Terminology Description/Explanation: 1. Right To Be Informed - IRR, Section 34.a
Terminology Description/Explanation: 1. Right To Be Informed - IRR, Section 34.a
Terminology Description/Explanation: 1. Right To Be Informed - IRR, Section 34.a
Terminology Description/Explanation
Data Privacy Act 2012
Chief Compliance and Monitoring
Dr. Rolando R. Lansigan
Division NPC
Raymund E. Liboro Privacy Commissioner and Chairman
MOTTO Do not collect, if you cannot protect
BOTPA
Damian Mapa Former Deputy Privacy Commissioner
An act protecting individual personal
information in information and
communications systems in the
Republic Act 10173 government and the private sector,
creating for this purpose a national
privacy commission, and for other
purposes.
a body that is mandated to administer
National Privacy Commission
and implement this law(DPA 2012)
DPA - 2012
NPC - March 2016
TIMELINE IRR - August 2016
IRR Reg. - September 9, 2017
Ownership
Stakeholder Involvement
Privacy Risk Map
Privacy Impact Assessment
Controls/Measures Framework
Sign-off
Implementation/Monitoring Plan
1) Registration of DPO with the NPC
by Sept. 09, 2017.
2) Registration of automated
processes,etc. by March 8, 2018
3) PIA by ASAP, conducted by the
process owner
4) Breach team and procedures in
place by ASAP, after conduct of
PIA
Compliance Procedures 5) Privacy policies and data
protection measures by ASAP,
disseminated within the
organization
6) PIP contracts/data sharing
agreements by ASAP, with
assistance from legal
7) Notification from NPC within 72
hours by ASAP, in the event of
peronal breach.
Introduction to Data Privacy Act
Republic Act 10173 Data Privacy Act of 2012
Any and all forms of data which under the
Privileged Information Rules of Court and other pertinent laws
constitute privileged communication.
Interaction between two parties which the
law recognizes as PRIVATE,
PROTECTED relationship. Whatever is
Privileged Communication communicated between these parties
shall remain CONFIDENTIAL and the law
CANNOT FORCE DISCLOSURE of
these communications.
Scope of Information(Excluded) 1) PUBLIC OFFICERS and
EMPLOYEES
2) GOVERNMENT CONTRACTORS
3) DISCRETIONARY BENEFITS
4) JOURNALISTIC, ARTISTIC,
LITERARY and RESEARCH
5) FUNCTIONS OF PUBLIC
AUTHORITY
6) BANKS AND OTHER FINANCIAL
7) RESIDENTS OF FOREIGN
JURISDICTIONS
For Sensitive
For Personal
Punishable Act Personal
Information
Information
JAIL TERM
18 months – 5
Unauthorized purposes 2-7 years
years
Industrial
YES YES YES
Applicability
Only one (1)
More than one (1)
generic claim is
generic claim is Omnibus type of
Claim allowed. No limit
allowed and claim
on the number of
dependent claims
dependent claims.
Ornamental
Features of shape,
configuration,
form, NO NO YES
or a combination
thereof
Five (5) years from
Twenty (20) years the date
Seven (7) years
from the date of of filing with 2 five
from
Term of Protection filing year term
the date of filing
with payment of renewals upon
without renewal
annuities payment of
fees
In 1983, Gatorade and Stokely-Van
Camp, Inc., Gatorade’s mother company,
were purchased by Quaker Oats
Company for $220 million •In 2001,
PepsiCo acquired Quaker Oats Company
for $13 billion
Gatorade Story While Gatorade has since been
sold, the University of Florida is still
entitled to 20% royalties and has earned
$100 million from it since 2004
As of 2009, Gatorade is considered
as PepsiCo’s 4th largest brand based on
worldwide annual retail sales
Any visible sign capable of distinguishing
Mark
the goods or services of an enterprise
Marks that are arbitrary and fanciful of the
Trademark
goods or services can be registered
Manny Pacquiao, Pilot, Jollibee,
Trademarks(Goods)
Samsung
Bruno’s Barbers, Belo Medical Group, Mr.
Service Mark
Quickie, MasterCard hologram
Collective Mak several enterprises
Apple for computers, Boracay for
Trademark – Arbitrary
alcoholic beverage
Xerox for printing equipment, Kodak for
Trademark – Fanciful
camera
Protection afforded to original literary,
Copyright
scientific, and artistic works
Choreography: Swan Lake by Moscow
City Ballet
Photograph: Afghan Girl (1984) by Steve
McCurry
Copyright Examples Painting: Untitled (2000)
by Former President Cory Aquino
Audiovisual: Budoy
(ABS-CBN show)
Dumb show / Pantomime
1. Reproduction of the work or
substantial portion of the work
2. Dramatization, translation,
adaptation, abridgment,
arrangement or other
transformation of the work
Republic Act No. 8293 or Philippine an act that outlines the intellectual
Intellectual Property Code property rights of a Filipino citizen, and
the benefits to which he/she is entitled
1. the intellectual property office,
2. the law on patents,
3. the law on trademarks, service
Republic Act No. 8293 Division
marks, and trade names,
4. the law on copyright, and
5. other financial provisions.
refers to anything created by someone,
including but not limited to inventions,
literary works, items created by artists
Intellectual property (e.g. artwork and musical pieces),
symbols, designs, images, pictures, and
even names that are used for commercial
purposes
refers to the exclusive rights to a product
or process, as well as its improvements—
Patent
granted that the product or process offers
something new and useful
a tool used to differentiate services and
goods from one another.
Trademark It can be in the form of a word or a group
of words; a sign, logo, or symbol. It could
even be a combination of those above
an international treaty, allowing trademark
registration in the Philippines or any
The Madrid Protocol
country—as long as they are part of the
Madrid Protocol
refers to the protection given to the owner
of an original work covering literary
Copyright
works, musical pieces, paintings, and
computer programs, among others
Copyright Issues in the E-Environment
a bundle of rights granted under the IP
Copyright
Code to “authors”
It attaches from moment of creation until
How long is the copyright?
50 years from death of author
1. Right to reproduce (copy)
2. Right to dramatize, adapt or
transform the work (derivative
works)
3. First public distribution of the
Right of the Author original
4. Rental right
5. Public display
6. Public performance
7. Other communication to the public
of the work
1. Author
2. Joint authors – co-ownership
3. Employee
Regular duties – employer
Copyright Owner
Not part of regular duties –
employee
4. Commissioned work – copyright to
creator
From moment of creation
Term of Protection
Lifetime plus 50 years
File Sharing
All forms of Infringement
Online Piracy Domain Name Cybersquatting if
constituting infringement
Framing Manila Bulletin incident
refers to a provider of online services or
network access, or the operator of
facilities therefor, including entities
offering the transmission, routing, or
Service Provider providing of connections for online
communications, digital or otherwise,
between or among points specified by a
user, of electronic documents of the
user’s choosing;
Service Providers Example 1. ISPs
2. Telecomms Companies (wire and
wireless)
3. Webhosts
4. Mail Providers (Yahoo!, Gmail,
Ymail, PinoyMail)
5. YouTube, Google Video
6. Pix Sites (Flickr)
7. Groupmail (Yahoo!/Google
Groups)
8. Social Networking Sites
(Facebook, Friendster)
9. SMS-Web Providers (Chikka)
10. Blogging services (blogger.com,
wordpress.com)
1. Impositions on creative process
2. Attacks on fair use (exaggerates
its inherent weakness)
3. Rent-seeking
4. Anti-competitive behaviour (Aibo
Pet)
5. Restricting technological
Rising Cost of Copyright innovation (P2P)
6. Free speech/Censorship (Bush-
Blair)
7. Internet magnification
8. Impositions upon Internet users
(StarWars Kid)
9. What the Internet can do (Free
Culture)
2014-2015 Cybercrime Report
Atty. Menardo I. Guevarra Current Justice Secretary
Chief State Counsel Ricardo V. Paras
Chair, Office of Cybercrime
III
Assistant Secretary Geronimo L. Sy Vice chair, Office of Cybercrime
1. RA 10175 – Cybercrime
Prevention Act of 2012
2. RA 9995 – Anti-Photo and
Voyeurism Act of 2009
3. RA 9775 – Anti-Child Pornography
Act of 2009
Cybercrime Jurisdictions
4. RA 8792 – E-Commerce Act of
2000
5. RA 8484 – Access Devices
Regulation Act of 1998
6. RA 4200 – Anti-Wiretapping Law of
1965
Internet Users 33.6 million
In 2002, the virus bolstered the
insufficiency of the government‟s policies
Love bug or I love you Virus
on cybercrime suppression, investigation
and prosecution
September 12, 2012
completely addresses crimes committed
Cybercrime Prevention Act
against and by means of computer
system
is considered as the major threat that
Cyberespionage or intellectual
increasingly hits the manufacturing
property theft
sectors
Global Alliance against Child Sexual
was launched on 5 December 2012
Abuse Online
gives credence to admissibility of
evidence in electronic form and to secure
E-Commerce Act of 2000
legal framework and environment for
electronic commerce
an inter-agency body created by virtue of
the Philippine Cybercrime Prevention Act
of 2012, and is under the administrative
supervision of the Office of the President
CICC
which was established for policy
coordination among concerned agencies
and for the formulation and enforcement
of the national cyber security plan
an office within the DOJ created under
Republic Act 10175 or the “Cybercrime
Prevention Act of 2012” and is designated
OOC
as the Central Authority in all matters
relating to international mutual assistance
and extradition for cybercrime cases
tasked to investigate all cyber related
crimes punishable under CPA and related
laws, and to establish and maintain an
Incident Response Team and Digital
NBI-CCD
Forensic Section that will be responsible
for responding to the current and
emerging cyber threats, and conducting
digital forensic examination and analysis
PNP-ACG investigates all cybercrimes and other
crimes in which Information and
Communications Technology (ICT) is
used in the commission of criminal acts
or the object of attack, conduct data
recovery and forensic analysis on all
computers, computer peripherals and
storage devices, and other digital
evidence seized by PNP units and any
other law enforcement agencies within
the country
authorized by U.S. Congress to create a
reporting mechanism for members of the
public, law enforcement, and certain
corporate entities, including U.S.
CyberTipline electronic service providers (ESPs) that
have statutory reporting obligations to
report to NCMEC instances of child
sexual exploitation, including child
pornography
the international community of
INTERPOL specialized units to save children from
sexual exploitation
1. Department of Justice (DOJ) –
Office of Cybercrime;
2. DOJ – National Prosecution
Service;
3. DOJ – Office of the Chief State
Counsel;
4. Department of Science and
Technology – Information and
Communications Technology
TWG Office (DOST-ICTO);
5. Department of Foreign Affairs
(DFA);
6. Department of Local and Interior
Government (DILG);
7. Philippine National Police (PNP);
and
8. National Bureau of Investigation
(NBI).
1. Illegal Access
2. Illegal Interception
3. Data Interference
Common Cybercrime Offenses
4. System Interference
5. Misuse of Devices
6. Cybersquatting
The access to the whole or any part of a
Illegal Access
computer system without right
The interception made by technical
means without right of any non-public
transmission of computer data to, from, or
Illegal Interception within a computer system including
electromagnetic emissions from a
computer system carrying such computer
data
The intentional or reckless alteration,
damaging, deletion or deterioration of
computer data, electronic document, or
Data Interference
electronic data message, without right,
including the introduction or transmission
of viruses.
The intentional alteration or reckless
hindering or interference with the
functioning of a computer or computer
network by inputting, transmitting,
damaging, deleting, deteriorating, altering
System Interference
or suppressing computer data or
program, electronic document, or
electronic data message, without right or
authority, including the introduction or
transmission of viruses
A computer password, access code, or
similar data by which the whole or any
part of a computer system is capable of
Misuse of Devices
being accessed with intent that it be used
for the purpose of committing any of the
offenses under this Act.
he acquisition of a domain name over the
internet in bad faith to profit, mislead,
Cybersquatting
destroy reputation, and deprive others
from registering the same
1. Computer-related forgery
Computer-related offenses 2. Computer-related fraud
3. Computer-related Identity Theft
The act of knowingly using computer data
which is the product of computer-related
Computer-related forgery forgery as defined herein, for the purpose
of perpetuating a fraudulent or dishonest
design
The unauthorized input, alteration, or
deletion of computer data or program or
Computer-related fraud interference in the functioning of a
computer system, causing damage
thereby with fraudulent intent:
The intentional acquisition, use, misuse,
transfer, possession, alteration or deletion
of identifying information belonging to
Computer-related Identity Theft another, whether natural or juridical,
without right: Provided, That if no damage
has yet been caused, the penalty
imposable shall be one (1) degree lower.
1. Cybersex
Content-related offenses 2. Child Pornography
3. Libel
Cybersex The willful engagement, maintenance,
control, or operation, directly or indirectly,
of any lascivious exhibition of sexual
organs or sexual activity, with the aid of a
computer system, for favor or
consideration
The unlawful or prohibited acts defined
and punishable by Republic Act No. 9775
Child Pornography or the Anti-Child Pornography Act of
2009, committed through a computer
system
a public and malicious imputation of a
crime, or of a vice or defect, real or
imaginary, or any act, omission, condition,
status or circumstance tending to
Libel
discredit or cause the dishonor or
contempt of a natural or juridical person,
or to blacken the memory of one who is
dead.
unauthorized access into a computer
Hacking
system/server
The intentional or reckless alteration,
damaging, deletion or deterioration of
computer data, electronic document, or
Data Interference
electronic data message, without right,
including the introduction or transmission
of viruses
A buyer orders an item from a website
Sales or Marketing Fraud and the item is delivered BUT buyer does
not pay / remit payment
Infecting a number of computers
Botnet connected to the internet with a malware
– making the computer a “zombie”
Data Theft Unauthorized access to a database
Unsolicited Commercial Communication
Spamming – struck down by Supreme Court as
unconstitutional
Solicits information / update from target,
eg., updating a bank account but
Phishing directing a victim to a website that
deceptively looks like the legitimate
website of the bank
Using identity information that belongs to
Identity Theft
another for gain, financial or otherwise
The sending of email messages or
posting of information on social media
Bullying
sites which tend to cause psychological
or emotional harm to the target individual
Violation of the Intellectual Property Code
P2P Sharing
using computers
1. Curiosity
2. Fun
3. Ego
4. Personal Reasons
a) Stalking
Cybercrime Motivations
b) Emotional Harassment
c) Vengeance
5. Political Reasons
6. Espionage
7. Financial Gain
1. From guns to computers and
software
2. From bullets and bombs to bits
Tools
and bytes
3. Downloadable malware scripts
4. Botnet for rent
1. Computers, Networks,
Telecommunications Infrastructure,
Information and Communications
Systems
Targets
2. Data / Information
3. Persons
4. Organizations
5. Government
Cyber Safety
refers to the collection of tools, policies,
risk management approaches, actions,
training, best practices, assurance and
Cyber Security
technologies that can be used to protect
the cyber environment and organization
and user’s assets.
The State of Global Information
Security
3,000 companies (including banks,
retailers, defense contractors have
FBI
suffered some form of information
security breach
105million payment card information
In South Korea
exposed
In Germany 18 million email addresses stolen
Government agencies Web wars or Keyboard wars
Threat Actors
Individuals disgruntled employee; kids out to have
fun, ego boost and peer pressure, etc.
drug operations, child abuse, cybersex
Cybercrime Groups
operations, human trafficking
Nation-states economic espionage, geopolitical discord
1. Internet of Things
2. Big Data
Challenges to Information Security
3. BYOD – tablets, smartphones,
wearables
1. Deep Web, also Deepnet, Invisible
Web, Hidden Web
Attribution Challenge 2. Dark Web, Dark Internet
3. Tor Browser (Anonymity Network)
4. Anonymity
1. You are your own brand
2. Your product description:
3. Your personality and character
4. Your skills, knowledge, and
Product and You expertise
5. Your experience
6. Your education
7. Your online identity
8. Your online reputation
1. Be Aware
2. Adopt Information Security
Protect your Online Reputation
Practices
3. Live it! Breathe it!
1. ISO 27000/27001
Information Security Practice
2. PCI DSS
Standards
3. Business Continuity
1. Protect
Information Security Practice 2. Detect
3. Respond
Information Assurance
is the sender or signer the person he
Authentication
claims to be
the sender or signer cannot deny that he
Non-repudiation
sent or signed the information
can the information be independently
Verifiability
verified?
can the receiver of the information rely on
Reliability the completeness, integrity, and
authenticity of the information received?
Nothing is Perfect!
Ephemeral electronic communication
refers to telephone conversations, text
messages, chatroom sessions, streaming
audio, streaming video, and other
Ephemeral electronic communication
electronic forms of communication the
evidence of which is not recorded or
retained
lasting one day only, lasting a very short
Ephemeral
time
Dallas Mavericks Basketball player who
venture to help people reduce their digital
footprint.
Mark Cuban
“when you send a text or email you
lose ownership of that message, but
you don’t lose responsibility.”
New mobile application that assures that
messages are, “Gone Forever: Messages
Cyber Dust
never hit a hard drive, so when they
disappear, they disappear for good.”
types of programs that are most personal
ephemeral technology communication platform
self-destruct
an application (“app”) that allows users to
send pictures, videos, and chat
Snapchat, Wickr, Frankly messages to other users, who can view
the content for one to ten seconds before
it disappears.
during the viewing period, the recipient
Snap must maintain contact with the device's
touchscreen or the message.
the term used to describe the deletion of
Wall scrubbing
Facebook posts
COMMON TYPES OF INTERNET FRAUD SCAMS
TYPES OF INTERNET FRAUD SCAMS
refers to a room where salesmen work
using unfair, dishonest sales tactics,
sometimes selling foreign currency
stocks, private placements or committing
BOILER ROOM
outright stock fraud. The term carries a
negative connotation, and is often used to
imply high-pressure sales tactics and,
sometimes, poor working conditions.
They play on emotional triggers to get
you to provide money, gifts and personal
ROMANCE SCAM details. Scammers target victims by
creating fake profiles on legitimate
internet dating services.
An email, letter or text message from a
lottery institution arrives from out of
nowhere. It will advise you that you have
LOTTERY SCAM
won a lot of money or fantastic prizes—in
a lottery or competition that you did not
enter.
BANKING AND ONLINE ACCOUNT
SCAM
the illegal copying of information from the
1. CARD SKIMMING magnetic strip of a credit or Automated
Teller Machine (ATM) card.
also called brand spoofing is the creation
of email messages and Web pages that
2. PHISHING
are replicas of existing and legitimate
sites.
he creation of email messages with a
forged sender address something which
is simple to do because the core
3. EMAIL SPOOFING
protocols do no authentication.
to mislead the recipient about the origin
of the message
NIGERIAN SCAMS
a form of advance fee fraud or money
transfer request similar to the Spanish
Prisoner scam dating back to the late
1. NIGERIAN 419 SCAMS 19th century. In that con, businessmen
were contacted by an individual allegedly
trying to smuggle someone connected to
a wealthy family out of prison in Spain.
You might receive an offer from a
potential buyer often quite generous and
2. CHECK OVERPAYMENT SCAM accept it. The scammer then sends you a
check, but the check is for more money
rather than the agreed price.
when a scammer contacts you out of
nowhere to tell you that you‟ve been left,
or are entitled to claim, a large
3. INHERITANCE SCAM
inheritance from a distant relative or
wealthy benefactor who has died
overseas.
4. EMERGENCY OR In the typical scenario, a grandparent
"GRANDPARENT" SCAM receives a phone call from a con artist
claiming to be one of his or her
grandchildren. The caller goes on to say
that they are in some kind of trouble and
need money immediately. Typically they
claim being in a car accident, trouble
returning from a foreign country or they
need money for bail.
THE SOCIAL MEDIA AND THE ACADEMIC COMMUNITY:
A LEGAL PERSPECTIVE
web-based communication tools that
enable people to interact with each other
Social Media
by both sharing and consuming
information.
refers to interacting with other people by
Social sharing information with them and
receiving information from them.
refers to an instrument of communication,
like the internet. TV, radio, TV and
Media
newspapers are traditional forms of
media
Access virtual libraries and encyclopedias
Cyberspace Post billboard-like notices or messages,
including pictures and videos
CYBERCRIME PREVENTION ACT OF
The cybercrime law aims to regular
2012
access to and use of the cyberspace and
(R.A. 10175; enacted on Sept. 12,
imposes penalties for violations.
2012)
1. Offenses Against Confidentiality,
Integrity and Availability of
Computer Data and Systems.
PUNISHABLE ACTS
2. Computer-related Offense
3. Content-related Offenses
4. Other Offenses
committed by means of writing, printing,
lithography, engraving, radio,
phonograph, painting, theatrical
exhibition, cinematographic exhibition, or
any similar means, shall be punished by
prision correccional in its minimum
Online libel
and medium periods (6 months and 1
day to 4 years and 2months) or a fine
ranging from 200 to 6,000 pesos, or
both, in addition to the civil action which
may be brought by the offended party.