0% found this document useful (0 votes)
816 views8 pages

Atty. Agustin Aristeo F. Bautista

This document outlines various computer-related offenses under Philippine law. It discusses illegal access, illegal interception of computer data, system interference, misuse of devices, cybersquatting, computer-related forgery, computer-related fraud, computer-related identity theft, and references. The offenses cover unauthorized access to computer systems, interception of computer data, altering or interfering with computer systems, propagation of viruses or access codes, domain name registration in bad faith, forgery of computer data, fraud using computers, and identity theft using computers.

Uploaded by

jstin_jstin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
816 views8 pages

Atty. Agustin Aristeo F. Bautista

This document outlines various computer-related offenses under Philippine law. It discusses illegal access, illegal interception of computer data, system interference, misuse of devices, cybersquatting, computer-related forgery, computer-related fraud, computer-related identity theft, and references. The offenses cover unauthorized access to computer systems, interception of computer data, altering or interfering with computer systems, propagation of viruses or access codes, domain name registration in bad faith, forgery of computer data, fraud using computers, and identity theft using computers.

Uploaded by

jstin_jstin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Atty. Agustin Aristeo F.

Bautista

1
Offenses Against Confidentiality, Integrity, and
Availability of Computer Data and Systems
Computer-related Offenses
Content-related Offenses
Other Offenses

2
1. Illegal Access – access to the whole or any part of
a computer system
2. Illegal Interception – Interception by technical
means (without right) of computer data to, from or
within a computer system, including
electromagnetic emissions from a computer system
3. Illegal Interception – Interception by technical
means (without right) of computer data to, from or
within a computer system, including
electromagnetic emissions from a computer system
4. System Interference – Intentional alteration or
reckless hindering or interference with the
functioning of a computer or computer network by
inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer
data or program, electronic document, or
electronic data without right or authority including
the introduction or transmission of viruses.

3
Cont. 5. Misuse of Devices

i. Propagation of devices intended for


introduction of viruses

ii. Propagation of access codes, computer


password, or anything similar with the intent to commit
any offense under the cybercrime law.

6. Cybersquatting – Acquisition of a Domain Name


over the Internet in bad faith to profit, mislead, and
deprive others from registering the name, if such a
domain name is:

i. Similar, Identical, or confusingly similar to an


existing trademark registered with the government.

ii. Identical or in any way similar with the


name of a person other than the registrant.

4
Computer-Related
Offenses

Computer-related Forgery – alteration of computer data without right resulting


in inauthentic data with intent that the forged data will be considered or acted
upon for legal purposes as if authentic; usage of the forged data

Computer-related fraud – unauthorized alteration of data causing damage in


the functioning of the computer system with fraudulent intent

Computer-related identity theft – the intentional acquisition, use, misuse,


transfer, possession, alteration or deletion of identifying information belonging
to another.
Computer-Related
Other Offenses
Offenses
References
8

You might also like