Skip to main content

Pertinent Laws

Pertinent Laws


Republic Act 8293
Intellectual Property Code of the Philippines
DICT Reference PDF, NetSafetyPH Mirror
Republic Act 8792
E-Commerce Act of 2000
DICT Reference PDF, NetSafetyPH Mirror
Republic Act 9775
Anti-Child Pornography Act of 2009
DICT Reference PDF, NetSafetyPH Mirror
Republic Act 9995
Anti-Photo and Video Voyeurism Act of 2009
DICT Reference PDF, NetSafetyPH Mirror
Republic Act 10173
Data Privacy Act of 2012
DICT Reference PDF, NetSafetyPH Mirror
Republic Act 10175
Cybercrime Prevention Act of 2012
Official Gazette Reference PDF, NetSafetyPH Mirror
Republic Act 10844
Department of Information and Communication Technology Act of 2015
DICT Reference PDF, NetSafetyPH Mirror

Disclaimer

We are I.T. Professionals. We are not lawyers, all the articles we have on this site even if contributed by a lawyer does not constitute legal counsel. Please refer to your duly licensed and appointed legal counsel for your legal needs.

Popular Posts

Attack Example - ClickJacking+Spoofing - UI Redress - Trusted User Interface

ClickJacking and Spoofing Attack Example - Trusted User Interface attack. It used to be that the most common operating system and browser being targeted for this kind of attack is Windows and IE. The underlying reason was that Windows has more users and Internet Explorer was basically File Explorer having a different user interface. Today, the attack surface is wider and much more complicated to notice. The screenshot posted here is a combination of a User Interface (UI) spoofing from a ClickJack.

Attack Example - Phishing - SMS Based - Smishing

What exactly is Phishing? It smells fishy, sounds like fishing, and it is exactly fishing. Knowing how social Filipinos are, almost everyone doesn't like being late in knowing who's an item in the office or who likes who, or what successful neighbors are doing to be successful. And so, we non-chalantly fish for information about it. That is exactly the core function of Phishing. It is to gather Personally Identifiable Information (PII) or information which can be used to identify individuals.