Digital Laws
Digital Laws
Ethics in
Business
Computer and Internet Cyber Crimes
1. Phishing
Phishing is when criminals send fraudulent emails pretending to be
from legitimate businesses, in an attempt to collect sensitive,
personal information. Often, any links in the email will redirect to a
website owned by the scammer, so always be careful about what
information you give out on the Internet.
2. Harassment
Cyberstalkers use electronic communication, such as email, social
media, or websites to stalk and harass people. Forms of online
harassment include slander, libel, false accusations, threats, or any
other behavior that demeans or embarrasses someone. Sentences
for cyberstalking can include jail time and hefty fines.
3. Ransomware
Cyber criminals can install malicious software on your system that will
essentially hold your important information hostage until you meet their
demands. A common ransomware attack will shut down a victim’s
computer or encrypt their files, agreeing to release them only if the
victim pays a ransom. All too often, however, the files are never
recovered.
4. Prostitution
Many escorts will advertise their services in online classifieds, social
media forums, or their own personal websites, making it easy and
discreet for people to find them. But since prostitution is illegal in the
vast majority of the United States, both the escort and the client are
committing a crime.
5. Child Pornography & Solicitation
The National Center for Missing and Exploited Children received over 10
million reports of suspected child sexual exploitation in the last year
alone. Perpetrators will use the Internet to gain access to sexually
explicit images of children, and sometimes even arrange for a face-to-
face meeting.
6. Intellectual Property Theft
More commonly known as piracy, the Internet abounds with
books, music, movies, and more that have been illegally obtained
and made available for free download. Despite what some people
say, piracy is not a victimless crime. Not only do artists and
creators lose out, but many illegal downloads also contain
hidden malware that can destroy your computer.
7. Account Hacking
We all know how important it is to guard our passwords – think
about the damage someone could do if they gained access to
your email account containing all your most personal
information. If someone logs into your email, social media, or
computer without authorization, they could potentially face jail
time.
8. Drug Trafficking
With the rise of cryptocurrency, the online drug trade has
increased significantly over the past few years. Illegal drugs such as
marijuana, cocaine, meth, ecstasy, and heroin are all just a few
clicks away – and according to research by the Rand Corporation,
over 35% of worldwide revenues from online drug trafficking are
based in the United States.
Illegal Access:
Access to a computer or any application without permission.
Illegal Interception:
Interception of any non-public communication of computer data to,
from, or within a computer system by an unauthorised person.
Data Interference:
Unauthorized tampering with, destroying, deleting, or deteriorating
computer data, electronic documents, or electronic data messages, as
well as the introduction or transmission of viruses. This provision can
also cover authorised activity if the person’s behaviour went beyond the
agreed-upon scope and resulted in the damages listed in this provision.
System Interference:
Unauthorized interference with the operation of a computer or
computer network, including the introduction or transmission of
viruses, by inputting, transmitting, damaging, deleting, deteriorating,
altering, or suppressing computer data or programmes, electronic
data messages, or by deleting, deteriorating, altering, or suppressing
them. This provision can also cover authorised activity if the person’s
behaviour went beyond the agreed-upon scope and resulted in the
damages listed in this provision.
Misuse of devices:
Unauthorized use, possession, production, sale, procurement,
importation, distribution, or otherwise making available of gadgets,
computer programmes, or other materials developed or adapted for
committing any of the acts listed in Republic Act 10175.
Unauthorized use of a computer password, access code, or similar
data that allows the entire or a portion of a computer system to be
accessed with the intent of using it to perpetrate any of the offences
listed in Republic Act 10175.
Cybersquatting:
Acquisition of a domain name in bad faith on the internet to profit,
deceive, harm reputation, and prevent others from registering it. This
includes trademarks that were already registered at the time of
registration, names of people other than the registrant, and trademarks
that were purchased with intellectual property interests in them. Those
who get domain names of prominent brands and individuals who in turn
are used to damage their reputation can be sued under this provision.
Note that freedom of expression and infringement on trademarks or
names of persons are usually treated separately. A party can exercise
freedom of expression without necessarily violating the trademarks of a
brand or the names of persons.
Cybersex:
For favour or consideration, willful engagement, maintenance, control, or
operation, directly or indirectly, of any lascivious presentation of sexual
organs or sexual activity via a computer system.
Child Pornography:
Unlawful or banned activities conducted through a computer system, as
defined and punished by Republic Act No. 9775 or the Anti-Child
Pornography Act of 2009.
Libel:
Acts of libel that are illegal or forbidden under Article 355 of the Revised
Penal Code, as amended, and are committed using a computer system or
any other similar means that may be created in the future. Penal Code
Revision According to Article 355 Libel is defined as defamation of
character by writings or other means. Libel committed by writing,
printing, lithography, engraving, radio, phonograph, painting, theatrical
exhibition, cinematographic exhibition, or any other similar means is
punishable by prison correctional for the minimum and medium periods,
or a fine ranging from 200 to 6,000 pesos, or both, in addition to any civil
action that the offended party may bring.
Corporate Liability:
(Section 9): When any of the punishable acts herein defined are knowingly
committed on behalf of or for the benefit of a juridical person by a natural
person acting either individually or as part of an organ of the juridical
person who has a leading position within, based on: (a) a power of
representation of the juridical person provided the act committed falls
within the scope of such authority; or (b) an authority to make decisions
on behalf of the juridical person. It also includes the commission of any of
the penal acts made possible due to the lack of supervision, provided that
the act committed falls within the scope of such authority; or(c) an
authority to exercise control inside the juridical person.
Intellectual Property Law
Intellectual Property law deals with laws to protect and enforce rights
of the creators and owners of inventions, writing, music, designs and
other works, known as the "intellectual property."
Patent Law grants protection for new inventions which can be products,
processes or designs and provides a mechanism for protection of the
invention.The patent law promotes the sharing of new developments with
others to foster innovation. The patent owner has the right to protect others
from producing, using, distributing or importing the protected item.
Essentially the patent is a property right that can be licensed, sold,
mortgaged or assigned.
Trade Secrets are business practices, formulas, designs or
processes used in a business, designed specifically to provide a
competitive advantage to a business. These trade secrets would not
be otherwise known to an “outsider” of the business. An example
of this is the formula for Coca Cola. Trade secrets are protected
without registration and appropriate steps should be taken by the
owner to maintain confidentiality.
Social Networking
Social Networking refers to the use of internet-based social
media sites to stay connected with friends, family, colleagues, or
customers. Social networking can have a social purpose, a business
purpose, or both, through sites like Facebook, Twitter, Instagram, and
Pinterest.
Instagram
Instagram is a social network that focuses on sharing visual media like
photos and videos. It's similar to Facebook in that users create a profile
and have a news feed. It allows users to upload media that can be edited
with filters and organized by hashtags and geographical tagging. Posts
can be shared publicly or with followers.
Twitter
Twitter is a social network that allows people to communicate with
short messages called tweets. Tweets are limited by the social
platform to 280 characters. Users post tweets that may be useful,
interesting, or even inflammatory for readers.
Pinterest
Pinterest is a social networking site that promotes image saving
and sharing using a virtual pinboard. It's an innovative platform
that facilitates the cataloguing and organizing of meaningful
information for individuals.