Professional Documents
Culture Documents
What is a Computer?
-an electronic machine, operating under the control of instructions stored in its own memory, that can accept data (input), manipulate the data according to specified rules (proceed) produce results (output) and store results for future use
Methods of Wiretapping
Hard Wiretapping Soft Wiretapping Record Wiretap Transmit Wiretap
Facts:
Not all wiretapping is illegal. A techno-hobbyist can engage in eavesdropping for the sake of vanity and potential intrusion Be vigilant, you may be the next victim! Technology keeps phone bugging intractable and undetectable.
Slander
-spoken
Computer Crime
Any crime accomplished through special knowledge of computer technology
As more business automates through computer, there is remarkable increase in computer crimes
HOW?
The transfer of accounts to the perpetrators account.
It takes a computer genius to detect complex embezzlements through computers.
When used to retrieve confidential information from the bank of the employer. Entering false data in the computer to defraud the innocent victim of pay.
Internet Crime
A second form of cyber crime and has now become a routine. Newly emerging problem
A) Market Manipulation -an individual either post erroneous and deceptive informations online to artificially inflate the price of a stock (so they can sell previously purchased share ) or they post negative rumors, driving down the price of a stock so they can buy it at a lower price.
B)Fraudulent Offering of Securities -Some cyber criminals creates websites specially designed to fraudulently sell securities.
C) Illegal Touting This crime occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
Identity theft
Cybercrime -It is evident around us, and still very much influx. -The cyber revolution has permeated virtually every facet of our lives; and that of the criminals, terrorists and adversarial foreign nations as well.
Cyberterrorism
While the term maybe difficult to define, this can be seen as an effort to convert forces to disrupt the intersection where virtual electronic reality of computer intersects with the physical world
Mark Pollit, an FBI expert defines CYBERTERRORISM as the premeditated, politically motivated attack against info, computer system, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.
Philippine Special Laws Regulating the Use of Electronics and Computers in Business and Commerce
Though the term originally means selling on-line, it has evolved to mean conducting business on-line in a more general sense, including customer service functions, sales, marketing, public relations, advertising and other similar matters.
3. Whether a participant or not, to knowingly possess a tape recorder, wire record, disc record, or any other such record or copies t hereof.
4. To replay the same to any person (s).
5. To communicate the content thereof either verbally or in writing 6. To furnish transcription thereof, whether complete or partial to any other person 7. Willful, aiding, abetting, or causing the above acts to be done (section 2)
Occupational Crimes Classification 1. Organizational Occupational Crime -crimes committed for the benefit of the entire org such as for instance, the employer and not the individual employees are involved.
2. State Authority 3. Professional Occupational Crime Occupational Crime -crimes by officials -crimes by through the exercise of professionals in their their state-based capacity as authority professionals. -can only be 4. Individual committed by person in Occupational Crime the public office or by -crimes of working for such person individuals as individuals w/c include income tax evasion, theft of goods and the like
Occupational Crimes also refer to: White-collar crimes Avocational crimes Corporate crimes Economic crimes Organizational crimes Upper-world crimes
4 areas of reform w/c will effectively address white collar crimes (J. W. Coleman)
1. 2. 3. 4. Ethical reform Enforcement Reform Structural Reform Political Reform
Business Crimes
The Investigative Tools for Business Crimes
1. Forensic Accountancy
Refers to the application of financial skills and an investigative mentality to unresolved issues, conducted w/in the context of the rules of evidence.
-it encompasses financial expertise, fraud knowledge, and strong knowledge and understanding of business reality and the working of the legal system
Special Philippine Laws Geared Towards the Control of Economic Abuses of Unscrupulous persons w/c makes the Economy in Peril
R.A. 9160 as amended by R.A. 9194 known as an Act Defining the Crime of Money Laundering Law of 2001
R.A. 1405
Bank Secrecy Law of 1995, an Act Prohibiting Disclosure or Inquiry into Deposits with any Banking Institution