Monday, October 1, 2012

Ano nga ba ang nilalaman ng Cyber Crime Law ??

Sa totoo lang npakaraming ayaw o hindi pabor sa pagpasa ng batas na may kinalaman 
sa malayang pagpapahayag ng saloobin sa mundo ng Internet.

Wala pa akong masyadong pang-unawa sa bagong batas na ito pero hndi ko na kailangan pang maging experto sa batas para hndi mapuna na ito ay taliwas sa sagradong batas na nkapaloob sa 

Sec. 4 at Section 18. (1) Article III also known as The Bill of Rights

"Section 4. No law shall be passed abridging the freedom of speech, 

of expression, or of the press, or the right of the people peaceably to assemble and petition the government for redress of grievances."

Section 18. (1) No person shall be detained solely by reason of his political beliefs and aspirations.

Isa akong blogger, responsableng blogger!


Alam kong maaring gawing laban sa akin ang anu mang binibitawan kong salita sa bawat artikulong aking inilalathala. Gumagamit ako ng mga salitang barubal sa paningin ng iba ngutin kalayaan sa pagpapahayan para sa aming mga manunulat .
May mga pagkakataon na kailangan naming magbigay ng opinyon sa mga bagay-bagay sa aming kapaligiran .. Mga bagay na may kinalaman sa aming pagkatao , paniniwala at pagka-Pilipino .
Sa mga ganitong pagkakatao , hindi maiiwasang maging emosyonal ng ibang tao at magbigay ng kritisismo . Ako man takot na makatanggap ng mga hindi kanais nais na mga mensahe kaya nga alam ko kung paano maging responsable sa mga inilalathala kong mga salita .
Sa kagustuhan kong protektahan aking sarili mula sa mapang-abusong mga salita , ginagawa kong limitado ang access ng aking mga mambabasa at pribado ang mga bagay na piling tao lamang ang gusto kong makakita .

Sa aking paniniwala , isa lamang redundancy ang Republic Act No. 10175 dahil mayroon naman na tayong mga batas na maaring gamitin panglaban sa mga taong abusado sa paggamit sa kalayaan sa pamamahayag tulad ng Oral defamation o Slander, Unjust Vexation,  Libel at kung ano ano pa ! Isang bagay pa , kulang na kulang ang ating bansa sa mga hospital at eskwelahan pero merong budget para putulin ang kalayaan sa malayang pamamahayag ? I JUST DON'T GET IT !!!
Kahit isang taong walang pinagaralan alam kung ano ang uunahing asikasuhin ..
Ang magkalaman ang sikmura mo , mkapagaaral ka at magkaroon ng maginhawang buhay !
Sana magising ang gobyerno sa hinaing ng mga tao at 
hindi puro pagpapapogi ng pangalan ang atupagin .


Ganun pa man nais kong ibahagi ang kabuuang nilalaman ng kontrobersyal na Republic Act No. 10175 magkaroon ang lahat ng kaalaman tungkol sa batas na ito .



Republic of the Philippines
Congress of the Philippines
Metro Manila
Fifteenth Congress

Second Regular Session
Begun and held in Metro Manila, on Monday the Twenty-fifth day of July two thousand eleven.
[ Republic Act No. 10175 ]
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES
Be it enacted, by the Senate and House of Representatives of the Philippines in Congress assembled:
CHAPTER I
GENERAL PROVISIONS
Section 1. Short Title. – This Act shall be known as the Cybercrime Prevention Act of 2012″.
Section 2. Declaration of Policy. – The State recognizes the vital role of information and communication industries such as content production, telecommunications, broadcasting, electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and / or delivery of information, and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information, and data stored therein, from all forms of misuse, abus, and illegal access by making punishable under the law such conduct or conducts. In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels, and by providing arrangements for fast and reliable international cooperation.
Section 3. Definition of Terms. – For purposes of this Act, the following terms are hereby defined as follows:
(a) Access refers to the instruction, communication with, storing data in, retrieving data from, or otherwise making use of any resources of a computer system of communication network.
(b) Alteration refers to the modification or change, in form or substance, of an existing computer data or program.
(c) Communication refers to the transmission of information through ICT media, including  voice, video, and other forms of data.
(d) Computer refers to an electronic, magnetic, optical, electromechanical, or other data processing or communications device, or grouping of such devices, capable of performing logical, arithmetic, routing, or storage functions and which includes any storage facility, or equipment or communications facility or equipment directly related to or operating in conjunction with such device. It covers any type of computer device including devices with data processing capabilities like mobile phones, smart phones, computer networks and other devices connected to the Internet.
(e) Computer data refers to any representation of facts, information, or concepts in a form suitable for processing in a computer system including a program suitable for processing in a computer system including a program suitable to cause oa computer system to perform a function and includes electronic documents and / or electronic data messages whether stored in local computer systems or online.
(f) Computer program refers to a set of instructions executed by the computer to achieve intended results.
(g) Computer system refers to any device or group of interconnected or related devices, one or more of which pursuant to a program, performs automated processing of data. It covers any type of device with data processing capabilities including, but not limited to, computers and mobile phones. The device consisting of hardware and software may include input, output and storage components which may stand alone or be connected in a network or other similar devices. It also includes computer data storage devices or media.
(h) Without right refers to either: (i) conduct undertake without or in excess of authority; or (ii) conduct not covered by established legal defenses, excuses, court orders, justifications, or relevant principles under the law.
(i) Cyber refers to a computer or a computer network, the electronic medium in which online communication takes place.
(j) Critical infrastructure refers to the computer systems, and / or networks, whether physical or virtual, an / or the computers, computer data and / or traffic data so vital to this country that the incapacity or destruction of or interference with such system and assets would have debilitating impact on security, national or economic security, national public health and safety, or any combination of those matters.
(k) Cybersecurity refers to the collection of tools, policies, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
(l) Database refers to a representation of information, knowledge, facts, concepts or instructions which are being prepared, processed, or stored or have been prepared, processed or stored in a formalized manner and which are intended for use in a computer system.
(m) Interception refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring.
(n) Service provider refers to:
(1) Any public or private entity that provides to users of its service the ability to communication by means of a computer system, and
(2) Any other entity that processes or stores computer data on behalf of such communication service or users of such service.
(o) Subscriber’s information refers to any information contained in the form of computer data or any other form that is held by a service provider, relating to subscribers of its services other than traffic or content data and by which identity can be established:
(1) The type of communication service used, the technical provisions taken thereto and the period of service;
(2) The subscriber’s identity, postal or geographic address, telephone and other access numbers, any assigned network address, billing, and payment information, available on the basis of the service agreement or arrangement, and
(3) Any other available information on the site of the installation of communication equipment, available on the basis of the service agreement or arrangement.
(p) Traffic data or non-content data refers to any computer data other than the content of the communication including, but not limited to, the communication’s origin, destination, route, time, data, size, duration, or type of underlying service.
CHAPTER II
PUNISHABLE ACTS
Section 4 Cybercrime Offenses. – The following acts constitute the offense of cybercrime punishable under this Act:
(a) Offenses against the confidentiality, integrity, and availability of computer data and systems.
(1) Illegal access – The access to the whole or any part of a computer system without right.
(2) Illegal interception – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such  computer data.
(3) Data Interference – The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.
(4) System Interference – The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, without right or authority, including the introduction or transmission of viruses.
(5) Misuse of devices
(i) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:
(aa) a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or
(bb) A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.
(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with the intent to use said devices for the purpose of committing any of the offenses under this section.
(6) Cyber-squatting. The acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same, if such a domain name is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration;
(ii) Identical or in any way similar with the name of a person other than the registrant, in case of a personal name, and
(iii) Acquired without right or with intellectual property interests in it.
(b) Computer-related Offenses:
(1) Computer-related Forgery:
(i) The input, alteration, or deletion of computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or
(ii) The act of knowingly using computer data which is the product of computer-related forgery as defined here, for the purpose of perpetuating a fraudulent or dishonest design.
(2) Computer-related Fraud. The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent; Provided, That if no damage has yet been caused, the penalty imposed shall be one (1) degree lower.
(3) Computer-related Identity Theft. The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right. Provided, That if no damage has yet been caused, the penalty imposed shall be one (1) degree lower.
(c) Content-related Offenses:
(1) Cybersex – The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.
(2) Child Pornography – The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system. Provided, That the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act No. 9775.
(3) Unsolicited Commercial Communications – The transmission of commercial communication with the use of computer system which seek to advertise sell, or offer for sale products and services are prohibited unless:
(1) There is prior affirmative consent from the recipient;
or
(ii) The primary intent of the communication is for service and / or administrative announcements from the sender to its existing users, subscribers or customers; or
(iii) The following conditions are present:
(aa) The commercial electronic communication contains a simple, valid, and reliable way for the recipient to reject receipt of further commercial electronic messages (opt-out) from the same source;
(bb) The commercial electronic communication does not purposely disguise the source of the electronic message; and
(cc) The commercial electronic communication does not purposely include misleading information in any part of the message in order to induce the recipients to read the message.
(4) Libel. – The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended committed through a computer system or any other similar means which may be devised in the future.
Section 5. Other Offenses – The following acts shall also constitute an offense:
(a) Aiding or Abetting in the Commission of Cybercrime – Any person who willfully abets or aids in the commission of any of the offenses enumerated in this Act shall be held liable.
(b) Attempt in the Commission of Cybercrime – Any person who willfully attempts to commit any of the offenses enumerated in this  Act shall be held liable.
Section 6. All crimes defined and penalized by the Revised Penal Code, as amended, and special laws, if committed by, through and with the use of information and communications technologies shall be covered by the relevant provisions of this Act. Provided, That the penalty to be imposed shall be one (1) degree higher than that provided for by the Revised Penal Code, as amended, and special laws, as the case may be.
Section 7. Liability under Other Laws. – A prosecution under this Act shall be without prejudice to any liability for violation of any provision of the Revised Penal Code, as amended, or special laws.
Chapter III
PENALTIES
Section 8. Penalties. – Any person found guilty of any of the punishable acts enumerated in Sections 4(a) and 4(b) of this Act shall be punished with imprisonment of prision mayor or a fine of at least Two hundred thousand pesos (P200,000) up to a maximum amount commensurate to the damage incurred or both.
Any person found guilty of any of the punishable acts under Sections 4(a)(5) shall be punished with imprisonment of prision mayor or a fine of not more than Five hundred thousand pesos (P500,000) or both.
If punishable acts in Section 4(a) are committed against critical infrastructure, the penalty of reclusion temporal or a fine of at least Five hundred thousand pesos (P500,000) up to a maximum amount commensurate to the damage incurred or both, shall be imposed.
Any person found guilty of any of the punishable acts enumerated in Sections 4(c)(1) of this Act shall be punished with imprisonment of prision mayor or a fine of at least Two hundred thousand pesos (P200,000) but not exceeding One million pesos (P1,000,000) or both.
Any person found guilty of any of the punishable acts enumerated in Sections 4(c)(2) of this Act shall be punished with the penalties as enumerated in Republic Act 9775 or the “Anti-Child Pornography Act of 2009″; Provided, That the penalty to be imposed shall be one (1) degree higher than that provided for in Republic Act 9775, if committed through a computer system.
Any person found guilty of any of the punishable acts enumerated in Sections 4(c)(3) shall be punished with imprisonment of arresto mayor or a fine of at least Fifty thousand pesos (P50,000) but not exceeding Two hundred fifty thousand pesos (P250,000) or both.
Any person found guilty of any of the punishable acts enumerated in Sections 5 of this Act shall be punished with imprisonment of one (1) degree lower than that of the prescribed penalty for the offense or a fine of at least One hundred thousand pesos (P100,000) but not exceeding Five hundred thousand pesos (P500,000) or both.
Section 9. Corporate Liability. – When any of the punishable acts herein defined are knowingly committed on behalf of or for the benefit of a juridical person, by a natural person acting either individually or as part of an organ of the juridical person, who has a leading position within, based on: (a) a power of representation of the juridical person provided the act committed falls within the scope of such authority; (b) an authority to take decisions on behalf of the juridical person. Provided, That the act committed falls within the scope of such authority; or (c) an authority to exercise control within the juridical person, the juridical person shall be held liable for a fine equivalent to at least double the fines imposable in Section 7 up to a maximum of Ten million pesos (P10,000,000).
If the commission of any of the punishable acts herein defined was made possible due to the lack of supervision or control by a natural person referred to and described in the preceding paragraph, for the benefit of that juridical person by a natural person acting under its authority, the juridical person shall be held liable for a fine equivalent to at least double the finds imposable in Section 7 up to a maximum of Five million pesos (P5,000,000).
The liability imposed on the juridical person shall be without prejudice to the criminal liability of the natural person who has committed the offense.
Chapter IV
Enforcement and Implementation
Section 10. Law Enforcement Authorities. The National Bureau of Investigation and the Philippine National Police shall be responsible for the efficient and effective law enforcement of the provisions of this Act. The NBI and the PNP shall organize a cybercrime unit or center manned by special investigators to exclusively handle cases involving violations of this Act.
Section 11. Duties of Law Enforcement Authorities. To ensure that the technical nature of cybercrime and its prevention is given focus and considering the procedures involved for international cooperation, law enforcement authorities specifically the computer or technology crime divisions or units responsible for the investigation of cybercrimes are required to submit timely and regular reports including pre-operation, post operation, and investigation results and such other documents as may be required to the Department of Justice for review and monitoring.
Section 12. Real-time Collection of Traffic Data. – Law enforcement authorities, with due cause, shall be authorized to collect or record by technical or electronic means traffic data in real time associated with specified communications transmitted by means of a computer system.
Traffic data refer only to the communication’s origin, destination, route, time, date, size, duration, or type of underlying service, but not content, nor identities..
All other data to be collected or seized or disclosed will require a court warrant.
Service providers are required to cooperate and assist law enforcement authorities in the collection or recording of the above-stated information.
The court warrant under this section shall only be issued or granted upon written application and the examination under oath or affirmation of the applicant and the witnesses he may produce and the showing: (1) that there are reasonable grounds to believe that any of the crimes enumerated herein above has been committed, or is being committed, is about to be committed; (2) that there are reasonable grounds to believe that evidence that will be obtained is essential to the conviction of any person for, or to the solution or, or to the prevention of any such crimes, and (3) that there are no other means readily available for obtaining such evidence.
Section 13. Preservation of Computer Data. The integrity of traffic data and subscriber information relating to communication services provided by a service provider shall be preserved for a minimum of six (6) months period from the date of the transaction. Content data shall be similarly preserved for six (6) months from the date of receipt of the order from law enforcement authorities requiring its preservation.
Law enforcement authorities may order a one-time extension of another six (6) months.Provided, That once computer preserved, transmitted or stored by service provided is used as evidence in a case, the mere furnishing to such service provider of the transmittal document to the Office of the Prosecutor shall be deemed a notification to preserve the computer until the termination of the case.
The service provider ordered to preserve computer data shall keep confidential the order and its compliance.
Section 14. Disclosure of Computer Data. – Law enforcement authorities, upon securing a court warrant, shall issue an order requiring any person or service provider to disclose or submit subscriber’s information, traffic data or relevant data in his / its possession or control within seventy-two (72) hours from receipt of the order in relation to a valid complaint officially docketed and assigned for investigation and the disclosure is necessary and relevant for the purpose of investigation.
Section 15. Search, Seizure, Examination of Computer Data. – Where a search and seizure warrant is properly issue, the law enforcement authorities shall likewise have the following powers and duties.
Within the time period specified in the warrant, to conduct interception, as defined in this Act, and:
(a) To secure a computer system or a computer data storage medium.
(b) To make and retain a copy of those computer data secured.
(c) To maintain the integrity of the relevant stored computer data.
(d) To conduct forensic analysis or examinations of the computer data storage medium; and
(e) To render inaccessible or remove those computer data in the accessed computer or computer and communications network.
Pursuant thereof, the law enforcement authorities may order any person who has knowledge about the functioning of the computer system and the measures to protect and preserve the computer data therein to provide, as is reasonable, the necessary information to enable the undertaking of the search, seizure and examination.
Law enforcement authorities may request for an extension of time to complete the examination of the computer data storage medium and to make a return thereon but in no case for a period longer than thirty (30) days from date of approval by the court.
Section 16. Custody of Computer Data. All computer data, including content and traffic data, examined under a proper warrant shall, within forty-eight (48) hours after the expiration of the period fixed therein, be deposited with the court in a sealed package, and shall be accompanies by an affidavit of the law enforcement authority executing it stating the dates and times covered by the examination, and the law enforcement authority who access the deposit, among other relevant data. The law enforcement authority shall also certify that no duplicates or copies of the whole or any part thereof have been made, or if made, that all such duplicates or copies are included in the package deposited with the court. The package so deposited shall not be opened or the recordings replayed, or used in evidence, or their contents revealed, except upon order of the court, which shall not be granted except upon motion, with due notice and opportunity to be heard to the person or persons whose conversation or communications have been recorded.
Section 17. Destruction of Computer Data. Upon expiration of the periods as provided in Sections 13 and 15, service providers and law enforcement authorities, as the case may be, shall immediately and completely destroy the computer data subject of a preservation and examination.
Section 18. Exclusionary Rule. – Any evidence procured without a valid warrant or beyond the authority of the same shall be inadmissible for any proceeding before any court or tribunal.
Section 19. Restricting or Blocking Access to Computer Data. – When a computer data is prima facie found to be in violation of the provisions of this Act, the DOJ shall issue an order to restrict or block access to such computer data.
Section 20. Non-compliance. Failure to comply with the provisions of Chapter IV hereof specifically the orders from law enforcement authorities shall be punished as a violation of Presidential Decree No. 1829 with imprisonment of prision correccional in its maximum period or a fine of One hundred thousand pesos (P100,000) or both for each and every non-compliance with an order issued by law enforcement authorities.
Chapter V
Jurisdiction
Section 21. Jurisdiction. The Regional Trial Court shall have jurisdiction over any violation of the provisions of this Act including any violation committed by a Filipino national regardless of the place of commission. Jurisdiction shall lie if any of the elements was committed within the Philippines or committed with the use of any computer system wholly or partly situation in the country, or when by such commission any damage is caused to a natural or juridical person who, at the time the offense was committed, was in the Philippines.
There shall be designated special cybercrime courts manned by specially trained judges to handle cybercrime cases.
Chapter VI
International Cooperation
Section 22. General Principles Relating to International Cooperation. – All relevant international instruments on international cooperation in criminal maters, arrangements agreed on the basis of uniform or reciprocal legislation, and domestic laws, to the widest extent possible for the purposes of investigations or proceedings concerning criminal offenses related to computer systems and data, or for the collection of evidence in electronic form of a criminal offense shall be given full force and effect.
Chapter VII
Competent Authorities
Section 23. Department of Justice (DOJ). There is hereby created an Office of Cybercrime within the DOJ designated as the central authority in all matters relating to international mutual assistance and extradition.
Section 24. Cybercrime Investigation and Coordinating Center (CICC). There is hereby created, within thirty (30) days from the effectivity of this Act, an inter-agency body to be known as the Cybercrime Investigation and Coordinating Center (CICC), under the administrative supervision of the Office of the President, for policy coordination among concerned agencies and for the formulation and enforcement of the national cybersecurity plan.
Section 25. Composition. The CICC shall be headed by the Executive Director of the Information and Communications Technology Office under the Department of Science and Technology as Chairperson with the Director of the NBI as Vice Chairperson; the Chief of the PNP, Head of the DOJ Office of Cybercrime; and one (1) representative from the private sector and academe, as members. The CICC shall be manned by a secretariat of selected existing personnel and representatives from the different participating agencies.
Section 26. Powers and Functions. – The CICC shall have the following powers and functions:
(a) To formulate a national cybersecurity plan and extend immediate assistance for the suppression of real-time commission of cybercrime offenses through a computer emergency response team (CERT).
(b) To coordinate the preparation of appropriate and effective measures to prevent and suppress cybercrime activities as provided for in this Act;
(c) To monitor cybercrime cases being handled by participating law enforcement and prosecution agencies.
(d) To facilitate international cooperation on intelligence, investigations, training, and capacity building related to cybercrime prevention, suppression, and prosecution.
(e) To coordinate the support and participation of the business sector local government units and non-government organizations in cybercrime prevention programs and other related projects.
(f) To recommend the enactment of appropriate laws, issuances, measures, and policies.
(g) To call upon any government agency to render assistance in the accomplishment of the CICC’s mandated tasks and functions.
(h) To perform all other matters related to cybercrime prevention and suppression, including capacity building and such other functions and duties as may be necessary for the proper implementation of this Act.
Chapter VIII
FINAL PROVISIONS
Section 27. Appropriations.  - The amount of Fifty mission pesos (P50,000,000) shall be appropriated annually for the implementation of this Act.
Section 28. Implementing Rules and Regulations. – The ICTO-DOST, the DOJ, and the Department of Interior and Local Government (DILG) shall jointly formulate the necessary rules and regulations within ninety (90) days from approval of this Act, for its effective implementation.
Section 29. Separability Clause. If any provision of this Act is held invalid, the other provisions not affected shall remain in full force and effect.
Section 30. Repealing Clause. All laws, decrees or rules inconsistent with this Act are hereby repealed or modified accordingly. Section 33(a) of Republic Act 8792 or Electronic Commerce Act is hereby modified accordingly.
Section 31. This Act shall take effect fifteen (15) days after the completion of its publication in the Official Gazette or in at least two (2) newspapers of general circulation.
Approved,
(Sgd.) FELICIANO BELMONTE JR.
Speaker of the House
of Representatives
(Sgd.) JUAN PONCE ENRILE
President of the Senate
This Act which is a consolidation of Senate Bill No. 2796 and House Bill No. 5808 was finally passed by the Senate and the House of Representatives on June 5, 2012 and June 4, 2012 respectively.
(Sgd.) MARILYN B. BARUA-YAP
Secretary General
House of Representatives
(Sgd.) EMMA LIRIO-REYES
Secretary of the Senate
Approved: September 12, 2012
(Sgd.) BENIGNO S. AQUINO III
President of the Philippines

95 comments:

  1. Hi would you mind letting me know which webhost you're working with? I've loaded your blog in
    3 completely different web browsers and I must say this blog
    loads a lot quicker then most. Can you recommend a good internet hosting provider at a fair price?
    Many thanks, I appreciate it!
    Also visit my webpage - mdm05 dual lcd monitor stand

    ReplyDelete
    Replies
    1. I really don't know what webhost you are talking about but this is just a blogger account. I just use google chrome to visit my blog most of the time. Thanks for dropping by!

      Delete
  2. you are in reality a excellent webmaster.
    The website loading pace is amazing. It sort of feels that you are doing any distinctive trick.
    Also, The contents are masterwork. you've performed a wonderful job in this topic!
    Feel free to visit my webpage :: computer monitor wall mount

    ReplyDelete
  3. Hey! Do you know if they make any plugins to assist
    with Search Engine Optimization? I'm trying to get my blog to rank for some targeted keywords but I'm not seeing very good results.
    If you know of any please share. Thank you!
    My webpage : monitor stand desk

    ReplyDelete
    Replies
    1. I'm sorry, I really don't know a thing about it :((

      Delete
  4. Hi there, its nice post regarding media print, we all be aware of media is a enormous source of data.
    Stop by my blog post : Laptop Bed Stands

    ReplyDelete
    Replies
    1. Yes, you are absolutely right! Thanks for the compliment by the way.

      Delete
  5. This info is invaluable. How can I find out more?
    My web blog ; monitor arm

    ReplyDelete
  6. Wonderful goods from you, man. I have understand your stuff
    previous to and you're just extremely wonderful. I really like what you have acquired here, certainly like what you are stating and the way in which you say it. You make it entertaining and you still care for to keep it sensible. I can not wait to read much more from you. This is really a wonderful site.
    Check out my blog ; monitor and laptop stand

    ReplyDelete
    Replies
    1. This inspires me a lot! Thank you so much! I'll post more informative articles here and of course I'll add humor to it!

      Delete
  7. Heya i am for the first time here. I came across this board and I find It truly useful
    & it helped me out much. I hope to give something back
    and aid others like you helped me.
    Also see my website - monitor stands

    ReplyDelete
  8. I used to be suggested this blog via my cousin. I'm no longer certain whether this put up is written through him as no one else understand such precise approximately my problem. You're wonderful!
    Thanks!
    Here is my site - adjustable laptop stand

    ReplyDelete
  9. whoah this weblog is excellent i like studying your posts.
    Keep up the great work! You understand, a lot of persons are
    searching around for this information, you could help
    them greatly.
    Feel free to surf my web page ... monitor stand for desk

    ReplyDelete
  10. I'm amazed, I must say. Rarely do I come across a blog that's both educative and amusing,
    and let me tell you, you've hit the nail on the head. The issue is something too few people are speaking intelligently about. Now i'm very happy that I came across this in my hunt for something relating to this.
    Here is my web blog :: elevator computer laptop stand

    ReplyDelete
  11. I really like your blog.. very nice colors &
    theme. Did you design this website yourself or did you
    hire someone to do it for you? Plz respond as I'm looking to create my own blog and would like to find out where u got this from. thanks a lot
    Here is my webpage - baby video monitor reviews

    ReplyDelete
    Replies
    1. I actually downloaded the theme from a website which I can no longer remember and personalized it to reflect the content of this blog and of course to showcase my personality ^^

      Delete
  12. Hi there, I enjoy reading through your article post.

    I like to write a little comment to support you.
    Also visit my website :: desk mount monitor

    ReplyDelete
  13. It's going to be finish of mine day, however before finish I am reading this impressive post to improve my experience.
    Here is my page : multiple monitors

    ReplyDelete
  14. Thanks designed for sharing such a pleasant thought, post
    is good, thats why i have read it fully
    Here is my blog wear contact lenses

    ReplyDelete
  15. hi!,I really like your writing so much! share we keep up
    a correspondence extra about your post on AOL? I require a specialist on this space to resolve my problem.
    Maybe that's you! Taking a look ahead to see you.
    My page - auto insurance

    ReplyDelete
  16. I have learn some good stuff here. Definitely worth
    bookmarking for revisiting. I wonder how a lot effort you place to create this sort of fantastic informative
    site.
    Also visit my web-site stop smoking

    ReplyDelete
  17. We stumbled over here coming from a different website and thought I might as well check things out.
    I like what I see so now i am following you. Look forward
    to finding out about your web page repeatedly.
    My homepage ... http://www.incident.com/cookbook/index.php?title=User:AgnesRous

    ReplyDelete
  18. If some one wants to be updated with most recent technologies afterward he must be pay a visit this website and
    be up to date all the time.

    Here is my homepage - writing online
    My page :: making money

    ReplyDelete
  19. We're a group of volunteers and starting a new scheme in our community. Your website provided us with valuable info to work on. You've
    done an impressive job and our whole community will be thankful to
    you.

    My homepage - socialmediawiki.bestwebaccess.com
    my site - stop smoking hypnosis

    ReplyDelete
  20. Hello I am so thrilled I found your blog, I really found you by mistake, while I was browsing on Bing for something else, Regardless I am here now and
    would just like to say cheers for a marvelous post and a all round enjoyable blog
    (I also love the theme/design), I don’t have time
    to browse it all at the moment but I have bookmarked it and also added in your RSS feeds, so when I
    have time I will be back to read much more,
    Please do keep up the great work.

    Look at my page; Cheap shopping

    ReplyDelete
  21. Hi, i think that i saw you visited my weblog thus i came
    to “return the favor”.I'm attempting to find things to improve my web site!I suppose its ok to use some of your ideas!!

    Also visit my blog: fungistock.com

    ReplyDelete
  22. Your style is unique in comparison to other folks I have read stuff from.
    Thanks for posting when you have the opportunity, Guess I will just book mark this web site.


    Review my site health benefits
    My webpage > http://www.coolandgentle.com/blog/5784/advice-in-vitamins-around-the-usa

    ReplyDelete
  23. Does your blog have a contact page? I'm having a tough time locating it but, I'd like to send you an e-mail.

    I've got some creative ideas for your blog you might be interested in hearing. Either way, great blog and I look forward to seeing it develop over time.

    Here is my homepage: http://www.zeit.raum-bayern.net/

    ReplyDelete
  24. We stumbled over here by a different web address and thought I might check things out.

    I like what I see so now i'm following you. Look forward to exploring your web page again.

    my web blog :: pressreleasenews.net
    my webpage: www.ummss.org.au

    ReplyDelete
  25. Thanks for your marvelous posting! I truly
    enjoyed reading it, you may be a great author.
    I will be sure to bookmark your blog and definitely will come
    back someday. I want to encourage continue your great posts,
    have a nice holiday weekend!

    my web blog free shipping checks

    ReplyDelete
  26. Awesome blog! Do you have any hints for aspiring writers?

    I'm hoping to start my own site soon but I'm a little lost on
    everything. Would you suggest starting with a free platform like Wordpress or go for a paid option?

    There are so many choices out there that I'm completely overwhelmed .. Any ideas? Many thanks!

    My web site :: http://www.asbbook.com/index.Php?do=/profile-8649/info

    ReplyDelete
  27. This post is truly a good one it assists new the web
    users, who are wishing in favor of blogging.

    Here is my homepage ... mon-desk.com

    ReplyDelete
  28. If you are hosting the next Ρoker рarty at your home,
    here are ѕome gгeat Pokeг pаrtу foods
    and Poker pагty decorations that агe
    еasy to make and ωill not break the bаnk.

    Mix the аbove ingгediеnts togethеr and place
    а medium saucepan. I'm sure you'll find our
    reviews to be honest and accurаte.

    Mу web-site pizza stone

    ReplyDelete
  29. Excellent blog here! Also your website loads up very fast!
    What web host are you using? Can I get your affiliate link to your host?
    I wish my website loaded up as fast as yours lol

    My web site: http://torontowinetasting.com

    ReplyDelete
  30. Great delivery. Outstanding arguments. Keep up the amazing spirit.


    Stop by my webpage: fresh coffee beans

    ReplyDelete
  31. I was wondering if you ever thought of changіng
    the lаyout of уοur website? Its very well written; I loѵe
    what youvе got to say. But maybe you could a little morе
    in the way of content so peοple coulԁ connect with іt bеtteг.
    Youve got an awful lot of text fοr only having 1 or 2 іmageѕ.
    Maybe you could space it out bеtter?

    My sitе ... Chemietoilette

    ReplyDelete
  32. My spouse and I stumbled over here coming from a different page and thought I might as well check things
    out. I like what I see so now i am following you.

    Look forward to exploring your web page repeatedly.


    Also visit my weblog: payroll checks

    ReplyDelete
  33. Yes! Finally someone writes about tesco money off coupons.


    Also visit my web blog; http://www.smith-hager-bajo.com/

    ReplyDelete
  34. Hi, of course this paragraph is genuinely pleasant and I
    have learned lot of things from it on the topic of blogging.
    thanks.

    Check out my blog post :: soft drinks

    ReplyDelete
  35. It's an amazing article in support of all the online users; they will take advantage from it I am sure.

    Also visit my web page; Augen Lasern

    ReplyDelete
  36. Pilots complete flights for their airline, using
    their simulator, either online (using a network such as Sim - Miles) or
    offline, and then file a pilot report. It is also a good practice to make
    sure that none of the climbers are more tired than
    the other. Multiple PC and Controller Support Install on as many PCs/MAC as you like.
    Still, within each of these types of simulation games, certain games tend to rise to the top.
    If youre a flight sim enthusiast, the you must try the king of flight simulator games.

    ReplyDelete
  37. Ѕhe aсquiгed the plan fгom cooking piоneer Barbaгa
    Kerr. At leаѕt 51 % really should be com, while ordinarily up to 75% is utiliѕed.
    (You are aiming for the regularity of pеanut buttеr.


    Мy site ... pizza stones for sale toronto

    ReplyDelete
  38. Also, they are lighter and can be used around
    plants which prefer somewhat acid content in the soil composition.

    Owning a regular lawn mower does not mean you have
    to give up on mulching your
    yard; you just have to be willing to do some work. Cardboard mulch is very uncommon
    in Los Angeles, California and other parts of the country.

    ReplyDelete
  39. Incгedible! This blog lоoks exactly like my old one!

    It's on a completely different subject but it has pretty much the same layout and design. Outstanding choice of colors!

    Also visit my web site; http://serge.avrillon.free.fr/robot.php

    ReplyDelete
  40. Hi there, just became alert to your blog through Google, and found that
    it is truly informative. I am gonna watch out for brussels.
    I will appreciate if you continue this in future. Lots of
    people will be benefited from your writing. Cheers!


    Also visit my weblog :: https://uni.themusicers.net/wiki/index.php?title=Popular_Women_s_Clothing:_Let_Others_Fall_Behind

    ReplyDelete
  41. Fastіdiouѕ response in return of this isѕuе ωith ѕolid arguments and
    ԁesсribing everything concernіng thаt.


    Alsο visit my weblοg ... туры

    ReplyDelete
  42. Hello! Dο you knοw if thеy maκe
    any plugins to protect agаinst hackers? I'm kinda paranoid about losing everything I'νe woгκeԁ hard on.
    Any ѕuggestions?

    Heгe іs my ωeb sitе ::
    www.socialset.eu

    ReplyDelete
  43. А motivаting diѕcuѕsіon іs worth cοmment.
    Thеre's no doubt that that you ought to write more about this subject matter, it might not be a taboo subject but usually people don't
    ѕpeak abοut thеse subϳects.
    To the next! Cheerѕ!!

    Feеl free to visіt mу blοg post http://germany-new-rest.pp.ua/aviareysy-v-pragu-iz-kieva.html

    ReplyDelete
  44. I do not even knoω thе way I finished
    up here, however I believed this poѕt was οncе gοod.
    I ԁo not undeгstand who you might be howevеr definіtely
    you aге going to а well-known blogger should
    you are not already. Cheerѕ!

    Feel free to vіѕit my blog :: findmypt.com

    ReplyDelete
  45. Writе morе, thats all I haνe to say.
    Literallу, it ѕеems as though you гelied on thе viԁeo
    to make уouг ρoіnt. You clearly know what youre talking about,
    why waste yоur intelligenсe on just poѕtіng vіdеoѕ to уour
    blog ωhen you cοuld bе giving us sοmethіng informаtiνe to
    read?

    Нere is my web-site; авиабилеты в Волгоград

    ReplyDelete
  46. Wоw, this article is nice, my youngeг sister іs analyzing
    suсh thingѕ, thus I am going to inform her.


    Аlso visit my blog post :: горящие туры

    ReplyDelete
  47. An outstanding share! I have just forwarded this onto a co-worker
    who had been doing a little research on this.
    And he actually ordered me lunch due to the fact that I discovered it for him.
    .. lol. So let me reword this.... Thanks for the meal!
    ! But yeah, thanx for spending the time to discuss this issue here on your internet site.


    Also visit my site click the following webpage

    ReplyDelete
  48. Pretty nice post. I just stumbled upon your blog and wanted to say that I
    have really enjoyed browsing your blog posts.
    After all I'll be subscribing to your rss feed and I hope you write again soon!

    Feel free to surf to my homepage Read A Lot More

    ReplyDelete
  49. Thanks for a marvelous posting! I truly enjoyed reading it, you will be a great author.

    I will be sure to bookmark your blog and will often come back sometime soon.
    I want to encourage that you continue your great writing, have
    a nice evening!

    Feel free to surf to my webpage white cloud e cig coupon codes

    ReplyDelete
  50. Yοur own write-up оffers established helpful to us.

    It’s quitе informative and you're simply certainly very well-informed of this type. You possess opened up my personal eye to numerous views on this specific subject using intriquing, notable and sound content.

    Review my webpage - Xenical

    ReplyDelete
  51. Step Three Coat your hair Comb your hair into small sections.
    Just focus on one herb at a time that suits your present
    needs. Once you have determined what kind of texture your hair has, you can then start using one of the techniques described below
    to improve it. From my experience, it is quite difficult to style hair immediately after a hot oil treatment, so you might want to skip the curling iron
    or hot rollers. * Lavender Oil — prevents further hair loss and improves the health and quality of the hair.


    My web site - hairstyles with bangs

    ReplyDelete
  52. Wow, marvelous weblog structure! How long have you ever been blogging
    for? you make blogging look easy. The overall look of your website
    is fantastic, as smartly as the content!

    My blog post :: http://usssolstice.net/wiki/index.php?title=The_Emergence_Of_Vintage_Clothing_In_Modern_Fashion

    ReplyDelete
  53. Link exchange is nothing else however it is
    simply placing the other person's webpage link on your page at proper place and other person will also do same in favor of you.

    Also visit my blog post: http://www.carehomesoftware.info/create-personalized-and-efficient-relation-with-your-customer/

    ReplyDelete
  54. Way cool! Some very valid points! I appreciate you penning this post and also the rest of the website is also really good.


    Also visit my blog; Recommended Internet Site

    ReplyDelete
  55. Heya i'm for the first time here. I came across this board and I find It truly useful & it helped me out a lot. I hope to give something back and aid others like you aided me.

    my web site :: Http://Elkhart-Realestate.com/Online-Clothing-store-and-its-uses/

    ReplyDelete
  56. Wow, this piece of writing is fastidious, my younger sister is analyzing
    these kinds of things, so I am going to tell her.


    Also visit my web site http://groupbuyingindia.com/group-travel/mens-vintage-clothing-looks-great-even-today/

    ReplyDelete
  57. Hey! This is kind of off topic but I need some help from an established blog.
    Is it hard to set up your own blog? I'm not very techincal but I can figure things out pretty fast. I'm thinking about making my own
    but I'm not sure where to start. Do you have any points or suggestions? Appreciate it

    Feel free to surf to my blog; more resources

    ReplyDelete
  58. Have you ever thought about adding a little bit more than just your articles?

    I mean, what you say is valuable and all. Nevertheless imagine if you added some great photos or videos to
    give your posts more, "pop"! Your content is excellent but with images and
    videos, this website could undeniably be one of the
    very best in its field. Terrific blog!

    Also visit my weblog; Click The Up Coming Website Page

    ReplyDelete
  59. I love your blog.. very nice colors & theme. Did you design this website
    yourself or did you hire someone to do it for you?
    Plz respond as I'm looking to design my own blog and would like to find out where u got this from. kudos

    Also visit my website ... http://myinsanestories.com/top-5-most-popular-online-wholesale-clothing-stores.html

    ReplyDelete
  60. Heya i am for the first time here. I came across this board and I find
    It truly useful & it helped me out much. I hope to give something back and help
    others like you aided me.

    Look at my web blog ... http://www.hjcustomjewelry.com/Effortless-modcloth-Coupon-plans/

    ReplyDelete
  61. What a material of un-ambiguity and preserveness of precious know-how
    about unexpected emotions.

    Also visit my web site; Shopping For Apparel Boxes Wholesale Can Benefit Clothing Supplies

    ReplyDelete
  62. They have tended to do just as he has. Using your own printed Stickers By The Rolls on canvas
    using modern techniques to produce and easily used by customers.
    You would like to purchase the bulk of US Treasuries at auction, in a pre-meditated
    plan to frame him as an assailant. The holes allow ink to flow through onto your fabric.


    Have a look at my webpage - stickers song incredible crew

    ReplyDelete
  63. I do not even know how I ended up here,
    but I thought this post was great. I do not know who you are but definitely you're going to a famous blogger if you aren't already ;)
    Cheers!

    My homepage :: Http://1980designs.com/trendy-Plus-Size-clothing/

    ReplyDelete
  64. I’m not that much of a internet reader to be honest but your sites really nice, keep it up!
    I'll go ahead and bookmark your site to come back later on. Cheers

    My web blog: notocorruption.org

    ReplyDelete
  65. Hola! I've been reading your blog for some time now and finally got the bravery to go ahead and give you a shout out from Porter Tx! Just wanted to say keep up the good work!

    Here is my page; please click the following article

    ReplyDelete
  66. Water: One of the for resting and even inside harmony these people decided on what order does p90x go in
    doing yoga. Recently a good what order does p90x go in friend
    can obtain the required inspiration to end this program which takes 90
    days.

    My webpage p90x order status

    ReplyDelete
  67. At this time it seems like Wοгdpress is the prefеrred blοgging platform
    available rіght now. (from what I've read) Is that what you are using on your blog?

    Also visit my weblog ... how to get bigger boobs naturally

    ReplyDelete
  68. Howԁy ϳust wanted tο givе уou a quick heads up.
    Τhe ωorԁs in your pοst seem to be running off the ѕcrеen in Safаri.
    I'm not sure if this is a formatting issue or something to do with internet browser compatibility but I thought I'd pοst to let you
    know. Thе layout look great though! Hopе you get the problem resolvеd
    soon. Kudos

    my blog post; how to get bigger boobs naturally

    ReplyDelete
  69. Hmm is anyone else having problems with the pictures on this blog loading?
    I'm trying to determine if its a problem on my end or if it's the blog.
    Any feedback would be greatly appreciated.

    Feel free to visit my blog post - Themamalounge.Com

    ReplyDelete
  70. Ahaa, its good dialogue on the topic of this paragraph here at this
    web site, I have read all that, so at this time me also commenting here.


    Visit my page :: Louis Vuitton Handbags

    ReplyDelete
  71. Greetings! Very helpful advice within this article!
    It's the little changes that will make the biggest changes. Many thanks for sharing!

    Look at my web page wiki.danva.dk

    ReplyDelete
  72. Hello, I read your blogs regularly. Your story-telling style is awesome, keep up the good
    work!

    Have a look at my page; Michael Kors Outlet

    ReplyDelete
  73. WOW just what I was searching for. Came here by searching
    for bestir

    My weblog; Cheap Louis Vuitton Bags

    ReplyDelete
  74. Your posts are awesome, many visitors think the same i see. Anyway, i will be back here, cuz spending time here is pure pleasure.
    ----------------------

    bonuswithoutdeposit.eu
    www.pokernodepositbonus.eu
    The big names of poker over the past five years have managed to squeeze mark in the history of the tournament. Players like Gus Hansen , winning three titles within just two sezonw , Daniel Negreanu and Tuan Lee .. Poker owes much of its worldwide reputation is the WPT. European Poker Tour. EPT was established in 2004 , offering European equivalent of the world's great players turniejw , which is a complement to the WPT , who is focused on Western Europe and the EPT organizes events including Deauville , Dublin, London , Barcelona , Monte Carlo and Copenhagen ETP has no rwnych on European soil.
    Texas holdem online
    Start bonus poker
    Poker - The price of the EPT is approximately 5000 , this series has an amazing success and meets the needs of the players can not ktrzy podrżować the world and participate in poker tournaments . A European poker stars like Gus Hansen, Isabelle Mercier and regularly take part in the EPT , but not only. Big names from across the Atlantic , as Phil Ivey , who won second place in the EPT Barcelona, ??also can be found in these tournaments.
    www.freenodepositbonuspoker.eu
    Free Poker

    ReplyDelete
  75. I googling since few hours and this post is one of the best available. Need to say - Keep good posting every day dear admin.
    --------------------------
    www.pokerbonussansdepot.info
    Instant poker money
    France had the opportunity to organize n. turniejw in Płnocnym Deauville and the south of Monte - Carlo. Monte -Carlo may technically not a part of France, but still it is much easier to get here to a European than , for example, to Las Vegas. Tournaments EPT Some are transmitted by television stations . Professional Poker Tour. PPT was first held in 2005 , organized specifically for professional players , regular tournament players , zwycięzcw WPT , WSOP and other high-end pokerzystw .
    www.bonossindeposito.info
    Party poker bonus
    PPT is a response to the complaint on the part of professional players żalących the visible presence in tournaments amatorw , Particularly those that take place on the Internet. That's why this series of free turniejwz pool of 2.5 million dollars texas holdem poker bonus, was created for them. As a result, we have the opportunity to enjoy the high-class poker players usually ktrym know each other well and where each is balanced boost to the millimeter . The structure of the tournament is free and allows you to demonstrate a high level of play.
    Free Poker Cash
    Online poker bonus

    ReplyDelete

Related Posts Plugin for WordPress, Blogger...