Carousel

Sponsored Links

Looking for House and Lot Within Tagaytay Area? CONTACT US!

Name

Email *

Message *

Showing posts with label Cybercrime. Show all posts
Showing posts with label Cybercrime. Show all posts

Friday, September 20, 2019

Do Not Post Your Kids' School Card, ID, Certificates And Other School Credentials On Social Media

It makes us proud that our kids do well in school. It also feel good to boast about it, hence, you often see social media posts from certain parents flaunting their kids' achievement.
But do you know that posting it in social media is not recommended by experts? Find out why.


It makes us proud that our kids do well in school. It also feel good to boast about it, hence, you often see social media posts from certain parents flaunting their kids' achievement.  But do you know that posting it in social media is not recommended by experts? Find out why.    Nakaka-proud talaga para sa isang magulang na maganda ang resulta ng inyong anak sa kanyang pag-aaral. Dahil dito ay maraming magulang ang hindi mapigil ang sarili na ibahagi ito sa iba sa pamamagitan ng pagpo-post sa social media.   Pero alam nyo ba na hindi ito ipinapayo ng mga eksperto? Alamin kung bakit.        Ads          Sa mga magulang at mga mag aaral,  Tayo po ay pinaaalalahanan at hinihikayat ng DepEd na iwasan ang pagpopost ng buong larawan ng ID, Report Card o Certificate ng ating mga anak sa Facebook o sa anupamang social networking site platforms. Ang mga dokumentong ito, bagama’t karapatdapat ipagmalaki, ay naglalaman ng mga mahahalaga at sensitibong personal na impormasyong maaaring gamitin upang mambiktima at manlinlang ng kapwa kabilang na may ari ng mga dokumentong iyon kasama na rin ang kanyang mga kaanak.      Ads      Sponsored Links    1. Ang buong pangalan ng bata at buong pangalan ng kanyang paaralan na matatagpuan dito ay maaaring gamitin upang matukoy kung saan siya naroroon. Napakadali ngayong isearch at makita ang mga social media accounts ng mga bata gayundin makita sa mapa gamit ang internet ang kinaroroonan ng mga ito;    2. Ang Learner Reference Number (LRN) na natatangi sa isang maga-aral ay matatagpuan rin sa mga dokumentong ito. Nakaugnay sa LRN ng isang bata ang kanyang historical school records kasama ang kanyang mga marka gayundin ang mga personal na impormasyon gaya ng petsa ng kapanganakan, adres, pangalan ng mga magulang, lahi, at iba pa, na pawang ginawa ng gobyerno bilang paghahanda sa National ID System. Isang hack ng database ng DepEd at tiyak na makikita ang mga impormasyong ito na magagamit sa Identity Theft o pagnanakaw ng pagkakakilanlan. Nagagamit, halimbawa, ang apelyido ng nanay noong dalaga at petsa ng kapanganakan upang matukoy ang password ng isang tao sa kanyang mga accounts;    3. Ang lagda o pirma ng mga school administrators at principals gayundin ang mga logos at headers ng mga paaralan ay naroroon din. Ang mga ito ay maaaring makopya at maedit para makahingi ng donasyon at makapangikil;    4. Ang buong Diploma o Certificate ay maaaring makopya para magamit sa pansariling kapakanan. Napakadali na ngayong mag edit at makapandaya.    Kahit na po talagang maipagmamalaki ang mga dokumentong ito at masarap ipost sa ating social media accounts, isipin pa rin natin una sa lahat, ang kaligtasan at ang kapakanan ng ating mga anak at sarili.     Ads    Nakaka-proud talaga para sa isang magulang na maganda ang resulta ng inyong anak sa kanyang pag-aaral. Dahil dito ay maraming magulang ang hindi mapigil ang sarili na ibahagi ito sa iba sa pamamagitan ng pagpo-post sa social media.   Pero alam nyo ba na hindi ito ipinapayo ng mga eksperto? Alamin kung bakit.        Ads          Sa mga magulang at mga mag aaral,  Tayo po ay pinaaalalahanan at hinihikayat ng DepEd na iwasan ang pagpopost ng buong larawan ng ID, Report Card o Certificate ng ating mga anak sa Facebook o sa anupamang social networking site platforms. Ang mga dokumentong ito, bagama’t karapatdapat ipagmalaki, ay naglalaman ng mga mahahalaga at sensitibong personal na impormasyong maaaring gamitin upang mambiktima at manlinlang ng kapwa kabilang na may ari ng mga dokumentong iyon kasama na rin ang kanyang mga kaanak.      Ads      Sponsored Links    1. Ang buong pangalan ng bata at buong pangalan ng kanyang paaralan na matatagpuan dito ay maaaring gamitin upang matukoy kung saan siya naroroon. Napakadali ngayong isearch at makita ang mga social media accounts ng mga bata gayundin makita sa mapa gamit ang internet ang kinaroroonan ng mga ito;    2. Ang Learner Reference Number (LRN) na natatangi sa isang maga-aral ay matatagpuan rin sa mga dokumentong ito. Nakaugnay sa LRN ng isang bata ang kanyang historical school records kasama ang kanyang mga marka gayundin ang mga personal na impormasyon gaya ng petsa ng kapanganakan, adres, pangalan ng mga magulang, lahi, at iba pa, na pawang ginawa ng gobyerno bilang paghahanda sa National ID System. Isang hack ng database ng DepEd at tiyak na makikita ang mga impormasyong ito na magagamit sa Identity Theft o pagnanakaw ng pagkakakilanlan. Nagagamit, halimbawa, ang apelyido ng nanay noong dalaga at petsa ng kapanganakan upang matukoy ang password ng isang tao sa kanyang mga accounts;    3. Ang lagda o pirma ng mga school administrators at principals gayundin ang mga logos at headers ng mga paaralan ay naroroon din. Ang mga ito ay maaaring makopya at maedit para makahingi ng donasyon at makapangikil;    4. Ang buong Diploma o Certificate ay maaaring makopya para magamit sa pansariling kapakanan. Napakadali na ngayong mag edit at makapandaya.    Kahit na po talagang maipagmamalaki ang mga dokumentong ito at masarap ipost sa ating social media accounts, isipin pa rin natin una sa lahat, ang kaligtasan at ang kapakanan ng ating mga anak at sarili.       Parents and students are warned and urged by the Department of Education (DepEd)to refrain from posting the entire photo of school IDs, Report Card or Certificate of our children on Facebook or in any social networking site platforms. Though it is definitely something to be proud of, it also contains vital and sensitive informations that could be use by other people to victimized and scam other people including the person who owns the information and their families, friends and relatives.       Ads          Sponsored Links    1. The child's full name, the name and location of the school could be used to track where the kid is. It is now very easy for them to locate your kids just by looking into their social media accounts and google maps.      2. The Learner Reference Number (LRN)which is unique to every student can be found here also. the LRN is associated with the students school historical records including their grades and other personal information like date of birth, address, name of parents, race, ethnicity, and others which was made by the government in preparation to the National ID system. it could be a tool for identity theft. Mother's maiden name and birth date could be also use to determine passwords in their accounts.       3. It also contains the signature of the school administrators, principals as well as the logos and headers of the schools. It could be edited and maliciously use to extort money or to ask for donations.    4. The whole photo of the certificate or Diploma could be copied and used maliciously as well.     So, before posting anything on social media, parents need to control themselves for security reasons.

Ads


It makes us proud that our kids do well in school. It also feel good to boast about it, hence, you often see social media posts from certain parents flaunting their kids' achievement.  But do you know that posting it in social media is not recommended by experts? Find out why.    Nakaka-proud talaga para sa isang magulang na maganda ang resulta ng inyong anak sa kanyang pag-aaral. Dahil dito ay maraming magulang ang hindi mapigil ang sarili na ibahagi ito sa iba sa pamamagitan ng pagpo-post sa social media.   Pero alam nyo ba na hindi ito ipinapayo ng mga eksperto? Alamin kung bakit.        Ads          Sa mga magulang at mga mag aaral,  Tayo po ay pinaaalalahanan at hinihikayat ng DepEd na iwasan ang pagpopost ng buong larawan ng ID, Report Card o Certificate ng ating mga anak sa Facebook o sa anupamang social networking site platforms. Ang mga dokumentong ito, bagama’t karapatdapat ipagmalaki, ay naglalaman ng mga mahahalaga at sensitibong personal na impormasyong maaaring gamitin upang mambiktima at manlinlang ng kapwa kabilang na may ari ng mga dokumentong iyon kasama na rin ang kanyang mga kaanak.      Ads      Sponsored Links    1. Ang buong pangalan ng bata at buong pangalan ng kanyang paaralan na matatagpuan dito ay maaaring gamitin upang matukoy kung saan siya naroroon. Napakadali ngayong isearch at makita ang mga social media accounts ng mga bata gayundin makita sa mapa gamit ang internet ang kinaroroonan ng mga ito;    2. Ang Learner Reference Number (LRN) na natatangi sa isang maga-aral ay matatagpuan rin sa mga dokumentong ito. Nakaugnay sa LRN ng isang bata ang kanyang historical school records kasama ang kanyang mga marka gayundin ang mga personal na impormasyon gaya ng petsa ng kapanganakan, adres, pangalan ng mga magulang, lahi, at iba pa, na pawang ginawa ng gobyerno bilang paghahanda sa National ID System. Isang hack ng database ng DepEd at tiyak na makikita ang mga impormasyong ito na magagamit sa Identity Theft o pagnanakaw ng pagkakakilanlan. Nagagamit, halimbawa, ang apelyido ng nanay noong dalaga at petsa ng kapanganakan upang matukoy ang password ng isang tao sa kanyang mga accounts;    3. Ang lagda o pirma ng mga school administrators at principals gayundin ang mga logos at headers ng mga paaralan ay naroroon din. Ang mga ito ay maaaring makopya at maedit para makahingi ng donasyon at makapangikil;    4. Ang buong Diploma o Certificate ay maaaring makopya para magamit sa pansariling kapakanan. Napakadali na ngayong mag edit at makapandaya.    Kahit na po talagang maipagmamalaki ang mga dokumentong ito at masarap ipost sa ating social media accounts, isipin pa rin natin una sa lahat, ang kaligtasan at ang kapakanan ng ating mga anak at sarili.     Ads    Nakaka-proud talaga para sa isang magulang na maganda ang resulta ng inyong anak sa kanyang pag-aaral. Dahil dito ay maraming magulang ang hindi mapigil ang sarili na ibahagi ito sa iba sa pamamagitan ng pagpo-post sa social media.   Pero alam nyo ba na hindi ito ipinapayo ng mga eksperto? Alamin kung bakit.        Ads          Sa mga magulang at mga mag aaral,  Tayo po ay pinaaalalahanan at hinihikayat ng DepEd na iwasan ang pagpopost ng buong larawan ng ID, Report Card o Certificate ng ating mga anak sa Facebook o sa anupamang social networking site platforms. Ang mga dokumentong ito, bagama’t karapatdapat ipagmalaki, ay naglalaman ng mga mahahalaga at sensitibong personal na impormasyong maaaring gamitin upang mambiktima at manlinlang ng kapwa kabilang na may ari ng mga dokumentong iyon kasama na rin ang kanyang mga kaanak.      Ads      Sponsored Links    1. Ang buong pangalan ng bata at buong pangalan ng kanyang paaralan na matatagpuan dito ay maaaring gamitin upang matukoy kung saan siya naroroon. Napakadali ngayong isearch at makita ang mga social media accounts ng mga bata gayundin makita sa mapa gamit ang internet ang kinaroroonan ng mga ito;    2. Ang Learner Reference Number (LRN) na natatangi sa isang maga-aral ay matatagpuan rin sa mga dokumentong ito. Nakaugnay sa LRN ng isang bata ang kanyang historical school records kasama ang kanyang mga marka gayundin ang mga personal na impormasyon gaya ng petsa ng kapanganakan, adres, pangalan ng mga magulang, lahi, at iba pa, na pawang ginawa ng gobyerno bilang paghahanda sa National ID System. Isang hack ng database ng DepEd at tiyak na makikita ang mga impormasyong ito na magagamit sa Identity Theft o pagnanakaw ng pagkakakilanlan. Nagagamit, halimbawa, ang apelyido ng nanay noong dalaga at petsa ng kapanganakan upang matukoy ang password ng isang tao sa kanyang mga accounts;    3. Ang lagda o pirma ng mga school administrators at principals gayundin ang mga logos at headers ng mga paaralan ay naroroon din. Ang mga ito ay maaaring makopya at maedit para makahingi ng donasyon at makapangikil;    4. Ang buong Diploma o Certificate ay maaaring makopya para magamit sa pansariling kapakanan. Napakadali na ngayong mag edit at makapandaya.    Kahit na po talagang maipagmamalaki ang mga dokumentong ito at masarap ipost sa ating social media accounts, isipin pa rin natin una sa lahat, ang kaligtasan at ang kapakanan ng ating mga anak at sarili.       Parents and students are warned and urged by the Department of Education (DepEd)to refrain from posting the entire photo of school IDs, Report Card or Certificate of our children on Facebook or in any social networking site platforms. Though it is definitely something to be proud of, it also contains vital and sensitive informations that could be use by other people to victimized and scam other people including the person who owns the information and their families, friends and relatives.       Ads          Sponsored Links    1. The child's full name, the name and location of the school could be used to track where the kid is. It is now very easy for them to locate your kids just by looking into their social media accounts and google maps.      2. The Learner Reference Number (LRN)which is unique to every student can be found here also. the LRN is associated with the students school historical records including their grades and other personal information like date of birth, address, name of parents, race, ethnicity, and others which was made by the government in preparation to the National ID system. it could be a tool for identity theft. Mother's maiden name and birth date could be also use to determine passwords in their accounts.       3. It also contains the signature of the school administrators, principals as well as the logos and headers of the schools. It could be edited and maliciously use to extort money or to ask for donations.    4. The whole photo of the certificate or Diploma could be copied and used maliciously as well.     So, before posting anything on social media, parents need to control themselves for security reasons.



Parents and students are warned and urged by the Department of Education (DepEd)to refrain from posting the entire photo of school IDs, Report Card or Certificate of our children on Facebook or in any social networking site platforms. Though it is definitely something to be proud of, it also contains vital and sensitive informations that could be use by other people to victimized and scam other people including the person who owns the information and their families, friends and relatives. 



Ads




Sponsored Links


1. The child's full name, the name and location of the school could be used to track where the kid is. It is now very easy for them to locate your kids just by looking into their social media accounts and google maps.



2. The Learner Reference Number (LRN)which is unique to every student can be found here also. the LRN is associated with the students school historical records including their grades and other personal information like date of birth, address, name of parents, race, ethnicity, and others which was made by the government in preparation to the National ID system. it could be a tool for identity theft. Mother's maiden name and birth date could be also use to determine passwords in their accounts.


3. It also contains the signature of the school administrators, principals as well as the logos and headers of the schools. It could be edited and maliciously use to extort money or to ask for donations.

4. The whole photo of the certificate or Diploma could be copied and used maliciously as well. 

So, before posting anything on social media, parents need to control themselves for security reasons.


©2019 THOUGHTSKOTO

Thursday, April 21, 2016

ARE YOU A REGISTERED VOTER? COMELEC ADVISED TO ALL: CHANGE YOUR PASSWORD AND DATA INFO'S ASAP!C



Commission on Elections or Comelec said sorry to all registered voters and those who were registered in previous elections with names and sensitive informations including passport number and fingerprint that may be vulnerable to use for some illegal activities. 

The names said to be numbering between 55M to 70M registered infos that hackers took from the Comelec database and dumped to a searchable website entitled, "Philippines, we have your data" The Comelec asked the help of NBI to take down the website and it is still searchable and visible as of Thursday.
advertisement
The Comelec advised all registered voters to change their email passwords and other vital infos to prevent misuse of their privacy.
"Tayong lahat po. Palitan email addresses and passwords;
 contact credit card company to tell them maaring damay kayo"

advertisement
The website "Philippines, we have your data" said in a statement at the opening of the website.

"ATTENTION: there is no any passport information, no documents, etc. There is just personal data from the previously leaked by LulzSecPinas Comelec database. We have no responsibility and don't give any warranty of leaked data's accuracy - we have just extracted it from the dump." 

What is this all about?
As you know (or don't know), recently LulzSec Pilipinas have hacked comelec.ph. They have dumped the database of about 70 million of Philippines voters and have published all the data at archive.org. The database contains a lot of sensitive information, including fingerprint data and passport information. So, we thought that it would be fun to make a search engine over that data.

Why are we doing this?

For lulz. Hackers just hack and download data from websites but we make it accessible for anyone. It's one thing to hear news about a huge data leak and another to is see your data in a public website. Maybe, at least now, government will start thinking about security of citizens' personal data.



PROTECT YOUR INFORMATION

  1. CHANGE EMAIL ADDRESS PASSWORDS
  2. CHANGE PIN CODES IN ATM
  3. ENABLE TWO WAY OR PHONE AUTHENTICATION OF YOUR CREDIT CARDS AND BANK TRANSACTIONS
  4. PASSPORTS AND OTHERS DATA MAY ALSO BE RENEWED FOR SECURITY REASON



©2016 THOUGHTSKOTO

Thursday, February 25, 2016

WARNING UAE EXPATS! DON'T TAKE OR POST PHOTOS WITHOUT PERMISSION!

Posting other people's photos on social media networks like facebook, Snapchat or Twitter without permission from the original owner or model could land someone to jail for 6 months or pay for as much as half a million dirhams (dH500,000)  or P6.5Millions ($138K) under the United Arab Emirates IT or Cybercrime law.  According to report, a dubai police officer admitted that many social media users in the UAE are not aware of that law.

"Some people do not know that if they photograph a person and post the picture on social networks or other electronic devices, it becomes a punishable crime according to the UAE law. This crime involves a jail term of six months and 
a fine of Dh150,000-500,000. ($41K to $138K). 
We need the public to know that this is a big crime in the UAE because some people do it for fun without knowing they will be prosecuted." 
- Major General Mohammed Al Shareef, Assistant Police Commander for Administration



SQUARE LINKS 5

LONG LINKS


"They should control their children because letting them have their own social network account could make them easy prey to blackmail and other crime." 
- Mohammed Abdullah, Director, Decision Support Centre, Dubai Police.

UAE have had several cases of social media reported prosecution that involves even expats and foreigners. 

See also:

©2016 THOUGHTSKOTO

Friday, October 09, 2015

IMPORTANT INFO: Saudi Arabia Cybercrime Law




PLEASE SHARE THIS IMPORTANT INFO:
According to Saudi Arabia Cybercrime Law of 2007, cybercrime perpetrators can be imprisoned for anywhere between one and 10 years and incur a fine of between SR500,000 and SR5 million.

The anti-cybercrime law in the Kingdom of Saudi Arabia involves various offenses. These include spying,
interception of data transmitted through an information network without authorization,
unlawful access to computers with the intention of threatening or engaging in blackmail,
unlawful access to a website or hacking with the intent of changing design,
destroying or modifying websites,
invasion of privacy through the misuse of camera-equipped mobile phones and defamation
 and infliction of damage on others through the misuse of information.

Recent news about a wife posting the video and the page who published the video could be liable or committed a cybercrime violation. According to Mr. Fahd Mahbob, a lawyer said there could be punishment for the person who took the video and posted it online. This could mean either a fine of SR500,000 or one year in jail or both. The publisher of the video faces a fine of SR3 million and six years in prison.

Read the whole law below:




Anti-Cyber Crime Law
(8 Rabi1, 1428 / 26 March 2007)
Kingdom of Saudi Arabia
 Bureau of Experts at the Council of Ministers
Official Translation
Department Translation of Saudi Laws
Anti-Cyber Crime Law Royal Decree No. M/17
8 Rabi 1 1428 / 26 March 2007
First Edition 2009

Article 1:
The following terms and phrases, wherever mentioned in this Law, shall have the meanings expressed next to them, unless the context requires otherwise:
1. Person: Any natural or corporate person, whether public or private.
2. Information System: A set of programs and devices designed for managing and including computers.
3. Information Network: An interconnection of more than one computer or processing data, information system to obtain and exchange data, e. g. Local Area Network (LAN), Wide Area Network (WAN), and World Wide Web (Internet).
4. Data: Information, commands, messages, voices, or images which are prepared or have been prepared for use in computers. This includes data that can be saved, processed, transmitted, or constructed by computers, such as numbers, letters, codes, etc
5. Computer Programs: As a set of commands and data which contain guidelines or applications when run in computers or computer networks to perform required functions.
6. Computer: Any electronic device whether movable or fixed, wired or wireless, which is equipped with a system to process, store, transmit, receive or browse data and perform specific functions according to programs and commands.
7. Unauthorized Access: The deliberate, unauthorized access by any person to computers, websites, information systems, or computer networks.
8. Cyber Crime: Any action which involves the use of computers or computer networks, in violation of the provisions of this Law.
9. Web Site: A site providing data on the information network through specific Uniform Resource Locator (URL). 
10. Reception: Illegal viewing or obtaining of date.
Article 2
This Law aims at combating cyber crimes by identifying such crimes and determining their punishments to ensure the following:
1. Enhancement of information security.
2. Protection of rights pertaining to the legitimate use of computers and information networks.
3. Protection of public Interest, morals, and common values.
4. Protection of national economy.
Article 3:
Any person who commits one of the following cyber crimes shall be subject to imprisonment for a period not exceeding one year and a fine not exceeding five hundred thousand riyals (SR500,000) or to either punishment:
1. Spying on, interception or reception of data transmitted through an information network or a computer without legitimate authorization.
2. Unlawful access to computers with the intention to threaten or blackmail any person to compel him to take or refrain from taking an action, be it lawful or unlawful.
3. Unlawful access to a web site, or hacking a web site with the intention to change its design, destroy or modify it, or occupy its URL.
4. Invasion of privacy through the misuse of camera-equipped mobile phones and the like.
5. Defamation and infliction of damage upon others through the use of various information technology devices.
Article 4
Any person who commits one of the following cyber crimes shall be subject to imprisonment for a period not exceeding three years and a fine not exceeding two million riyals, or to either punishment:
1. Acquisition of movable property or bonds for oneself or others or signing such bonds through fraud or use of false name or identity.
2. Illegally accessing bank or credit data, or data pertaining to ownership of securities with the intention of obtaining data, information, funds or services offered.
Article 5:
Any person who commits one of the following cyber crimes shall be subject to imprisonment for a period not exceeding four years and a fine not exceeding three million riyals or to either punishment:
1. Unlawful access to computers with the intention to delete, erase, destroy, leak, damage, alter or redistribute private data
2. Causing the information network to halt or breakdown, or destroying, deleting, leaking or altering existing or stored programs or data.
3. Obstruction of access to, distortion, and causing the breakdown of services by any means.
Article 6:
Any person who commits one of the following cyber crimes shall be subject to imprisonment for a period not exceeding five years and a fine not exceeding three million riyals or to either punishment:
1. Production, preparation, transmission, or storage of material impinging on public order, religious values, public morals, and privacy, through the information network or computers.
2. The construction or publicizing of a website on the information network or computer to promote or facilitate human trafficking.
3. The preparation, publication, and promotion of material for pornographic or gambling sites which violates public morals.
4. The construction or publicizing of a web site on the information network or computer to trade in, distribute, demonstrate method of use or facilitate dealing in narcotic and psychotropic drugs.
Article 7:
Any person who commits one of the following cyber crimes shall be subject to imprisonment for a period not exceeding ten years, and a fine not exceeding five million riyals or to either punishment:
1. The construction or publicizing of a website on the information network or on a computer for terrorist organizations to facilitate communication with leaders or members of such organizations, finance them, promote their ideologies, publicize methods of making incendiary devices or explosives, or any other means used in terrorist activities.
2. Unlawful access to a web site or an information system directly, or through the information network or any computer with the Intention of obtaining data jeopardizing the internal or external security of the State or its national economy.
Article 8:
The imprisonment and the fine may not be less than half the maximum if the crime is coupled with one of the following:
1. The crime is perpetrated through organized crime.
2. The offender holds a public office and the crime perpetrated relates to this office, or if he perpetrates the crime using his power or influence.
3. The luring and exploiting of minors and the like.
4. The offender has been previously convicted of similar crimes within or outside the Kingdom.
Article 9:
Any person who incites, assists or collaborates with others to commit any of the crimes stipulated in this Law shall be subject to a punishment not exceeding the maximum punishment designated for such crimes, if the crime is committed as a result of said incitement, assistance or collaboration, and he shall be subject to a punishment not exceeding half the maximum punishment designated, if the intended crime is not committed.
Article 10:
Any person who attempts to commit any of the crimes stipulated in this Law shall be subject to a punishment not exceeding half the maximum punishment designated for said crimes.

Article 11:
The competent court may exempt an offender from such punishments if he informs the competent authority of the crime prior to its discovery and prior to the infliction of damage. If the culprit informs the competent authority after the occurrence of the crime, the exemption from punishment shall be granted if the information he provides eventually leads to the arrest of the other culprits and the seizure of the means used in the perpetration of the crime.
Article 12:
Application of this Law shall not prejudice the provisions of relevant laws, especially those pertaining to intellectual property rights, nor relevant international agreements to which the Kingdom is party.
Article 13:
Without prejudice to the rights of bona fide persons, equipment, software, and means used in perpetrating any of the crimes stipulated in this Law or the proceeds generated therefrom may be confiscated. In addition, the website or the venue where the service is provided may be shut down permanently or temporarily if it is the source for perpetrating the crime and the crime is committed with the owner's knowledge.
Article 14:
The Communications and Information Technology Commission, pursuant to its powers, shall provide the assistance and technical support to competent security agencies during the Investigation stages of such crimes and during trial.
Article 15:
The Bureau of Investigation and Public Prosecution shall carry out the investigation and prosecution of crimes stipulated In this Law.
Article 16:

This Law shall be published in the Official Gazette and shall enter into force one hundred twenty days after the date of publication. This translation is provided for guidance. The governing text is the Arabic text
source: Saudi Arabia Cybercrime Law

READ MORE HERE:
Cyber Crime Law In UAE and The Middle East
©2015 THOUGHTSKOTO