INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION SYLLABUS (1).doc

JohnBarbonio2 238 views 7 slides Feb 26, 2025
Slide 1
Slide 1 of 7
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7

About This Presentation

Course Syllabus


Slide Content

Page 1 of 7
BICOL COLLEGE
Corner J.P. Rizal & Tabuena Sts.
Sagpon, Daraga Albay

PHILOSOPHY
The Bicol College adopts an eclectic philosophy of education that is geared towards the full development of man in all aspects of human living for the socio-economic transformation of the Bicol
Region in particular and the Philippines in general, through the achievement of quality education with emphasis on academic excellence and professional leadership.
BICOL COLLEGE VISION BICOL COLLEGE MISSION
Bicol College envisions to be a university offering affordable education geared toward excellence,
leadership and social responsibility for the empowerment of the individual in a changing world.
The mission of the Bicol College is to provide necessary support to excel in research, instruction and community
outreach in order to produce competitive graduates with strong social commitment.
INSTITUTIONAL CORE VALUES
INTEGRITY COMPASSIONATE EXCELLENCE LEADERSHIP
SCHOOL VISION SCHOOL MISSION
The Bicol College shall produce graduates who are academically-oriented and technically-trained
with the ability to create, critically think and act positively so as to contribute to the full
development of the family, community and the larger society.
To produce graduates who are imbued with relevant, responsive, ethical and moral standing, competent and
well-rounded individuals in the fields of education and management.
PROGRAM EDUCATIONAL OBJECTIVES PROGRAM OUTCOMES
This course covers an introduction to cyber crimes and environmental laws and protection. It
includes an overview of cyber crimes and computer technology as well as the study of
environmental concepts, principles, ecosystems, biodiversity, and threats to the environment.
Relevant environmental laws and the investigation and prosecution of environmental crimes are
also examined. The document then discusses specific environmental crimes such as wildlife
trafficking, logging, waste mismanagement, and pollution. It outlines related environmental laws in
the Philippines and the methods, expertise, and legal aspects of investigating environmental
crimes and protecting the environment.
By the end of this course, students will be able to:
1. Students will comprehend the various forms of cybercrime, including hacking, identity theft, phishing, and
cyberbullying.
2. Gain knowledge of the legal frameworks and regulations governing cybercrime, including international treaties
and national laws.
3. Evaluate the societal, economic, and personal impacts of cybercrime on individuals, organizations, and nations.
4. Identify and recommend cybersecurity measures and best practices to mitigate cyber threats and protect
sensitive information.
5. Understand key environmental laws and regulations at local, national, and international levels, such as those
Date Effective: Date Revised: Prepared by:
____________________________
Reviewed by:
MARIA LUISA N. GONZALES, DBM
Dean
Approved by:
MILAGROS S. ESPARRAGO, Ed.D.
VPAA

Page 2 of 7
related to pollution control, conservation, and sustainable development.
6. Develop an awareness of ethical issues related to environmental protection and sustainability.
7. Analyze case studies of cybercrime incidents and environmental law violations to understand real-world
implications and responses. Formulate strategies for policy development and advocacy in both cybercrime
prevention and environmental protection.
8. Appreciate the interdisciplinary nature of addressing cybercrime and environmental issues, including the role of
technology, law, ethics, and policy.

PROGRAM BACHELOR OF SCIENCE IN CRIMINOLOGY PROGRAM COURSE CODE & TITLE INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL
LAWS AND PROTECTION
COURSE SYLLABUS
Course Credit : 3 units
No. of Hour(s) 3 hours /week
Course Description
This course provides the overview of Cybercrime and Environment. It will lay the overview of our ecosystem, biodiversity and its relation to
human survival and sustainable development. It includes the environmental laws, the detection of violation, conduct of investigation,
evidence required and prosecution, and also the applicable jurisprudence. The cybercrime part, will take on basic understanding of
computer technology, history of cybercrimes, nature and types of cybercrimes, incident response, collection and preservation; digital
investigative plan, and the applicable legal provision. The outcomes of this course is to aim to provide students with a comprehensive
understanding of the complexities and importance of both cybercrime prevention and environmental protection in contemporary society. This
also covers the study of the concepts and principles of environment specifically on ecosystem and biodiversity, various threats to their
existence and its impact on humankind. It includes the study of relevant environmental laws and jurisprudence, the detection, investigation,
and gathering of evidence in the prosecution of cases.
Date Effective: Date Revised: Prepared by:
____________________________
Reviewed by:
MARIA LUISA N. GONZALES, DBM
Dean
Approved by:
MILAGROS S. ESPARRAGO, Ed.D.
VPAA

Page 3 of 7
TOPICS and
READINGS
(Course Content)
INTENDED LEARNING OUTCOMES
TEACHING-
LEARNING
ACTIVITIES
EQUIPMENT/
MATERIALS/TOOLS
ASSESMENT
TASK
ALLOCATION
OF TIME
UNIT 1
1. Environmental
Concepts and
Principles
2. Attributes of
Ecosystem and
Biodiversity
3. Various threats to
environmental well
being
4. Threats to Mankind
Generalize the nature and concept of Ecosystem and Biodiversity.
Enumerate and discuss the Various Threats to environmental well
being and Threats to Mankind.
Discuss the following topics:
a. Importance of Ecosystem
b. Properties of Ecosystem
c. Components of Ecosystem
d. Types of Ecosystem
e. Imbalancement of Ecosystem and Biodiversity
f. Solves of Imbalancement of Ecosystem and Biodiversity
Discuss the ways on how to prevent and control the Imbalancement of
Ecosystem and Biodiversity.
Lecture/
Reports
Group
Discussions
Individual/
Group exercise
Text Book
Other References
PPT/Projector
*Class
Participation and
Seatwork
*Group paper
grading
* Rubric
* Quizzes
3 hours
UNIT 2
1. International Union
for the Conservation
of Nature (IUCN)
2. NIPAS Law and
Convention on
Biodiversity
Define and conceptualize the International Union for the Conservation
of Nature (IUCN), NIPAS Law and Convention on Biodiversity.
Describe the role and function of International Union for the
Conservation of Nature (IUCN), NIPAS Law and Convention on Biodiversity.
Discuss the 3 Components and Benefits of Biodiversity.
Enumerate and elaborate the discussion of Causes of Biodiversity
Depletion.
Discuss the importance of Biodiversity in the community.
•Lecture/Reports
•Group Discussions
•Individual/
Group exercise
Group presentation
•Text Book
•Other References
•Projector
* Logical Framework
*Class
Participation and
Seatwork
*Group paper
grading
* Rubric
* Quizzes
3 hours
UNIT 3
1. Specific or relevant
techniques in
Environmental Crime
Generalize the nature and concept of Environmental Crime Detection.
Enumerate and explain the Specific or relevant Techniques in
Environmental Crime Detection.
Discuss the following topics:
•Lecture/Reports
•Group Discussions
•Individual/
Group exercise
•Text Book
•Other References
•Projector
*Class
Participation and
Seatwork
*Group paper
grading
* Rubric
3 hours
Date Effective: Date Revised: Prepared by:
____________________________
Reviewed by:
MARIA LUISA N. GONZALES, DBM
Dean
Approved by:
MILAGROS S. ESPARRAGO, Ed.D.
VPAA

Page 4 of 7
Detection
2. Specific Lists of
Various Conservation
Status (IUCN,
CITES, PHILIPPINE
RED LIST)
a. IUCN
b. CITES
c. PHILIPPINE RED LIST
Explain the roles, functions, and importance of Environmental Crime
Detection in the community.
* Quizzes
UNIT 4
1. Forms or
Documentations
required for Transport
of wildlife, logs and
timber
2. List of
Jurisprudence and
List of Laws
Define and conceptualize the Jurisprudence and Laws.
Enumerate and discuss the Forms or Documentations required for
Transport of wildlife, logs and timber.
Enumerate and explain the List of Jurisprudence and List of Laws
Discuss the role and functions of Jurisprudence and Laws.
Discuss the essence of Documentations required for Transport of
wildlife, logs and timber.

•Lecture/Reports
•Group Discussions
•Individual/
Group exercise
•Text Book
•Other References
•Projector
*Class
Participation and
Seatwork
*Group paper
grading
* Rubric
* Quizzes
3 hours
MID-TERM EXAMINATION
Total hours 12
UNIT 5
1. Special Rules of
Procedure of
Environmental Cases
(Civil or Criminal)
2. IPRA Law
3. Blue and Green
Laws
Define and discuss the Environmental Cases.
Discuss the Special Rules of Procedure of Environmental Cases (Civil
or Criminal).
Discuss the following topics:
a. IPRA Law
b. Blue and Green Laws
Discuss the 4 Bundles of Rights defined under IPRA Law.
Discuss the importance of IPRA Law, Blue and Green Laws.
Conceptualized and give the role and function of Special Rules of
Procedure of Environmental Cases (Civil or Criminal) in Criminal Justice
System of every country.

•Lecture/Reports
•Group Discussions
•Individual/
Group exercise
•Text Book
•Other References
•Projector
*Class
Participation and
Seatwork
*Group paper
grading
* Rubric
* Quizzes
3 hours
Date Effective: Date Revised: Prepared by:
____________________________
Reviewed by:
MARIA LUISA N. GONZALES, DBM
Dean
Approved by:
MILAGROS S. ESPARRAGO, Ed.D.
VPAA

Page 5 of 7
UNIT 6
1. Overview of
Cybercrime
2. Basic Components
and Functions of
Digital Devices
Define and conceptualize the Cybercrime.
Enumerate and explain the Types of Cybercrime.
Discuss the following topics:
a. Safety Tips to Cyber Crime
b. Cyber Security
c. Cyber Security Advantages
d. Cyber Law
Discuss the Basic Components and Functions of Digital Devices.
Enumerate and discuss the following topics:
a. Types of Digital Devices
b. Features of Digital Devices
Discuss the importance of advance Digital Devices in Cybercrime
Cases.
•Lecture/Reports
•Group Discussions
•Individual/
Group exercise
•Text Book
•Other References
•Projector
*Class
Participation and
Seatwork
*Group paper
grading
* Rubric
* Quizzes
3 hours
UNIT 7
1. Computer
Terminology
2. Components of
Computer System
Define and discuss the Computer.
Elaborate and discuss the following topics:
a. Computer Terminology
b. Components of Computer System
c. Organization of Computer
d. Characteristics of Computer
e. System Software
f. Application Software
Discuss the importance of using Computer, System Software. and
Application Software in detecting the Cyber Crime Cases.
•Lecture/Reports
•Group Discussions
•Individual/
Group exercise
•Text Book
•Other References
•Projector
*Class
Participation and
Seatwork
*Group paper
grading
* Rubric
* Quizzes
3 hours
UNIT 8
1. CyberCrime
Offenses (Sec., 4,5,
and 6, RA 10175)
2. Duties of Law
Enumerate and discuss the Cyber Crime Offenses under (Sec., 4,5, and
6, RA 10175) and Duties of Law Enforcement Agencies.
Elaborate the discussion of Incident Response, Preservation, and
Collection.
•Lecture/Reports
•Group Discussions
•Individual/
Group exercise
•Text Book
•Other References
•Projector
*Class
Participation and
Seatwork
*Group paper
grading
* Rubric
* Quizzes
3 hours
Date Effective: Date Revised: Prepared by:
____________________________
Reviewed by:
MARIA LUISA N. GONZALES, DBM
Dean
Approved by:
MILAGROS S. ESPARRAGO, Ed.D.
VPAA

Page 6 of 7
Enforcement
Agencies
3. Incident Response,
Preservation, and
Collection
4. Digital
Investigative Plan
Determine the role and functions of Law Enforcement Agencies in the
community.
Determine the concept and essence of Digital Investigative Plan.
Discussed the importance of implementing the Digital Investigative
Plan in Criminal Justice System.
UNIT 9
1. Initial examination
of Digital Evidence
(Artefacts)
2. Warrants and other
Issuances for
Computer Data
Define and discuss the Warrants and Issuances.
Discuss and explain the Initial Examination of Digital Evidence
(Artefacts).
Elaborate the discussion of how warrants and other issuances for
computer data is implemented and practice by the Law Enforcement Agencies.
Discuss the importance of Warrants and Issuances in Criminal Justice
System.
•Lecture/Reports
•Group Discussions
•Individual/
Group exercise
•Text Book
•Other References
•Projector
*Class
Participation and
Seatwork
*Group paper
grading
* Rubric
* Quizzes
1.5
FINAL EXAM
Course Output :
Text Book :
Web References : https://www.scribd.com/presentation/541413365/INTRO-TO-CYBERCRIME-AND-ENVIRONMENTAL-LAWS-AND-PROTECTION-1
https://www.slideshare.net/SMZahidHasan1/ecosystem-and-biodiversity-76475879
https://www.slideshare.net/slideshow/iucn-68417080/68417080
https://www.slideshare.net/slideshow/national-integrated-protected-areas/27611292
https://www.scribd.com/presentation/432535166/260793897-LESSON-8-BIODIVERSITY-pptx-pptx
https://www.unodc.org/documents/NGO/EIA_Ecocrime_report_0908_final_draft_low.pdf
https://www.slideshare.net/harshrajshinde1/iucn-red-list
https://www.slideshare.net/slideshow/introduction-to-jurisprudence-173236421/173236421
https://www.slideshare.net/slideshow/types-of-laws/55762534
Date Effective: Date Revised: Prepared by:
____________________________
Reviewed by:
MARIA LUISA N. GONZALES, DBM
Dean
Approved by:
MILAGROS S. ESPARRAGO, Ed.D.
VPAA

Page 7 of 7
https://www.slideshare.net/slideshow/ipra-ncip/250147834
https://www.scribd.com/presentation/423238036/Blue-Law-RP
https://www.coursehero.com/file/153943599/PRESENTATION-1-2pptx/
https://www.slideshare.net/slideshow/cyber-crime-70262741/70262741
https://www.slideshare.net/slideshow/digital-devices-pptx/256259762
https://www.slideshare.net/DeepanshuSainiSolanki/presentation-on-computer-system
https://www.slideshare.net/martianne21/chapter-3-computer-systems
https://www.slideshare.net/slideshow/computer-crime-249927102/249927102
https://www.slideshare.net/slideshow/cyber-crime-257929566/257929566
https://www.slideshare.net/slideshow/organization-of-law-enforcement-agencies/11519816
https://www.slideshare.net/slideshow/introduction-to-incident-response-management/264562030
https://www.slideshare.net/slideshow/cyber-evidence-at-crime-scene/249932285
https://www.slideshare.net/slideshow/digital-investigation/10919321
https://www.scribd.com/presentation/719399877/df-ppt
Consultation Time
Date Effective: Date Revised: Prepared by:
____________________________
Reviewed by:
MARIA LUISA N. GONZALES, DBM
Dean
Approved by:
MILAGROS S. ESPARRAGO, Ed.D.
VPAA
Tags