Lorenzo CLJ Reviewer Kuno
Lorenzo CLJ Reviewer Kuno
Lorenzo CLJ Reviewer Kuno
1. SERVICE OF SUMMONS
The defendant shall file an answer within ten (10) days from receipt
of the summons either personally or by counsel, or with the
assistance of the Clerk of Court.[17]
3. FAILURE TO ANSWER
Should the defendant fail to answer the complaint within ten (10)
days from service, the Court shall proceed to receive the
evidence ex-parte upon which judgment shall be rendered.[18]
4. PRE-TRIAL[19]
6.1. Not later than thirty (30) days after the answer is filed, the case shall be
calendared for pre-trial. Should the parties fail to arrive at an amicable
settlement (Sulh), the Court shall clarify and define the issues of the case which
shall be set forth in a pre-trial order.
6.2. Within ten (10) days from receipt of such order, the parties or counsels shall
forthwith submit to the Court the statement of witnesses (shuhud) and other
evidence (bayyina) pertinent to the issues so clarified and defined, together with
the memoranda setting forth the law and the facts relied upon by them.
6.3. Should the Court find, upon consideration of the pleadings, evidence and
memoranda, that a judgment may be rendered without need of a formal hearing,
the Court may do so within fifteen (15) days from the submission of the case for
decision.
5. HEARING OR TRIAL[20]
7.1. The plaintiff (mudda’i) has the burden of proof, and the taking of an
oath (yamin) rests upon the defendant (mudda’ aalai’). If the plaintiff has no
evidence to prove his claim, the defendant shall take an oath and judgment shall
be rendered in his favor by the Court. Should the defendant refuse to take an
oath, the plaintiff shall affirm his claim under oath in which case judgment shall
be rendered in his favor. Should the plaintiff refuse to affirm his claim under oath,
the case shall be dismissed.
7.2. If the defendant admits the claim of the plaintiff, judgment shall be rendered
in his favor by the Court without further receiving evidence.
7.3. If the defendant desires to offer defense, the party against whom judgment
would be given on the pleadings and admissions made, if no evidence was
submitted, shall have the burden to prove his case. The statements submitted by
the parties at the pre-trial shall constitute the direct testimonies of the witnesses
as basis for cross-examination.
6. JUDGMENT[21]
8.1. The judgment shall be rendered within fifteen (15) days from the
termination of the trial, or disposition of the case, should there be no formal trial
or hearing.
8.2. The judgment shall become final and executory upon the expiration of the
period to appeal. Once the judgment becomes final and executory, the
Court motu proprio shall immediately issue the writ of execution for the
satisfaction of the judgment.
7. APPEAL
Within five (5) days from the perfection of the appeal, the Clerk of Court shall
transmit the records to the appropriate appellate court.[23]
“Ever since men began to modify their lives by using technology they have found
themselves in a series of technological traps”
Roger
Revelle What is Cyber Crime?
Cyber-crimes are essentially a combination of the elements of Computer
and Net Crime and can be best defined as "Offenses that are committed against
individuals or groups of individuals with a criminal motive to intentionally harm
the reputation of the victim or cause physical or mental harm to the victim
directly or indirectly using modem telecommunication networks such as the
Internet and mobile phones.
In its simplest definition, Cybercrime is criminal activity that either targets
or uses a computer, a computer network or a networked device.
What is Cyber Criminology?
Cyber Criminology is the study of causation of crimes that occur in the
cyberspace and its impact in the physical space (Jaishankar 2007).
General categories of Cyber Crime:
1. Computer as a Target
2. Computer as a weapon
• The first person to be found guilty of cybercrime was Ian Murphy, also
known as Captain Zap, and that happened in the year 1981.
Take Note: RA 8792 is considered the landmark law in the history of the
Philippines since it has placed the Philippines among the countries penalizing
cybercrime.
Likewise, the Supreme Court drafted the Rules on Electronic Evidence,
which took effect on 1 August 2000, to emphasize the admissibility of evidence
in electronic form, subject to its authenticity and reliability.
• Keyboard
• Mouse
• Scanner
• Microphone
• Digital Camera
• PC Video Camera
Storage Media
Storage keeps data, information and instructions for use in the future.
Primary storage
• RAM (Random Access Memory) - is the primary storage of a
computer. When you’re working on a file on your computer, it will
temporarily store data in your RAM. It allows you to perform
everyday tasks like opening applications, loading webpages, editing
a document or playing games, and allows you to quickly jump from
one task to another without losing your progress.
Secondary Storage (Hard Disk Drives (HDD) & Solid-State Drives (SSD))
• Hard Disk Drives (HDD) - Hard disk drives are commonly used as
the main storage device in a computer. HDDs often store operating
system, software programs and other files. These are magnetic
storage devices
• Solid-state drives (SSD) is a new generation of storage device
used in computers. SSDs replace traditional mechanical hard disks
by using flashbased memory, which is significantly faster. SSDs
don’t rely on magnets and disks, instead they use a type of flash
memory called NAND
• Gray hat hackers - They belong to the neutral zone. They act in the
middle ground between white hat hackers, who operate on behalf of those
maintaining secure systems, and sometimes act as black hat hackers who
act maliciously to exploit vulnerabilities in systems.
4. Cyber Fraud - is the crime committed via a computer and internet with
the intent to corrupt another individual’s personal and financial information
stored online from people illegally by deceiving them.
a. Spoofing or Phishing - Spoofing is a type of scam in which criminals
attempt to obtain someone's personal information by pretending to be a
legitimate source. It can be in the form of:
•Email Spoofing- Email spoofing is a technique used in spam and
phishing attacks to trick users into thinking a message came from a
person or entity they either know or can trust. In email spoofing
attacks, the sender forges email headers so that client software
displays the fraudulent sender address, which most users take at
face value.
•Text Message Spoofing - Sometimes referred to as smishing. The
text message may appear to come from a legitimate source, such as
your bank. It may request that you call a certain phone number or
click on a link within the message, with the goal of getting you to
divulge personal information.
•URL Spoofing - URL spoofing happens when scammers set up a
fraudulent website to obtain information from victims or to install
malware on their computers. Virus hoax emails - Virus hoaxes are
false reports about nonexistent viruses, often claiming to do
impossible things like blow up the recipient's computer and set it on
fire, or less sensationally, delete everything on the user's computer.
b. Lottery Frauds - These are emails, which inform the recipient that he/
she has won a prize in a lottery.
c. Credit Card Fraud -Credit card fraud is the unauthorized use of a credit
or debit card, or similar payment tool to fraudulently obtain money or
property. Credit and debit card numbers can be stolen from unsecured
websites or can be obtained in an identity theft scheme.
Take Note: Identity theft is the scheme of obtaining the personal, financial
information or other information of another person to use their identity to
commit fraud or other illegal activities.
d. Theft of Internet Hours - Unauthorized use of Internet hours paid for by
another person.
What is RA 10175?
Republic Act No. 10175, otherwise known as the “Cybercrime Prevention Act of
2012”
What are the acts the constitute Cybercrime Offenses under RA 10175?
5. Misuse of Devices
a. The use, production, sale, procurement, importation, distribution or
otherwise making available, intentionally and without right, of any of
the following:
i. A device, including a computer program, designed or adapted
primarily for the purpose of committing any of the offenses under
this rules; or
ii. A computer password, access code, or similar data by which the
whole or any part of a computer system is capable of being
accessed with the intent that it be used for the purpose of
committing any of the offenses under this rules.
b. The possession of an item referred to in 5a(i) or(ii) above, with the
intent to usesaid devices for the purpose of committing any of the
offenses under this section.
B. Computer-related Offenses
1.Computer-related Forgery
a. The input, alteration or deletion of any computer data without right,
resulting in inauthentic data, with the intent that it be considered or
acted upon for legal purposes as if it were authentic, regardless
whether or not the data is directly readable and intelligible; or
Take Note: The penalty to be imposed shall be one (1) degree higher than that
provided for in Republic Act No. 9775 if committed through a computer system.
Take Note: Cybersex involving a child shall be punished in accordance with the
provision on child pornography of the Act.
Take Note: This provision applies only to the original author of the post or online
libel, and not to others who simply receive the post and react to it.
Take Note: The NBI shall create a cybercrime division to be headed by at least
a Head Agent. The PNP shall create an anti-cybercrime unit headed by at least
a Police Director.
Take Note: The DOJ – Office of Cybercrime (OOC) created under the Act shall
coordinate the efforts of the NBI and the PNP in enforcing the provisions of the
Act. It also provided under this law the creation of an inter-agency body known
as the Cybercrime Investigation and Coordinating Center (CICC) under the
Office of the President.
b. Pursuant thereto, the law enforcement authorities may order any person,
who hasknowledge about the functioning of the computer system and the
measures to protect and preserve the computer data therein, to provide, as is
reasonable, the necessary information to enable the undertaking of the search,
seizure and examination.
Custody of Computer Data. – All computer data, including content and traffic
data, that are examined under a proper warrant shall, within forty-eight (48)
hours after the expiration of the period fixed therein, be deposited with the court
in a sealed package, and shall be accompanied by an affidavit of the law
enforcement authority executing it, stating the dates and times covered by the
examination, and the law enforcement authority who may have access to the
deposit, among other relevant data.
Destruction of Computer Data. – Upon expiration of the periods as provided in
Sections 12 (6months) and Section 15 ( Within the time period specified in the
warrant), or until the final termination of the case and/or as ordered by the Court,
as the case may be, service providers and law enforcement authorities, as the
case may be, shall immediately and completely destroy the computer data.
Take Note: Exclusionary Rule – Any evidence obtained without a valid warrant
or beyond the authority of the same shall be inadmissible for any proceeding
before any court or tribunal.
Take Note: Failure to comply with the provisions of stated above specifically the
orders from law enforcement authorities, shall be punished as a violation of
Presidential Decree No. 1829, entitled ‘Penalizing Obstruction Of Apprehension
And Prosecution Of Criminal Offenders.’ The criminal charge for obstruction of
justice shall be filed before the designated cybercrime court that has jurisdiction
over the place where the non-compliance was committed.
Where does Cybercrime case be filed and who have the Jurisdiction over
the Cybercrime Cases in the Philippines?
The criminal actions for violation of RA 10175, shall be filed before the
designated special cybercrime court (RTC) of the province or city where
the offense or any of its elements is committed, or where any part of the
computer system used is situated, or where any of the damage caused to
a natural or juridical person took place.