1. The document discusses key provisions and terms related to electronic signatures and e-commerce under Philippine law.
2. It covers definitions, requirements, and oversight for electronic transactions, digital signatures, cybercrime, and the roles of government agencies in implementing related acts like the E-Commerce Act of 2000.
3. Various terms and concepts are defined, such as electronic signatures, digital signatures, hacking, cyber-squatting, and the duties of agencies like the Cybercrime Investigation and Coordinating Center to enforce cybersecurity laws and recommend new legislation.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
94 views4 pages
COE70
1. The document discusses key provisions and terms related to electronic signatures and e-commerce under Philippine law.
2. It covers definitions, requirements, and oversight for electronic transactions, digital signatures, cybercrime, and the roles of government agencies in implementing related acts like the E-Commerce Act of 2000.
3. Various terms and concepts are defined, such as electronic signatures, digital signatures, hacking, cyber-squatting, and the duties of agencies like the Cybercrime Investigation and Coordinating Center to enforce cybersecurity laws and recommend new legislation.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
1. When an electronic signature is used, it 6.
These 2 sections carries the provisions
is presumed that for E-commerce in the government. a. There is a method used to identify a. 30 and 31 the signature b. 27 and 28 b. It was affixed by the owner of c. 25 and 26 signature d. 40 and 41 c. the signature belongs to the person 7. Which congressional committee is not whom it correlates part of the oversight committee? d. both b and c a. Committee on trade and industry 2. What does the "usual place of b. science and technology residence" in relation to a body of c. National telecommunications corporate mean? commission a. The place of business d. Finance b. The place where it is legally 8. The E-commerce Act does not cover constituted a. International transactions c. Habitual residence b. non-commercial transactions d. The principal place of business c. private transactions 3. Refers to any access in order to corrupt, d. none of the above transactions alter, steal, or destroy using a computer 9. Foreigners may enjoy the privileges and or other similar info and benefits of RA8792 if their country of communication devices without the origin provides similar privileges and knowledge and consent of the owner. benefits to the Filipinos a. Hacking a. Barter b. Piracy b. Mutuality c. Cracking c. Equality d. Stealing d. Reciprocity 4. Electronic transactions in banks are 10. The acquisition of a domain name over completed when? the internet in bad faith to profit, a. The electronic data message is sent. mislead, destroy reputation, and b. The electronic receipt is received. deprive others from registering the c. cash is dispensed, or account is same. debited (or credited) a. Illegal access d. The account holder is duly notified. b. Illegal interception 5. RA8792 was adopted from United c. Cyber-squatting Nations model law known as d. none of the above a. UNIECL 11. Which of the following government b. UNCENTRAL bodies are responsible for making the c. UNTRIPAL IRR as mandated by RA 10175 Section d. UNCITRAL 28? a. ICTO-DOST and PNP b. CICC and the Office of the President c. Senate and the Office of the Representatives d. ICTO-DOST, DOJ, DILG 12. The following are requirements of the 17. A secret code which secures and law for the integrity & reliability of defends sensitive information that cross electronic document, except one: over public channels. a. Completeness a. Password b. Held by a party adverse in interest b. Electronic PIN c. Reliable of its purpose c. Electronic Signature d. Unaltered d. Electronic Key 13. In any proceedings involving electronic 18. Which of the following is NOT part of signatures, all of the ff. is presumed, the "Powers and Functions" of CICC as except for one: stated on Section 26 of RA 10175 a. It was affixed w/ the intention of a. To formulate a national acknowledging conditions of the cybersecurity plan electronic document b. To monitor cybercrime cases b. Integrity of the data signed is c. To recommend the enactment of shown by evidence appropriate laws c. The signature originated from the d. To shut down websites caught in person to whom it correlates the act violating RA10175 d. None of the above. 19. Parties are given the right to choose 14. It is the intentional alteration or ____________ of security methods that reckless hindering or inherence with the suit their needs. function of computer or computer a. The safest only network. b. the cheapest a. System Interference c. the benefits and kind b. Data Interference d. the type and level c. Interception 20. It refers to a computer or a computer d. Illegal Interception network, the electronic medium in 15. How much fund shall be appropriated which online communication takes annually for the implementation of R.A. place. No. 10175? a. Service Provider a. PhP20,000,000.00 b. Cyber b. PhP30,000,000.00 c. Computer System c. PhP50,000,000.00 d. ICT d. PhP40,000,000.00 21. Any evidence procured without a valid 16. Traffic data or ____ refers to any warrant or beyond the authority of the computer data other than the content same shall be inadmissible for any of the communication including, but not proceeding before any court or tribunal. limited to, the communication's origin, a. Validity Rule destination, route, time, date, size, b. Admission Rule duration, or type of underlying service. c. Appeal Rule a. Non-violent data d. Exclusionary Rule b. Non-essential data c. Non-content data d. Non-volatile data 22. This clause states that if any provision 26. The information or the representation of the Act is held invalid, the other of information, data, figures, symbols or provisions not affected shall remain in other modes of written expression, full force and effect. described or however represented, by a. Repealing Clause which a right is established, or an b. Persistence Clause obligation extinguished, or by which a c. Effectivity Clause fact may be prove and affirmed, which d. Separability Clause is receive, recorded, transmitted, 23. The person by whom, or on whose stored, processed, retrieved or behalf, the electronic document produced electronically. purports to have been created, a. Electronic Data Message generated and/or separated b. Electronic Signature a. Addressee c. Electronic Document b. Intermediary d. Electronic Key c. Originator 27. The person who in behalf of another d. Producer person and with respect to a particular 24. Input, alteration, or deletion of any electronic document sends, receives computer data without right resulting in and on stores or provides other services inauthentic data with the intent that it in respect of that electronic data be and intelligible authentic, regardless message or electronic document. whether or not the data is directly a. Addressee readable and intelligible. b. Intermediary a. Computer-related Forgery c. Originator b. Computer-related Fraud d. Producer c. Computer-related Identity Theft 28. It mandates the government to install d. Computer-related Offense an electronic network to known as the 25. This can be appended to electronic RPWeb within two (2) years from the evidences and is sworn under oath. date on effectivity of the Act. a. Image a. RA 8792 Section 27 b. Video b. RA 8792 Section 28 c. File attachment c. RA 8792 Section 29 d. Affidavit d. RA 8792 Section 30 29. From Section 13 of the Anti-Camcording Act of 2010, all laws, decrees, ordinances or rules inconsistent with or contrary to the provisions of this Act are hereby amended. a. Repealing Clause b. Separability Clause c. Enforcement d. Penalties 30. In the absence of evidence, the integrity of the electronic data may be established by showing that a. The data operates in a manner that doesn't affect its integrity b. An appropriate security procedure was employed in verifying the originator c. The signature originated from the person to whom it correlates. d. The signature was affixed w/ the intention of acknowledging conditions of the electronic document 31.
Gmail - Complaint Petition To National Commission For Child Protection, Special Investigation Police To Investigate and Take Action. Letter No. TN - 237003-2022 - 23 - EDU, Reg.