Wednesday, March 31, 2010

Philippine Law Provisions about Defemation

ACT NO. 3815
AN ACT REVISING THE PENAL CODE AND OTHER PENAL LAWS
(December 8, 1930)
BOOK TWO
CRIMES AND PENALTIES
Title Three
CRIMES AGAINST PUBLIC ORDER
Chapter One
REBELLION, SEDITION AND DISLOYALTY
Art. 142. Inciting to sedition. — The penalty of prision correccional in its maximum period and a fine not exceeding 2,000 pesos shall be imposed upon any person who, without taking any direct part in the crime of sedition, should incite others to the accomplishment of any of the acts which constitute sedition, by means of speeches, proclamations, writings, emblems, cartoons, banners, or other representations tending to the same end, or upon any person or persons who shall utter seditious words or speeches, write, publish, or circulate scurrilous libels against the Government (of the United States or the Government of the Commonwealth) of the Philippines, or any of the duly constituted authorities thereof, or which tend to disturb or obstruct any lawful officer in executing the functions of his office, or which tend to instigate others to cabal and meet together for unlawful purposes, or which suggest or incite rebellious conspiracies or riots, or which lead or tend to stir up the people against the lawful authorities or to disturb the peace of the community, the safety and order of the Government, or who shall knowingly conceal such evil practices. (Reinstated by E.O. No. 187).
Art. 358. Slander (Oral Defamation)
I. Concept: It is understood as the speaking of base and defamatory words which tend to prejudice another in his reputation, office, trade, business or means of livelihood
II. Oral or verbal Defamation is of two kinds: (1) Grave when it is of a serious and insulting kind or (2) Simple
A. Factors to consider:
1. The expression used including their sense, grammatical significance and accepted ordinary meaning
2. The personal relations of the accused and the offended party, as when both are bitter enemies
3. The special circumstances of the case and its antecedents, such as the time, place and occasion of the utterances, persons present
4. The social standing and position of the offended party
B. Words uttered in the heat of anger or in a quarrel, with some provocation on the part of the victim, is simple slander.
Example: The refusal of the Mayor, without valid justification to approve the monetization of accrued leaves of the accused led the latter to utter scathing words against the Mayor, which utterances were considered slight as the said refusal was deemed sufficient provocation (Villanueva vs. People, April 10, 2006)
III. The victim may not have heard the words, it is enough that a third person heard them.
IV. Words uttered in one occasion and place and directed at several persons not mentioned individually constitute only one offense.

V. Words used as expletives ( i.e.to express anger, displeasure, are not defamatory)
1. Example: the words “Puta, Putang Ina Mo” are common enough expressions in the dialect that are often employed, not really to slander but rather to express anger or displeasure. It is seldom, if ever, taken in its literal sense by the hearer, that is, as a reflection on the virtues of the mother “(PP. vs. Reyes quoted in Villanueva vs. PP)
Art. 359. Slander By Deed.
I. The performance of any act which shall cast dishonor, discredit or contempt upon another person. Depending upon the seriousness of the act, the time, place, occasion, the character of the victim, it is either Grave or Light.
II. If it is not proven that the purpose of the act is to humiliate or embarrass the act may either be maltreatment or unjust vexation.
III. Poking a dirty finger ordinarily connotes the phrase “Fuck you” which is similar to the expression “Puta” or “Putang Ina Mo” and, when there is provocation from the victim, is simple slander by deed ( Viilanueva vs. Pp)

IT Organizations in the Philippines

1.)
Name: Information Technology Foundation of the Philippines (ITFP)
Address: 32nd Flr Philam Life Tower
8767 Paseo de Roxas Ave, Makati City E Mail: cynthia.mamon@sun.com.ph
Tel No: (632) 750-3742
Fax No: (632)
Website: www.itfp.org.ph
About: The Information Technology Foundation of the Philippines (ITFP) is a non-stock and non-profit organization. It is the federation of all the Philippine Computer IT organization.
Programs & Projects: 8-POINT PROGRAM-ITFP aims to achieve the following:

For the ITFP Organization itself
Be financially strong and stable
Professionally run and managed.
For the Member Associations
Improve members well-being and supports its interest
For the IT Industry
Focus on the local market but supports global competitiveness
Support the national thrust to become the e-services hub of Asia
Be strong lobby group
For the Public (Government and the civil society)
To promote social responsibility
To support and assist in e-governance
2007 Programs
Push for "Strengthen CICT to DICT
Procurement Law and its implementation (CICT and DBM)
- Forum
- Training (With ITAP-NCI)
Automation of the Electoral System
ICT Training and Certification (CICT, NCI, ITAP, TESDA, PAQTVET)
Good Governance of IT Organizations and Associations (Code of Ethics)

MOA re Promoting English Proficiency (PEP)

Fund Raising
Vision: "The voice and the medium of the ICT community in the country that supports the ICT programs of the government and private sector."
Mission: To contribute to the contribute to the economic, social and political development of the country

- by advocating the wise and widespread use of ICT;
- by representing the needs and interest of the ICT industry and community;
- by supporting the ICT-based programs of government and private sector; and
- by strengthening the country's global competitiveness through ICT
Objectives: To accelerate the development of the Philippine Information Technology industry and help the profession by conducting and supporting projects and activities that will lead to the attainment of its purposes.
To support and fund selected IT related activities of its member Associations.
To contribute towards the social and economic development to the country through the promotion of IT utilization in all sectors of the Philippine society.
To represent the IT industry in the government in the formulation and implementation of policies, laws, regulations and statues affecting the IT industry.
Date Founded:
Contact Person: Ellen Almazon
List of Officers
CYNTHIA R. MAMON, President
SUN MICRO SYSTEMS PHILIPPINES
(632) 885-7867, 885-0401
(632) 885-7866
cynthia.mamon@sun.com.ph

2.)University of the Philippines Information Technology Training Center
The University of the Philippines Information Technology Training Center (UP ITTC) is a program of the University of the Philippines together with the Japan International Cooperation Agency (JICA) solely devoted to training professionals in information technology. The UP ITTC also hosts the Philippine Youth Congress in Information Technology or Y4IT every September, the largest gathering of IT enthusiasts from all over the Philippines.
University of the Philippines
Information Technology
Training Center

Helping You Build a Solid IT Career
Address
Quirino Avenue cor. Velasquez Street
Vidal A. Tan Hall
UP Diliman
Quezon City, 1101
Philippines
Coordinates- 14°39′7.60″N 121°4′5.88″ECoordinates: 14°39′7.60″N 121°4′5.88″E Information
Opened -2004
Authority University of the Philippines System
Director Dr. Jaime D.L. Caro
Website http://ittc.up.edu.ph/
3.) International Organization for IT

The heart of AITP lies in its local chapters. Chapter activities provide unique opportunities for informal but direct contact with other IT professionals. For more information about AITP chapter locations, contact the AITP Membership Department, call 1-800-224-9371 or visit a chapter’s Web site.
AITP gives you online access to local chapters by state or city. Chapter e-mail addresses and Web site pages are provided where available.

Tuesday, February 9, 2010

Should an IT Professional either be licensed or certified? Why or why not?

As now it professional don't have licensed because technology is always change. every generation new technology come. as an it professional you must be fit for any position.and always learn the new technology come..

now a days it graduates are having Mastered degree in their chosen field.

Tuesday, January 5, 2010

What is PROFESSIONAL?

This are some definition of a Professional

professional traditionally means a person who has obtained a degree in a professional field. The term professional is used more generally to denote a white collar working person, or a person who performs commercially in a field typically reserved for hobbyists or amateurs.

professional engaged in a profession or engaging in as a profession or means of livelihood; "the professional man or woman possesses distinctive qualifications"; "began her professional career after the Olympics"; "professional theater"; "professional football"; "a professional cook"; "professional actors and athletes"
-or pertaining to a profession, or calling; conforming to the rules or standards of a profession; following a profession; as, professional knowledge; professional conduct.
-A person who prosecutes anything professionally, or for a livelihood, and not in the character of an amateur; a professional worker.
references:



Ethics in Information Technology by George Reynolds (2006)
http://www.thefreedictionary.com/professional
http://www.brainyquote.com/words/pr/professional207054.html

Types of Attacks to Computer System

List of different forms of attack that threatens Computer Security.
  1. Trojan horse - Comes with other software.
  2. Worm - Self-reproducing program. Creates copies of itself. Worms that spread using e-mail address books are often called viruses.
  3. Logic Bomb - Dormant until an event triggers it (Date, user action, random trigger, etc.)
  4. DoS- Denial of Service
  5. Virus - Reproduces itself by attaching to other executable files.

Hacker Attacks are various forms that exploit weakneses in security. Many of these may cause loss of service or system crashes.

  1. Password cracking - Used to get the password of a user or administrator on a network and gain unauthorized access.
  2. DNS poisoning - This is an attack where DNS information is falsified. This attack can succeed under the right conditions, but may not be real practical as an attack form. The attacker will send incorrect DNS information which can cause traffic to be diverted. The DNS information can be falsified since name servers do not verify the source of a DNS reply. When a DNS request is sent, an attacker can send a false DNS reply with additional bogus information which the requesting DNS server may cache. This attack can be used to divert users from a correct webserver such as a bank and capture information from customers when they attempt to logon.
  3. Gaining access through source routing. Hackers may be able to break through other friendly but less secure networks and get access to your network using this method.
  4. IP spoofing - An attacker may fake their IP address so the receiver thinks it is sent from a location that it is not actually from.
  5. Server spoofing - A C2MYAZZ utility can be run on Windows 95 stations to request LANMAN (in the clear) authentication from the client. The attacker will run this utility while acting like the server while the user attempts to login. If the client is tricked into sending LANMAN authentication, the attacker can read their username and password from the network packets sent.
  6. Man in the middle attack -
  7. Session hijacking - An attacker may watch a session open on a network. Once authentication is complete, they may attack the client computer to disable it, and use IP spoofing to claim to be the client who was just authenticated and steal the session.