IT ERA
REVIEW
LESSON 13 Information Technology Era.pptx
LESSON 13 Information Technology Era.pptx
LESSON 13 Information Technology Era.pptx
LESSON 13 Information Technology Era.pptx
DIGITAL LAWS
AND ETHICS IN
BUSINESS
What are Computer and
Internet Crimes?
•Unauthorized access to computer systems
•Data theft and intellectual property violations
•Identity theft and phishing scams
•Cyberstalking and harassment
•Malware and ransomware attacks
Cybercrime Law in the Philippines
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Definition and scope of the law
•Penalties for hacking, data interference, and misuse of
devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI)
and other agencies in cybercrime enforcement
Cybercrime Law - Specific Offenses
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Illegal Access: Hacking into systems without permission
•Data Interference: Unauthorized alteration, deletion, or
suppression of data
•Cyber Libel: Defamation through electronic means
•Cybersex: The use of the internet for exploitation or illegal
sexual acts
International Cybercrime Laws
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Budapest Convention: The first international treaty
addressing internet and computer crime
•Importance of international cooperation in combating
cybercrime
•Differences and similarities between global cybercrime
laws and Philippine law
The Ten Commandments of Computer
Ethics
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
1.Do not use a computer to harm others.
2.Do not interfere with other people's work.
3.Do not snoop around in other people’s files.
4.Do not use a computer to steal.
5.Do not use a computer to bear false witness.
The Ten Commandments of Computer
Ethics
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
6. Do not use software without paying for it.
7. Do not use other people's computer resources without
authorization.
8. Do not appropriate other people's intellectual output.
9. Think about the social consequences of the programs
you write.
10. Use computers in ways that show consideration and
respect for others.
Philippine Laws on Cybercrime
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•RA 10175 (Cybercrime Prevention Act of 2012)
•RA 8792 (Electronic Commerce Act of 2000)
•RA 9995 (Anti-Photo and Video Voyeurism Act of 2009)
•RA 9775 (Anti-Child Pornography Act of 2009)
RA 10175 (Cybercrime Prevention Act of
2012)
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•A 10175 is the law that defines and penalizes cybercrimes in the
Philippines. The act covers various forms of cybercrimes, including
offenses related to computers, the internet, and digital
communications. The main purpose of this law is to combat illegal
activities conducted using technology while ensuring data protection
and network security.
RA 10175 (Cybercrime Prevention Act of
2012)
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
•Penalties for hacking, data interference, and misuse of devices
•Penalties for identity theft, cybersex, and online libel
•The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
• Example:
• Case of Hacking (Illegal Access): A person hacking into another
individual's online banking account to transfer funds illegally.
• Cyber Libel Case: A blogger or social media user posts defamatory
comments or false information about a public figure, causing
reputational damage. This act is punishable under RA 10175.
•RA 8792 (Electronic Commerce Act of
2000)
•RA 8792, also known as the Electronic Commerce Act of 2000,
is the law that provides the legal framework for electronic
commercial transactions in the Philippines. It recognizes the
validity of electronic documents, contracts, and signatures,
ensuring that transactions conducted electronically are legally
binding. The law is essential for the growth of e-commerce, digital
businesses, and online transactions in the country.
•RA 8792 (Electronic Commerce Act of
2000)
e of software from a foreign company. Under RA 8792, the electronic signature is as legally binding as a physical signature
se of software from a foreign company. Under RA 8792, the electronic signature is as legally binding as a physical signatur
•Example 1: Legal Online Contracts:
•A business owner agrees to purchase goods through an online platform. The terms
and conditions of the sale are accepted through a digital agreement, and payment
is made online. Under RA 8792, this transaction is legally binding, just like a
traditional contract signed with pen and paper.
•Example 2: Electronic Signature in a Business Agreement:
•A business partner in the Philippines electronically signs a contract for the
purchase of software from a foreign company. Under RA 8792, the electronic
signature is as legally binding as a physical signature.
•RA 9995 (Anti-Photo and Video
Voyeurism Act of 2009)
•RA 9995, also known as the Anti-Photo and Video Voyeurism Act of
2009, is a law in the Philippines that criminalizes acts of recording,
copying, reproducing, or sharing intimate images or videos without
the consent of the individuals involved. The act specifically prohibits
recording images or videos of private parts or sexual acts without
the knowledge or permission of the person(s) involved, and it also
makes it illegal to distribute these materials, whether online or
offline.
•RA 9995 (Anti-Photo and Video
Voyeurism Act of 2009)
•Example 1: Secretly Recording a Private Act:
•A person secretly installs a hidden camera in a bedroom or bathroom and records another
individual without their knowledge. The act of recording this private moment without consent is a
violation of RA 9995. Even if the recording is not shared, the mere act of capturing it without
permission is punishable.
•Example 2: Sharing a Private Video Online:
•An individual obtains a video of someone in a compromising or intimate situation (e.g., a sex
tape or nude photos) and shares it on social media or sends it to others without the subject's
consent. This act of distributing private content violates RA 9995 and can lead to legal penalties,
including imprisonment.
•RA 9775 (Anti-Child Pornography Act of
2009)
•RA 9775, also known as the Anti-Child Pornography Act of 2009, is
a law in the Philippines that criminalizes the production, distribution,
and consumption of any form of child pornography. The law aims to
protect minors (individuals under the age of 18) from exploitation in
any form of media, whether digital or physical. It mandates strict
penalties for those involved in the creation, possession, and
dissemination of child pornographic materials.
•RA 9775 (Anti-Child Pornography Act of
2009)
•Example 1: Online Distribution of Child Pornography:
•A person creates or obtains explicit images of children and shares them on websites or
social media platforms. This act of distributing child pornography over the internet is a
violation of RA 9775. Both the uploader and the platform (if it fails to take action) can be
penalized.
•Example 2: Possession of Child Pornographic Material:
•An individual is found to have downloaded and saved child pornographic images or
videos on their computer or phone. Even if the material is not shared, the mere
possession of child pornography violates RA 9775, and the individual can face
imprisonment and fines.
•RA 9775 (Anti-Child Pornography Act of
2009)
•Example 1: Online Distribution of Child Pornography:
•A person creates or obtains explicit images of children and shares them on websites or
social media platforms. This act of distributing child pornography over the internet is a
violation of RA 9775. Both the uploader and the platform (if it fails to take action) can be
penalized.
•Example 2: Possession of Child Pornographic Material:
•An individual is found to have downloaded and saved child pornographic images or
videos on their computer or phone. Even if the material is not shared, the mere
possession of child pornography violates RA 9775, and the individual can face
imprisonment and fines.
quiz
Enhancing your presentation

More Related Content

PPTX
[AAA-1] LECTURE PRIMER ON CYBERCRIME.pptx
PPTX
Chapter 2 - Computer Engineering and IT Laws.pptx
PPTX
Cyber Banking Conference
PPTX
LESSON 2-CYBERCRIME and criminal activities
PPTX
LESSON 2-CYBERCRIME, criminals Activities IT ERA
PPTX
Cyber Security
PPSX
Cyber law2
PDF
Cyber Security law in Bangladesh
[AAA-1] LECTURE PRIMER ON CYBERCRIME.pptx
Chapter 2 - Computer Engineering and IT Laws.pptx
Cyber Banking Conference
LESSON 2-CYBERCRIME and criminal activities
LESSON 2-CYBERCRIME, criminals Activities IT ERA
Cyber Security
Cyber law2
Cyber Security law in Bangladesh

Similar to LESSON 13 Information Technology Era.pptx (20)

PPTX
Lecture 6 Laws Ethics CYBERCRIME PREVENTION ACT OF 2012
PPTX
Unit-3 Cyber Crime PPT.pptx
PPTX
Cyber Crime(Hacking) - IT acts
PPTX
Cyber crime ✔
PDF
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
PDF
cyber crimes in India LAWS & Guidelines_
PPTX
The disadvantage of ict.pptx
PDF
Cyberspace Usages Challenges And Disputeresolution Ja
PPTX
Cyber law comp
PDF
Chapter-3-Ethics-in-Information-Technology.pdf
PDF
ICT, the Self, and Society.pdf
PPTX
cyber crime in india and law related to cyber crime
PPTX
Living in the IT era - CYBERCRIME- -.pptx
PPT
Cyber-Crime-in- India at Present day and Laws
PPTX
Indian Cyber laws
PPTX
Cyber laws
PPTX
Cyber Crimes & Legal Framework(cyber crime and ethics)
PDF
M1-01-CybercrimeIntroduction.pdf
PPTX
cyber law IT Act 2000
PPTX
Cyber crime ppt
Lecture 6 Laws Ethics CYBERCRIME PREVENTION ACT OF 2012
Unit-3 Cyber Crime PPT.pptx
Cyber Crime(Hacking) - IT acts
Cyber crime ✔
Anti-Child Porn Act & Privacy (slides from ICT4PHD)
cyber crimes in India LAWS & Guidelines_
The disadvantage of ict.pptx
Cyberspace Usages Challenges And Disputeresolution Ja
Cyber law comp
Chapter-3-Ethics-in-Information-Technology.pdf
ICT, the Self, and Society.pdf
cyber crime in india and law related to cyber crime
Living in the IT era - CYBERCRIME- -.pptx
Cyber-Crime-in- India at Present day and Laws
Indian Cyber laws
Cyber laws
Cyber Crimes & Legal Framework(cyber crime and ethics)
M1-01-CybercrimeIntroduction.pdf
cyber law IT Act 2000
Cyber crime ppt
Ad

More from ElleLegaspi1 (9)

PPTX
Lesson 8 - Cyber security and Data Protection.pptx
PPTX
5. NU GEFIDO1X Panitikan - Kahulugan, Kahalagahan at iba pa(1).pptx
PPTX
Slide 3 Art Appreciation lecture four.pptx
PPTX
Slide 2 Art Appreciation Lecture 3 .pptx
PPTX
Science Technology and Society WEEK 8 - 9.pptx
PPTX
Week 12 International Financial Market and Innovations.pptx
PPTX
Case Study total quality control and operations management.pptx
PPTX
Science, Technology and Society WEEK 4 pptx
PPTX
Week 1-2 Introduction to Financial Markets and Financial Systems.pptx
Lesson 8 - Cyber security and Data Protection.pptx
5. NU GEFIDO1X Panitikan - Kahulugan, Kahalagahan at iba pa(1).pptx
Slide 3 Art Appreciation lecture four.pptx
Slide 2 Art Appreciation Lecture 3 .pptx
Science Technology and Society WEEK 8 - 9.pptx
Week 12 International Financial Market and Innovations.pptx
Case Study total quality control and operations management.pptx
Science, Technology and Society WEEK 4 pptx
Week 1-2 Introduction to Financial Markets and Financial Systems.pptx
Ad

Recently uploaded (20)

PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Ensemble model-based arrhythmia classification with local interpretable model...
4 layer Arch & Reference Arch of IoT.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
Auditboard EB SOX Playbook 2023 edition.
NewMind AI Weekly Chronicles – August ’25 Week IV
Early detection and classification of bone marrow changes in lumbar vertebrae...
SGT Report The Beast Plan and Cyberphysical Systems of Control
Rapid Prototyping: A lecture on prototyping techniques for interface design
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
CEH Module 2 Footprinting CEH V13, concepts
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
AI.gov: A Trojan Horse in the Age of Artificial Intelligence

LESSON 13 Information Technology Era.pptx

  • 8. What are Computer and Internet Crimes? •Unauthorized access to computer systems •Data theft and intellectual property violations •Identity theft and phishing scams •Cyberstalking and harassment •Malware and ransomware attacks
  • 9. Cybercrime Law in the Philippines •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Definition and scope of the law •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement
  • 10. Cybercrime Law - Specific Offenses •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Illegal Access: Hacking into systems without permission •Data Interference: Unauthorized alteration, deletion, or suppression of data •Cyber Libel: Defamation through electronic means •Cybersex: The use of the internet for exploitation or illegal sexual acts
  • 11. International Cybercrime Laws •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Budapest Convention: The first international treaty addressing internet and computer crime •Importance of international cooperation in combating cybercrime •Differences and similarities between global cybercrime laws and Philippine law
  • 12. The Ten Commandments of Computer Ethics •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement 1.Do not use a computer to harm others. 2.Do not interfere with other people's work. 3.Do not snoop around in other people’s files. 4.Do not use a computer to steal. 5.Do not use a computer to bear false witness.
  • 13. The Ten Commandments of Computer Ethics •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement 6. Do not use software without paying for it. 7. Do not use other people's computer resources without authorization. 8. Do not appropriate other people's intellectual output. 9. Think about the social consequences of the programs you write. 10. Use computers in ways that show consideration and respect for others.
  • 14. Philippine Laws on Cybercrime •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •RA 10175 (Cybercrime Prevention Act of 2012) •RA 8792 (Electronic Commerce Act of 2000) •RA 9995 (Anti-Photo and Video Voyeurism Act of 2009) •RA 9775 (Anti-Child Pornography Act of 2009)
  • 15. RA 10175 (Cybercrime Prevention Act of 2012) •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •A 10175 is the law that defines and penalizes cybercrimes in the Philippines. The act covers various forms of cybercrimes, including offenses related to computers, the internet, and digital communications. The main purpose of this law is to combat illegal activities conducted using technology while ensuring data protection and network security.
  • 16. RA 10175 (Cybercrime Prevention Act of 2012) •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement •Penalties for hacking, data interference, and misuse of devices •Penalties for identity theft, cybersex, and online libel •The role of the National Bureau of Investigation (NBI) and other agencies in cybercrime enforcement • Example: • Case of Hacking (Illegal Access): A person hacking into another individual's online banking account to transfer funds illegally. • Cyber Libel Case: A blogger or social media user posts defamatory comments or false information about a public figure, causing reputational damage. This act is punishable under RA 10175.
  • 17. •RA 8792 (Electronic Commerce Act of 2000) •RA 8792, also known as the Electronic Commerce Act of 2000, is the law that provides the legal framework for electronic commercial transactions in the Philippines. It recognizes the validity of electronic documents, contracts, and signatures, ensuring that transactions conducted electronically are legally binding. The law is essential for the growth of e-commerce, digital businesses, and online transactions in the country.
  • 18. •RA 8792 (Electronic Commerce Act of 2000) e of software from a foreign company. Under RA 8792, the electronic signature is as legally binding as a physical signature se of software from a foreign company. Under RA 8792, the electronic signature is as legally binding as a physical signatur •Example 1: Legal Online Contracts: •A business owner agrees to purchase goods through an online platform. The terms and conditions of the sale are accepted through a digital agreement, and payment is made online. Under RA 8792, this transaction is legally binding, just like a traditional contract signed with pen and paper. •Example 2: Electronic Signature in a Business Agreement: •A business partner in the Philippines electronically signs a contract for the purchase of software from a foreign company. Under RA 8792, the electronic signature is as legally binding as a physical signature.
  • 19. •RA 9995 (Anti-Photo and Video Voyeurism Act of 2009) •RA 9995, also known as the Anti-Photo and Video Voyeurism Act of 2009, is a law in the Philippines that criminalizes acts of recording, copying, reproducing, or sharing intimate images or videos without the consent of the individuals involved. The act specifically prohibits recording images or videos of private parts or sexual acts without the knowledge or permission of the person(s) involved, and it also makes it illegal to distribute these materials, whether online or offline.
  • 20. •RA 9995 (Anti-Photo and Video Voyeurism Act of 2009) •Example 1: Secretly Recording a Private Act: •A person secretly installs a hidden camera in a bedroom or bathroom and records another individual without their knowledge. The act of recording this private moment without consent is a violation of RA 9995. Even if the recording is not shared, the mere act of capturing it without permission is punishable. •Example 2: Sharing a Private Video Online: •An individual obtains a video of someone in a compromising or intimate situation (e.g., a sex tape or nude photos) and shares it on social media or sends it to others without the subject's consent. This act of distributing private content violates RA 9995 and can lead to legal penalties, including imprisonment.
  • 21. •RA 9775 (Anti-Child Pornography Act of 2009) •RA 9775, also known as the Anti-Child Pornography Act of 2009, is a law in the Philippines that criminalizes the production, distribution, and consumption of any form of child pornography. The law aims to protect minors (individuals under the age of 18) from exploitation in any form of media, whether digital or physical. It mandates strict penalties for those involved in the creation, possession, and dissemination of child pornographic materials.
  • 22. •RA 9775 (Anti-Child Pornography Act of 2009) •Example 1: Online Distribution of Child Pornography: •A person creates or obtains explicit images of children and shares them on websites or social media platforms. This act of distributing child pornography over the internet is a violation of RA 9775. Both the uploader and the platform (if it fails to take action) can be penalized. •Example 2: Possession of Child Pornographic Material: •An individual is found to have downloaded and saved child pornographic images or videos on their computer or phone. Even if the material is not shared, the mere possession of child pornography violates RA 9775, and the individual can face imprisonment and fines.
  • 23. •RA 9775 (Anti-Child Pornography Act of 2009) •Example 1: Online Distribution of Child Pornography: •A person creates or obtains explicit images of children and shares them on websites or social media platforms. This act of distributing child pornography over the internet is a violation of RA 9775. Both the uploader and the platform (if it fails to take action) can be penalized. •Example 2: Possession of Child Pornographic Material: •An individual is found to have downloaded and saved child pornographic images or videos on their computer or phone. Even if the material is not shared, the mere possession of child pornography violates RA 9775, and the individual can face imprisonment and fines.