{"id":6188,"date":"2019-05-09T22:19:00","date_gmt":"2019-05-09T14:19:00","guid":{"rendered":"https:\/\/pnl-law.com\/blog\/?p=6188"},"modified":"2020-06-14T16:37:55","modified_gmt":"2020-06-14T08:37:55","slug":"glossary-data-privacy-internet-technology-and-cybercrimes","status":"publish","type":"post","link":"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/","title":{"rendered":"Glossary: Data Privacy, Internet, Technology and Cybercrimes"},"content":{"rendered":"\n<p>[Definitions or characterizations provided in Republic Act No. 10173 (<a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">Data Privacy Act of 2012<\/a>) and Republic Act No. 10175 (<a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">Cybercrime Prevention Act of 2012<\/a>), Republic Act No. 8792 (Electronic Commerce of 2000), as well as the respective Implementing Rules and Regulations of these laws, including the <a href=\"https:\/\/pnl-law.com\/blog\/rule-on-cybercrime-warrants-a-m-no-17-11-03-sc-full-text\/\">Rule on Cybercrime Warrants<\/a>.]<\/p>\n\n\n\n<!--more-->\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>A<\/strong><\/td><td><strong>B<\/strong><\/td><\/tr><tr><td>*&nbsp;<a href=\"#Access\">Access<\/a><br \/>* <a href=\"#Addressee\">Addressee<\/a><br \/>*&nbsp;<a href=\"#Aiding-Abetting-Cybercrime\">Aiding or abetting in the commission of cybercrime<\/a><br \/>*&nbsp;<a href=\"#Alteration\">Alteration<\/a><br \/>* <a href=\"#Anti-Wiretapping-Law\">Anti-Wiretapping Law<\/a><br \/>* <a href=\"#Asymmetric-Public-Cryptosystem\">Asymmetric or public cryptosystem<\/a><br \/>*&nbsp;<a href=\"#Attempt-Cybercrime\">Attempt in the commission of cybercrime<\/a><\/td><td>* <a href=\"#Bit-Streaming\">Bit streaming<\/a><br \/>* <a href=\"#Broadcast\">Broadcast<\/a><br \/>* <a href=\"#Business-Records\">Business records<\/a><\/td><\/tr><tr><td><strong>C<\/strong><\/td><td><strong>D<\/strong><\/td><\/tr><tr><td>* <a href=\"#Capture\">Capture<\/a><br \/>* <a href=\"#Certificate\">Certificate<\/a><br \/>*&nbsp;<a href=\"#Child-Pornography\">Child Pornography&nbsp;<\/a><br \/>*&nbsp;<a href=\"#Collection\">Collection<\/a><br \/>*&nbsp;<a href=\"#Communication\">Communication<\/a><br \/>*&nbsp;<a href=\"#Computer\">Computer<\/a><br \/>*&nbsp;<a href=\"#Computer-Data\">Computer data<\/a><br \/>*&nbsp;<a href=\"#Computer-Program\">Computer program<\/a><br \/>*&nbsp;<a href=\"#Computer-Forgery\">Computer-related forgery<\/a><br \/>*&nbsp;<a href=\"#Computer-Fraud\">Computer-related fraud<\/a><br \/>*&nbsp;<a href=\"#Computer-Identity-Theft\">Computer-related identity theft<\/a><br \/>*&nbsp;<a href=\"#Computer-System\">Computer system<\/a><br \/>*&nbsp;<a href=\"#Consent-Data-Subject\">Consent of the data subject<\/a><br \/>*&nbsp;<a href=\"#Content-Data\">Content data<\/a><br \/>*&nbsp;<a href=\"#Critical-Infrastructure\">Critical infrastructure<\/a><br \/>*&nbsp;<a href=\"#Cyber\">Cyber<\/a><br \/>*&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a><br \/>* <a href=\"#Cybercrime-Court\">Cybercrime court<\/a><br \/>*&nbsp;<a href=\"#Cybercrime-Offenses\">Cybercrime offenses<\/a><br \/>*&nbsp;<a href=\"#Cybersecurity\">Cybersecurity<\/a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<br \/>*&nbsp;<a href=\"#Cybersex\">Cybersex<\/a><br \/>*&nbsp;<a href=\"#Cyber-Libel\">Cyber libel<\/a><br \/>*&nbsp;<a href=\"#Cyber-Squatting\">Cyber squatting<\/a><\/td><td>*&nbsp;<a href=\"#Database\">Database<\/a><br \/>*&nbsp;<a href=\"#Data-Interference\">Data interference<\/a><br \/>*&nbsp;<a href=\"#Data-Processing-Systems\">Data processing systems<\/a><br \/>*&nbsp;<a href=\"#Data-Sharing\">Data sharing<\/a><br \/>*&nbsp;<a href=\"#Data-Subject\">Data subject<\/a><br \/>*&nbsp;<a href=\"#Digital-Evidence\">Digital evidence<\/a><br \/>* <a href=\"#Digital-Signature\">Digital signature<\/a><br \/>* <a href=\"#Digitally-Signed\">Digitally signed<\/a><br \/>*&nbsp;<a href=\"#Direct-Marketing\">Direct marketing<\/a><\/td><\/tr><tr><td><strong>E<\/strong><\/td><td><strong>F<\/strong><\/td><\/tr><tr><td>* <a href=\"#Electronic-Data-Message\">Electronic data message<\/a><br \/>* <a href=\"#Electronic-Document\">Electronic document<\/a><br \/>*&nbsp;<a href=\"#Electronic-Evidence\">Electronic evidence&nbsp;<\/a><br \/>* <a href=\"#Electronic-Key\">Electronic key<\/a><br \/>* <a href=\"#Electronic-Signature\">Electronic signature<\/a><br \/>* <a href=\"#Ephemeral-Electronic-Communication\">Ephemeral electronic communication<\/a><br \/>* <a href=\"#Ethical-Hackers\">Ethical hackers<\/a><\/td><td>*<a href=\"#Female-Breast\">Female breast<\/a><br \/>*&nbsp;<a href=\"#Filing-System\">Filing system<\/a><br \/>*&nbsp;<a href=\"#Forensics\">Forensics<\/a><br \/>*&nbsp;<a href=\"#Forensic-Copy\">Forensic copy<\/a><br \/>*&nbsp;<a href=\"#Forensic-Image\">Forensic image<\/a><\/td><\/tr><tr><td><strong>H<\/strong><\/td><td><strong>I<\/strong><\/td><\/tr><tr><td>&nbsp;*&nbsp;<a href=\"#Hash-Value\">Hash value<\/a><\/td><td>*&nbsp;<a href=\"#Identifying-Information\">Identifying information<\/a><br \/>*&nbsp;<a href=\"#Illegal-Access\">Illegal access<\/a><br \/>*&nbsp;<a href=\"#Illegal-Interception\">Illegal interception<\/a><br \/>*&nbsp;<a href=\"#Information-Communications-System\">Information and communications system<\/a><br \/>*&nbsp;<a href=\"#Information-Communication-Technology-System\">Information and communication technology system&nbsp;<\/a><br \/>*&nbsp;<a href=\"#Interception\">Interception<\/a><br \/>* <a href=\"#Intermediary\">Intermediary<\/a><br \/>*&nbsp;<a href=\"#Internet-Content-Host\">Internet content host&nbsp;<\/a><br \/>* <a href=\"#Internet-Libel\">Internet libel<\/a><br \/>* <a href=\"#Item\">Item<\/a><\/td><\/tr><tr><td><strong>K<\/strong><\/td><td><strong>L<\/strong><\/td><\/tr><tr><td>&nbsp;* <a href=\"#Key-Pair\">Key pair<\/a><\/td><td>*&nbsp;<a href=\"#Libel\">Libel<\/a><\/td><\/tr><tr><td><strong>M<\/strong><\/td><td><strong>N<\/strong><\/td><\/tr><tr><td>*&nbsp;<a href=\"#Misuse-Devices\">Misuse of devices<\/a><\/td><td>*&nbsp;<a href=\"#National-Cybercrime-Plan\">National cybersecurity plan<\/a><br \/>*&nbsp;<a href=\"#Non-Content-Data\">Non-content data<\/a><\/td><\/tr><tr><td><strong>O<\/strong><\/td><td><strong>P<\/strong><\/td><\/tr><tr><td>* <a href=\"#Offense\">Offense<\/a><br \/>* <a href=\"#Off-Site-Search\">Off-site search<\/a><br \/>* <a href=\"#On-Site-Search\">On-site search<\/a><br \/>* <a href=\"#Online-Libel\">Online libel<\/a><br \/>*&nbsp;<a href=\"#Original-Author\">Original author&nbsp;<\/a><br \/>* <a href=\"#Originator\">Originator<\/a><\/td><td>*&nbsp;<a href=\"#Personal-Data\">Personal data<\/a><br \/>*&nbsp;<a href=\"#Personal-Data-Breach\">Personal data breach<\/a><br \/>*&nbsp;<a href=\"#Personal-Information\">Personal information<\/a><br \/>*&nbsp;<a href=\"#Personal-Information-Controller\">Personal information controller<\/a><br \/>*&nbsp;<a href=\"#Personal-Information-Processor\">Personal information processor<\/a><br \/>* <a href=\"#Photo-Video-Voyeurism\">Photo or video voyeurism<\/a><br \/>*&nbsp;<a href=\"#Preservation\">Preservation<\/a><br \/>* <a href=\"#Private-Area-Person\">Private area of a person<\/a><br \/>* <a href=\"#Private-Key\">Private key<\/a><br \/>*&nbsp;<a href=\"#Privileged-Information\">Privileged information<\/a><br \/>*&nbsp;<a href=\"#Processing\">Processing<\/a><br \/>*&nbsp;<a href=\"#Profiling\">Profiling<\/a><br \/>*&nbsp;<a href=\"#Public-Authority\">Public authority<\/a><br \/>* <a href=\"#Public-Key\">Public key<\/a><\/td><\/tr><tr><td><strong>S<\/strong><\/td><td><strong>T<\/strong><\/td><\/tr><tr><td>*&nbsp;<a href=\"#Security-Incident\">Security incident<\/a><br \/>*&nbsp;<a href=\"#Sensitive-Personal-Information\">Sensitive personal information<\/a><br \/>*&nbsp;<a href=\"#Service-Provider\">Service provider&nbsp;<\/a><br \/>*&nbsp;<a href=\"#Subscribers-Information\">Subscriber\u2019s information&nbsp;<\/a><br \/>*&nbsp;<a href=\"#System-Interference\">System interference<\/a><\/td><td>*&nbsp;<a href=\"#Traffic-Data\">Traffic data<\/a>&nbsp;<\/td><\/tr><tr><td><strong>U<\/strong><\/td><td><strong>V<\/strong><\/td><\/tr><tr><td>* <a href=\"#Circumstances-Privacy\">Under circumstances in which a person has a reasonable expectation of privacy<\/a><br \/>*&nbsp;<a href=\"#Unsolicited-Communications\">Unsolicited commercial communications<\/a><\/td><td>* <a href=\"#Video-Voyeurism\">Video voyeurism<\/a><\/td><\/tr><tr><td><strong>W<\/strong><\/td><td><\/td><\/tr><tr><td>* <a href=\"#Warrant-Disclose-Computer-Data\">Warrant to Disclose Computer Data<\/a><br \/>* <a href=\"#WECD\">Warrant to Examine Computer Data<\/a>&nbsp;<br \/>* <a href=\"#Warrant-Intercept-Computer-Data\">Warrant to Intercept Computer Data<\/a>&nbsp;<br \/>* <a href=\"#WSSECD\">Warrant to Search, Seize and Examine Computer Data<\/a><br \/>* <a href=\"#Wiretapping\">Wiretapping<\/a><br \/>*&nbsp;<a href=\"#Without-Right\">Without Right<\/a><\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Access\">Access<\/h2>\n\n\n\n<p>The instruction,&nbsp;<a href=\"#Communication\">communication<\/a>&nbsp;with, storing data in, retrieving data from, or otherwise making use of any resources of a&nbsp;<a href=\"#Computer-System\">computer system<\/a>&nbsp;or communication network. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Addressee\">Addressee<\/h2>\n\n\n\n<p>A person who is intended by the originator to receive the electronic data message or electronic document. The term does not include a person acting as an intermediary with respect to that electronic data message or electronic document. [RA <a href=\"https:\/\/pnl-law.com\/blog\/electronic-commerce-act-of-2000-republic-act-no-8792-full-text\/\">8792<\/a>, Sec. 5]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Aiding-Abetting-Cybercrime\">Aiding or abetting in the commission of cybercrime<\/h2>\n\n\n\n<p>Any person who willfully abets or aids in the commission of any of the&nbsp;<a href=\"#Cybercrime\">offenses<\/a>&nbsp;enumerated in <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">RA 10175<\/a> is liable. [RA <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">10175<\/a>, Sec. 5(a)]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Alteration\">Alteration<\/h2>\n\n\n\n<p>The modification or change, in form or substance, of an existing&nbsp;<a href=\"#Computer-Data\">computer data<\/a>&nbsp;or&nbsp;<a href=\"#Computer-Program\">program<\/a>. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Anti-Wiretapping-Law\">Anti-Wiretapping Law<\/h2>\n\n\n\n<p><a href=\"https:\/\/pnl-law.com\/blog\/anti-wiretapping-law-republic-act-no-4200-full-text\/\">Republic Act No. 4200<\/a>, which declares it unlawful for any person to tap any wire or cable, or by using any other device or arrangement, to secretly overhear, intercept, or record such communication or spoken word by using a device commonly known as a dictaphone or dictagraph or dictaphone or walkie-talkie or tape recorder, or however otherwise described. [See discussion <a href=\"https:\/\/pnl-law.com\/blog\/interception-of-computer-data-wicd-in-connection-with-cybercrime-warrants\/\">Interception of Computer Data<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Asymmetric-Public-Cryptosystem\">Asymmetric or public cryptosystem<\/h2>\n\n\n\n<p>A system capable of generating a secure key pair, consisting of a <a href=\"#Ditigal-Signature\">private key<\/a> for creating a digital signature, and a public key for verifying the digital signature.&nbsp;[Rules on Electronic Evidence, A.M. NO. 01-7-01-SC]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Attempt-Commission-Cybercrime\">Attempt in the commission of cybercrime<\/h2>\n\n\n\n<p>Any person who willfully attempts to commit any of the&nbsp;<a href=\"#Cybercrime\">offenses<\/a>&nbsp;enumerated in RA 10175 is liable. [RA <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">10175<\/a>, Sec. 5(b)]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Bit-Streaming\">Bit streaming&nbsp;<\/h2>\n\n\n\n<p>Making a clone copy of a computer drive. It copies virtually everything included in the drive, including sectors and clusters, which makes it possible to retrieve files that were deleted from the drive. Bit stream images are usually used when conducting digital <a href=\"#Forensics\">forensic<\/a> investigations in a bid to avoid tampering with digital evidence such that it is not lost or corrupted. [Referenced in Sec. 4.3(6), <a href=\"https:\/\/pnl-law.com\/blog\/rule-on-cybercrime-warrants-a-m-no-17-11-03-sc-full-text\/\">Rule on Cybercrime Warrants<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Broadcast\">Broadcast<\/h2>\n\n\n\n<p>To make public, by any means, a visual image with the intent that it be viewed by a person or persons. [Anti-Photo and Video Voyeurism Act of 2009 (<a href=\"https:\/\/pnl-law.com\/blog\/anti-photo-and-video-voyeurism-act-of-2009\/\">Republic Act No. 9995<\/a>); See <a href=\"https:\/\/pnl-law.com\/blog\/primer-on-the-anti-photo-and-video-voyeurism-act-of-2009-ra-9995\/\">Primer<\/a>; <a href=\"https:\/\/pnl-law.com\/blog\/interception-of-computer-data-wicd-in-connection-with-cybercrime-warrants\/\">Warrant to Incept Computer Data<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Business records<\/h2>\n\n\n\n<p>Include records of any business, institution, association, profession, occupation, and calling of every kind, whether or not conducted for profit, or for legitimate purposes.&nbsp;[Rules on Electronic Evidence]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Capture\">Capture<\/h2>\n\n\n\n<p>With respect to an image, means to videotape, photograph, film, record by any means, or broadcast. [Anti-Photo and Video Voyeurism Act of 2009 (<a href=\"https:\/\/pnl-law.com\/blog\/anti-photo-and-video-voyeurism-act-of-2009\/\">Republic Act No. 9995<\/a>); See <a href=\"https:\/\/pnl-law.com\/blog\/primer-on-the-anti-photo-and-video-voyeurism-act-of-2009-ra-9995\/\">Primer<\/a>; <a href=\"https:\/\/pnl-law.com\/blog\/interception-of-computer-data-wicd-in-connection-with-cybercrime-warrants\/\">Warrant to Incept Computer Data<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Certificate\">Certificate<\/h2>\n\n\n\n<p>An electronic document issued to support a <a href=\"#Digital-Signature\">digital signature<\/a> which purports to confirm the identity or other significant characteristics of the person who holds a particular <a href=\"#Key-Pair\">key pair<\/a>.&nbsp;[Rules on Electronic Evidence, A.M. NO. 01-7-01-SC]&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Child-Pornography\">Child Pornography&nbsp;<\/h2>\n\n\n\n<p>The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the \u201cAnti-Child Pornography Act of 2009\u201d, committed through a&nbsp;<a href=\"#Computer-System\">computer system<\/a>, provided&nbsp;that the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3; See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Collection\">Collection&nbsp;<\/h2>\n\n\n\n<p>Gathering and receiving information. [RA 10175 IRR, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Communication\">Communication&nbsp;<\/h2>\n\n\n\n<p>The transmission of information through information and communication technology (ICT) media, including voice, video and other forms of data. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Computer\">Computer<\/h2>\n\n\n\n<p>An electronic, magnetic, optical, electrochemical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing or storage functions, and which includes any storage facility or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device, including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the internet. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<p>Any single or interconnected device or apparatus, which, by electronic, electro-mechanical or magnetic impulse, or by other means with the same function, can receive, record, transmit, store, process, correlate, analyze, project, retrieve and\/or produce information, data, text, graphics, figures, voice, video, symbols or other modes of expression or perform any one or more of these functions.&nbsp;[Rules on Electronic Evidence]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Computer-Data\">Computer data<\/h2>\n\n\n\n<p>Any representation of facts, information, or concepts in a form suitable for processing in a&nbsp;<a href=\"#Electronic-System\">computer system<\/a>, including a program suitable to cause a computer system to perform a function, and includes electronic documents and\/or electronic data messages whether stored in local computer systems or online. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Computer-Program\">Computer program<\/h2>\n\n\n\n<p>A set of instructions executed by the computer to achieve intended results. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Computer-Forgery\">Computer-related forgery<\/h2>\n\n\n\n<p>The (a) input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or (b) Act of knowingly using computer data which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design. [RA <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">10175<\/a>, Sec. 4(b); See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Computer-Fraud\">Computer-related fraud<\/h2>\n\n\n\n<p>The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent. [<a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">RA 10175<\/a>, Sec. 4(b); See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Computer-Identity-Theft\">Computer-related identity theft<\/h2>\n\n\n\n<p>The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of <a href=\"#Identifying-Information\">identifying information<\/a> belonging to another, whether natural or juridical, <a href=\"#Without-Right\">without right<\/a>. [<a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">RA 10175,<\/a> Sec. 4(b); See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Computer-System\">Computer system<\/h2>\n\n\n\n<p>Any device or group of interconnected or related devices, one or more of which, pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities, including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components, which may stand alone or be connected to a network or other similar devices. It also includes computer data storage devices or media. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Consent-Data-Subject\">Consent of the data subject<\/h2>\n\n\n\n<p>Any freely given, specific, informed indication of will, whereby the <a href=\"#Data-Subject\">data subject<\/a> agrees to the collection and processing of his or her <a href=\"#Personal-Sensitive-Information\">personal, sensitive persona<\/a>l, or <a href=\"#Privileged-Information\">privileged information<\/a>. Consent shall be evidenced by written, electronic or recorded means. It may also be given on behalf of a data subject by a lawful representative or an agent specifically authorized by the data subject to do so. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Content-Data\">Content data<\/h2>\n\n\n\n<p>The communication content of the <a href=\"#Communication\">communication<\/a>, the meaning or purport of the communication, or the message or information being conveyed by the communication, other than <a href=\"#Traffic-Data\">traffic data<\/a>. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Critical-Infrastructure\">Critical infrastructure<\/h2>\n\n\n\n<p>The <a href=\"#Computer-System\">computer systems<\/a>, and\/or networks, whether physical or virtual, and\/or the <a href=\"#Computer-Program\">computer programs<\/a>, <a href=\"#Computer-Data\">computer data<\/a> and\/or <a href=\"#Traffic-Data\">traffic data<\/a> that are so vital to this country that the incapacity or destruction of or interference with such system and assets would have a debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Cyber\">Cyber<\/h2>\n\n\n\n<p>A <a href=\"#Computer\">computer<\/a> or a computer network, the electronic medium in which online communication takes place. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Cybercrimes\">Cybercrimes<\/h2>\n\n\n\n<p>Cybercrimes are offenses defined and penalized under the <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">Cybercrime Prevention Act of 2012<\/a> (<a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">RA 10175<\/a>), or offenses defined and penalized in other laws but using <a href=\"#Information-Communications-Technology\">information and communications technology<\/a>. [<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">See Cybercrimes in the Philippines<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Cybercrime-Court\">Cybercrime court<\/h2>\n\n\n\n<p>Any of the Regional Trial Courts which are designated as special cybercrime courts under A.M. No. 03-03-03-SC (15 November 2016). [See <a href=\"https:\/\/pnl-law.com\/blog\/rule-on-cybercrime-warrants-a-m-no-17-11-03-sc-full-text\/\">Rule on Cybercrime Warrants<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Cybercrime-Offenses\">Cybercrime offenses<\/h2>\n\n\n\n<p>See <a href=\"#Cybercrime\">Cybercrimes<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Cybersecurity\">Cybersecurity<\/h2>\n\n\n\n<p>The collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment, and organization and user\u2019s assets. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Cybersex\">Cybersex<\/h2>\n\n\n\n<p>The willful engagement, maintenance, control or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3] See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"`Cyber-Libel\">Cyber libel<\/h2>\n\n\n\n<p>See <a href=\"#Online-Libel\">Online libel<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Cyber-Squatting\">Cyber-squatting<\/h2>\n\n\n\n<p>The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same, if such a domain name is: (i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration; (ii) Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and (iii) Acquired without right or with intellectual property interests in it. [RA 10175, Sec. 4(a); See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Database\">Database&nbsp;<\/h2>\n\n\n\n<p>A representation of information, knowledge, facts, concepts or instructions which are being prepared, processed or stored, or have been prepared, processed or stored in a formalized manner, and which are intended for use in a computer system. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Data-Interference\">Data interference<\/h2>\n\n\n\n<p>The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document or electronic data message, without right, including the introduction or transmission of viruses. [RA 10175, Sec. 4(a); See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Data-Processing-Systems\">Data processing systems<\/h2>\n\n\n\n<p>The structure and procedure by which personal data is collected and further processed in an information and communications system or relevant filing system, including the purpose and intended output of the processing. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Data-Sharing\">Data sharing<\/h2>\n\n\n\n<p>The disclosure or transfer to a third party of personal data under the custody of a personal information controller or personal information processor. In the case of the latter, such disclosure or transfer must have been upon the instructions of the personal information controller concerned. The term excludes outsourcing, or the disclosure or transfer of personal data by a personal information controller to a personal information processor. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Data-Subject\">Data subject<\/h2>\n\n\n\n<p>An individual whose personal, sensitive personal, or privileged information is processed. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Digital-Evidence\">Digital evidence<\/h2>\n\n\n\n<p>Digital information that may be used as evidence in a case. The gathering of the digital information may be carried out by confiscation of the storage media (data carrier), the tapping or monitoring of network traffic, or the making of digital copies&nbsp;(e.g.,&nbsp;forensic images, file copies, etc.), of the data held. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Digital-Signature\">Digital signature<\/h2>\n\n\n\n<p>An electronic signature consisting of a transformation of an electronic document or an electronic data message using an asymmetric or public cryptosystem such that a person having the initial untransformed electronic document and the signer\u2019s public key can accurately determine:&nbsp; (i) whether the transformation was created using the private key that corresponds to the signer\u2019s public key; and&nbsp; (ii) whether the initial electronic document had been altered after the transformation was made.&nbsp;[Rules on Electronic Evidence, A.M. NO. 01-7-01-SC]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Digitally-Signed\">Digitally signed<\/h2>\n\n\n\n<p>An <a href=\"#Electronic-Document\">electronic document<\/a> or <a href=\"#Electronic-Data-Messsage\">electronic data message<\/a> bearing a <a href=\"#Digital-Signature\">digital signature<\/a> verified by the <a href=\"#Public-Key\">public key<\/a> listed in a certificate.&nbsp;[Rules on Electronic Evidence, A.M. NO. 01-7-01-SC]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Direct-Marketing\">Direct marketing<\/h2>\n\n\n\n<p>Communication by whatever means of any advertising or marketing material which is directed to particular individuals. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Electronic-Data-Message\">Electronic Data message<\/h2>\n\n\n\n<p>Information generated, sent, received or stored by electronic, optical or similar means. [RA <a href=\"https:\/\/pnl-law.com\/blog\/electronic-commerce-act-of-2000-republic-act-no-8792-full-text\/\">8792<\/a>, Sec. 5]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Electronic-Evidence\">Electronic evidence&nbsp;<\/h2>\n\n\n\n<p>Evidence, the use of which is sanctioned by existing rules of evidence, in ascertaining in a judicial proceeding, the truth respecting a matter of fact, which evidence is received, recorded, transmitted, stored, processed, retrieved or produced electronically. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Electronic-Document\">Electronic document<\/h2>\n\n\n\n<p>Information or the representation of information, data, figures, symbols or other modes of written expression, described or however represented, by which a right is established or an obligation extinguished, or by which a fact may be proved and affirmed, which is received, recorded, transmitted, stored, processed, retrieved or produced electronically. [RA <a href=\"https:\/\/pnl-law.com\/blog\/electronic-commerce-act-of-2000-republic-act-no-8792-full-text\/\">8792<\/a>, Sec. 5]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Electronic-Key\">Electronic key<\/h2>\n\n\n\n<p>A secret code which secures and defends sensitive information that crosses over public channels into a form decipherable only with a matching electronic key. [RA <a href=\"https:\/\/pnl-law.com\/blog\/electronic-commerce-act-of-2000-republic-act-no-8792-full-text\/\">8792<\/a>, Sec. 5]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Electronic-Signature\">Electronic signature<\/h2>\n\n\n\n<p>Information or the representation of information, data, figures, symbols or other modes of written expression, described or however represented, by which a right is established or an obligation extinguished, or by which a fact may be proved and affirmed, which is received, recorded, transmitted, stored processed, retrieved or produced electronically. It includes digitally signed documents and any print-out or output, readable by sight or other means, which accurately reflects the electronic data message or electronic document. Used interchangeably with Electronic data message.&nbsp;[Rules on Electronic Evidence]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Ephemeral-Electronic-Communication\">Ephemeral electronic communication<\/h2>\n\n\n\n<p>Telephone conversations, text messages, chatroom sessions, streaming audio, streaming video, and other electronic forms of communication the evidence of which is not recorded or retained.&nbsp;[Rules on Electronic Evidence]&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Ethical-Hackers\">Ethical hackers<\/h2>\n\n\n\n<p>Professionals who employ tools and techniques used by criminal hackers but would neither damage the target systems nor steal information. Ethical hackers evaluate the target system\u2019s security and report back to the owners the vulnerabilities they found in it and give instructions for how these can be remedied. [Disini vs. Secretary of Justice, G.R. No. 203335, 11 February 2014]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Female-Breast\">Female breast<\/h2>\n\n\n\n<p>Any portion of the female breast. [Anti-Photo and Video Voyeurism Act of 2009 (<a href=\"https:\/\/pnl-law.com\/blog\/anti-photo-and-video-voyeurism-act-of-2009\/\">Republic Act No. 9995<\/a>); See <a href=\"https:\/\/pnl-law.com\/blog\/primer-on-the-anti-photo-and-video-voyeurism-act-of-2009-ra-9995\/\">Primer<\/a>; <a href=\"https:\/\/pnl-law.com\/blog\/interception-of-computer-data-wicd-in-connection-with-cybercrime-warrants\/\">Warrant to Incept Computer Data<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Filing-System\">Filing system<\/h2>\n\n\n\n<p>Any set of information relating to natural or juridical persons to the extent that, although the information is not processed by equipment operating automatically in response to instructions given for that purpose, the set is structured, either by reference to individuals or by reference to criteria relating to individuals, in such a way that specific information relating to a particular individual is readily accessible. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Forensics\">Forensics<\/h2>\n\n\n\n<p>The application of investigative and analytical techniques that conform to evidentiary standards, and are used in, or appropriate for, a court of law or other legal context. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Forensic-Copy\">Forensic copy<\/h2>\n\n\n\n<p>See <a href=\"#Forensic-Image\">Forensic image<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Forensic-Image\">Forensic image<\/h2>\n\n\n\n<p>Forensic image,&nbsp;also known as a&nbsp;forensic copy,&nbsp;refers to an exact bit-by-bit copy of a data carrier, including slack, unallocated space and unused space. There are forensic tools available for making these images. Most tools produce information, like a hash value, to ensure the integrity of the image. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Hash-Value\">Hash value<\/h2>\n\n\n\n<p>The mathematical algorithm produced against digital information (a file, a physical disk or a logical disk) thereby creating a \u201cdigital fingerprint\u201d or \u201cdigital DNA\u201d for that information. It is a one-way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Identifying-Information\">Identifying information<\/h2>\n\n\n\n<p>Any name or number that may be used alone or in conjunction with any other information to identify any specific individual, including any of the following: (1) Name, date of birth, driver\u2019s license number, passport number or tax identification number; (2)  Unique biometric data, such as fingerprint or other unique physical representation; (3) Unique electronic identification number, address or routing code; and (4) Telecommunication identifying information or access device. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Illegal-Access\">Illegal access<\/h2>\n\n\n\n<p>The access to the whole or any part of a <a href=\"#Computer-System\">computer system<\/a> <a href=\"#Without-Right\">without right<\/a>. [RA 10175, Sec. 4(a); See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Illegal-Interception\">Illegal interception<\/h2>\n\n\n\n<p>The interception made by technical means and without right, of any non-public transmission of computer data to, from, or within a computer system, including electromagnetic emissions from a computer system carrying such computer data. [RA 10175, Sec. 4 (a); See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Information-Communications-System\">Information and communications system<\/h2>\n\n\n\n<p>A system for generating, sending, receiving, storing, or otherwise processing electronic data messages or electronic documents, and includes the computer system or other similar device by which data is recorded, transmitted, or stored, and any procedure related to the recording, transmission, or storage of electronic data, electronic message, or electronic document. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3] Same as Information and communication technology system.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Information-Communication-Technology-Systems\">Information and communication technology system<\/h2>\n\n\n\n<p>System intended for, and capable of, generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents, and includes the computer system or other similar device by or in which data is recorded or stored, and any procedures related to the recording or storage of electronic data message or electronic document. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3] Same as <a href=\"#Information-Communication-System\">Information and communication system<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Interception\">Interception<\/h2>\n\n\n\n<p>Listening to, recording, monitoring or surveillance of the content of communications, including procurement of the content of data, either directly through access and use of a <a href=\"#Computer-System\">computer system<\/a>, or indirectly through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Intermediary\">Intermediary<\/h2>\n\n\n\n<p>A person who in behalf of another person and with respect to a particular <a href=\"#Electronic-Document\">electronic document<\/a> sends, receives and\/or stores or provides other services in respect to that electronic document. [RA <a href=\"https:\/\/pnl-law.com\/blog\/electronic-commerce-act-of-2000-republic-act-no-8792-full-text\/\">8792<\/a>, Sec. 5]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Internet-Content-Host\">Internet content host<\/h2>\n\n\n\n<p>A person who hosts or who proposes to host internet content in the Philippines. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Internet-Libel\">Internet libel<\/h2>\n\n\n\n<p>See <a href=\"#Online-Libel\">Online libel<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Item\">Item<\/h2>\n\n\n\n<p>A general term used to refer to objects of the warrant application and\/or the warrant itself, such as the subject <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Computer-Data\">computer data<\/a>, the related computer device\/s, and\/or other parts of the <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Computer-System\">computer system<\/a>. [<a href=\"https:\/\/pnl-law.com\/blog\/rule-on-cybercrime-warrants-a-m-no-17-11-03-sc-full-text\/\">Rule on Cybercrime Warrants<\/a>, Sec. 1.4 (l)]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Key-Pair\">Key pair<\/h2>\n\n\n\n<p>An <a href=\"#Asymmetric-Public-Cryptosystem\">asymmetric cryptosystem<\/a> refers to the <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Private-Key\">private key<\/a> and its mathematically related <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Public-Key\">public key<\/a> such that the latter can verify the digital signature that the former creates.&nbsp;[See Rules on Electronic Evidence]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Libel\">Libel<\/h2>\n\n\n\n<p>See <a href=\"#Online-Libel\">Online libel<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Misuse-Devices\">Misuse of devices<\/h2>\n\n\n\n<p>The (A) use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of: (i) A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under RA 10175; or (ii) A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under RA 10175; OR (B) Possession of an item referred to in (A) with intent to use said devices for the purpose of committing any of the offenses under this section. [RA 10175, Sec. 4(a); See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"National-Cybersecurity-Plan\">National Cybersecurity Plan<\/h2>\n\n\n\n<p>A comprehensive plan of actions designed to improve the security and enhance cyber resilience of infrastructures and services. It is a top-down approach to cybersecurity that contains broad policy statements and establishes a set of national objectives and priorities that should be achieved within a specific timeframe. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Non-Content-Data\">Non-content data<\/h2>\n\n\n\n<p>See <a href=\"#Traffic-Data\">Traffic data<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Offense\">Offense<\/h2>\n\n\n\n<p>A general term used to refer to either a violation of Section 4 (Cybercrime Offenses), Section 5 (Other Offenses), or Section 6 (all crimes defined and penalized by the Revised Penal Code, as amended, and other special laws, if committed by, through, and with the use of ICT), Chapter II of <a href=\"https:\/\/pnl-law.com\/blog\/cybercrime-prevention-act-of-2012-republic-act-no-10175-full-text\/\">Republic Act 10175<\/a>. [<a href=\"https:\/\/pnl-law.com\/blog\/rule-on-cybercrime-warrants-a-m-no-17-11-03-sc-full-text\/\">Rule on Cybercrime Warrants<\/a>, Sec. 1.4 (m)]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Off-Site-Search\">Off-site search<\/h2>\n\n\n\n<p>The process whereby law enforcement authorities, by virtue of a warrant to search, seize, and examine, are allowed to bring the computer device\/s and\/or parts of the <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Computer-System\">computer system<\/a> outside the place to be searched in order to conduct the <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Forensics\">forensic<\/a> examination of the <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Computer-Data\">computer data<\/a> subject of the warrant. [<a href=\"https:\/\/pnl-law.com\/blog\/rule-on-cybercrime-warrants-a-m-no-17-11-03-sc-full-text\/\">Rule on Cybercrime Warrants<\/a>, Sec. 1.4 (n)]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"On-Site-Search\">On-site search<\/h2>\n\n\n\n<p>The process whereby law enforcement authorities, by virtue of a warrant to search, seize, and examine, obtains the <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Computer-Data\">computer data<\/a> subject thereof for forensic examination, without the need of bringing the related computer device\/sand\/or parts of the <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Computer-System\">computer system<\/a> outside the place to be searched. [<a href=\"https:\/\/pnl-law.com\/blog\/rule-on-cybercrime-warrants-a-m-no-17-11-03-sc-full-text\/\">Rule on Cybercrime Warrants<\/a>, Sec. 1.4 (o)]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Online-Libel\">Online libel<\/h2>\n\n\n\n<p>Referred to as &#8220;libel&#8221; in RA 10175, it is the unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future. [RA 10175, Sec. 4(c); &#8220;Online libel&#8221; is not used in RA 10175, but the term is used in the IRR of RA 10175 and by the Supreme Court in <em>Disini vs. Secretary of Justice<\/em>, G.R. No. 203335, 11 February 2014; It is the proper term, and not &#8220;internet libel&#8221; or &#8220;cyber libel&#8221;; See <a href=\"https:\/\/pnl-law.com\/blog\/online-libel-as-cybercrime-in-the-philippines-definition-requisites-and-application-of-penalties\/\">Discussion on Online Libel<\/a>,\u00a0<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;\u00a0<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Original-Author\">Original author&nbsp;<\/h2>\n\n\n\n<p>The person who created or is the origin of the assailed <a href=\"#Electronic-Statement\">electronic statement<\/a> or post using a <a href=\"#Computer-System\">computer system<\/a>. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Originator\">Originator<\/h2>\n\n\n\n<p>A person by whom, or on whose behalf, the <a href=\"#Electronic-Document\">electronic <\/a>document purports to have been created, generated and\/or sent. The term does not include a person acting as an intermediary with respect to that electronic document. [RA <a href=\"https:\/\/pnl-law.com\/blog\/electronic-commerce-act-of-2000-republic-act-no-8792-full-text\/\">8792<\/a>, Sec. 5]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Personal-Data\">Personal data<\/h2>\n\n\n\n<p>All types of <a href=\"#Personal-Information\">personal information<\/a>. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Personal-Data-Breach\">Personal data breach<\/h2>\n\n\n\n<p>A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Personal-Information\">Personal information<\/h2>\n\n\n\n<p>Any information, whether recorded in a material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Personal-Information-Controller\">Personal information controller<\/h2>\n\n\n\n<p>A natural or juridical person, or any other body who controls the processing of personal data, or instructs another to process personal data on its behalf. The term excludes:&nbsp;(1) A natural or juridical person, or any other body, who performs such functions as instructed by another person or organization; or (2) A natural person who processes personal data in connection with his or her personal, family, or household affairs. There is control if the natural or juridical person or any other body decides on what information is collected, or the purpose or extent of its processing. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Personal-Information-Processor\">Personal information processor<\/h2>\n\n\n\n<p>Any natural or juridical person or any other body to whom a personal information controller may outsource or instruct the processing of personal data pertaining to a data subject. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Photo-Video-Voyeurism\">Photo or video voyeurism<\/h2>\n\n\n\n<p>The act of taking photo or video coverage of a person or group of persons performing sexual act or any similar activity or of <a href=\"#Capture\">capturing<\/a> an image of the <a href=\"#Private-Area-Person\">private area of a person<\/a> or persons without the latter&#8217;s consent, under circumstances in which such person\/s has\/have a reasonable expectation of privacy, or the act of selling, copying, reproducing, <a href=\"#Broadcast\">broadcasting<\/a>, sharing, showing or exhibiting the photo or video coverage or recordings of such sexual act or similar activity through VCD\/DVD, internet, cellular phones and similar means or device without the written consent of the person\/s involved, notwithstanding that consent to record or take photo or video coverage of same was given by such persons. [Anti-Photo and Video Voyeurism Act of 2009 (<a href=\"https:\/\/pnl-law.com\/blog\/anti-photo-and-video-voyeurism-act-of-2009\/\">Republic Act No. 9995<\/a>); See <a href=\"https:\/\/pnl-law.com\/blog\/primer-on-the-anti-photo-and-video-voyeurism-act-of-2009-ra-9995\/\">Primer<\/a>; <a href=\"https:\/\/pnl-law.com\/blog\/interception-of-computer-data-wicd-in-connection-with-cybercrime-warrants\/\">Warrant to Incept Computer Data<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Preservation\">Preservation<\/h2>\n\n\n\n<p>The keeping of data that already exists in a stored form, protected from anything that would cause its current quality or condition to change or deteriorate. It is the activity that keeps that stored data secure and safe. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Private-Area-Person\">Private area of a person<\/h2>\n\n\n\n<p>The naked or undergarment clad genitals, public area, buttocks or female breast of an individual. [Anti-Photo and Video Voyeurism Act of 2009 (<a href=\"https:\/\/pnl-law.com\/blog\/anti-photo-and-video-voyeurism-act-of-2009\/\">Republic Act No. 9995<\/a>); See <a href=\"https:\/\/pnl-law.com\/blog\/primer-on-the-anti-photo-and-video-voyeurism-act-of-2009-ra-9995\/\">Primer<\/a>; <a href=\"https:\/\/pnl-law.com\/blog\/interception-of-computer-data-wicd-in-connection-with-cybercrime-warrants\/\">Warrant to Incept Computer Data<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Private-Key\">Private key<\/h2>\n\n\n\n<p>The key of a <a href=\"#Key-Pair\">key pair<\/a> used to create a digital signature.&nbsp;[See <a href=\"#Public-Key\">Public key<\/a>; Rules on Electronic Evidence]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Privileged-Information\">Privileged information<\/h2>\n\n\n\n<p>Any and all forms of data, which, under the Rules of Court and other pertinent laws constitute privileged communication. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Processing\">Processing<\/h2>\n\n\n\n<p>Any operation or any set of operations performed upon personal data including, but not limited to, the collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of data. Processing may be performed through automated means, or manual processing, if the personal data are contained or are intended to be contained in a filing system. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Profiling\">Profiling<\/h2>\n\n\n\n<p>Any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyze or predict aspects concerning that natural person&#8217;s performance at work, economic situation, health, personal preferences, interests, reliability, behavior, location or movements. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Public-Authority\">Public authority<\/h2>\n\n\n\n<p>Any government entity created by the Constitution or law, and vested with law enforcement or regulatory authority and functions. [RA 10173, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Public-Key\">Public key<\/h2>\n\n\n\n<p>The key of a <a href=\"#Key-Pair\">key pair<\/a> used to verify a digital signature. [See <a href=\"#Private-Key\">Private key<\/a>; Rules on Electronic Evidence]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Security-Incident\">Security incident<\/h2>\n\n\n\n<p>An event or occurrence that affects or tends to affect data protection, or may compromise the availability, integrity and confidentiality of personal data. It includes incidents that would result to a personal data breach, if not for safeguards that have been put in place. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Sensitive-Personal-Information\">Sensitive personal information<\/h2>\n\n\n\n<p>Personal information:&nbsp;(1) About an individual\u2019s race, ethnic origin, marital status, age, color, and religious, philosophical or political affiliations;&nbsp; (2) About an individual\u2019s health, education, genetic or sexual life of a person, or to any proceeding for any offense committed or alleged to have been committed by such individual, the disposal of such proceedings, or the sentence of any court in such proceedings; (3) Issued by government agencies peculiar to an individual which includes, but is not limited to, social security numbers, previous or current health records, licenses or its denials, suspension or revocation, and tax returns; and&nbsp;(4) Specifically established by an executive order or an act of Congress to be kept classified. [RA <a href=\"https:\/\/pnl-law.com\/blog\/data-privacy-act-of-2012-republic-act-no-10173-full-text\/\">10173<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Service-Provider\">Service provider&nbsp;<\/h2>\n\n\n\n<p>Refers to: (1) any public or private entity that provides users of its service with the ability to communicate by means of a computer system; and (2) any other entity that processes or stores computer data on behalf of such communication service or users of such service. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>A provider of: (a) &nbsp;On-line services or network access, or the operator of facilities thereof, including entities offering the transmission, routing, or providing of connections for online communications, digital or otherwise, between or among points specified by a user, of electronic documents of the user\u2019s choosing; or&nbsp;<\/p>\n\n\n\n<p>(b) &nbsp;The necessary technical means by which electronic documents of an originator may be stored and made accessible to a designated or undesignated third party;&nbsp;<\/p>\n\n\n\n<p>(c) &nbsp;Such service providers shall have no authority to modify or alter the content of the electronic data message or electronic document received or to make any entry therein on behalf of the originator, addressee or any third party unless specifically authorized to do so, and who shall retain the electronic document in accordance with the specific request or as necessary for the purpose of performing the services it was engaged to perform. [RA <a href=\"https:\/\/pnl-law.com\/blog\/electronic-commerce-act-of-2000-republic-act-no-8792-full-text\/\">8792<\/a>, Sec. 5]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Subscribers-Information\">Subscriber\u2019s information<\/h2>\n\n\n\n<p>Any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services, other than traffic or content data, and by which any of the following can be established: (1) The type of communication service used, the technical provisions taken thereto and the period of service; (2) The subscriber\u2019s identity, postal or geographic address, telephone and other access number, any assigned network address, billing and payment information that are available on the basis of the service agreement or arrangement; or (3) Any other available information on the site of the installation of communication equipment that is available on the basis of the service agreement or arrangement. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"System-Interference\">System interference&nbsp;<\/h2>\n\n\n\n<p>The intentional alteration, or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document or electronic data message, without right or authority, including the introduction or transmission of viruses. [RA 10175, Sec. 4(a); See&nbsp;<a href=\"https:\/\/pnl-law.com\/blog\/cybercrimes-under-the-cybercrime-prevention-act-of-2012-ra-10175\/\">Cybercrimes under RA 10175<\/a>;&nbsp;<a href=\"#Cybercrimes\">Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Traffic-Data\">Traffic data &nbsp;<\/h2>\n\n\n\n<p>Traffic Data or Non-Content Data refers to any computer data other than the content of the communication, including, but not limited to the communication\u2019s origin, destination, route, time, date, size, duration, or type of underlying service. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Circumstances-Privacy\">Under circumstances in which a person has a reasonable expectation of privacy<\/h2>\n\n\n\n<p>Believe that he\/she could disrobe in privacy, without being concerned that an image or a private area of the person was being captured; or circumstances in which a reasonable person would believe that a <a href=\"#Private-Area-Person\">private area of the person<\/a> would not be visible to the public, regardless of whether that person is in a public or private place. [Anti-Photo and Video Voyeurism Act of 2009 (<a href=\"https:\/\/pnl-law.com\/blog\/anti-photo-and-video-voyeurism-act-of-2009\/\">Republic Act No. 9995<\/a>); See <a href=\"https:\/\/pnl-law.com\/blog\/primer-on-the-anti-photo-and-video-voyeurism-act-of-2009-ra-9995\/\">Primer<\/a>; <a href=\"https:\/\/pnl-law.com\/blog\/interception-of-computer-data-wicd-in-connection-with-cybercrime-warrants\/\">Warrant to Incept Computer Data<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Unsolicited-Communications\">Unsolicited commercial communications<\/h2>\n\n\n\n<p>The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services are prohibited. [RA 10175, Sec. 4(c); However, this provision has been declared VOID for being UNCONSTITUTIONAL in Disini vs. Secretary of Justice, G.R. No. 203335, 11 February 2014]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Video-Voyeurism\">Video voyeurism<\/h2>\n\n\n\n<p>See <a href=\"#Photo-Video-Voyeurism\">Photo or video voyeurism<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Warrant-Disclose-Computer-Data\">Warrant to Disclose Computer Data (WDCD)<\/h2>\n\n\n\n<p>A Warrant to Disclose Computer Data (WDCD) is an order in writing issued in the name of the People of the Philippines, signed by a judge, upon application of law enforcement authorities, authorizing the latter to issue an order to disclose and accordingly, require any person or <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Service-Provider\">service provider<\/a> to disclose or submit <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Subscribers-Information\">subscriber&#8217;s information<\/a>, <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Traffic-Data\">traffic data<\/a>, or relevant data in his\/her or its possession or control. [See <a href=\"https:\/\/pnl-law.com\/blog\/disclosure-of-computer-data-warrant-to-disclose-computer-data-wdcd-under-the-rule-on-cybercrime-warrants\/\">WDCD in Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"WECD\">Warrant to Examine Computer Data&nbsp;<\/h2>\n\n\n\n<p>A Warrant to Examine Computer Data (WECD) is a warrant secured by law enforcement agencies upon acquiring possession of a computer device or <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Computer-System\">computer system<\/a> via a lawful warrantless arrest. [See <a href=\"https:\/\/pnl-law.com\/blog\/warrant-to-examine-computer-data-wecd-in-lawful-warrantless-arrests\/\">WECD in Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Warrant-Intercept-Computer-Data\">Warrant to Intercept Computer Data&nbsp;<\/h2>\n\n\n\n<p>A Warrant to Intercept Computer Data (WICD) is an order in writing issued in the name of the People of the Philippines, signed by a judge, upon application of law enforcement authorities, authorizing the latter to carry out any or all of the following activities: (a) listening to, (b) recording, (c) monitoring, or (d) surveillance of the content of <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Communication\">communications<\/a>, including procuring of the content of <a href=\"https:\/\/pnl-law.com\/blog\/glossary-data-privacy-internet-technology-and-cybercrimes\/#Computer-Data\">computer data<\/a>, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring. [See <a href=\"https:\/\/pnl-law.com\/blog\/interception-of-computer-data-wicd-in-connection-with-cybercrime-warrants\/\">WICD in Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"WSSECD\">Warrant to Search, Seize and Examine Computer Data<\/h2>\n\n\n\n<p>A Warrant to Search, Seize and Examine Computer Data (WSSECD) is an order in writing issued in the name of the People of the Philippines, signed by a judge, upon application of law enforcement authorities, authorizing the latter to search the particular place for items to be seized and\/or examined.&nbsp;[See <a href=\"https:\/\/pnl-law.com\/blog\/search-seizure-and-examination-of-computer-data-in-cybercrime-warrants\/\">WSSECD in Cybercrimes<\/a>]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Wiretapping\">Wiretapping<\/h2>\n\n\n\n<p>See <a href=\"#Anti-Wiretapping-Law\">Anti-Wiretapping Law<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Without-Right\">Without Right<\/h2>\n\n\n\n<p>Either: (i) conduct undertaken without or in excess of authority; or (ii) conduct not covered by established legal defenses, excuses, court orders, justifications or relevant principles under the law. [RA 10175 <a href=\"https:\/\/pnl-law.com\/blog\/implementing-rules-and-regulations-cybercrime-prevention-act-of-2012\/\">IRR<\/a>, Sec. 3]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[Definitions or characterizations provided in Republic Act No. 10173 (Data Privacy Act of 2012) and Republic Act No. 10175 (Cybercrime Prevention Act of 2012), Republic Act No. 8792 (Electronic Commerce of 2000), as well as the respective Implementing Rules and Regulations of these laws, including the Rule on Cybercrime Warrants.]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,148],"tags":[149,151,1466,1464,1465,1330,114,1473],"class_list":["post-6188","post","type-post","status-publish","format-standard","hentry","category-criminal-law","category-internet-law","tag-cybercrime-prevention-act-of-2012","tag-cybercrimes","tag-data-privacy","tag-data-privacy-act","tag-data-privacy-act-of-2012","tag-glossary","tag-internet","tag-technology"],"_links":{"self":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/comments?post=6188"}],"version-history":[{"count":13,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6188\/revisions"}],"predecessor-version":[{"id":8639,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/posts\/6188\/revisions\/8639"}],"wp:attachment":[{"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/media?parent=6188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/categories?post=6188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pnl-law.com\/blog\/wp-json\/wp\/v2\/tags?post=6188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}