What are the salient features of this act?
- Illegal access - Unauthorized access (without right) to a computer system or application.
- Illegal interception - Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system.
- Data Interference - Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses.
- System Interference – an intentional disruption of a certain system without authority by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or computer program, electronic document, or electronic data message and transmission of viruses.
- Cybersex – sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages with another person via the Internet.
- Child Pornography – pornography related to children (below 18 years old).
- Identity Theft – unauthorized usage of system accounts like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- Computer-related Fraud - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- Misuse of Devices – The use, production, sale, procurement, importation, distribution, or otherwise making available, without right.
Can you relate some provisions of the Law on your past experiences as an IT student?
I do not have any experiences that violates this law. Because if I will violate some of this law, the government can trace me anytime and be arrested anytime. But I'm thinking that I already violated this law before it was implemented, like using other accounts for spying and getting some valuable data but the owner granted my permission to use his account.

