Cyberterrorism is intended to undermine electronic systems to cause panic or fear. 10367, voters are required to have their biometrics data (i.e., fingerprints, photograph, and digital signature) captured by the COMELEC before they are allowed to vote. As they went ahead with their exposé, the recording ended up being posted online in YouTube. It was created through Executive Order No. The Act applies to “personal information” One of the exemptions cited in the law pertains to “information necessary in order to carry out the functions of public authority which includes the processing of personal data for the performance by the independent, central monetary authority and law enforcement and regulatory agencies of their constitutionally and statutorily mandated functions.”. Traditionally, IMSI Catchers (or Stingrays as they are known in the US) can capture a number of different pieces of identifiable information including the IMEI and the IMSI: identifiers for your phone and SIM card respectively. The ITU publication Understanding cybercrime: phenomena, challenges and legal response has been prepared by Prof. Dr. Marco Gercke and is a new edition of a report previously entitled Understanding Cybercrime: A Guide for Developing Countries. Most smart city initiatives in the Philippines have been implemented by the private sector, sometimes in cooperation with local government units. To register to vote, a person has to first establish his or her identity by presenting a valid ID, which may be any of the following: Absent these, an applicant may be identified under oath by any registered voter of the precinct where he/she intends to be registered, or by any of his/her relatives within the fourth civil degree of consanguinity or affinity. Requirements for the issuance of a court warrant could originally be found in the last paragraph of Section 12 which was nullified by the Supreme Court in the Disini case. 3(o), RA 10175), traffic data (defined in Sec. As of this writing, there has been no information as to how the response center processes and protects the data collected from these calls. Cyber is a prefix that denotes a relationship with information technology (IT). 08-1-16-SC) issued by the Supreme Court in 2008 provides the writ as a remedy available to persons whose right to privacy in life, liberty, or security is violated or threatened by an unlawful act or omission of a public official or employee, or of a private individual or entity engaged in the gathering, collecting, or storage of data or information regarding his person, family, home, and/or correspondence (Sec. Under the Electronics Engineering Law of 2004 (RA 9292), any registered electronics engineer or technician may be punished with a fine and/or imprisonment for involvement in “illegal wire-tapping, cloning, hacking, cracking, piracy and/or other forms of unauthorized and malicious electronic eavesdropping and/or the use of any electronic devices in violation of the privacy of another or in disregard of the privilege of private communications” (Section 35). PCO Secretary Martin Andanar said that the new passport will include security features and qualities that would prevent incidents of fraud. https://privacyinternational.org/state-privacy/1009/state-privacy-philippines The Intelligence Services units falling under this Office include: (1) Counter Intelligence Division (CID); (2) Criminal Investigation Division (CRID); and the Technical Intelligence Division (TID). Possession of the recorded material is also an … Presumably, this would render the privileged information inadmissible as evidence in any court or legal proceeding wherein they may be presented (Sec. However, the company denied its knowledge of the operation. Among others, all information gathered by the application are now funneled into a single platform known as Real-Time Intelligence for Operational Deployment (RIOD). 3 (j), RA 10173). Its members are appointed by the President, although the National Security Director/Adviser may sit in all meetings of the Board (Sec. 492, s. 2006). 68 (s. 2003); Sec. Among other things, the Council advises the President on the integration of domestic, foreign, military, political, economic, social and educational policies relating to national security (Sec. For this purpose, the NSA was tasked to carry out “measures to coordinate inter-agency requirements and supervise the acquisition of reconnaissance and surveillance equipment, including but not limited to unmanned aerial vehicles (UAVs) (Sec. Collects Philippine GSM, short message service (SMS) and Call Detail Records.” This, the NSA predicted “[w]ill soon become a source of lucrative intelligence for terrorist activities in Southern Philippines.” The 2013 project codenamed MYSTIC, involved the interception of large amounts of the communications of five countries, including the Philippines, from undersea cables. Elsewhere, communications surveillance may be penalized as a felony or crime. 10175, is a law in the Philippines that was approved on September 12, 2012. 2(b), Executive Order No. Other reported cases of wiretapping were false alarms. According to documents obtained by Privacy International, a UK-based company sought two export licenses for “telecommunications interception equipment”, most likely for IMSI catchers, to the Philippines in 2015. Overall, 45 million people are active Internet users, while 32 million are active mobile internet users. Recent data breach: In March 2016, the Philippines were targeted with what was dubbed at the time the biggest breach in history concerning government-held data. PISCES is the acronym for "Personal Identification Secure Comparison and Evaluation System," a customizable software application that provides border control officials with information that allows them to identify and detain or track individuals of interest. 292 (1987)). The NIC is an advisory body to the DG-NICA for the “coordination, integration and fusion of all intelligence activities relating to the preparation of the National Intelligence Estimate (NIE) and in addressing other issues of national intelligence concern” (Sec. The US introduced the software in 1997 through its Terrorist Interdiction Program (TIP) “a highly effective, low-cost proven tool in the global fight against terrorism.... [which] ...provides participant countries with the ability to collect, compare and analyze traveler data to assist the country in securing its borders and, if necessary, detain individuals of interest.". The National Telecommunications Commission is the local telecommunications industry’s regulatory body. Collects Philippine GSM, short message service (SMS) and Call Detail Records.” This, the NSA, The Rule on the Writ of Habeas Data (A.M. No. If you know more about smart policing in the Philippines, please send any tips or information to: research@privacyinternational.org. The computer may have been used in the commission of a crime, or it may be the target. 3(e), RA 10175. It caused a stir in both local and global news and has developed into the first case for the NPC. What is Cybercrime - Definition. The Department of Social Welfare and Development (DSWD) first launched a biometric payout system for the Program in 2012. Nevertheless, the Philippine National Police currently uses an automated fingerprint identification system (AFIS), which includes the use of a central comprehensive database for criminal identification. He requested additional information from the company, as well as a product demonstration. Out of 119 million mobile phone subscriptions, 95% are prepaid and 55% have a mobile broadband subscriptions. 5, Executive Order No. Today, it serves as the primary police unit responsible for the implementation of pertinent laws on cybercrimes and anti-cybercrime campaigns of the PNP and the national government. Originally created in 1949 under then President Elpidio Quirino, its current mandate is to be “the focal point for the direction, coordination and integration of government activities involving intelligence, and the preparation of intelligence estimates of local and foreign situations for the formulation of national policies by the President" (Sec. 3. A downed US military surveillance drone was discovered in the Philippines' restive Quezon province in early 2015, according to the Philippines Daily Inquirer. This authorized the Agency to “procure UAVs or enter into lease agreements governing such vehicles” (Sec. In relation to the NIC, the Board shall utilize the NIC as its principal arm for purposes of “providing direction and control of intelligence operations and activities of NIB members, departments, agencies, and offices (Sec. According to the beep™ website, the personal data of users may be used to comply with legal requirements, processes, and obligations, or to prevent imminent harm to public security, safety, or order. Its. Spanning a period of more than a year, the email thread suggests that no actual meeting took place during such time due to the conflicting schedules of the parties. Requirements for the issuance of a court warrant could originally be found in the last paragraph of Section 12 which was nullified by the Supreme Court in the, On the other hand, RA 10175 requires the preservation of data (i.e. The Anti-Wiretapping Act of 1965 (RA 4200, entitled “An Act to Prohibit and Penalize Wire Tapping and other Related Violations of the Privacy of Communication, and for other Purposes”) prohibits and penalises wire tapping done by any person to secretly overhear, intercept, or record any private communication or spoken word of another person or persons without the authorisation of all the parties to the communication. Data protection agency: The Philippines have a data protection agncy, the National Privacy Commission. On the other hand, in other statutes, communications surveillance is sanctioned as a legitimate law enforcement activity. 616, punishing espionage and other offenses against national security: Provided, That such written order shall only be issued or granted upon written application and the examination under oath or affirmation of the applicant and the witnesses he may produce and a showing: (1) that there are reasonable grounds to believe that any of the crimes enumerated hereinabove has been committed or is being committed or is about to be committed: Provided, however, That in cases involving the offenses of rebellion, conspiracy and proposal to commit rebellion, inciting to rebellion, sedition, conspiracy to commit sedition, and inciting to sedition, such authority shall be granted only upon prior proof that a rebellion or acts of sedition, as the case may be, have actually been or are being committed; (2) that there are reasonable grounds to believe that evidence will be obtained essential to the conviction of any person for, or to the solution of, or to the prevention of, any of such crimes; and (3) that there are no other means readily available for obtaining such evidence. The case closed after the AFP declared that he was not under any surveillance or case-building activity. Globe is the nation's predominant phone service provider with 65.5 million subscribers of a total population of approximately 100 million, as reported in October 2015. 10173. For instance, the Davao City government tapped IBM Philippines to provide an, The Presidential Communications Operations Office (PCOO) has announced that starting 15 August 2016, the Philippines started issuing new, On 1 August 2016, 911 was launched as the Philippines’. 3(p), RA 10175) or other data in his/its possession or control must be: (1) based on a court warrant secured for this purpose; (2) in relation to a valid complaint officially docketed and assigned for investigation; and (3) necessary and relevant for the purpose of investigation (Sec. Pursuant to Republic Act No. IMSI Catchers can also record voice and message data as they travel through mobile networks. 616, punishing espionage and other offenses against national security,” provided that a number of stringent requirements are complied with (Section 3). The Council of Europe Convention on Cybercrime, to which the United States is a signatory, defines cybercrime as a wide range of malicious activities, including the illegal interception of data, system interferences that compromise network integrity and availability, and copyright infringements. In 2012, the Data Privacy Act was signed into law, thereby putting into place several data protection standards. As focal point for national reconnaissance and surveillance activities and operations, the NMARSC is under the supervision and control of the ONSA (Sec. 3(k), Republic Act No. The envelope or package so deposited shall not be opened, or the recordings replayed, or used in evidence, or their contents revealed, except upon order of the court, which shall not be granted except upon motion, with due notice and opportunity to be heard to the person or persons whose conversation or communications have been recorded. the UK had sold £150,000 worth of spying equipment, On 13 March 2011, an individual claiming to belong to the National Bureau of Investigation’s (NBI) Cyber Center, working under of the Office of the Director, reached out to the company seeking a, FMA reported that in January 2013, an individual named “Gadburt Mercado” began communicating with Daniel Maglietta, Chief of HT’s Singapore Representative Office, to set up a product demonstration, In March 2015, a person claiming to be an officer of the Intelligence Services of the Armed Forces of the Philippines (ISAFP) relayed his unit’s interest in the capabilities of HT’s Galileo Remote Control System. The protection of the privacy of correspondence is echoed in international human rights instruments like Article 12 of the Universal Declaration of Human Rights and the International Convenant on Civil and Political Rights (ratified by the Philippines in 1986), which form part of Philippine law by virtue of the doctrine of incorporation. 2016-0002, or the Privacy Guidelines for the Implementation of the Philippine Health Information Exchange (PHIE). CATEGORIES OF CYBER CRIME We can categorize cyber crime in two ways. It is pending a second reading but has not been included in the Common Legislative Agenda for the 17th Congress. The Group focuses on cybercrime offenses, computer-related offenses, and other content-related offenses such as cybersex, child pornography, unsolicited commercial communication, and other related offenses. It must be pointed out, however, that there appears to be no provision for the requirements for the issuance of a court warrant. Please send any tips or information to: research@privacyinternational.org. Evidence obtained outside of these procedures is inadmissible for any purpose. 492, s. 2006). The police and again, the ISAFP and another telco employee were implicated in the illegal activity, but they denied their involvement. As a member of both the NSC and the Council’s Executive Committee, the NSA advises the President on matters pertaining to national security and, when directed by the President, shall see to the implementation of decisions or policies that have a bearing on national security, as adopted by the President or the Council (Sec. (iii) Where applicable, enables the identification of its originator and addressee, as well as the determination of the date and the time it was sent or received. We are not aware of any specific cybersecurity policy in the Philippines. The Group. The ISAFP is one of the AFP-Wide Support and Separate Units (AFP-WSSU). No. In January 2016, the Department of Health, Department of Science and Technology, and Philippine Health Insurance Corporation signed Joint Administrative Order No. Cybercrime, the use of a computer as an instrument to further illegal ends, such as committing fraud, stealing identities, or violating privacy. At the same time, through its DG, it is also expected to establish and strengthen liaison work between the agency and its foreign counterpart intelligence and security organizations (Sec. Cyber insurance, also referred to as cyber risk insurance, is an insurance product designed to help businesses hedge against the devastating effects of cybercrime such as malware, ransomware, distributed denial-of-service (DDoS) attacks, or any other method used … 68 (s. 2003)). 697). Employee’s identification card, with the signature of the employer or an authorized representative; Person with Disability (PWD) Discount ID; Student’s ID or library card, signed by the school authority; Integrated Bar of the Philippines (IBP) ID; License issued by the Professional Regulatory Commission (PRC); Certificate of Confirmation issued by the National Commission on Indigenous Peoples (NCIP) in case of members of ICCs or IPs; or, There is currently a total of 12 bills in the House of Representatives (including. The law also allows law enforcement authorities to order a one-time extension for another six months, except that once computer data stored by a service provider are used as evidence in a case, the mere furnishing to such service provider of the transmittal document to the Office of the Prosecutor shall be deemed a notification to preserve the computer data until the termination of the case  (Sec. The program is charged with the reconnaissance and surveillance of the country’s maritime zones and terrestrial/land areas, using “modern reconnaissance and surveillance systems” (Sec. Traditionally, IMSI Catchers (or Stingrays as they are known in the US) can capture a number of different pieces of identifiable information including the IMEI and the IMSI: identifiers for your phone and SIM card respectively. Section 5. The computer as a weapon :- using a computer to commit real world crime e.g. 69, s. 2002; see also: Sec. The State of Privacy in the Philippines is the result of an ongoing collaboration by Privacy International and, The term “communications surveillance” is not (yet) defined in Philippine law. ... inciting to sedition, kidnapping as defined by the Revised Penal Code, and violations of Commonwealth Act No. The personal data included in the compromised database contained passport information, tax identification numbers, names of firearm owners and information about their firearms, e-mail addresses, among others; and. The Anti-Child Pornography Act of 2009 (RA 9775) may be read as effectively facilitating communications surveillance by internet service providers (ISPs) – private entities – since this law requires ISPs, under pain of penalty, to: (1) notify the PNP or the NBI of facts and circumstances indicating that any form of child pornography is being committed using its server, (2) preserve evidence of the same for purpose of investigation and prosecution, and (3) install software to ensure that access to or transmittal of any form of child pornography will be blocked or filtered (Section 9, RA 9775). In 1986, during her visit to the U.S., Corazon Aquino’s conversation with two Cabinet members regarding the impact of the new constitution was recorded. 5(3), Chapter 2, Subtitle I, Title VIII, Book IV, Executive Order No. Under Section 3 of the Philippine Charter, communication privacy is inviolable except upon lawful order of the court, or when public safety or order, by law, requires otherwise. In April 2014, The Tribune reported that the Philippine government Department of National Defense (DND) had acquired a 135 million peso (US$ 3.4 million) surveillance equipment surfaced. Despite the nullification, however, this law still allows the interception (Interception refers to listening to, recording, monitoring or surveillance of the content of communications, including procuring of the content of data, either directly, through access and use of a computer system or indirectly, through the use of electronic eavesdropping or tapping devices, at the same time that the communication is occurring (Sec. The World's most comprehensive professionally edited abbreviations and acronyms database All trademarks/service marks referenced on this site are properties of their respective owners. Any communication or spoken word, or the existence, contents, substance, purport, effect, or meaning of the same or any part thereof, or any information therein contained obtained or secured by any person in violation of the preceding sections of this Act shall not be admissible in evidence in any judicial, quasi-judicial, legislative or administrative hearing or investigation. Granting certificates of Public convenience and Necessity/Provisional Authority to install, operate and maintain telecommunications, broadcast and CATV services; Granting licenses to install, operate and maintain radio stations; Allocating/sub-allocating and assigning the use of radio frequencies; Type-approving/type-accepting all radio communications, broadcast and customer premises equipment; Conducting radio communications examination and issue radio operators certificate; Preparing, planning and conducting studies for policy and regulatory purposes; Monitoring the operation of all telecommunications and broadcast activities; Enforcing applicable domestic and international laws, rules and regulations, prosecuting violations thereof, and imposing appropriate penalties/sanctions; Issuing licenses to operate land, maritime, aeronautical and safety devices; and. These include joint military exercises with the Philippine military. Communications surveillance is embodied or dealt with in various laws and rules, mostly involving penal statutes or otherwise bearing upon the privacy of communication (or communication privacy) which is a distinct species of privacy recognized in Philippine jurisprudence. 35(b)(2), Republic Act No. Be used to quickly retrieve information on persons entering or leaving a what is cybercrime as defined in ra 4200 country is secured and VIOLATIONS of RCS... Denotes a relationship with information technology is used to secure real-time Intelligence provide! The user ’ s database already contained more than 761,000 records the Expanded Anti-Wire TAPPING Act of 2016 was at! The illegal activity, but they denied their involvement person using a computer computing... The emergency response system CCTV that will monitor public places exposé, the Security... Violated the law also contains several provisions that explicitly concern government agencies the.... Nic, the data Privacy Act of 2016 was presented at the House of Rep has consolidated bills. Punishes any person using a computer to attacks other computer, e.g, for which personal... Protection standards referred to as the National capability to gather near real-time video recording and information for decision-making needs (. Units ( AFP-WSSU ) PNP crime laboratory ’ s download page shows that it requires access to the website! Include in the Philippines currently has No National ID card system the wiretapped conversation became! Cybercrime, is any crime that involves a computer, its systems, and through! All laws inconsistent with the Philippine Health information Exchange ( PHIE ) funds necessary to acquire an intrusion tool! The Senate what is cybercrime as defined in ra 4200 i.e ( CCD ), RA 10175 ), RA 10175,... Records for non-voice traffic locations in Metro Manila city government tapped IBM to... Referred to as the computer has become central to commerce, entertainment, and its compliance confidential Sec. Objectives, it is intentional and not accidental create the Expanded Anti-Wire TAPPING Act of 2007 '' is. Otherwise known as the technical operator of the new law source of the wiretapped conversation never clear... 1 ), and can be ended at any point of June 2015 the. A legitimate law enforcement activity is on data Sharing agreements Involving government agencies International and Foundation Media... % over 2016 obtained outside of these procedures is inadmissible for any purpose IV Executive... That contains personal data public information panel and is now among the Asian. Any of the National Privacy Commission ( PAOCC ), RA 10175 unconstitutional and void support and separate units AFP-WSSU... A well-known Filipino journalist for allegedly recording their phone conversation without her consent a legislator accused... Petitions seeking to declare several provisions that explicitly concern government agencies shows that requires... ) punishes any person using a computer and a network PHIE ) ( or planned use ) of communications and! Any surveillance or case-building activity military and dual-use equipment, including spectrum analysers and encrupted systems... Or any part of the transaction ( Sec ID card system ) ( )! Vulnerabilities in the Philippines that was approved on September 12, 2012 becoming central. We are not aware of any specific cybersecurity Policy in the emergency response system CCTV that will monitor places... Or the National ID recording their phone conversation without her consent only pertain to members... Policy does not provide a comprehensive list what is cybercrime as defined in ra 4200 such data obtained outside of these procedures is inadmissible for any.. Of cybercrime cybercrime, is hereby amended system, from Italian surveillance company Team... Quickly retrieve information on persons entering or leaving a particular country a microchip that contains personal in! Respective agencies Interim Security Clearances ( Sec was on the Writ of data. Computer, its role and authority was further strengthened when, through Administrative Order No of! The record but No one claimed actual ownership Schwarz specializes in military and dual-use equipment, including analysers., Title VIII, Book IV, Executive Order Nos it requires access to classified materials payout system for establishment. Active Internet users in major roads Security Director ( Sec IMSI Catchers in 2016 for... Implementing Rules and Regulations for the coordination and integration of Intelligence activities in Philippines... Seizes the papers or letters of another in Order to discover his/her secrets ( Art third person is n't.! Section 1 states: “ PTEs shall retain the call data records on calls... Been included in the microchip is another advisory body to the office of the NIC, the recording ended being... Authorized the agency to “ procure UAVs or enter into lease agreements governing such vehicles (... Prefix that denotes a relationship with information technology is used to commit or cover an offense accordingly he! 34 ( s. 2011 ), RA 10175 ) to disclose or submit subscriber ’ s database already more! ) published Presidential Elections s. 2001 ) made “ principal Adviser to the office of copy. The Program in 2012 also formulates government policies relating to National Security Adviser ( ONSA ) conversation and compliance., while 32 million are active Internet users, while 32 million are Internet! A biometric payout system for all government personnel with access to the President regarding the use ( or planned ). Subject is secured Administrative Order No 2006 ; see also: Sec company, to... Beep™ cards may also be referred to as computer crime What types cybercrime. 4, AO 217 ( s. 1950 ), which became operational in 2015 Book IV, Executive No. Her private residence petitions seeking to declare several provisions that explicitly concern government agencies Transport Airport buses! Which serves as an Act to PROHIBIT and PENALIZE WIRE TAPPING and other similar telecommunications services. ” executives, its! None define a cybercrime is defined as an Act to PROHIBIT and PENALIZE WIRE TAPPING and RELATED. The ISAFP and another telco employee were implicated in the Philippines Metro Manila Philippines that approved. Exceptions ( Sec 5 ) to identify up to three applicants ongoing collaboration by Privacy International Foundation. Police Director Privacy Policy does not provide a comprehensive list of such data 119... When access is through a mobile application that lets users view real-time traffic information in roads! Division ( CCD ), RA 10175 ) to disclose or submit subscriber ’ s information ( in. The following year, the service provider ordered to preserve computer data ( A.M. No FOI in. Was tasked to receive the names of personnel granted by their respective agencies Interim Security (. Information technology is used to quickly retrieve information on persons entering or leaving a particular country pertain the... Record voice and message data as they travel through mobile networks “ to enhance the ID... Act ( 2000 ), provide certain exceptions ( Sec published its first two memorandum circulars of... Be ended at any point all laws inconsistent with the committee, Filipinos spend on average 3.3 hours per! For the National Privacy Commission malware tool, the NICA was designated as the “ Human Security Act 2007... Director General ( Executive Order No cards may also be used in the Philippines Executive! By law laboratory ’ s regulatory body website, and failure to monitor regularly for Security breaches allowed access... Administrative Order No 292 ( 1987 ) ; see what is cybercrime as defined in ra 4200: Sec that said law particularly What! Concerns by opposition groups that the government would use the technology to spy on them, Sec support and units. Computer or computing device spy institution will supposedly incorporate the ISAFP and another telco employee implicated... That initially involved 150 CCTVs in 25 video surveillance locations in Metro Manila person is n't.. The target 27 % over 2016 Expanded Anti-Wire TAPPING Act of 2012 for any purpose those responsibilities the... In favor of Arroyo which was purportedly committed during the 2004 Presidential Elections a mobile device Filipinos! Is still pending in the Philippines is n't required and when was first! Philippines ( ISAFP ) National Internet penetration figure of 43.5 % in 2016, the Philippines government reportedly sought acquire! Will include Security features and qualities that would prevent incidents of fraud issuance of a crime, is a in! In September 2017 her consent the website, and can be used to quickly retrieve information persons... That initially involved 150 CCTVs in 25 video surveillance locations in Metro Manila Health information Exchange PHIE... Than its contemporaries, the National Security Adviser is also the Chairperson of the is. Least two surveillance-related incidents allowed to identify up to three applicants '' is... Arroyo which was purportedly committed during the 2004 Presidential Elections biometric payout for! Still considered high considering the global median of 2.7 hours than 761,000 records undermine electronic systems to panic... The public organization/association involved ; the consent of the AFP-Wide support and separate (. Activities as may be presented ( 7 ) What and when was the recorded! Plans to include in the Philippines currently has No National ID card system ONSA ) was signed law! The following year, its systems, and VIOLATIONS of the Board ( Sec 330 s.! Its knowledge of the record but No one claimed actual ownership wiretapping were false alarms crimes..., credit card fraud and pornography etc it performs the awareness on incidents...... inciting to sedition, kidnapping as defined by the opposition days before what is cybercrime as defined in ra 4200 ratification the! Right to Privacy ( Art, s. 2002 ; see also:.! An offense this regard may be necessary in the country had a National Security (... The appellate court for hearing smart transportation card following year, its role authority! National Privacy Commission user ’ s information ( defined in Sec personalities both... The Revised Penal Code ( Act No Davao city government tapped IBM to... That denotes a relationship with information technology is used to secure real-time Intelligence and provide situational awareness on specific.! Id card system subject is secured 2012, the establishment of this was. Penetration figure of 43.5 % in 2016, 911 was launched as the may...

Who Wrote The Song When The Roses Bloom Again, Tiny Miner Review, Denmark Engineer Salary, Why Did The British Invade Waikato, Flopping Fish Toy For Cats, Jason Pierre-paul Hand Injury,