Sei sulla pagina 1di 4

CYBERCRIMES

What is Cybercrime? It is a crime committed using a computer and the internet to steal a person's identity or sell or stalk victims or disrupt operations with malevolent programs. A crime in which theres an involvement of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Speed, convenience and anonymity that modern technologies offer are being exploited by criminals in order to commit a various range of criminal actions. It is one of the fastest growing crimes in a geographical area. Crimes committed through the use of computer systems. The Role of the Computer The computer as a target - attacking the computers of others. The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world. The computer as an accessory - using a computer as a "fancy filing cabinet" to store illegal or stolen information.

Do not give personal information to anyone or to any company youve never heard of before.

Do not open emails from strangers. Install anti-viral software and spam blocking programs on your computer and your email program.

Dont download attachments from people you dont know.

Teach your children about safe communication on the Internet to protect them from Internet predators.

Computer Trespassing Cybercriminals can gain access to individual computers to peek through files, website browsing history, access passwords, or possibly even save files to your machine. In many cases, computer trespassing is accomplished by luring people to click on attachments or download files. How to Prevent Computer Trespassing Do not keep passwords on your computer, especially in social networking sites. Do not entertain e-mails that need your personal information. Hardware Hijacking Researchers recently discovered a serious security flaw in certain printers. Many printers automatically update their software when accepting a print job, connecting to the Internet to download the latest print drivers. How to Prevent Hardware Hijacking Make sure to install or buy a trusted hardware application Change the password on your account Trace E-mail Location

Types of Cybercrimes
Computer Fraud Fraud becomes ever more complex with the ingenuity of people who intend to deceive, misrepresent, destroy, steal information, or cause harm to others by accessing information through deceptive and illegal means. Types of Computer Fraud Sending hoax emails intended to scare people. Illegally using someone elses computer or posing as someone else on the Internet. Using spyware to gather information about people.

Bullying, Harassment, Stalking In most instances of cyberbullying, bullies posted obscene or cruel messages to the victim on social media sites like Facebook, uploaded embarrassing videos of them to sites like YouTube, or impersonated someone else to toy with their emotions. The Internet can also be an ideal tool for stalkers. Information is often handed to the criminals by the victims themselves. Unwary social media site users can give away their name, age, occupation, home and work addresses, or even their current location by using sites such as

How to Prevent Fraud

Foursquare or Facebook without making full use of privacy protections. Cyberbullying Cyberbullying is a type of harassment using new technology. Whether it is criminal harassment depends on the facts of a case. Cyberbullies use social media blogs, texting, instant messaging, and other internet avenues to engage in deliberate, repeated, and hostile behaviour intended to harm, embarrass, or slander someone. Stalking Stalking is criminal harassment if a person does any of the following things, knowing that it causes you to reasonably fear for your safety or the safety of anyone you know who: repeatedly follow you, or anyone you know. repeatedly communicate with you, or anyone you know, directly or indirectly. repeatedly watch you, or anyone you know, or lurk around your home, workplace, or any other place you happen to be engage in any threatening conduct directed at you or a member of your family Spam Unsolicited mass e-mail, known colloquially as spam, is more than annoying: spam messages can be used to trick people into giving up sensitive personal information (known as phishing), or as carriers for computer worms and viruses. Additionally, opening spam e-mail could leave you vulnerable to spoofing, where a spammer gains the ability to send more of this junk e-mail through your account. Information Warfare More complex and far-reaching than the crimes above, information warfare involves large-scale attacks on

computers, websites, and networks. Jamming or hijacking a satellite or phone network, which can be done through computers, is one example of information warfare. Cyber sex It is a virtual sex encounter in which two or more persons connected remotely via computer network send each other sexually explicit messages describing a sexual experience. In one form, this fantasy sex is accomplished by the participants describing their actions and responding to their chat partners in a mostly written form designed to stimulate their own sexual feelings and fantasies.

Republic Act 10175: Cybercrime Prevention Act of 2012


Senators who passed RA 10175 Sen. Tito Sotto Sen. Bong Revilla Sen. Manny Villar Sen. Lito Lapid Sen. Koko Pimentel Sen. Jinggoy Estrada Sen. Loren Legarda Sen. Chiz Escudero Sen. Ping Lacson Sen. Gringo Honasan Sen. Pia Cayetano Sen. Bongbong Marcos Sen. Ralph Recto

Definition: AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No. 10175, is a law in the Philippines approved on 12 September 2012. It aims to address legal issues concerning online interactions and the Internet in the Philippines. Among the cybercrime offenses included in the bill are

cybersquatting, cybersex, child pornography, identity theft, illegal access to data and libel.

purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or (ii) The act of knowingly using computer data which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design. (2) Computer-related Fraud. The unauthorized input, alteration, or deletion of computer data or program or interference in the

On 5 February 2013, The Supreme Court extended the temporary restraining order on the law, "until further orders from the court."

Cyber Crime Law Chapter II : Punishable Acts SEC. 4. Cybercrime Offenses. (a) Offenses against the confidentiality, integrity and availability of computer data and systems: (1) Illegal Access. The access to the whole or any part of a computer system without right. (2) Illegal Interception. The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data. (3) Data Interference. The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses. (4) System Interference. The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses. (5) Misuse of Devices. (6) Cyber-squatting. The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same, (1) Computer-related Forgery. (i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal

functioning of a computer system, causing damage thereby with fraudulent intent: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower. (3) Computer-related Identity Theft. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.

(c) Content-related Offenses: (1) Cybersex. The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. (2) Child Pornography. The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775. (4) Libel. The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future. SEC. 5. Other Offenses. The following acts shall also constitute an offense: (a) Aiding or Abetting in the Commission of Cybercrime. Any person who willfully abets or aids in the

commission of any of the offenses enumerated in this Act shall be held liable.

Frequently look away from the screen and focus on faraway objects

The Internet Freedom Bill


Definition

Make sure that your computer screen is not too close to your face

House Bill Seeks to Repeal Controversial Provisions in Anti-cybercrime Law

Have regular eye examinations if symptoms are observed

A bill has been filed at the House of Representatives seeking to repeal controversial provisions of Republic Act (RA) 10175, or the controversial Cybercrime Prevention Act.

Laptop Computer Dangers Prolonged use of laptop computers instead of desktop computers may contribute to higher computer-related injuries. The problem is that the monitor and keyboard of a laptop are very close together To position the monitor at the right height for the back and neck causes the arms of the shoulders to be lifted too high Carrying laptops around can also cause excessive strain on muscles and joints Prevention Tips Use peripheral equipment whenever possible such as docking station, separate keyboard, mouse, and laptop stands Have frequent breaks Use a well set-up desktop computer instead of a laptop where appropriate Carry your laptop in a backpack or in wheelalong luggage

Kabataan party-list Rep. Raymond Palatino and Bayan Muna Rep. Teodoro Casio filed on Monday House Bill 6613 or what they called the Internet Freedom Bill.

Computer Related Diseases


Posture Related Injuries o Back and neck pain, headaches, & shoulder and arm pain Causes: Sitting for extended periods of time Poor workstation design Bad posture

Prevention Tips Position the monitor either eye level or slightly lower Position your keyboard at a height that allows your elbow to rest Allow your feet rest flat on the floor Switch to an ergonomic chair Use ergonomic keyboard Take frequent breaks

Eyestrain Causes Focusing the eyes at the same distance point for extended periods of time Illuminated computer screen Symptoms like blurred vision, temporary inability to focus on faraway objects and headaches Prevention Tips Reduce the contrast or brightness of your computer screen

Potrebbero piacerti anche