a law in the Philippines that was
approved on September 12, 2012. It aims to explain and
enumerate cybercrime offenses under sec. 5, RA 10175 and
duties of law enforcement agencies and rationalize incident
response, preservation and collection of evidence in related
cybercrime offenses.
SEC. 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under
this Act:

(a) Offenses against the confidentiality, integrity and


availability of computer data and systems:
(1) Illegal Access. – The access to the whole or any part of
a computer system without right.

(2) Illegal Interception. – The interception made by


technical means without right of any non-public
transmission of computer data to, from, or within a
computer system including electromagnetic emissions
from a computer system carrying such computer data.
(5) Misuse of Devices.
(i) The use, production, sale, procurement, importation,
distribution, or otherwise making available, without right,
of:
(aa) A device, including a computer program, designed or
adapted primarily for the purpose of committing any of
the offenses under this Act; or
(bb) A computer password, access code, or similar data
by which the whole or any part of a computer system is
capable of being accessed with intent that it be used for
the purpose of committing any of the offenses under this
Act.

(ii) The possession of an item referred to in


paragraphs 5(i)(aa) or (bb) above with intent to
use said devices for the purpose of committing
any of the offenses under this section.
(6) Cyber-squatting. – The acquisition of a domain
name over the internet in bad faith to profit,
mislead, destroy reputation, and deprive others from
registering the same, if such a domain name is:
(i) Similar, identical, or confusingly similar to an existing
trademark registered with the appropriate government
agency at the time of the domain name registration:
(ii) Identical or in any way similar with the name of a person
other than the registrant, in case of a personal name; and
(iii) Acquired without right or with intellectual property
interests in it.
(b) Computer-related Offenses:
(1) Computer-related Forgery. —
(i) The input, alteration, or deletion of any computer
data without right resulting in inauthentic data with the
intent that it be considered or acted upon for legal
purposes as if it were authentic, regardless whether or
not the data is directly readable and intelligible; or
(ii) The act of knowingly using computer
data which is the product of computer-
related forgery as defined herein, for the
purpose of perpetuating a fraudulent or
dishonest design.
(2) Computer-related Fraud. — The unauthorized input,
alteration, or deletion of computer data or program or
interference in the functioning of a computer system,
causing damage thereby with fraudulent intent: Provided,
That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
Republic Act No. 8792- AN ACT PROVIDING
FOR THE RECOGNITION AND USE OF
ELECTRONIC COMMERCIAL AND NON -
COMMERCIAL TRANSACTIONS AND
DOCUMENTS, PENALTIES FOR UNLAWFUL
USE THEREOF AND FOR OTHER PURPOSES
Prohibited acts

a) Hacking or cracking(higher form of hacking) which


refers to unauthorized access into or interference in a
computer system/server or information and communication
system; or any access in order to corrupt, alter, steal, or
destroy using a computer or other similar information and
communication devices, without the knowledge and consent of
the owner of the computer or information and communications
system, including the introduction of computer viruses and the
like.
 b)Piracy or the unauthorized copying, reproduction,
dissemination, distribution, importation, use, removal,
alteration, substitution, modification, storage, uploading,
downloading, communication, making available to the public,
or broadcasting of protected material, electronic signature or
copyrighted works including legally protected sound
recordings or phonograms or information material on
protected works, through the use of telecommunication
networks, such as, but not limited to, the internet, in a
manner that infringes intellectual property rights shall be
punished
(3) Computer-related Identity Theft. – The intentional
acquisition, use, misuse, transfer, possession, alteration or
deletion of identifying information belonging to another,
whether natural or juridical, without right: Provided, That
if no damage has yet been caused, the penalty imposable
shall be one (1) degree lower.
(c) Content-related Offenses:

(1) Cybersex. — The willful engagement, maintenance,


control, or operation, directly or indirectly, of any
lascivious exhibition of sexual organs or sexual activity,
with the aid of a computer system, for favor or
consideration.
(2) Child Pornography. — The unlawful or prohibited
acts defined and punishable by Republic Act No.
9775 or the Anti-Child Pornography Act of 2009,
committed through a computer system: Provided,
That the penalty to be imposed shall be (1) one
degree higher than that provided for in Republic Act
No. 9775.
(3) Unsolicited Commercial Communications. — The
transmission of commercial electronic communication
with the use of computer system which seek to advertise,
sell, or offer for sale products and services are prohibited
unless:
(i) There is prior affirmative consent from the recipient;
or
(ii) The primary intent of the communication is for
service and/or administrative announcements from the
sender to its existing users, subscribers or customers; or
(iii) The following conditions are present:
(aa) The commercial electronic communication contains a
simple, valid, and reliable way for the recipient to reject.
receipt of further commercial electronic messages (optout)
from the same source;
(bb) The commercial electronic communication does not
purposely disguise the source of the electronic message; and
(cc) The commercial electronic communication does not
purposely include misleading information in any part of the
message in order to induce the recipients to read the message.
(4) Libel. — The unlawful or prohibited acts of libel
as defined in Article 355 of the Revised Penal Code,
as amended, committed through a computer system
or any other similar means which may be devised in
the future.
SEC. 5. Other Offenses. — The following acts shall also
constitute an offense:
(a) Aiding or Abetting in the Commission of Cybercrime. – Any
person who willfully abets or aids in the commission of any of
the offenses enumerated in this Act shall be held liable.
(b) Attempt in the Commission of Cybercrime. — Any person
who willfully attempts to commit any of the offenses
enumerated in this Act shall be held liable. Moreover sec. 10 of
this act constitute the enforcement agency and its procedure:
SEC. 10. Law Enforcement Authorities. — The National
Bureau of Investigation (NBI) and the Philippine
National Police (PNP) shall be responsible for the
efficient and effective law enforcement of the
provisions of this Act. The NBI and the PNP shall
organize a cybercrime unit or center manned by special
investigators to exclusively handle cases involving
violations of this Act.
SEC. 11. Duties of Law Enforcement Authorities. — To ensure
that the technical nature of cybercrime and its prevention is
given focus and considering the procedures involved for
international cooperation, law enforcement authorities
specifically the computer or technology crime divisions or
units responsible for the investigation of cybercrimes are
required to submit timely and regular reports including pre-
operation, post-operation and investigation results and such
other documents as may be required to the Department of
Justice (DOJ) for review and monitoring.
SEC. 12. Real-Time Collection of Traffic Data. — Law
enforcement authorities, with due cause, shall be authorized
to collect or record by technical or electronic means traffic
data in real-time associated with specified communications
transmitted by means of a computer system
Traffic data refer only to the communication’s origin,
destination, route, time, date, size, duration, or type of
underlying service, but not content, nor identities.
All other data to be collected or seized or disclosed will
require a court warrant.
Service providers are required to cooperate and assist law
enforcement authorities in the collection or recording of the
above-stated information.
The court warrant required under this section shall only be
issued or granted upon written application and the
examination under oath or affirmation of the applicant and
the witnesses he may produce and the showing:
(1) that there are reasonable grounds to believe that any of
the crimes enumerated hereinabove has been committed, or
is being committed, or is about to be committed:
(2) that there are reasonable grounds to believe that
evidence that will be obtained is essential to the conviction
of any person for, or to the solution of, or to the prevention
of, any such crimes; and
(3) that there are no other means readily available for
obtaining such evidence
SEC. 13. Preservation of Computer Data. — The integrity
of traffic data and subscriber information relating to
communication services provided by a service provider
shall be preserved for a minimum period of six (6) months
from the date of the transaction.
SEC. 14. Disclosure of Computer Data. — Law enforcement
authorities, upon securing a court warrant, shall issue an
order requiring any person or service provider to disclose or
submit subscriber’s information, traffic data or relevant data
in his/its possession or control within seventy-two (72)
hours from receipt of the order in relation to a valid
complaint officially docketed and assigned for investigation
and the disclosure is necessary and relevant for the purpose
of investigation.
SEC. 15. Search, Seizure and Examination of Computer
Data. — Where a search and seizure warrant is properly
issued, the law enforcement authorities shall likewise have
the following powers and duties.
Within the time period specified in the warrant, to conduct
interception, as defined in this Act, and:
(a) To secure a computer system or a computer data storage
medium;
(b) To make and retain a copy of those computer data secured;
(c) To maintain the integrity of the relevant stored computer
data;
(d) To conduct forensic analysis or examination of the computer
data storage medium; and
(e) To render inaccessible or remove those computer data in the
accessed computer or computer and communications network.
Pursuant thereof, the law enforcement authorities may order
any person who has knowledge about the functioning of the
computer system and the measures to protect and preserve
the computer data therein to provide, as is reasonable, the
necessary information, to enable the undertaking of the
search, seizure and examination.
Law enforcement authorities may request for an extension of
time to complete the examination of the computer data
storage medium and to make a return thereon but in no case
for a period longer than thirty (30) days from date of approval
by the court.
SEC. 16. Custody of Computer Data. — All computer data,
including content and traffic data, examined under a proper
warrant shall, within forty-eight (48) hours after the expiration
of the period fixed therein, be deposited with the court in a
sealed package, and shall be accompanied by an affidavit of
the law enforcement authority executing it stating the dates
and times covered by the examination, and the law
enforcement authority who may access the deposit, among
other relevant data.
The law enforcement authority shall also certify that no
duplicates or copies of the whole or any part thereof have
been made, or if made, that all such duplicates or copies
are included in the package deposited with the court. The
package so deposited shall not be opened, or the
recordings replayed, or used in evidence, or then contents
revealed, except upon order of the court, which shall not be
granted except upon motion, with due notice and
opportunity to be heard to the person or persons whose
conversation or communications have been recorded.
SEC. 17. Destruction of Computer Data. — Upon expiration
of the periods as provided in Sections 13 and 15, service
providers and law enforcement authorities, as the case may
be, shall immediately and completely destroy the computer
data subject of a preservation and examination.
SEC. 18. Exclusionary Rule. — Any evidence
procured without a valid warrant or beyond the
authority of the same shall be inadmissible for any
proceeding before any court or tribunal.
SEC. 19. Restricting or Blocking Access to Computer Data.
— When a computer data is prima facie found to be in
violation of the provisions of this Act, the DOJ shall issue an
order to restrict or block access to such computer data.
The Anti-Photo and Video
Voyeurism Act of 2009(RA 9995)
Prohibited Acts
 The Anti-Photo and Video Voyeurism Act prohibits the
following acts:
1. Theunconsented taking of a photo or video of a person
or group of persons engaged in a sexual act or any
similar activity, or capturing an image of the private
area of a person, under circumstances in which the said
person has a reasonable expectation of privacy;
2. Thecopying or reproduction of such photo or video
recording of the sexual act;
Important Questions

1. What does the “private area of a person” include?


 The “private area of a person” includes naked or
undergarment-clad genitals, pubic area, buttocks, or
the female breast.
2.What does it mean to have a reasonable expectation
of privacy?
R.A. 9995 contemplates two situations where a
person can have a reasonable expectation of privacy:
1.When the person believes that one could undress
in privacy without being concerned that an image of
him or her is being taken; and,
2.When a reasonable person would believe that one’s
private area would not be visible regardless of
whether the person is in a public or private place.
Important Questions
3. Will one
be liable for the non-commercial copying or
reproduction of said photo or video?
 Yes. The mere copying or reproduction of said material
will make one liable under the law regardless of the
reason or whether one profits or not from such
act. Indeed, the mere showing of the material on one’s
cellphone would violate the law.
4.The persons in the photo knew and consented to the
video recording or taking of the photo; can I reproduce,
distribute, or broadcast it?
If the person or persons in the photo or video gave written
consent for the reproduction, distribution, or broadcasting
of said material, then one will not be held liable under the
Anti-Photo and Video Voyeurism Act. However, if the
person merely consented to the taking of the photo or the
video recording and did not give written consent for its
reproduction, distribution, and broadcasting, then anyone
committing the said acts shall be held liable under R.A.
9995.
3. The selling or distribution of such photo or video
recording;

4. The publication or broadcasting, whether in print or


broadcast media, or the showing of such sexual act or
any similar activity through VCD/DVD, the internet,
cellular phones, and other similar means or devices
without the written consent of the persons featured.[2]
 Prohibitions numbered 2, 3, and 4 will still apply even if the
person or persons featured in the photo or video
consented to the taking of the photo or recording of the
sexual act.
ENVIRONMENTAL LAWS AND CONTROL

Environmental Crime
Environmental crime is a highly profitable and rapidly
expanding area of international criminal activity. In the
Philippines, environmental crimes, such as illicit trafficking
in wildlife, illegal logging, and illegal, unregulated, and
unreported fishing, have broader impacts.
Green Criminology
Green criminology is a branch of criminology that involves
the study of harms and crimes against the environment
broadly conceived, including the study of environmental
law and policy, the study of corporate crimes against the
environment, and environmental justice from a
criminological perspective.
ENVIRONMENTAL LAWS IN THE PHILIPPINES
P.D. No. 705, Revised Forestry Code
CRIMINAL OFFENSES under PD 705
 Cutting, Gathering and/or Collecting Timber, or Other Forest
Products Without License
 Any person, who shall, without authority under a lease or
permit, graze or cause to graze livestock in forest lands,
grazing lands and alienable and disposable lands which have
not as yet been disposed of in accordance with the Public
Land Act;
 Any person who enters and occupies or possesses, or
makes kaingin for his own private use or for others, any
forest land or grazing land without authority under a
license agreement, lease, license or permit, or in any
manner destroys such forest land or grazing land or part
thereof, or causes any damage to the timber stand and
other products and forest growth found therein, or who
assists, aids or abets any other person to do so, or sets a
fire, or negligently permits a fire to be set in any forest
land or grazing land, or refuses to vacate the area when
ordered to do so
 Any person who, shall, without permit, occupy for any
length of time any portion of the national parks system or
shall, in any manner cut, destroy, damage or remove timber
or any species of vegetation or forest cover and other
natural resources found therein, or shall mutilate, deface or
destroy objects of natural beauty or of scenic value within
areas in the national parks system
P.D. NO. 856, SANITATION CODE

PROTECTION OF DRINKING WATER FROM CONTAMINATION

 Washing clothes or bathing within a radius of 25 meters


from any well or other source of drinking water is
prohibited.
 No artesians, deep or shallow well shall be constructed
within 25 meters from any source of pollution.
No radioactive sources or materials shall be
stored within a radius of 25 meters from any
well or source of drinking water unless the
radioactive source is adequately and safely
enclosed by proper shielding.
DISPOSAL OF DEAD PERSONS

 It shall be unlawful for any person to bury remains in


places other than those legally authorized
 A burial ground shall at least be 25 meters distant from
any dwelling house and no house shall be constructed
within the same distance from any burial ground.
 No burial ground shall be located within 50 meters from
either side of a river or within 50 meters from any source
of water supply.
 Compliance with burial requirements such as death
certificate, proper depth of graves, shipment of remains
abroad shall governed by Bureau of Quarantine
 Except when required by legal investigation or when
permitted by the local health authority, no unembalmed
remains shall remain unburied longer than 48 hours after
death
 When the cause of death is a dangerous communicable
disease, the remains shall be buried within 12 hours after
death. They shall not be taken to any place of public
assembly. Only the adult members of the family of the
deceased may be permitted to attend the funeral.
 In case of disinterment, it must comply with the following
requirements:
1. Permission to disinter remains of persons who died of non-
dangerous communicable diseases may be granted after a
burial period of three years
2. Permission to disinter remains of person who died of
dangerous communicable diseases may be granted after a
burial period of five years.
3. the remains shall be disinfected and places in a durable
and sealed container prior to their final disposal
• Funeral and Embalming Establishments are subject to
sanitary permit and licensing requirements
• Special Precautions for cadavers containing radioactive
isotopes
• Local Governments are required to reserve appropriate
tracts of land under their jurisdiction, for cemeteries
subject to approval of Regional Directors concerned
R.A. NO. 6969, TOXIC SUBSTANCES AND HAZARDOUS WASTE ACT

PROHIBITED ACTS

 Knowingly use a chemical substance or mixture which is


imported, manufactured, processed or distributed in
violation of this Act or implementing rules and regulations or
orders;
 Failure or refusal to submit reports, notices or other
information, access to records as required by this Act, or
permit inspection of establishment where chemicals are
manufactured, processed, stored or otherwise held
 Failure or refusal to comply with the pre-manufacture and
pre-importation requirements
 Cause, aid or facilitate, directly or indirectly, in the storage,
importation, or bringing into Philippine territory, including
its maritime economic zones, even in transit, either by
means of land, air or sea transportation or otherwise
keeping in storage any amount of hazardous and nuclear
wastes in any part of the Philippines.
R.A. NO. 9003, ECOLOGICAL SOLID WASTE MANAGEMENT ACT

PROHIBITED ACTS:

1. Littering, throwing, dumping of waste matters in public places,


such as roads, sidewalks, canals, esteros or parks, and
establishment, or causing or permitting the same;
2. Undertaking activities or operating, collecting or transporting
equipment in violation of sanitation operation and other
requirements or permits set forth in established pursuant;
3. The open burning of solid waste;
4. Causing or permitting the collection of non-segregated
or unsorted wastes;
5. Squatting in open dumps and landfills;
6. Open dumping, burying of biodegradable or non-
biodegradable materials in flood prone areas;
7. Unauthorized removal of recyclable material intended
for collection by authorized persons;
8. The mixing of source-separated recyclable material with
other solid waste in any vehicle, box, container or receptacle
used in solid waste collection or disposal;
9. Establishment or operation of open dumps as enjoined in
this Act, or closure of said dumps in violation of Sec. 37;
10. The manufacture, distribution or use of non-
environmentally acceptable packaging materials;
11. Importation of consumer products packaged in non-
environmentally acceptable materials;
12. Importation of toxic wastes misrepresented as “recyclable”
or “with recyclable content”;
13. Transport and dumplog in bulk of collected domestic,
industrial, commercial, and institutional wastes in areas other
than centers or facilities prescribe under this Act;
14. Site preparation, construction, expansion or operation of
waste management facilities without an Environmental
Compliance Certificate required pursuant to Presidential
DecreeNo. 1586 and this Act and not conforming with the land
use plan of the LGU;
The construction of any establishment within two
15.
hundred (200) meters from open dumps or controlled
dumps, or sanitary landfill; and
16.The construction or operation of landfills or any
waste disposal facility on any aquifer, groundwater
reservoir, or watershed area and or any portions thereof
R.A. NO. 9147, WILDLIFE CONSERVATION AND PROTECTION
ACT

Illegal Acts. - Unless otherwise allowed in accordance with this


Act, it shall be unlawful for any person to willfully and
knowingly exploit wildlife resources and their habitats, or
undertake the following acts;
1. Collecting, hunting or possessing wildlife, their by-products
and derivatives;
2. Gathering or destroying of active nests, nest trees, host
plants and the like;
3. Maltreating and/or inflicting other injuries not covered by
the preceding paragraph; and
4. Transporting of wildlife.
PHILIPPINE EAGLE
BRAHMINY
KITE
DUGONG
TARSIER
TODAY GECKO
KALASIB
BLIND SNAKE
PHILIPPINE PIT VIPER
STAGHORN
FERN
WALING-WALING
ALOCASIA
SLIPPER ORCHIDS
The Philippine clean air act
(Republic Act No. 8749)

The Philippine Clean Water Act of


2004 (Republic Act No. 9275)
END OF LECTURE.
Thank You for Listening!

You might also like