Art 5: Unit 5 (15 PTS) Part 6: Unit 8 (10 PTS) GRADED Activity: Midterm Examination
Art 5: Unit 5 (15 PTS) Part 6: Unit 8 (10 PTS) GRADED Activity: Midterm Examination
Art 5: Unit 5 (15 PTS) Part 6: Unit 8 (10 PTS) GRADED Activity: Midterm Examination
MODULE 3
With the internet being the center for acquiring information nowadays, and more and
more
systems being developed to suit the needs of different businesses, all of which make
use of the
internet as a medium for marketing and operations, there is a question of how the
security of
everyone is maintained. Having a singular tool used as a platform by different
business and
individuals alike has definitely made it easier for everyone to communicate and do
transactions.
But it has also made it easier for others to exploit the vulnerability of persons who are
not
knowledgeable about the risks of using the internet.
To start with this module, take some time to reflect on the following questions:
1.
Have you ever felt that your security is compromised while using the internet?
2.
Do you think you have done something that might have been illegal?
3.
Have you ever searched anything in Google and used it as part of one of your
outputs?
4.
Have you created anything that was used by someone else without your consent
Explore Activity
1.
Search for an example of an apparent cybercrime. From this example, give your
thoughts on
how you think that could have been prevented.
2.
Downloading files through the internet is rampant, whether legal or not. An example
of which
is downloading of movies, TV series, or animes via a torrent client. Currently, this is
an illegal
act, but authorities have little resources to stop this completely. Do you think this kind
of activity
must be stopped, or do you think this is something that must be accepted as legal?
Unit 09: Cybercrime Laws
Study the presentation named GIT Lecture 9 - Cybercrime Laws in the
Philippines.pptx
Cybercrime Prevention Act of 2012. The State recognizes the vital role of information
and
communications industries such as content production, telecommunications,
broadcasting
electronic commerce, and data processing, in the nation’s overall social and
economic
development. The State also recognizes the importance of providing an environment
conducive
to the development, acceleration, and rational application and exploitation of
information and
communications technology (ICT) to attain free, easy, and intelligible access to
exchange and/or
delivery of information; and the need to protect and safeguard the integrity of
computer, computer
and communications systems, networks, and databases, and the confidentiality,
integrity, and
availability of information and data stored therein, from all forms of misuse, abuse,
and illegal
access by making punishable under the law such conduct or conducts. In this light,
the State shall
adopt sufficient powers to effectively prevent and combat such offenses by facilitating
their
detection, investigation, and prosecution at both the domestic and international
levels, and by
providing arrangements for fast and reliable international cooperati