CYBERCRIMES
OBJECTIVES
❖ Define Cybercrimes – Explain what cybercrimes are and how they impact
individuals, businesses, and society.
❖ Identify Common Cybercrimes – Describe different types of cybercrimes,
including hacking, identity theft, cyberbullying, and online fraud.
❖ Explain Legal Frameworks – Discuss laws such as Republic Act No. 10175
(Cybercrime Prevention Act of 2012) and Republic Act No. 10173 (Data Privacy
Act of 2012) that address cybercrimes.
❖ Highlight the Consequences – Explore the legal, financial, and personal
consequences of engaging in or being a victim of cybercrimes.
CONTENTS
What is Cyber?
Cybercrime
Cybercriminals
Republic Act No. 10175 – Cybercrime Prevention Act of 2012
Republic Act No. 10173 – Data Privacy Act of 2012
Common Forms of Cybercrimes
a. Copyright
b. Plagiarism
c. Computer Addiction
Criminal Activities
a. Hacking
b. Computer-related forgery, fraud, and/or identity theft
c. Electronic theft
d. Cyberbullying
e. Cybers (this seems incomplete or incorrect)
f. Child Pornography
g. Cyber Defamation
WHAT IS
CYBER?
CYBERCRIME
•
•
CYBERCRIMINALS
•
•
CYBERCRIME
POLICIES
REPUBLIC ACT NO.
10175: CYBERCRIME
PREVENTION ACT OF
2012.
REPUBLIC ACT NO. 10175: CYBERCRIME
PREVENTION ACT OF 2012.
1. Cybercrime Offenses
• Illegal Access – Unauthorized access to a computer system or
network.
• Illegal Interception – Interception of non-public data transmissions.
• Data Interference – Unauthorized alteration, damage, or deletion of
data.
• System Interference – Hindering or disrupting the functioning of a
computer system.
• Misuse of Devices – Possession or distribution of devices intended
for committing cybercrimes.
REPUBLIC ACT NO. 10175: CYBERCRIME
PREVENTION ACT OF 2012.
2. Content-Related Offenses
• Cybersex – Engaging in sexually explicit acts using a computer
system for profit.
• Child Pornography – Creating, distributing, or accessing child sexual
abuse materials through online platforms.
• Unsolicited Commercial Communications (Spam) – Sending
unwanted bulk electronic messages without consent.
• Libel – Online defamation using digital platforms.
REPUBLIC ACT NO. 10175: CYBERCRIME
PREVENTION ACT OF 2012.
3. Computer-Related Offenses
• Computer-Related Forgery – Unauthorized input, alteration, or
deletion of computer data to appear authentic.
• Computer-Related Fraud – Fraudulent manipulation of computer
systems for financial gain.
• Identity Theft – The use of another person’s identity for malicious
purposes.
REPUBLIC ACT NO. 10173:
DATA PRIVACY ACT OF
2012
REPUBLIC ACT NO. 10173: DATA
PRIVACY ACT OF 2012
Rights of Data Subjects
• Right to be Informed – Individuals must be informed before their personal data is
collected.
• Right to Access – Individuals can request access to their personal data.
• Right to Rectification – Individuals can correct incorrect or outdated information.
• Right to Erasure or Blocking – Individuals can request the deletion or blocking of
personal data if it is unlawfully obtained.
• Right to Object – Individuals can refuse data processing, especially for marketing
purposes.
• Right to Data Portability – Individuals can obtain and reuse their personal data for
their own purposes.
REPUBLIC ACT NO. 10173: DATA
PRIVACY ACT OF 2012
• Unauthorized Processing of Personal Data – 1 to 3 years imprisonment and a
fine of Php 500,000 to Php 2,000,000.
• Processing Personal Data for Unauthorized Purposes – 1.5 to 5 years
imprisonment and a fine of Php 500,000 to Php 2,000,000.
• Unauthorized Disclosure of Personal Information – 1.5 to 5 years
imprisonment and a fine of Php 500,000 to Php 1,000,000.
• Malicious Disclosure – 3 to 6 years imprisonment and a fine of Php 500,000 to
Php 1,000,000.
• Failure to Implement Data Security Measures – 6 months to 3 years
imprisonment and a fine of Php 500,000 to Php 1,000,000.
REPUBLIC ACT NO. 10173: DATA
PRIVACY ACT OF 2012
.
COMMON
FORMS OF
CYBERCRIMES
COPYRIGHT
COPYRIGHT INFRINGEMENT
The violation, piracy, or theft of a
copyright holder’s exclusive rights through
the unauthorized use of a copyrighted
material or work.
Example: A student downloads a PDF copy of a
bestselling textbook from an unauthorized website
and shares it with their classmates through social
media.
Why is this Copyright Infringement?
➢ Downloading and sharing copyrighted material
without permission violates the intellectual
property rights of the author.
PLAGIARISM
•
•
PLAGIARISM
1. Direct Copying (Verbatim Plagiarism) - A student copies and pastes entire
paragraphs from a research paper into their own assignment without citing
the source.
2. Paraphrasing Without Credit - A student rewrites information from a book or
article in their own words but fails to credit the original author.
3. Self-Plagiarism - Submitting the same paper for multiple subjects without
permission from the instructors.
4. Mosaic Plagiarism (Patchwriting) - Taking phrases or sentences from
multiple sources, slightly modifying them, and combining them into a new
work without proper citations.
COMPUTER
ADDICTION
❖
❖
VIRTUAL SELF
The "persona" you create about
yourself virtually. People become
obsessed with their virtual self,
constantly updating social media,
curating their image, and seeking
validation through likes and
comments. Gamers can become
addicted to living through their
avatars, preferring the virtual world
over reality (e.g., MMORPGs,
metaverse experiences).
CRIMINAL ACTIVITIES
COMPUTER-RELATED FORGERY,
FRAUD, AND/OR IDENTITY THEFT
•
➢ Maximum of Php 200,000 fine
or prison mayor
COMPUTER-RELATED FORGERY,
FRAUD, AND/OR IDENTITY THEFT
I PHISHING I
COMPUTER-RELATED FORGERY,
FRAUD, AND/OR IDENTITY THEFT
Common Phishing Methods:
• Fake Emails: Attackers send emails that look like they are
from a legitimate company, asking you to click on a link
and enter your details.
• Fake Websites: Scammers create websites that mimic real
ones to steal login credentials.
• Text Messages & Calls: Phishing can also happen through
SMS (smishing) or phone calls (vishing).
COMPUTER-RELATED FORGERY,
FRAUD, AND/OR IDENTITY THEFT
I PHARMING I
Pharming is a type of cyber attack where hackers redirect
users from legitimate websites to fake, malicious ones
without their knowledge. Unlike phishing, which relies on
tricking users into clicking on fraudulent links, pharming
manipulates the website’s DNS (Domain Name System)
or the user’s device to automatically redirect them to
fake websites, even if they type the correct web address.
COMPUTER-RELATED FORGERY,
FRAUD, AND/OR IDENTITY THEFT
How Pharming Works:
1. DNS Poisoning: Hackers alter the DNS settings, so when
you enter a trusted website’s address (e.g.,
www.bank.com), you are secretly redirected to a fake
website.
2. Malware Infection: A virus or malware on your
computer can change your settings, sending you to
fraudulent sites without you realizing it.
COMPUTER-RELATED FORGERY,
FRAUD, AND/OR IDENTITY THEFT
I SPAM I
COMPUTER-RELATED FORGERY,
FRAUD, AND/OR IDENTITY THEFT
Types of Scam:
📧 Email Spam – Unwanted promotional emails, scam emails, or
phishing attempts.
📲 SMS Spam – Fake prize notifications, lottery scams, or
phishing messages.
💬 Social Media Spam – Fake links, bots posting scams, or
excessive tagging.
📞 Spam Calls (Robocalls) – Automated or scam calls pretending
to be from banks or government
ELECTRONIC THEFT
•
➢ Penalty of 50,000 – 500,000
and or prison mayor.
ELECTRONIC THEFT
I. Illegal Downloading
Illegal downloading refers to the unauthorized copying, sharing, or distribution of
copyrighted digital content, such as music, movies, software, books, and games,
without the permission of the copyright owner. This is often done through
torrenting, file-sharing websites, or direct downloads from unauthorized sources.
Why Is It Illegal?
• Copyright Violation – The content is protected by copyright laws, and downloading it
without authorization infringes on the creator’s rights.
• Losses to Creators – Musicians, filmmakers, authors, and software developers lose revenue
due to piracy.
• Legal Consequences – In many countries, illegal downloading can lead to fines, lawsuits, or
even criminal charges.
• Harm to Industries – The entertainment and software industries suffer financial losses,
leading to job cuts and reduced investment in new content.
ELECTRONIC THEFT
II. Obtaining files that you do not have the right to use from the internet
Example:
For instance, if someone downloads a paid software program like Adobe Photoshop from
an unauthorized website instead of buying it legally, they are committing electronic theft.
III. Digital Piracy
➢ Digital piracy is the act of illegally copying, distributing, or downloading digital
content such as movies, music, software, e-books, and video games without the
proper authorization from the copyright owner.
Example:
• Downloading movies from torrent sites • Distributing copyrighted e-books
• Using cracked software • Pirated video games
• Streaming copyrighted content illegally
ELECTRONIC THEFT
IV. Practice of illegal copying and selling digital music, video, computer
software, etc.
Example:
• Cracked Software – Distributing paid software (e.g., Microsoft Office, Adobe
Photoshop) for free or selling it without a valid license.
• Bootleg Music Albums – Copying music from streaming services or CDs and
selling them as MP3 files or burned CDs.
V. Copyright Infringement
The violation, piracy, or theft of a copyright holder’s exclusive rights through
the unauthorized use of a copyrighted material or work.
CYBERBULLYING •
•
•
•
•
•
CYBERBULLYING
Examples of Cyberbullying:
1. Hateful Comments – Posting mean or offensive comments on someone’s social media post to
embarrass or insult them.
2. Spreading Rumors – Sharing false or harmful information about a person online to damage their
reputation.
3. Impersonation – Creating a fake account to pretend to be someone else and posting harmful content
in their name.
4. Threats and Harassment – Sending repeated threatening or hurtful messages to intimidate
someone.
5. Doxxing – Exposing someone’s private information (like address or phone number) online to
encourage harassment.
6. Exclusion – Deliberately leaving someone out of online group chats, games, or social events to make
them feel unwanted.
7. Cyberstalking – Continuously monitoring someone’s online activities and sending them unwanted
messages, creating fear.
The Anti-Bullying Act
of 2013 (RA 10627)
CYBERSEX
•
➢
CHILD •
PORNOGRAPHY
•
➢ Penalty of 12 – 20 years of
imprisonment or reclusion
temporal.
Republic Act No. 9775 – The
Anti-Child Pornography Act
of 2009
To protect children from all
forms of child pornography by criminalizing
the production, distribution, possession,
and access of child sexual exploitation
materials (CSEM). The law strengthens
measures to prevent child exploitation
online and offline and punishes those
involved in such activities.
CYBER DEFAMATION
Example:
• Posting false accusations about someone on Facebook or Twitter.
• Writing a fake negative review to harm a business’s reputation.
• Spreading false rumors in online forums or blogs.
• Sharing edited images or videos that falsely portray someone negatively.
➢ Penalty of 6–12 of imprisonment or prison mayor.
THANK YOU!
Any Questions?
QUIZ!
1. What is cybercrime?
a) A crime committed in physical stores
b) A crime involving computers and networks
c) A crime related to road accidents
d) A crime committed without evidence
2. Which of the following is an example of illegal access?
a) Sending spam emails
b) Hacking into a company’s database without permission
c) Writing fake online reviews
d) Downloading free music
3. What is the main law in the Philippines addressing cybercrimes?
a) Republic Act No. 10175
b) Republic Act No. 10627
c) Republic Act No. 9775
d) Republic Act No. 10173
4. Which of the following is a computer-related offense?
a) Cyberbullying
b) Identity theft
c) Online defamation
d) Cybersex
5. The act of sending unwanted bulk emails without consent is called:
a) Cyber fraud
b) Spam
c) Phishing
d) Pharming
6. What does "pharming" refer to in cybercrime?
a) Tricking users into revealing personal information
b) Redirecting users from a legitimate website to a fake one
c) Sending phishing emails
d) Creating fake social media accounts
7. Which of the following is an example of cybersex under RA 10175?
a) Posting inappropriate videos online
b) Engaging in sexually explicit acts for profit using a computer
c) Sending unwanted flirty messages
d) Watching adult content privately
8. The Anti-Child Pornography Act of 2009 is also known as:
a) Republic Act No. 9775
b) Republic Act No. 10627
c) Republic Act No. 10173
d) Republic Act No. 10175
9. What is the penalty for cyber libel in the Philippines?
a) Community service
b) Imprisonment of 6 to 12 years
c) House arrest
d) Life imprisonment
10. Which cybercrime involves modifying or stealing someone’s personal
data for fraudulent activities?
a) Cyber defamation
b) Identity theft
c) Cybersex
d) Copyright infringement
11. Which of the following is NOT an offense under the Cybercrime
Prevention Act?
a) System interference
b) Data theft
c) Unsolicited commercial communications
d) Street robbery
12. Which law is known as the Data Privacy Act of 2012?
a) RA 10175
b) RA 10173
c) RA 9775
d) RA 10627
13. What is plagiarism?
a) A form of cyberbullying
b) The act of copying someone's work without proper credit
c) An online scam
d) A type of cybercrime where money is stolen
14. A person who repeatedly monitors someone’s online activities without
their consent is committing:
a) Cyberstalking
b) Cyberfraud
c) Cyber libel
d) Cyber piracy
15. Which of the following is an example of a copyright violation?
a) Watching a movie on a streaming site
b) Downloading a copyrighted textbook from an unauthorized website
c) Buying an original music album
d) Sharing a meme with friends
16 – 17. List 2 examples of plagiarism.
18 – 19. What are the 2 Cybercrime policies in the Philippines?
20. What does CSEM stands for?
Multiple Choice (15 items)
1. b) A crime involving computers and networks
2. b) Hacking into a company’s database without permission
3. a) Republic Act No. 10175
4. b) Identity theft
5. b) Spam
6. b) Redirecting users from a legitimate website to a fake one
7. b) Engaging in sexually explicit acts for profit using a computer
8. a) Republic Act No. 9775
9. b) Imprisonment of 6 to 12 years
10. b) Identity theft
11. d) Street robbery
12. b) RA 10173
13. b) The act of copying someone's work without proper credit
14. a) Cyberstalking
15. b) Downloading a copyrighted textbook from an unauthorized website