CHAPTER TWO: CYBERCRIME
Polymophic virus
Changes its code each time an infected file is executed. It does this to evade antivirus programs.
Also known as Child Pornography.
Child Sexual Exploitation
Computer-related Forgery
The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible
Cyber Enabled Crimes
Traditional crimes which can be increased in scale or reach by the use of computers, computer networks or other forms of ICT.
Macro Virus
Written in the same macro language used for software applications. Such viruses spread when you open an infected document, often through email attachments
Computer Virus
is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another.
Hacking
refers to the unauthorized access into or interference in a computer system/server, or information and communication system.
Piracy
refers to the unauthorized copying, reproduction, dissemination, distribution, importation, use, removal, alteration, substitution, modification, storage, uploading, but not limited to, the internet, in a manner that infringes intellectual property rights
Cyber-assisted crime
Are crimes in which the use of computers is an incidental aspect of the commission of the crime but may afford evidence of the crimes.
Skimming
Copying or counterfeiting any credit card, payment card or debit card, and obtaining any information therein with the intent of accessing the account and operating the same whether or not cash is withdrawn or monetary injury is caused by a perpetrator against the account holder or the depositary bank.
RA 10175
Cybercrime Prevention Act of 2012 September 12, 2012
DICTM
Directorate for Information and Communications Technology Management
The Republic Act No. 8792 also known as
Electronic Commerce Act
ICT
Information and Communications Technology
Libel
Is public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or circumstance tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead.
Child Trafficking
It is the act of trading and dealing with children including, but not limited to, the act of buying and selling of a child for money, or for any other consideration, or barter.
Unauthorized Disclosure
It pertains to any personal information controller or personal information processor or any of its officials, employees or agents, who discloses to a third party personal information not covered by the immediately preceding section without the consent of the data subject.
ICT
It refers to the totality of the electronic means employed to systematically collect, process, store, present and share information to end-users in support of their activities
Information and Communication System
Refers to a system for generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents and includes the computer system or other similar device by or in which data is recorded or stored and any procedures related to the recording or storage of electronic data message or electronic document.
Card Skimming
Refers to a type of fraud which involves illegal copying of information from the magnetic stripe of a payment card to gain access to customer accounts.
Access Device Fraudulently Applied
Refers to any access device that was applied for or issued on account of the use of falsified documents, false information, fictitious identities and addresses, or any form of false pretense or misrepresentation.
Access Device
Refers to any card, plate, code, account number, electronic serial number, personal identification number, or other telecommunications service, equipment, or instrumental identifier, or other means of account access that can be used to obtain money, good, services, or any other thing of value or to initiate a transfer of funds.
Computer System
Refers to any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data
Computer Data
Refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable to cause a computer system to perform a function and includes electronic documents and/or electronic data messages whether stored in local computer systems or online (RA 10175, 2012, Section 3
Photo or video voyeurism
Refers to the act of taking photo or video coverage of a person or group of persons performing sexual act or any similar activity or of capturing an image of the private area of a person or persons without the latter's consent.
Access
Refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system or communication network (RA 10175, 2012, Section 3).
Alteration
Refers to the modification or change, in form or substance, of an existing computer data or program.
Cybercrime
Refers to the use of a computer as an instrument to further illegal ends.
Hacking or cracking
Refers to unauthorized access into or interference in a computer system/server or information and communication system.
System Interference
The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority.
Misuse of Device
The use, production, sale, procurement, importation, distribution, or otherwise making available, without right.
Cyber Dependent Crimes
These are crimes that can only be committed through computers, computer networks, or other forms of ICT
Cyber-Trespass
These crimes involve crossing or violating the boundaries of other people digitally. For example, hacking data without consent.
File Infector Virus
This common virus inserts malicious code into executable files or files used to perform certain functions or operation on a system.
Cyber Deception and Theft
This involves offenses such as online fraud and IP theft.
Cyber Porn and Obscenity
This involves the exploitation of children and distribution of porn materials through the internet.
Resident Virus
This is a general term for any virus that inserts itself in a computer system's memory.
Computer-related Identity Theft
This is the intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right.
Multipartite Virus
This kind of virus infects and spreads in multiple ways. It can infect both program files and system sector.
Malicious Disclosure
This refers to any personal information controller or personal information processor or any of its officials, employees or agents, who, with malice or in bad faith, discloses unwarranted or false information relative to any personal information or personal sensitive information obtained by him or her.
Child Sexual Exploitation
This refers to any representation, whether visual, audio, or written combination thereof, by electronic, mechanical, digital, optical, magnetic or any other means, of child engaged or involved in real or simulated explicit sexual activities.
Illegal Access
This refers to the access to the whole or any part of a computer system without right (RA 10175, 2012, Section 4).
Cybersquatting
This refers to the acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same.
Obscene Publications and Indecent Shows
This refers to the acts of hiring, employing, using, persuading, inducing or coercing a child to perform in obscene exhibitions and indecent shows, whether live or in video, or model in obscene publications or pornographic materials or to sell or distribute the said materials.
Data Interference
This refers to the intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses (RA 10175, 2012, Section 4).
Illegal Interception
This refers to the interception made by technical means without the right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data (RA 10175, 2012, Section 4).
Cyber-Violence
This refers to the kind of emotional violence that can be enacted online such as bullying or harassment
Unsolicited Commercial Communication
This refers to the transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services
Computer-related Fraud
This refers to the unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
Cybersex
This refers to the willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
Browser Hijacker
This type of virus "hijacks" certain web browser functions, and you may be automatically directed to an unintended website.
Boot Sector Virus
This type of virus can take control when you start -or boot- your computer. One way it can spread is by plugging an infected USB drive into your computer.
Direct Action Virus
This type of virus comes into action when you execute a file containing a virus. Otherwise, it remains dormant.
Web Scripting Virus
This type of virus exploits the code of web browsers and web pages. If you access such a web page, the virus can infect your computer.