0% found this document useful (0 votes)
33 views2 pages

10.7 Font Size

Uploaded by

andrewjayterrayo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views2 pages

10.7 Font Size

Uploaded by

andrewjayterrayo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Staying safe online is crucial as it protects

individuals from a variety of threats, including


“Success begins outside
cyberbullying and identity theft.
your comfort zone. Believe
1. Understanding online safety helps individuals
recognize the serious consequences of sharing personal
in yourself and never give
information,
impersonation.
which can lead to harassment or
up. ' 'Make each day count,
2. Protecting personal data by using privacy settings live with purpose. ' 'Stay RESEARCH DEVELOPMENT AND
EXTENSION UNIT
and strong passwords is essential to prevent
unauthorized
information.
access to accounts and sensitive curious. Kindness is always
3. Being aware of and avoiding online threats, such as in style. ' 'Strive for progress, Republic of the Philippines
phishing scams and malware, is vital for maintaining San Jose,Occidental Mindoro
internet security and safeguarding personal not perfection. Dream big, OCCIDENTAL MINDORO STATE COLLEGE
information.
Research Development and Extension Unit
work hard, achieve
greatness. Live your life,
4. Utilizing safety tools like multi-factor
authentication and regularly updating software enhances
security measures against cybercriminals.
not someone else's.”
5. Educational initiatives that promote online safety
empower users, especially children, to navigate the
internet safely and responsibly. Refference:
ATTPS://IHT-
6. Fostering a culture of awareness and proactive DATABASES.ICRC.ORG/EN/NATIONALPR
behavior contributes to a collective effort in making ACTICE/IMPLEME
the internet a safer place for everyone. ATING -RULES-ANDREGULATIONS-
CYBERCRIM E-
Success begins outside your comfort zone. ' 'Believe in
yourself and never give up. ' 'Make each day count, live
PREVENTION-ACT-201 5
with purpose. ' 'Stay curious. ' 'Kindness is always in HTTPS:
style. ' 'Strive for progress, not perfection. ' 'Dream W/hAWPHIL.NET/STATUTES/CE
big, work hard, achieve greatness. ' 'Live your life, YAETS/TA20(2/TA_(0(95_200
not someone else's. '
2.HTML

GROUP 7:
TULAYLAY, DONNALYN
REJOTO, KLAUDETTE
NAVAL, DAVE
JAWAY, NOEL
REPUBLIC
ACT NO. 10175
CHAPTER I PRELINILARY PROVISIONS THAT THE ACT COMMITTED FALLS WITHIN THE SCOPE OF SECTION 11. DUTIES OF LAW ENFORCEMENT AUTHORITIES.
SECTION I. TITLE. THIS ACT SHALL BE KNOWN AS THE SUCH AUTHORITY:OR (C) AN AUTHORITY TO EXERCISE TO ENSURE THAT THE TECHNICAL NATURE OF CYBERCRIME
CONTROL WITHIN THE JURIDICAL· PERSON, THE JURIDICAL AND ITS PREVENTION IS GIVEN FOCUS AND CONSIDERING
"CYBERCRIME PREVENNON ACT OF 2012" SECTION 2.
THE PROCEDURES INVOLVED FOR INTERNATIONAL
DECLARATION OF POLICR THE STATE RECOGNIZES THE PERSON SHALL BE HELD LIABLE FOR A FINE EQUIVALENT
COOPERATION, LAW ENFORCEMENT AUTHORITIES
VITAL ROLE OF INFORMATION AND COMMUNICATIONS TO AT LEAST DOUBLE THE FINES IMPOSABLE IN SECTION 7
SPECIFICALLY THE COMPUTER OR TECHNOLOGY CRIME
INDUSTRIES SUCH AS CONTENT PRODUCTION, UP TO A MAXIMUM OF TEN MILLION PESOS DIVISIONS OR UNITS RESPONSIBLE FOR THE INVESTIGATION
TELECOMMUNICATIONS. BROADCASTING ELECTRONIC (PHP10.000.000.00). OF CYBERCRIMES ARE REQUIRED TO SUBMIT TIMELY AND
COMMERCE. AND DATA PR OCESSING, IN THE NATION'S REGULAR REPORTS INCLUDING PRE-OPERATION, POST-
OVERALL SOCIAL AND ECONOMIC DEVELOPMENT. OPERATION AND INVESTIGATION RESULTS AND SUCH OTHER
DOCUMENTS AS MAY BE REQUIRED TO THE DEPARTMENT OF
JUSTICE (DOJ FOR REVIEW AND MONITORING

CHAPTER II PUNISHABLE ACTS


SECTION 6. ALL CRIMES DEFINED AND PE REVISED
PENAL CODE,AS AMENDED. AND COMMITTED BY, THROUGH SECTION 12. REAL-TIME COLLECTION OF TRAFFIC DATA. -
AND WITH NALIZED BY THE SPECIAL LAWS. IF THE USE LAW ENFORCEMENT AUTHORITIES. WITH DUE CAUSE. SHALL
BE AUTHORIZED TO COLLECT OR RECORD BY TECHNICAL OR
OF INFORMATION AND COMMUNICATIONS TECHNOLOGIES
ELECTRONIC MEANS TRAFFIC DATA IN REAL-TIME
SHALL BE COVERED BY THE RELEVANT PROVISIONS OF
ASSOCIATED WITH SPECIFIED COMMUNICATIONS
THIS ACT: PROVIDED. THAT THE PENALTY YO BE TRANSMITTED BY MEANS OF A COMPUTER SYSTEM
IMPOSED SHALL BE ONE (1) DEGREE HIGHER THAN THAT
PROVIDED FOR BY THE REVISED PENAL CODE, AS
AMENDED. AND SPECIAL LAWS. AS THE CASE MAY BE
SECTION 7. LIABILITY UNDER OTHER LA SECTION 13. PRESERVATION OF COMPUTER DATA. - THE
A'PROSECUTION UNDER THIS ACT SHALL BE WITHOUT INTEGRITY OF TRAFFIC DATA AND SUBSCRIBER
PREJUDICE TO ANY LIABILITY POR VIOLATION OF ANY INFORMATION RELATING TO COMMUNICATION SERVICES
PROVISION OF THE REVISED PENAL CODE. AS PROVIDED BY A SERVICE PROVIDER SHALL BE PRESERVED
AMENDED.OR SPECIAL LAWS FOR A MINIMUM PERIOD OF SIX (6) MONTHS FROM THE DATE
OF THE TRANSACTION. CONTENT DATA SHALL BE SIMILARLY
PRESERVED FOR SIX (6) MONTHS FROM THE DATE OF RECEIPT
CHAPTER III PENALTIES OF THE ORDER FROM LAW ENFORCEMENT AUTHORITIES
REQUIRING ITS PRESERVATION
SECTION 8. PENALTIES.- ANY PERSON FOUND GUILTY OF
ANY OF THE PUNISHABLE ACTS ENUMERATED IN SECTIONS
4(A) AND 4(B) OF THIS ACT SHALL BE PUNISHED WITH
IMPRISONMENT OF PRISON MAYOR OR A FINE OF AT LEAST SECTION 14. DISCLOSURE OF COMPUTER DATA. - LAW
ENFORCEMENT AUTHORITIES, UPON SECURING A COURT
TWO HUNDRED THOUSAND PESOS PHP200.000.00) UP TO A
WARRANT, SHALL ISSUE AN ORDER REQUIRING ANY
MAXIMUM AMOUNT COMMENSURATE TO THE DAMAGE INCURRED CHAPTER IV ENFORCEMENT AND PERSON OR SER VICE PROVIDER TO DISCLOSE OR SUBMIT
OR BOTH.SECTION 9. CORPORATE LIABILITY.- WHEN ANY SUBSCRIBER'S INFORMATION, TRAFFIC DATA OR
OF THE PUNISHABLE ACTS HEREIN DEFINED ARE IMPLEMENTATION RELEVANT DATA IN HIS/ITS POSSESSION OR CONTROL
KNOWINGLY COMMITTED ON BEHALF OF OR FOR THE WITHIN SEVENTY-TWO (72) HOURS FROM RECEIPT OF THE
BENEFIT OF A JURIDICAL PERSON BY A NATURAL PERSON SECTION 10. LAW ENFORCEMENT AUTHORITIES. - THE ORDER IN RELATION TO A VALID COMPLAINT
ACTING EITHER INDIVIDUALLY OR AS PART OF AN ORGAN NATIONAL BUREAU OF INVESTIGATION (NBI) AND THE OFFICIALLY DOCKETED AND ASSIGNED FOR
OF THE JURIDICAL PERSON. WHO HAS A LEADING PHILIPPINE NATIONAL POLICE (PNP) SHALL BE RESPONSIBLE INVESTIGATION AND THE DISCLOSURE IS NECESSARY
AND RELEVANT FOR THE PURPOSE OF INVESTIGATION.
POSITION WITHIN, BASED ON:(A)A POWER OF FOR THE EFFICIENT AND EFFECTIVE LAW ENFORCEMENT OF
SECTION 15. SEARCH, SEIZURE AND EXAMINATION OF
REPRESENTATION OF THE JURIDICAL PERSON PROVIDED THE PROviSIONS OF ThiS ACt. the NBI AND THE PNP SHALL COMPUTER DATA. - WHeRE A SEARCH AND SEIZURE
THE ACT COMMITTED FALLS WITHIN THE SCOPE OF SUCH ORGANIZE A CYBERCRIME UNIT OR CENTER MANNED BY WARRANT IS PROPERLY ISSUED. THE LAW
AUTHORITY: (B) AN AUTHORITY TO TAKE DECISIONS ON SPECIAL INVESTIGATORS TO EXCLUSIVELY HANDLE CASES ENFORCEMENT AUTHORITIES SHALL LIKEWISE HAVE
BEHALF OF THE JURIDICAL PERSON: PROVIDED. INVOLVING VIOLATIONS OF THIS ACT THE FOLLOWING POWERS AND DUTIES

You might also like