Skip to main content

Pertinent Laws

Pertinent Laws


Republic Act 8293
Intellectual Property Code of the Philippines
DICT Reference PDF, NetSafetyPH Mirror
Republic Act 8792
E-Commerce Act of 2000
DICT Reference PDF, NetSafetyPH Mirror
Republic Act 9775
Anti-Child Pornography Act of 2009
DICT Reference PDF, NetSafetyPH Mirror
Republic Act 9995
Anti-Photo and Video Voyeurism Act of 2009
DICT Reference PDF, NetSafetyPH Mirror
Republic Act 10173
Data Privacy Act of 2012
DICT Reference PDF, NetSafetyPH Mirror
Republic Act 10175
Cybercrime Prevention Act of 2012
Official Gazette Reference PDF, NetSafetyPH Mirror
Republic Act 10844
Department of Information and Communication Technology Act of 2015
DICT Reference PDF, NetSafetyPH Mirror

Disclaimer

We are I.T. Professionals. We are not lawyers, all the articles we have on this site even if contributed by a lawyer does not constitute legal counsel. Please refer to your duly licensed and appointed legal counsel for your legal needs.

Popular Posts

Protect Personal Information - Present and Future Value

Dear Mothers, We understand you are proud of your child. You can shout to the world that you are but please do not share your child's personal information online.

Attack Example - ClickJacking+Spoofing - UI Redress - Trusted User Interface

ClickJacking and Spoofing Attack Example - Trusted User Interface attack. It used to be that the most common operating system and browser being targeted for this kind of attack is Windows and IE. The underlying reason was that Windows has more users and Internet Explorer was basically File Explorer having a different user interface. Today, the attack surface is wider and much more complicated to notice. The screenshot posted here is a combination of a User Interface (UI) spoofing from a ClickJack.