Archive

Tag Archives: SB3327

SY 2012-2013, Second Semester


Cyber Crime Law: Bad News or Good News?

R.A.10175 otherwise known as the “Cybercrime Prevention Act of 2012” is both a good news and a bad news for us. The good news is that this act introduces penalties to acts in violation of certain rights which were otherwise not sanctioned by fines or penalties. The bad news, however, is that most of us, if not all, cannot fully understand how this act would affect the cyberworld – and eventually our transactions and activities in the internet. Is regulation of the cyberspace for good? Or is it not? Is the “Libel Provision” proper? Or is it merely politicized? The only way to know and understand the meaning of this law is no less than seeing such law in the legal perspective and not in anything else.

The Cybercrime Prevention Act ought to penalize crimes in the cyberspace which were otherwise outside the realm of our penal and special laws. Most of the cybercrime offenses enumerated under section 4 of this law are acts which are deemed as crimes in the international concept, but are not covered by penal sanctions under our jurisdiction prior to the enactment of this law. This implies that while foreign states discourage said acts by imposing penal sanctions, our government likewise do not encourage the commission of said acts but without however putting a teeth to these words. The advent of this law is a leap of security and protection for what was then an unconquered space. The growth of technology encourages more and more transactions to be done in the cyberworld. What was then a transaction only possible in the real world can now be conveniently performed with just a click of a button. The apparent growth of social media and communication in the internet, just like in the real world, is prone to abuse and misuse. This is where the good news, courtesy of this law, comes in. Imagine having your school ID stolen and the security guard refuses to let you enter the school building because of his long time moto: “no ID, no entry”; like when someone steal or change your password in your personal email and there’s no way you could access your own mail again. How about being annoyed by irrelevant, deceiving and unsolicited commercials waiting that you’d eventually press the button and buy something from them, or clicking a link which will eventually hack or virus your computer. Would it be tolerable for you to take these matters sitting down with the hope that a lightning would eventually strike unto the culprit, or would you take action and implore the aid of our laws? If you’d choose the latter, then this cybercrime prevention law is good news for you but if you’re the culprit who enjoys spreading injustice in the cyberspace, then it’s not unusual if you’ll hack government sites and ask that the law be trashed in its entirety.

Yet, if this law is good news for us, why was it bombarded by protests and criticisms after its enactment? The law, among others, is seen as a curtailment of the freedom we long enjoyed and got accustomed with when dealing with the cyberspace. But aren’t these fears of conquer and curtailment merely a product of speculation? Take for instance the process before a search or seizure could be validly conducted under this law. Similar process or condition to that of any other crimes is required and observed. Under section 12 of R.A. 10175, (last paragraph thereof) a judge, like any other crime, must determine personally whether there is a probable cause before a warrant to search or seize a computer or devise may be taken effect. Nothing in this process could excite our mind to think of any conspiracy or whatever there is we see on T.V. because of three things. First, our government just can’t afford a computer like that in the movie “Eagle Eye” who could be very capable of monitoring every piece of activity we have. Second, it still abides with the rule of law through proper determination and supervision by our courts in the proper conduct of search, seizures and arrests. Third, the purpose of the law is to regulate the cyberspace and not for take over. Aren’t those hackers and identity thieves in the internet more troublesome than this law is? Cybercriminals have nothing to loose and no where to divulge because they either fear no sanction or are confident enough that there tracks are no where to be followed due to absence of a body regulating and overseeing the same.

In the past few years, we’ve seen several reports on cybersex dens and rampant child pornographies in the country. Yet again, we still see or hear reports of continuous operations of police officers against cybersex dens who are mostly financed or manned by foreign nationals. The full efforts of our PNP against these illegal establishments are deemed inutile due to the fact that no adequate law punishes this crime. Criminals manning these dens may easily re-establish and re-locate its facilities because the fangs of the law were not strong enough to completely terminate their operation. A proof to this effect is apparent on papers where, despite continuous police operations, more and more cybersex dens were apprehended and discovered even up to date. Moreover, the people behind these dens call more reason for alarm. Majority of these people manning these dens are foreign nationals. A reasonable man could easily be asking the question as to why would a foreign national choose to invest such business in the country as compared to the rest of the countries. Hmmmmmnnn(brief moment of silence), a simple rule on tourism dictate that if the country and the people are business friendly, investors are more likely to come for business. This could then be the reason why foreign nationals love to put up their sex dens in our country because this country is healthy for their business in two ways. First, there is no fear for sanction because our cyberspace is the epitome of freedom. Second, they can easily exploit our poor people who are in dire need of money. We could then recall that, before the cyberspace had been exploited by this type of business, there was first the sex den. This type of business was likewise manned by some foreign nationals and a few influential locals, but due to business reverses resulting from raids, tongpats and bail bonds, some chooses to re-invent and hence come cybersex dens. What an innovation and what a discovery there is from clever and business minds. In this case, if criminals can reinovate their illegal business, why can’t the law do the same? White Slave Trade under Article 341 of the Revised Penal Code which, among others, punishes the maintenance of sex dens falls short to include maintenance of cybersex dens within its punishable acts. R.A. 10175 therefore is relevant in this matter as it expressly punishes what the Revised Penal Code failed to punish. Good news once again not specifically for your private interest, but for the general public. Bear in mind that child pornography is one of the outcome of cybersex dens. Children are more likely to land on cyber dens than they are on beerhouses as white slaves. The convenience of not being known to customers where the den is situated repels the danger of having a minor sex worker who, in the eyes of the law, is so favored and protected. This very nature of a cyber den gave the basis why a higher penalty is imposed on child pornography under R.A. 10175 as compared to R.A. 9775 or the Anti-Child Pornography Act of 2009.

The abovementioned crimes such as child pornography, cybersex, computer hacking, computer-related indentity theft, or unsolicited commercial communications are easily identified as crimes either because other jurisdiction treat them as such, or that our conscience dictates that these are wrongful acts. However, there is a provision of this law that would mostly raise eyebrows and which stand between the thin lines of what is right and what is wrong. This is the provision which, in the eyes of the netizens, is most likely susceptible for abuse and curtailment our constitutional right to free speech. In particular, the inclusion of libel as a punishable actunder the law brought about numerous objections and speculations as to how said provision reached the corners of R.A. 10175. Every person seems to have his own view as to how libel, which is a felony, reached the territories of special laws. The president, senators, lawyers, media, bloggers or even common users of facebook and twitters have their own view on this matter. But these views may be summarized in two aspects – the Political and Legal aspect.

First aspect of how people rationalize libel under RA 10175 is by looking at the political antecedents before this Cybercrime Prevention Act was even considered as a law. We recall that the Cybercrime Bill quickly became a law faster than RH Bill and any other bill in the congress that time. The nearest political antecedent linked in the quick passage of the law was, if I recall it right, the issue of plagiarism against a senator. There seemed to be a magnetic attraction between this senator and the bill that people ought to blame Mr. Senator why libel was inserted in the final draft of the bill – even the author of the bill could not explain how libel got into his bill. People seem to be convinced that the bill was passed in aid of a bullied senator – but did this kind of thing already occur then? P.D. 1866 or our law against Illegal possession of Firearms and Explosives possess a deep secret as revealed by a law professor and a retired judge. The professor judge relayed that under P.D. 1866, if a person is apprehended in possession of an illegal or unlicensed firearm, he is liable under the law and will suffer the penalty as prescribed therein. But if said person was apprehended in possession of said illegal or unlicensed firearm while committing a crime (say, alarms and scandal under Article 155 of the Revised Penal Code) the crime of illegal possession is absorbed by the crime of alarms and scandal, and the penalty prescribed by the latter crime shall be the only penalty imposed irrespective of the penalty under P.D. 1866. Problem then, the professor added, is that the penalty imposed under alarms and scandal is lower than that imposed in P.D. 1866. Now then, a malefactor can easily evade a higher penalty in case of violation of P.D. 1866 by merely firing his gun to commit alarms and scandal. How could our legislators have missed this point? Speculations then arouse that P.D. 1866 was passed in aid of a bad boy actor who was apprehended for illegal possession of firearms. Whether this was true or not is unconfirmed, but the point being, how could the same speculation arise ones again; where a law is sponsored and passed by the congress for a special benefit to certain individuals. Whether intentional or accidental, one point is clear – enactment of law is a political act. It depends solely on the initiative of our legislatures, lobbyists and political demand. People may ask: “isn’t it that the people are the sovereign of a State?” How could these types of laws then withstand against public clamor? Despite constant battle against the libel provision inside and outside court houses, netizens and law makers still fail to meet to an agreement as to this point. But what is really the source of the public clamor to remove libel from the law, if not declaring the law unconstitutional in its entirety? Is it the fact that the credibility of the law was tainted and doubted because of the political antecedents prior to its enactment? Or is it the fact that adding libel to the equation creates an apparent treat to our exercise of freedom of speech?

Libel under R.A. 10175 is a different breed to that of libel under Article 353 of the Revised Penal Code. The former imposes a penalty, one degree higher than that imposed under Article 353. What was then punishable by imprisonment from six (6) months and one (1) day to four (4) years and two (2) months, is now raised to one degree higher or up to twelve years (12) of imprisonment. The deterrence of the law seem to be very efficient to the point that during its enactment, a lot of people feared posting comments and consciously add disclaimers to their posts for fear of imprisonment. Furthermore, Section 5(a) of the law also punishes those who aid or abet in the commission of libel. Hence, a person who likes, tweet, comment, re-post or share a libelous article is liable under this law. On a brief thought, if a netizen, when posting, sharing, liking, commenting or tweeting is always in danger of violating the law, isn’t this a constructive deprivation of our right to speech? Does this mean that I am now restricted to criticize public officials in the cyberspace where it is convenient to air sentiments and people have easy access to it? The author of the law, Senator Edgardo J. Angara himself, posits part of the answer to the question. In his article in Manila Bulletin [1], Sen. Angara opined: “The provision met stiff opposition, which I believe stems from misunderstanding. Every day, in newspapers and television, journalists speak their minds, even against particular people, practices, or establishments. They have not been jailed for doing so; the right to express our opinions is enshrined in the Philippine Constitution. Neither will they be jailed for doing likewise on the Internet.” he further added by saying: “The law does not in any way stifle the right to freedom of expression. Rather, it protects citizens and expands the scope of that right. Both the Constitution and common sense tell us that the protection of free speech and free press does not extend to malicious falsehood against one’s person or reputation.” In other words, why fear for the sanctions when you will not commit any violation. Those who fear punishments from the law are only criminals because there actions are not warranted by the Constitution; but those who do no wrong can always take shield from our laws. This is where the bad news is; we raised our voices first before we could ever take time understanding the situation. The bad news is not the fact that libel was inserted as a penal provision of R.A. 10175, but it’s our misunderstanding of the reasons and implications of such provision. Our view on the law then cannot be complete without looking at its legal aspect, for a law is to be understood in the legal aspect, as it is supposed to be, and nothing else.

Since R.A. 10175 made reference of libel in relation to the provision under the Revised Penal Code, the former libel is to be understood in the concept of a felony under Article 353 of the Revised Penal Code. Under Article 353, libel has the following elements: (1) There must be an imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status, or, circumstance; (2) The imputation must be made publicly; (3) It must be malicious; (4) The imputation must tend to cause the dishonor, discredit or contempt of the person defamed. Among the elements abovementioned, malice (under the 3rd element) is the hardest to prove because in the case of People vs. Andrada [2], the malice or ill-will must be proved by clear and convincing evidence. There must be a proof of actual malice before a statement is considered libelous or that such statement must show injury or damage against the victim. Having said this, one does not have to be a law student in order to understand a malicious or injurious commentary. The implication brought about by the provision on libel is not a threat to freedom of speech or the press because, as opined by Sen. Angara, libelous words are not covered by free speech or the press. The Constitution did not in any way intended to enshrine in the bill of rights the freedom of the press so that men can tell untruthful stories against someone else, nor does free speech warrant total freedom of all words we utter. Our Philippine Bill of Rights under Article III of the 1987 Constitution, particularly the freedom of expression is borrowed from the Constitution of the United States of America. In the debate of the Madison’s version of speech and press clause, Madison revealed the intent of the clause which is: “To punish as the law does at present any dangerous or offensive writings, which, when published, shall on a fair and impartial trial be adjudged of a pernicious tendency, is necessary for the preservation of peace and good order, of government and religion, the only solid foundations of civil liberty. Thus, the will of individuals is still left free: the abuse only of that free will is the object of legal punishment. Neither is any restraint hereby laid upon freedom of thought or inquiry; liberty of private sentiment is still left; the disseminating, or making public, of bad sentiments, destructive to the ends of society, is the crime which society corrects.” [3] Hence, if libel as a felony was accepted as a just and proper law by the people, why can’t we accept it to cover the cyberspace? Due to fast development of our technology, every single person (with proper qualification or none) becomes a critic in his own title. Worst, opinions, nowadays, whether correct or not, are much more futile when shown in the Internet. Imagine the vast users in the cyberspace and how one could easily convey information? It’s basically talking to the whole world with just your fingertips. Can we understand the standard of care required from us every time we seat behind that screen or write a comment, post or like the same? This were ones the very reason for the enactment of libel as a felony. Now that it re-innovates itself, is there a cause for alarm? Should we panic and be mad because there’s a special law prescribing a higher penalty on this crime that what it used to be? Imagine how hard it is to track down a comment down from its source when all you can see are nicknames of real users of mails, blogs or accounts. If libel is brought back to its original penalty for those committed in the cyberspace, will it deter people to stop committing this crime? We must understand that it is mostly the unknown which begets fear. Given proper time to understand this law, would our view to this provision and ultimately this law change? Why not wait for the implementing law, or better yet, participate in the drafting of the implementing rules so that our sentiments and doubts may be aired and clarified. The purpose of forming a State is to afford protection for its people by regulating the dealing between one another. If we therefore hate that the State is doing its job, or that we hate being regulated, why not dissolve this State and let’s govern ourselves independently. The only impact that this law have on us is that it sets boundaries and standards of our conduct in the cyberspace; the rest is on us to take. Ultimately, we are still free to do as we please, only that we are just reminded of how a civilized man (as expected from a subject of a State) should conduct one’s self.


Endnotes

[1] Page 11 of Views – Features Section, Published on Sunday, October 7, 2012

[2] C.A., 37 O.G. 1783 as cited in Criminal Law: Book II of Luis B. Reyes, 17th Edition

[3] W. BLACKSTONE’S COMMENTARIES ON THE LAWS OF ENGLAND 151-52 (http://www.chanrobles.com/usa/us_supremecourt/constitution/amendment-01/20-freedom-of-expression.php) last access; December, 8, 2012


The Quest to the Cyber World: A Journey to Regulation of the Cyber Space

During the advent of R.A. 10175 (The Cybercrime Prevention Act of 2012), many hate protests and comments were thrown although some opined that the law is a leap to regulate the cyberspace. We note that prior to R.A. 10175, we already have R.A. 10173 (Data Privacy Act) and R.A. 8792 (Electronic Commerce Act of 2000) as our cyber laws. Yet, the quest for an effective cyber law goes on. There seem to be a thirst for a clear-tight rule which would govern the conduct in the cyberspace. R.A. 10175 was supposed to address the issue but it fall short towards peoples acceptability. What could have caused the bitter acceptability of this cyber law? At present, are we still discontented with our cyber laws that we still seek a better law on the matter? In this case, is Senate Bill Number 3327 otherwise known as The Magna Carta for Philippine Internet Freedom, the current would-be cyber law of the land, a better law than our recently approved cyber laws? S.B. 3327 seeks to repeal R.A. 10175 in toto and barely seek amendment of certain provisions of R.A. 10173 and R.A. 8792. Hence, in the course of this discussion, comparison of the bill is focused against R.A. 10175 since amendments under R.A. 10173 and R.A. 8792 are only for penalty purposes and some trivial matters.

S.B. 3327 is a bill sponsored by Senator Miriam Defensor-Santiago which ought to address the inadequacy of our present laws to cover certain acts in the cyberspace which if committed in the real world the same could constitute a crime or abuse of right. At glace, S.B. 3327 is more numerous in page compared to the past approved cyber laws (although along the process, said bill may be subjected to revisions which would eventually lessen its page number). Yet we cannot help but wonder whether this page numbers mean at all? R.A. 10175 was bitterly accepted due to its all encompassing provisions which permit several interpretations and covers acts which either appears to infringe private rights or raise people’s eyebrows and cause scratchy heads due to poor construction and/or express specification. Likewise, R.A. 8792 and R.A. 10173 were deemed inutile either for failure to include criminal cases on the admissibility of electronic evidence or for failure to be extensive, clear, and specific in the coverage of acts ought to be penalized in the cyberspace. Clashing sentiments for individual freedom in the Internet and for protection and security connive as one to create a chaotic battle ground for heated arguments. Yet at the heart of all this, we can see the face of the cyber law we seek: that which uphold individual right, define duties and protect from abuses committed in the cyberspace. Hence, in the course of the comparison, the discussion will revolve around three things: (1) whether the law promotes Internet freedom and use; (2) whether rights and duties of parties involved are clearly defined; and (3) whether there is proper regulation and implementation.

Promotion of Internet Freedom and Use

R.A. 10175 as a whole is a litany of all punishable acts committed in the Internet without however defining rights and protected expressions of an internet user. It seeks to define directly the punishable acts without further elaborating on the exceptions under said penal provisions. On the other hand, S.B. 3327 started by expressly stating under chapter III, section 4 that the State shall, within its jurisdiction, protects and promote the Internet as an open network. This, in impression is an express declaration from the law that the cyberspace remains to be a private aspect of communication and interaction by an individual and is thereby protected by privacy and no less than the constitution. By so stating, an express mandate and commitment to uphold the same is established unlike from a mere litany of penalties without air tight definition as to its proper goal – which is to uphold freedom and protection in the cyberspace. Furthermore, the law, in so phrasing, has already provided a clear guideline on how the law will be enforced and implemented by public officers unlike the confusingly worded section 12[1] of R.A. 10175 which, although state a requirement of a court order, has limited the same for collection, seizure or disclosure but not to the determination of due cause for such collection, seizure or disclosure and restriction or denial of access to the Internet. Whereas, section 6 paragraph 2 of S.B. 3327 expressly state that no person shall be restricted or denied access to the Internet without an order. The bill further added in section 6 the requirement of a NOTICE & HEARING before an order may be issued which R.A. 10175 failed to mention. The omission of an express mention of determination of DUE CAUSE under section 12 of R.A. 10175 is relevant in the upholding of property rights and privacy of an internet user which by the way was not even mentioned by the law to be in existent. Section 7, paragraph 1 of the bill expressly mentioned that the State shall, within its jurisdiction, protect the right of a person to gain or attain privileged access or control over any device over which the person has property rights. This in turn serves as a recognition of private and property rights of an individual which may not be infringed into even by the government without having complied with the requirements of our law for searches and seizure and most specially the determination of due cause for said government action. This again, was poorly addressed by R.A. 10175. Section 8 on Right to Freedom of Speech and Expression of the bill ought now to remedy the cause of bitterness by the public towards R.A. 10175 which, by way of observation in the cyberspace from blogs, comments, and tweets, was viewed to be a suppression of our Internet freedom for expression and use. In fair, R.A. 10175 never intended martial law in the cyberspace, yet it definitely failed to state such intention. The lack of defining the mitts and bounds of implementing said penalties and exercise of police power in the cyberspace were deemed futile to achieve the real purpose of the law. The unclear statements on certain provisions of the law seemed to have cloaked its spirit and basically put its completion towards administrative hands whose job, although to a certain degree authorizes the making of rules on its manner of implementation, could not warrant none deviation to the real spirit of the law as the law itself has failed to make its instructions clear. Furthermore, the law cannot effectively survive by mere Implementing Rules alone as judicial scrutiny could very well kill the discretions given to administrative officials in the implementation of the law brought about by its unclear and unspecific orders embodied in the very core of its provisions. It is note worthy that under our law, an administrative agency is not vested with the law making power but merely assists in the implementation of laws providing sanctions and defining rights which the Congress themselves must clearly supply. In this juncture, it can be said that this bill has a better hand. The provision on freedom of speech and expression has made FAIR USE WITHOUT SANCTION possible as the law clearly stated what it ought to protect and uphold. Unlike the negative way of defining an act by exclusion to those expressly mentioned punishable acts – as adopted by R.A. 10175, this bill started with the basic way of determining an act as a right before dwelling on prohibitions. In this way, an individual is properly appraised both his right and the States dedication of protecting them before dealing with abuses of rights because our basic rights are vested naturally and should not be made dependent on what is excluded as punishable since what is punishable is merely dependent on the same right which in the eyes of the law is abused and is in demand for justice. Right to privacy and security of data under sections 10 and 11 of the bill could very well be inutile if protection is not given to fair use and freedom to innovate and create without permission – under R.A. 10175, there was still no mention of this. Based on the sentiments of most Internet users during the passage of R.A., 10175, a common fear of Internet use and expression was felt by netizens. This was a result by the fact that the law defined fair use as to depend on what is excluded by the punishable acts it impose. In effect, it created a massive block out as to what Internet act is punishable and what is not.

Definition of Rights and Duties of Parties

Another key feature of S.B. 3327 is that it increases accountability by Internet providers to their consumers and the public by providing for rules on third party disclosure and quality of service and network fair use. R.A. 10175 operates as a mere cyber crime law or the litany of Internet crimes without establishing rights and freedom in the Internet. Furthermore, it is only directed to the offender as a user but not as the Internet provider. Nothing in the law, for example, provide for protection of the consumers from the abuses of telecommunication companies or provide for service standards of these entities. R.A. 7925 otherwise known as Telecommunications Policy Act of the Philippines at present does not cover Local Internet Service Providers, hence could not very well governed their conducts and duties to the general public. As to quality of service content, the MTRCB at present dwell by analogy as to regulating the cyberspace but are still left at thin air in the face of judicial scrutiny due to lack of legislative action vesting such power to this administrative body. All these and more should have been covered by R.A. 10175 if a complete regulation and protection in the cyberspace is to be sought to. A litany of the virgins might save us all but not a general litany of penal sanctions in the Internet. Classification between rights and liabilities of a user and Internet provider is wanting if the State ought to cover the Internet under its laws because these are the key figures which basically compose the Internet. An Internet is not possible without a provider, hence it is quiet unfair to regulate only the conduct of the people in general without however dwelling into the duties, responsibilities and liabilities of those who supply the system. This in turn is one of the major lapses of R.A. 10175 because it only concerns itself on imposing sanctions from the belief that rights and obligations may be had in that way.

Proper Regulation an Implementation

All the while, people remained clueless whether they’d post pictures, make comments or posts some likes for fear of Internet libel and the likes. In fair, this could merely be a result of ignorance of what is libelous and what is not but we cannot deny the fact that the law failed to supply a clear definition of what is punishable and what is not- most especially, what is fair use from not. Furthermore, the increased penalty to one degree higher than that prescribed by our Revised Penal Code on libel aggravated the matter. What are the odds of committing libel with a little or no clue of its covered acts? In fair, one could argue that we should not be ignorant of our own laws which in fact, are readily available for reading. Yet, we cannot close our eyes to the fact that our libel cases where battled by lawyers, most are really good at what they do, and not by mere ordinary netizen. Even our jurisprudence on libel would attest that a clear-cut definition on libel could not be had based on the series of flip-flopping decisions made in the past regarding the matter. What are the odds that one could be convicted of internet libel by mere posting of comment or like considering the penal sanction thereto? If so, what are the remedies available if filed with a libel case? If you are confident enough that your act is not covered, you could just disregard the complaint or have a not guilty plea and let justice do the rest. But how about if we put into equation the presence of a brilliant lawyer who could very much argue that your case is covered by internet libel or a judge itching to have you convicted? You’ll be left at the mercy of a merciful judge, a good lawyer or a favorable appeal respectively. Either way, these remedies could eat up a large amount of your time and money. If so, the panic reached to mind by the netizens is very well not baseless because, as ordinary citizens not well versed with the law, they could only avail of the quickest remedy possible by restricting their Internet transaction such as comments, views, likes, blogs, tweets and the like. Having said this, we might wonder what does the law seeks to deter. Is it the evil sought to be avoided by committing internet libel? or the exercise of freedom in the Internet? There seems to be a confusingly form of idea as to the purpose of raising penalty in Internet libel. In the first place, is it necessary at all? How does a libel on the Internet defer from a libel committed on print media or verbally in that case? A libelous act published even if not read by the people could very well qualify to a crime punishable by law irregardless of the manner of its publication. More so, a libelous comment in the Internet could be timely discarded as compared to that of the printed ones which could mean less damage to the reputation of the offended party. This is why, under S.B. 3327, it can be observed that only fine is imposed in Internet libel in lieu of imprisonment. This, in consideration of the above discussion, is sound than imposing imprisonment because a fine in itself is deterrent enough to punish the offender considering that a remedial measure of immediately discarding libelous comments may be had as compared to other forms of committing libel. The availability of this remedy would render imprisonment unjust and could even lead to further evil and non-encouragement of Internet freedom of use and expression. Furthermore, netizens has nothing to fear now or reason for excuses because section 33 paragraph AA[2] of the bill has expressly provided for the exceptions to Internet libel. It has even provided for valid defenses which may be availed of in order to appraise the people their respective rights and duties as regards this matter. Also, it is noteworthy that the bill has now punished plagiarism committed in the Internet, which although may arguably be covered by the Intellectual Property Law, has now provided for specific coverage and exclusions in relation to the imposition of penalties. Section 35 paragraphs 19 and 20 of the bill in relation to section 29 paragraph A.3.is a key provision of the bill in relation to plagiarism. It states that although plagiarism is a punishable act in relation to copyright infringement, free license or public domain content shall not be subject to payment for damages nor any other penalties. This implies that a netizen could not be so burdened in thinking whether he/she should copy every links and sites attributable to the picture he/she downloaded in goggle image as a primary picture so as to avoid committing plagiarism or copyright infringement in that matter because these stuffs are freely accessible and downloadable – a caveat though because under section 29 paragraph B of the bill, these computer program, script, code or software downloaded with intent to profit thereto are punishable and deemed piracy under the bill. However, what would happen if the gravaman is a minor who is not capable of discernment as to what is protected by copyright and what is not. The last paragraph of section 12[3] of the bill provided for the condition. In this case, the bill demands supervision from parents and guardians to their minor children or wards otherwise the former may suffer the consequences. This provision need be stated in order to clarify the duties and obligations in this certain instance.

As to implementation, a clear expression of the bill other than the summoning of administrative departments responsible thereto is the provision creating the cybercrime courts. Under section 21 of R.A. 10175, the RTC has jurisdiction over cyber crimes and a special cybercrime court is to be created which is manned by specially trained judges. This goal is basically the same as that ought to be achieved by S.B. 3327, but the former is so constructed in a lazy and general manner. Unlike R.A. 10175, the bill has provided for qualifications (such as academic and professional background) of a judge to man the cyber court. It further summoned court personnel of said cyber court to undergo training to suit the demands of the job. A mandatory continuing legal and information and communications technology education is further required to continually abreast a judge of the developments on the matter. Furthermore, the amendment to the AFP modernization act to include technologies which may be deemed helpful in the implementation of this bill is a serious step towards cyber regulation.

In sum, the major distinction between the current would-be cyber law and its predecessor is the manner of expressing its clear cut mandate. R.A. 10175 is a reflection of a crammed law hurriedly passed by the Congress due to some itchy demands. The general statements embodied in its very provisions could be said to be a product of inadequate brainstorming by the Congress and the people. If we could produce a bill a encompassing and adequate as Senate Bill Number 3327, there could be no room for administrative discretion, hence lessens deviation from the real spirit of the law. A clear-cut mandate and instruction from the body no less than granted the power to enact laws is wanting for us to properly regulate the cyber space, but such is not complete by itself. These instructions and mandate must reflect the intention of the people as the ultimate sovereign of the State. Furthermore, the Congress, in enacting laws, should always appraise the people their rights and duties under the law being enacted, before even thinking of penalizing them.


Endnotes

[1] Section 12. Real-Time Collection of Traffic Data. — Law enforcement authorities, with due cause, shall be authorized to collect or record by technical or electronic means traffic data in real-time associated with specified communications transmitted by means of a computer system.

Traffic data refer only to the communication’s origin, destination, route, time, date, size, duration, or type of underlying service, but not content, nor identities.

All other data to be collected or seized or disclosed will require a court warrant.

[2] AA. Exceptions to internet libel. – The following acts shall not constitute internet libel:

a) Expressions of protest against the government, or against foreign governments;

b) Expressions of dissatisfaction with the government, its agencies or instrumentalities, or its officials or agents, or with those of foreign governments;

c) Expressions of dissatisfaction with non-government organizations, umons, associations, political parties, religious groups, and public figures;

d) Expressions of dissatisfaction with the products or services of commercial entities;

e) Expressions of dissatisfaction with commercial entities, or their officers or agents, as related to the products or services that the commercial entities provide;

f) Expressions of a commercial entity that are designed to discredit the products or services of a competitor, even if the competitor is explicitly identified;

g) An expression made with the intention of remaining private between persons able to access or view the expression, even ifthe expression is later released to the public; and,

h) A fair and true report, made in good faith, without any comments or remarks, of any judicial, legislative or other official proceedings, or of any statement, report or speech delivered in said proceedings, or of any other act performed by public officers in the exercise of their functions, or of any matter of public interest.

[3] It shall be presumed that the parents or guardians of a minor shall have provided agreement and shall be bound to the terms of an end user license agreement should the minor in their care signify agreement to the end user license agreement. It shall be presumed that any infringement of intellectual property rights by a minor was done with the knowledge and consent of his parents or guardians.


Fifty Shades of Greed: A Discourse on Our Copyright Law

The Best Things in Life are Free! This is a moto seemingly inculcated and deeply rooted in our Filipino values and culture. What could be better than those freely offered and enjoyed without obligation or reciprocation on your part? Have you tried the free ride bus of Ang Dating Daan, went to Luneta Park on valentines day, parked in a parking lot without parking fee, ask relief goods, find a chair in a mall without the for customers only or do not seat sign, get a free ticket for a concert or even just to redeem a free and limited promo t-shirt? All of these have one thing in common, it attracts people – and the market industry knows it. Have you tried to look at your favorite shampoo, shop for grocery items, choose a post paid plan for your phone, buy yourself a shirt, or observe any of your market transactions? The key word for a best buy are the capital letters FREE. The more freebies they offer, the most likely you are to give in. In all things in terms of economic wisdom, this is the most basic principle that most people, if not all, would gladly adopt. The attitude of Filipinos on haggling for the best buy reflects our desire to as much as possible pay less for more because we are concerned in increasing our individual properties. Ladies and gentle men, the issues that are faced by our Copyright Law nowadays are but carved primarily by this attitude. This article is a response to the clamor for an effective Copyright Law in the Philippines that would strike a balance between Copyright Owners and Consumers. Although no prescription is advised, as the author is not a doctor, nor is he a legislator to propose a bill amending our present Copyright Law, the author for unknown reason is compelled to trace the bone of contention to pave way for a better Copyright Reform.

Rooting it out

Copyright, also known as Author’s Right relates to artistic creations, such as books, music, paintings and sculptures, films and technology-based works such as computer programs and electronic databases. [1] This is a concept of British origin brought about as a reaction to printers’ monopolies at the beginning of the 18th century. Charles II of England was concerned by the unregulated copying of books and passed the Licensing of the Press Act 1662 by Act of Parliament. [2] Then came Statutes of Anne, Paris Convention, Berne Convention and the creation of World Intellectual Property Organization which enhanced Intellectual Property and Copyright Laws and pave way to recognition and protection of individual rights to intellectual properties and expressions. The idea of Copyright and Intellectual Property is a product of Capitalism which recognizes and upheld individual rights and properties. To state otherwise, the concept of Copyright is basically all about money vis property. In the Philippines, we have Republic Act 8293 otherwise known as the Intellectual Property Code of the Philippines as the law primarily governing Philippine copyrights. Section 2 of RA 8293 provides in part that “the State recognizes that an effective intellectual and industrial property system is vital to the development of domestic and creative activity, facilitates transfer of technology, attracts foreign investments, and ensure market access for our products xxxx” – money talks again. Basically, the facade of copyright laws is all about money matters, but it also upholds a deeper essence that is the protection of expression. These are the two ingredients that make up the right of a copyright owner. A copyright owner under RA 8293 is vested with Economic Right under Section 177 of said law and Moral Right under Section 193 of the same law. Economic Rights consists of the exclusive right to authorize or prevent (177.1) Reproduction of work or substantial portion thereto; (177.2) its transformation; (177.3) distribution or transfer; (177.4) Rental; (177.5) Public display; (177.6) Public performance; and (177.7) other performance to the public of the work. Simply put, the economic rights of the copyright owner covers all economic transactions and endeavors of his work which is basically premised on his right to property of his work and therefore the accessory right to its fruits and accessions. Moral Rights, on the other hand, is consist of the right to (193.1) Authorship and attribution of the work to the copyright owner; (193.2) Make alterations or withhold its publication; (193.3) Object any derogatory actions against his work which are prejudicial to his honor or reputation; and (193.4) Restrain the use of his name for works not of his creation or in a distorted version of his work. Again, this right is rooted to the property right of the creator to use and abuse his creation, to possess title thereto and facilitate its transfer. These two rights however are not absolute. Section 184 of RA 8293 provides for the limitations on copyright which in sum are “interpreted in such a way as to allow the work to be used in a manner which does not conflict with the normal exploitation of the work and does not unreasonably prejudice the right holder’s legitimate interest” (184.2). Section 185 further allows any use without copyright owner’s consent as long as it constitutes Fair Use – still premised on subsection 184.2. Furthermore, copyright law protects only the form of expression of ideas but NOT the ideas themselves. So that this recently published article vis blog, although may reflect the same ideas of several scholars and writers may not necessarily infringe the works of the latter if the manner and form of expressing these ideas are wholly or substantially different and apart. This could very well be premised on the fact that everything is under the sun. Ideas are but products or adaptations of other ideas which, if mixed with some other ideas, would create a wholly different or an innovation of the old idea. Take for instance Aristotle’s principle on Thesis, Anti-thesis and Synthesis. It is basically the clash of ideas that bring about a new or improved form of idea – yet with the intervention of another’s idea. So do we have to ask permission to use other’s idea in order to create another idea? Possibility and development wise, NO. So, what is being battled and enforced by copyright owners under our copyright laws? Is it their thymotic sense of pride to be recognized and attributed for their work or is it quit a simple battle for individual property right? Based on the abovementioned provisions of RA 8293, the answer is both yet the prevailing factor is still money vis property talk. Copyright owners are but the deserving beneficiaries of any considerations which may be derived by virtue of their creations. It is basically money that makes the world go round in terms of copyright industry – that’s why its birthplace is capitalism. Yet, another factor adds to the equation – CONSUMERS. Again, section 2 of RA 8293 on Declaration of Policy states that “the industrial property system is vital to the development of domestic and creative activity xxxx and promote defusion of knowledge an information for the promotion of national development and progress and the common good”. Said industrial property system is not complete without the consumers, for no defusion of knowledge nor information may take place without the attendance of people who would absorb or patronize the same. But the law does not simply require that consumers should only eat the food of wisdom courtesy of authors and artists, for like any other restaurants, it comes for a price. The declaration of policy simply tells us the ideal aspect of the law but not quiet all – should we blame it to semantics then? If we interpret the law as a whole, it can be inferred that it is for the national development and progress that we protect the individual property rights of copyright owners, because they are the key to national progress and development – an investment of the country. However, a consumer too has his/her own property rights, so that if he/she patronizes a book of a copyright owner, the latter’s work in relation to the form in which it was expressed becomes the possession of the former – in this case, the book. If the consumer now exercises a right of ownership over the book, legally, he/she has all the rights appertaining to an owner to the extent of the property purchased – but the same of course is not absolute. RA 8293, among other laws, prescribes for the limitations of the use of said work to the extent that it does not prejudice the right holder’s legitimate interest (184.2) – in this case, those appertaining to the economic and moral rights of the copyright owner. In this point of view, if one should keep a score, both the copyright owner and consumer are at par with one another to the point that each has vested and limited rights under the law (economic rights for the former; and right to fair use for the latter). However, the interplay of culture sets a smoky reaction. Anyone could assume the shoe of either consumer or copyright owner, yet the attitude observed in playing each role is intended for a wholly different avowal. As a consumer, you would most likely haggle for less the selling price, yet as the copyright owner you would want your price to be as high as possible – thereby creating a double standard. However, you should not be shocked my dear Filipino friend because this is but consistent with our attitude of paying less for more and more for less. This very attitude is what complicates our copyright law, but this article is not intended to sermon for social change. Classical political thinkers don’t argue much on culture but uses culture as a vehicle for legal framework. To state otherwise, this attitude operates as the land on which our copyright laws should be planted. The protection and regulation afforded by our copyright laws should be based primarily on this attitude. This is not to say that our legislatures are unaware of this, however, awareness alone is none sense. Our copyright laws should reflect the balance of rights between consumers and copyright owners, and to constantly tip the scale in case one out ways the other. Piracy of books, DVDs, Music, computer programs, games – to name a few, are but consequences of our natural tendencies to increase our individual properties either for a lesser period or for a lesser cost. To root it out, what is happening at present in the copyright industry is but the consequence of the government’s inaction by failing to constantly balance the natural tendency and attitude of a consumer and copyright owner before even defining and limiting their rights under this matter. This is vital because the basis of regulation is the protection of one’s right from the abusive exercise of a right of another. [3] Since copyright law is basically about enforcement and protection of individual property rights, abuse usually occur when either consumer or copyright owner over claim their individual property rights to the expense of the other.

Comparing Seeds

In the international perspective, a man is still a man. Hence, a Filipino should not be ashamed nor boast his unique expression of greediness and frugality via paying less for more because all humans are created greedy – at least since capitalism and individual property rights were introduced. We all have tendencies and desires to increase our individual properties only that, our level of patience in terms of period of accumulating wealth varies. There are at least 50 Shades of Greed that are at our disposal as humans, so why feel unique for your greed when all of us have it. In the international arena, copyright laws of different States struggle basically because of constant clash between individual properties of copyright owners and consumers. Piracy for example is still rampant internationally – so don’t think Quiapo is its primary manufacturer. The development of technology carries with it other ways and forms of infringement. To name a few; the e-books, itunes or youtube are the primary challenge against copyright laws. If you ask whether our law (RA 8293) covers the following cyber transactions, the answer is a question. Is there itunes, ipad, or youtube on 1998 (the date when RA 8293 became effective)? It’s pretty obvious is it? The thing is, its not that easy to enact a law to include these matters in the cyberspace – even other States are struggling for a better copyright law. Different States employ various brands of copyright laws which are reflections of continuous struggle to balance consumer and copyright owner’s interests. In China for example, they have no equivalent to the doctrine of fair use but copyright law enforcement is lax – that explains the dvds. Protection under the copyright law also is quite limited. For example, recording of live sports broadcasts is not considered an infringement. Furthermore, no criminal liability is imposed in case of infringement when no monetary benefit is received. In contrast, US copyright law is much strict from enforcement to imposition of penalties. Criminal liability accrues even when no monetary benefit is derived from the infringing material. However, registration for copyright purposes is material in US since it evidence the enforcement of a protected right – in contrast to China who does not distinguish nor exercise preference between registered and unregistered work. These are few of the key brands of copyright laws which, by themselves, are reflections of subjective nature of the copyright industry. States adopt copyright policies based on the prevailing environment of the country. Different States face different problems in their respective copyright laws, but not all conflicts are results of the clashing interests of copyright owners and consumers. Few of the puzzles are attributable to other duties and priorities of a State. China for example limits the copyrighted materials crossing their border in order to protect its own local industry. However, this policy is of no consequence. Due to the scarce availability of foreign copyrighted materials, a local consumer has two options; (1) fly abroad and buy the desired copyrighted work, e.g. book/DVD or (2) look for a local copy that is not copyrighted. Of the two choices, the latter is much applicable to most consumers in terms of economic status – this situation is also true in the Philippines. Of the above situations and State’s response thereof, Philippines as a State could always chose what method would be used to address its copyright problems. Would it adopt a strict but formal process of US or the laxity of China? Both have their pros and cons, either way, it is for us to find the one that fits.

The Rotten Plant

At present, our RA 8293 is viewed as outdated and in need for retouch. An amendment of RA 8293 is being proposed which would add teeth to the law. Among others, the bill ought to increase the power of Intellectual Property Office especially in the conduct of warrantless searches and seizures – this particular idea was received bitterly. Scholars criticized the bill as granting more rights than heinous crime victims. But with our present copyright law, copyright owners are at apparent loss. The limited scope of said law and its failure to cope up with technological developments limit the level of protection which may be afforded under our copyright laws. On the other hand, enforceability is another thing. A singer or producer for example is almost certainly sure that 8 out of 10 Filipinos has unauthorized downloads of his song, but enforcing his right under said law is quite impossible without breaking into the privacy of another. An author on the other hand could be at a serious loss due to the availability of book alikes, yet the gravaman could always argue his way out under the fair use doctrine or for his right to use and abuse the same. However, not everything that is the result of infringement is always against the copyright owner. Unauthorized upload of a live performance to youtube for example, although unauthorized publicity is still a publicity – and publicity is beneficial for a celebrity. In short, it is only the economic aspect vis right of the copyright owner that is being infringed. With regard to Moral Right, all that is attributable to the author vis owner is not affected – plagiarism aside. Illegal downloads of music, books, and even recording of live performances does not affect nor separate the work from its owner. In short, the battlefield is only set for a purely economic matter vis the right to the fruits of the copyright work. In this case, if no monetary benefit is derived out of infringement, would it be proper to impose a penalty? Civilly, damages are but proper due to the loss of income or any fruits which properly appertain to the person who should properly receive the same. Criminally, Section 217 of the law pertains to infringement for monetary consideration such as but not limited to sale or trade. But a person in possession of an infringed material, although not maintaining the same for purposes of sale or trade may be put to prison by aiding or abetting – this is without prejudice to other laws penalizing the same act. However, it is noteworthy that the protection granted by law to copyright owners is to be interpreted as a form of incentive since the latter are vehicle for industrial development and diffusion of knowledge and information. Too much focus on the economic right of the copyright owner is futile to the society since a capitalist world has always the tendency to encourage accumulation of individual wealth in so far as it is legal without necessarily being just. In particular, a producer who invests for his talent is driven to lay the hen as many golden eggs as possible. To state otherwise, a side of our copyright industry is being used as purely for income generating purposes and crossing out its public purpose. This is not however the whole story – consumers have their own brand of abuse and greed. But we cannot close our eyes to the fact that copyright owners have their share of blame too. A capitalist society is structured in a way that goods and commodities are distributed based on individual’s economic means. Branded shirts for example are worn only by those who can afford them but that doesn’t mean that the poor are left naked. However, quality and luxury wise, them who are economically capable enjoy most of the pleasures, comforts and developments that the society can offer. For an individual in the upper and middle tier of the society, a P200.00 song album or P400.00 DVD is a reasonable price of commodity. However, most in our society are not that capable yet, these things should reach them in order to fulfill the public purpose of the law.

Planting a New

Our present copyright law is separated from the real world. Without further elaborating on technical matters, protection afforded to copyright owners are toothless bastard in their eyes, yet for consumers, provisions of the law are threatening and confusing if one dwells into their possible implications and analogous interpretations. The absence of a clear and inadvertent provision of the law permits different possibilities and a bunch of arguments. When the law shut its mouth, other will talk on its behalf. The matter on copyright law is very much confusing nowadays unlike before when men view society in tribes. The presence of a globalized society permits international trades of copyrightable items but without a uniform law governing them – in the sense that States varies in policies and level of enforcements. However, a standard of copyright law should be based mainly on moderation of greed between its parties. Copyright owners for example should be granted protection under the condition that they’d register and that prices shall not be unconscionable and that the period of protection should be shorter in order to constantly monitor its circulation and relevance. Limited copies of the work should be distributed immediately after registration in public libraries or facilities for the public who cannot afford them. It is only when the government should take the copyright industry as vested with public interest that the consumers would have no other reason but to comply. Taking seriously this matter is vital in the sense that consumers and copyright owners would not continuously battle and keep scores as to who of them are deriving most benefit. Piracy is an industry that also requires consumers. Satisfy the consumers and cross out reasons for them not to patronize piracy, then no pirate industry will live. If piracy could not be avoided, why not regulate them and issue involuntary sub copyrights to them as legal agents of the real copyright owner and impose tax on them subject to limitations on production. Part of the tax may be given to copyright owners. Since the form of expression of idea is what is protected, let those pirated copies of inferior quality be registered since they are made in inferior form subject to the abovementioned condition. Absurd it may be but this is the only thing that our copyright law should operate based on the real idea from which it was made. Again, it is noteworthy that copyright law took its roots as a reaction from printer’s monopolies. Hence, it is in this case that the government should always be kept on guard – avoiding the copyright law to be used as a vehicle for monopoly. To satisfy the greed of both consumer and copyright owner, the State should feed both of them in equal share and check in constant whether one should take the food of the other not because it legally belong to the other, but because by so doing, the other is left with starving.


[1] Copyright in Historical Perspective, p. 136-137, Patterson, 1968, VanderbiltUniv. Press. Copyrighthistory.com. Retrieved 2013-03-9.

[2] Ronan, Deazley (2006). Rethinking copyright: history, theory, language. Edward Elgar Publishing.. p. 13. ISBN 978-1-84542-282-0

[3] see Article 19 of the New Civil Code

SY 2012-2013, Second Semester


How does Republic Act 10173 affect me? Is there benefit or flaw in the law?

As I sit in front of the computer trying to figure out how I would answer these questions, I assessed myself, am I pro to this new law? The title helped me sort out my confusion – “An Act Protecting Individual Personal Information In Information and Communications System in the Government and the Private Sector, Creating For This Purpose A National Privacy Commission, And For Other Purposes.”

Honestly, I asked myself, “What the heck is this?!” “What does it REALLY do?”

It might be a wonder to many why this sound out of this world to me, well, for everybody’s information, I am not a computer GENIUS… yes, I am literate as it is noticeable I am able to type, and send this blog. But it does not follow that I understand everything that I do NOT do – obviously, I don’t do it because I do not intend to, and I don’t want to commit mistakes. Like the use of facebook, twitter, blog or however else any modern person of this era will want to communicate and reach out to many souls as easily as sending their messages without having to do it the old fashioned way… such as : letter-writing (as in like IN THE TESTATOR”S OWN HANDWRITING!), notice messaging via any post office, LBC, JRS or even the FedEx. Well I do that still. Am still in the Jurassic era, if that is how it is called nowadays. I prefer to commit less mistakes- with that, it is less headache. If modernity through technology will complicate my already complicated life, then I prefer to live in the Jurassic era where things are a little slower but less risk. HOWEVER, am now putting my opinion on a blog-seems like I have no choice. But, I understand why I need to be tech literate- as this not only refer to tech geniuses but in the profession that I intend to be a part of a few years from now. I must understand how it works- you know this techy thingy majigs!

First question : How does the law affect me intimately?

Skeptical!

The law says, xxx to protect the fundamental human right of privacy xxx

First, can this law protect me from invasion of my privacy? This law will be tested only when the harm is done already… and my privacy has already been violated.

Second, this law came about when there was already breach of this so-called privacy.

What it only does is that it serves as a warning to those who are in possession of any personal information about an individual. Just like any other law, it gives warning only, not a full-proof protection of what it seems to impart to the netizens.

Before anything else, it is important to know how and where our personal information go as we send them. It is a worldwide web out there!
I have watched a movie where a person’s personal information was used by another individual pretending to be her and the very ones who caused this trouble are the ones in the government! It may be JUST A MOVIE, but come to think of it, it can be anybody else’s reality once our information has landed onto the hands of the crooks. It is not sci fi, it is a fact!

On the question, “how does it affect me intimately?” it scares me because I know there is nothing in this world, not even a law, can protect me 100%. But, I reserve some respect to this law- 50% max that at least, when my privacy has been violated, there is a basis for my cause of action. It will somehow give me the relief needed by a netizen knowing that I am not totally abandoned in my quest for privacy, even just a little.

One look at the language of the law, it seems encompassing, full-proof.. that any violation regarding my privacy, the National Privacy Commission is there to seal my wound. But as I read it again, just like our courts, it is just there to help a little, impose a big fine upon those guilty as we say – IF PROVEN. What if not? Then we leak our own wounds.

Second question : Is there benefit or flaw in the law?

Section 4 of the topic law provides,

Scope- “This Act applies to the processing of all types of personal information and to any juridical person involved in personal information processing including those personal information controllers and processors who, although not found or established in the Philippines, use equipment that are located in the Philippines, or those who maintain an office, branch or agency in the Philippines, subject to the immediately succeeding paragraph: Provided, That the requirements of Section 5 are complied with.”

However, there are exceptions, meaning, there are circumstances that this law does not afford protection to. Reading those that are not included from protection of this Act, I find it justifiable, rightly excluded , and fair enough as there are many in our jurisdiction who take refuge in our own laws to circumvent the spirit of it and take it to their side and escape penalty in broad daylight. An example of this is the Secrecy of Bank Deposits Act which, as divulged through the media in many events, are taken as shield by those seated in power. But this RA 10173 will somehow tame the abuse of Secrecy of Bank Deposit Act.

Section 16 – Rights of the Data Subject –

When I read the contents of this particular section, it does not cover all that can be given as a right to one data subject. When an information is asked, the system does not accept what is entered into if the data subject omits some information he or she would want to skip – simply, for fear of violation or breach of privacy. So, the right to skip, omit for purposes of protection is not respected.

(f)Be indemnified for any damages sustained due to such inaccurate, incomplete, outdated, false, unlawfully obtained or unauthorized use of personal information.

Under normal circumstances, this does not have any tooth in regard any damages filed by a data subject. More often than not, this leak or unauthorized use of personal information usually goes ignored and hard to prove as to who the culprit really is. And Filipinos as we are, we often let it go as any suit will only take our precious time, moreover, costly.

Section 21 Principle of Accountability –

(a) xxx

(b) The personal information controller shall designate an individual or individuals who are accountable for the organization’s compliance with this Act. The identity of the individual(s) so designated shall be made known to any data subject upon request.

The above section is not yet tried. Say on jobstreet.com, it is system generated. All it does is get an information of data subject. It cannot even be asked. It is a one-way trip to Ohio where I GIVE DATA, IT RECEIVES DATA, AND I JUST WAIT WHAT HAPPENS NEXT.

Section 25- Unauthorized Processing of Personal Information and Sensitive Personal Information- (a) The unauthorized processing of personal information shall be penalized by imprisonment ranging from one (1) year to tree (3) years and a fine of not less than Five Hundred Thousand Pesos (500,000) but not more than Two Million Pesos (2,000,000) shall be imposed on persons who process personal information without the consent of the data subject, with or without being authorized under this Act or any existing law; (b) The unauthorized processing of personal sensitive information shall be penalized by imprisonment ranging from three (3) years to six (6) years and a fine not less than Five Hundred Thousand Pesos (500,000) but not more than Four Million Pesos (4,000,000) shall be imposed on persons who process personal information without the consent of the data subject, or without being authorized under this Act or any existing law.

Oftentimes, when a law has been passed, we look into the scope- we see to it we are not subject to it, and if we are, we take precautions. Next thing we look upon is the penalty. Section 25 is securing that this law will be implemented properly basing on the imposition of fines which are quite high as compared with other laws. What I do not read from any of the penalty provisions is the penalty in case of insolvency of the data or personal information controller.

Section 26 – Accessing Personal Information and Sensitive Personal Information Due to Negligence – (a) accessing personal information due to negligence shall be penalized by imprisonment ranging from one (1) year to three (3) years and a fine of not less than Five hundred thousand pesos (500,000) but not more than two million pesos(2,000,000) shall be imposed on persons who, due to negligence, provided access to personal information without being authorized under this Act or any existing law; (b) Accessing sensitive personal information due to negligence shall be penalized by imprisonment ranging from three (3) years to six (6) years and a fine not less than Five Hundred Thousand Pesos (500,000) but not more than Four Million Pesos (4,000,000) shall be imposed on persons who, due to negligence, provided access to personal information without being authorized under this Act or any existing law.

What I understand on this provision is that, say, I, an ordinary netizen, negligently accessed a personal information. Does this mean, any person? Like you and I? who, due to negligence, provided access to personal information? How will that happen? Educate me. Like when I tinker on my computer and upon doing such, I get an access code without really knowing and understanding it, and suddenly, wallahh! There appears the personal or sensitive information of another. I think this must be cleared- the language of the law is ”ACCESSING personal information” and “PROVIDED information xxx,”

which must be negligently done. There is no clear comportment as to how negligence is to be made so as to be held liable under this provision. Negligence must be accompanied by the intention and the surrounding circumstances that go about the so-called negligence. It does not come straight and alone, more often, it is not what we judge it is.

Have I understood PRIVACY the way this law would want me to?

What does PRIVACY mean? – a state of being apart from the company or observation of others; freedom from undesirable intrusions; esp. avoidance of publicity.

Article III BILL OF RIGHTS 1987 CONSTITUTION

Sec.3 (1) The privacy of communication and correspondence shall be inviolable xxx.

(2) xxx

Based on the penalties imposed and the functions of the National Privacy Commission, what I understand is that my right to privacy of any information sub-qualified into personal and sensitive information is as valuable as my own life that it is safeguarded like a precious gem.

Like any law, there are pros and cons for its enactment. There are advantages and disadvantages of Republic Act 10173, and as quoted from other sources, are as follows:

“The Advantages of this Act is that it aims to protect the individuals in personal information. the effects of this in our country’s e-Commerce security infrastructure, especially on the e-entrepreneurs. It helps the entrepreneurs in terms of their privacy when talking about the their business. On the other hand, R.A no. 10173 helps to prevent the theft of intellectual property and the privacy of each individuals.

The disadvantages of this act is that it minimizes the Information and Communications System generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents and includes the computer system or other similar device by or which data is recorded, transmitted or stored and any procedure related to the recording, transmission or storage of electronic data, electronic message, or electronic document.” [1]

“Benedict Hernandez, Director of the Business Processing Association of the Philippines (BPAP) and President of the Contact Center Association of the Philippines (CCAP), said the local BPO sector must and will abide by the new law’s provisions. It is also predicted to attract more investors as it is set to reinforce protection of private data.

In an interview, Hernandez also highlighted several uses and benefits of the law to the outsourcing industry and other sectors as well. He added that private information should be handled with outmost confidentiality.

Moreover, he said having reinforced data privacy processes will help pave the way for better business practices in companies and more opportunities in attracting potential investors. He reiterated that BPAP will strive to work with the government in implementing and establishing the provisions of the Data Privacy Law.”

“While the disadvantage of RA 10173 poses an equally if not more than alarming penalties not only for the long-time netizens but moreso for those who are newbies in using the internet or any kind of information technology media. Ordinary Filipinos, especially those who are computer illiterate, those with no access to, or seldom use the computer or any device that have the capabilities to store and transfer sensitive personal information may be prosecuted in courts of the Philippines due to improper handling of information or negligence.

“What alarms me the most are the penalty clauses stating that anyone can be penalized by imprisonment and will be fined in gargantuan proportions for accessing personal information of another individual or entity. Even if she/he did not mean to”. [2]

With all these presented – my preference for the old route, my need for what new techs offer just to be able to dance well with the fast paced life we have right now, it can be well said that this Republic Act 10173 is a balancer of the inevitable and its remedy.


Endnotes

[1] The Penguin English Dictionary, 2d Edition p.1108; Sec.3 Article 3 Bill of Rights; Lainemejos.wordpress.com, visited dec.1,2012

[2] Kristinepetagra.wordpress.com visited dec1,2012


RA 10175 and the Magna Carta for Philippine Internet Freedom

An Act Defining Cybercrime, Providing for the Prevention , Investigation, Suppression and Imposition of Penalties Therefore And For Other Purposes [ Republic Act 10175]; as against
An Act Establishing a Magna Carta for Philippines Internet Freedom, Cybercrime Prevention & Law Enforcement, Cyberdefenses & National Cybersecurity [SBN 3327]

First, it must be clarified that, before I continue on with my blog, I am inclined to dwell on neither side. My view is from a standpoint where people see it in black and white, unclouded by personal desires. Just plain and simple knowledge of the use of the internet.

I have read a running commentary on the Anti-Cybercrime Law, and they are not pointless to be ignored. Some articulate of their fight for their online rights before they may even be peddled, regulated, and scheduled away. It must be understood that the exercise of power in our physical world is rather a dangerous act as it entails more of what we can do rather than what we cannot do.

I have always believed that freedom comes with great responsibility. We are to be held accountable for what we say in print as well as online without really being suppressed of our so-called freedom. The barrier clouding our mentality to ever psych out the need to demarcate liberty from self-rule has to be deleted. In other countries such as China, “self-discipline” on the use of the internet is being rewarded, although it blocks content very directly, so does Iran; Russia does not directly block websites, as they simply introduce order to place the weight on the internet site themselves. However, not all regulations are applicable to all kinds of people. Those of what Russia, China and Iran implement may not be useful to our kind of people. But the common denominator of the aforementioned countries and the Philippines is that citizens ó government. It takes two to tango. We must admit, we tend to abuse the little power that we are granted, therefore, a little help from our government to tame us a bit will not hurt. I love freedom much as anyone else here on earth! So I must not be misquoted for saying that we need “a little help from the government.”

The internet, for all its good purpose, should help the good guys rather than the bad guys. But, for some reason or another, the bad guys tend to monopolize such good use and convert it to their glory, the ratiocination for the effectuation of the now questionable RA 10175 and its maybe replacement SBN 3327. It is somehow forgotten that the legitimate purpose of technology is to better our continuance here on earth and not to maneuver or enthrall us human beings. The government and technology work for the people and not the other way around.

It can be regarded that we are such in a sullen state because we cannot school ourselves that we need to be reproved by some law or laws. Discipline emanates from the person within and not from the castigation our government saddle upon our people.

What motivate people to do things? Perhaps, the urge to let their feelings flow through; the moment of emptiness that they so want to be filled with just anything. There is nothing wrong about going through any of these, in fact, these blogs, twitter or any social media effects, are one of the great geniuses of our time – where people come together, comment about anything; there is expansion of brilliant ideas; there is collective intelligence so to speak. The best part of all these is, it is for free! The positive side of blogging is that we have the citizen journalism where there is no need for formal training to be one. However, again, if there is positive side, there is always the dark side. Some say, it is very easy to fall in love with the internet. Really? When I heard this, I could hardly fathom if there is indeed any depth into that statement. Another is, the paradox of collective intelligence. The more ties we construct, the thornier it gets, the harder it is to be individualistic. Oh yeah!

President Noynoy Aquino III signed the Anti Cybercrime Law or RA 10175 on the 12th of September 2012, however, the Supreme Court discharged a Temporary Restraining Order for 120 days from the 9th of October to grant our Congress an opportunity to come about a substitute step.

RA 10175 sought to scourge cybercrime offenses such as spamming, identity theft, online pornography, hacking, online libel and other similar offenses committed through the use of the internet. This law has been reviewed, ridiculed and was given a chance but its objectives were not cogent enough in terms of freedom of expression, and of speech. People who are adept to the ins and outs of the internet enunciate their mettlesome sentiment about the provisions of this law.

In this law, the Department of Justice and not the court who investigates and castigates bad elements; collection of traffic data without warrant or court order is another flaw of this law. The other problem that this law presents is the Take down clause which is not well defined as there is a take down of computer data alone and taking down of a blog is another thing. The Department of Justice must secure a court order before the take down takes effect unless there is a clear and present danger that there could be no more waiting another second. The legal field employs the terminology “clear and present danger” as a standard to allow for the constitutional right of freedom of speech and expression be curbed. Tsk! Tsk!

This law that avow to protect us Filipinos against those who do us injustice though the internet is also threatening to march away our constitutional rights of freedom of speech and of expression. Tsk! Tsk!

On the Libel clause, it imposes a higher penalty which amended the Revised Penal Code because of the harmful nature of the internet if on the hands of a debauched internet user. One statement that is considered libelous and is posted, it becomes obtainable forthwith to everyone without obstruction and charge. A complainant who is libeled need be advanced as the new agency will not be capable of monitoring all the tweets, blogs or shout-outs in all networking sites. The good thing about this law, as they claim, is that when the person who commits cybercrime is outside the Philippines, he can still be held answerable since the person libeled may still file a case against its oppressor – and can still be arrested so long as there is a warrant against that person. As skeptical as I am, I wonder if this will be implemented as smoothly as it portrays to be easy.

Why it is a summon to all internet users to overrun too much use of the net in order to project selfish desires. Amen to that!

Here comes the SBN 3327.

One of the lady senators filed a bill crafting a Magna Carta for Philippine Internet Freedom that would take a crack supplanting the recently enacted but very controversial RA10175. It was argued that RA 10175 was unconstitutional because of its over breadth and vagueness to the effect of making some internet undertaking punishable. The bill filed seems to be more extensive providing not just disallowed acts and stern chastisement but more importantly, it assures the rights and protection of our netizens. This bill promises castigating internet libel and hate speech while it engenders freedom of speech and expression on the internet. On this proposal, the lady senator vouches for citizen’s rights against illegal search and seizure through letting the warrantless real-time collection of traffic data. It also warrants due process by catering meticulous guidelines for any data collection including the securing of warrants, obligating notification and limiting seizure to data while excluding the physical property. This bill likewise commands government agencies to procure security for the data they collect from netizens to ensure their rights to privacy. Also, there is no provision for ”take down clause” (which has raised a lot of questions in RA10175), instead, it provides for court proceedings in cases where websites or networks are to be taken down. There is also a provision wherein it prohibits censorship of content without first securing a court order. Said bill bars double jeopardy. On the Cybercrime law, it does not provide blockade for double jeopardy through prosecution of offenses committed against its provisions as well as those against the Revised Penal Code, Special Laws, considering the offenses are from a single act.

This bill grooms the propounded Department of Information and Communications Technology, law enforcement agencies, as well as the military with provisions for taking care of cybercrimes. It ensures that the country has suitable defenses against cyber-attacks by terrorists, violent non-state actors and rogue or enemy nations. The Philippine National Police and the National Bureau of Investigation are likewise directed to antagonize cyber-terrorism. There is a spadework for exploiting ICT for national development by assuring that government agencies hold fast with realities and advances in information technology like the copyright and consumer welfare laws.

SBN 3327 not only aspires to pitch into the protection of but also the institution of the rights of the internet users in our country. It is worthwhile noting that this bill claims to be escorted by the proficient, qualified knowledge in the IT and legal expertise. This bill is the first to be created through “crowdsourcing.” It says that in its drafting, a group of IT Specialist, software designers, bloggers, academics, engineers, human rights advocates, and lawyers were involved. They also claim that such draft was formulated through discussions in an open facebook group, email, google hangout teleconferences and twitter. It somehow pacifies the fear growing inside of me that my utilization of the internet will not land me into detention or be inflicted of hefty fines for simply letting out my sentiments unto the government, some public officials or some circumstances that are likely to happen to vocal people like me. Its quest is to implant a sensible, fact -oriented and stable environment that defends Philippine nationals against cybercrimes and cyber-attacks. It pursues to benefit netizens as they meet threats and challenges of piloting cyberspace.

For journalists, this could be favorable because it does away with imprisonment for libel through the internet as there only arise civil liability. Moreover, malice is not a presumption in internet libel in comparison with that punishable under the Revised Penal Code wherein such is presumed with every defamatory imputation if no good intention and justifiable motive is shown. As may have been raised by critical thinkers – a reporter being sued under both the Revised Penal Code and the Magna Carta if his article in print is also posted on the net and end up with two separate crimes. But it seems that SBN 3327 has foreseen this possibility of indicting a blogger with two charges in a single act. One of the lawyers behind Magna Carta said, that no journalist who has disputatious article published online and on a print is at risk of separate indictment.

On account of libel, it treats such only as a civil liability rather than a criminal act, as can be gleaned from my view, this is a step forward in the instigation to de-criminalize libel. However, it is not congruent with the libel punishable under the Revised Penal Code. This will become subject to questions later on as what should have been done first is to harmonize the two laws.

This bill, as the proponent sees fit, is anchored on rights, governance, development, and security upon which, qualms will arise, for sure!

Despite all the fears any netizen is facing with the enactment of the RA 10175 and the possible enactment of the Magna Carta, Philippine cyberspace is still unregulated and the need for one is calling louder. Yes, there are more priorities that our lawmakers should attend to, but this may become one of them if not given publicity right now.

In a country with more than thirty million internet users, how can cybercrime law be enforced in the Philippines? The enacted law and the proposed law are good push to resist cybercrimes, but, there is an exigency to take up any ambiguity or omission in a text through which its intent may be evaded. There are internet crimes which are vaguely covered or not at all, and this dilemma, for all we know, will not only create bigger problems that an amendment or repeal or imposition of another law may be needed, AGAIN!

Bloggers are beholden to what they say, comment, post, publish or whatever a social media user does. Yes, these SMU are not journalists as they are not trained as one, but when they nab the poncho of publicizing, they should be regarded and be burdened of the duty and responsibility of a journalist. They cannot excuse themselves simply because they are not licensed journalist thus leaving them unaccountable for the mess they created. Bloggers who are not in favor of being regulated by any outside law aside from their clout to their own morality, ascertain that even absent of any defining rules, a devious blogger may still be castigated by the community of bloggers through their comments online. But of course, there is no certainty as to the reprimand that an errant blogger is to be subject to if without any clear law that all social media users should abide. I see no reason to be uncomfortable about bloggers being regulated.

As what the government claims, the information and communications technology and the internet are drivers of economic growth, thus the country is all the more in need of a really adequate, competent and efficacious cyberlaw that will put to reality such a claim. Safeguarding our nation against cyber-attacks has become one of the nation’s topmost priority. To effectuate this objective, trained operations team must ardently protect against internal and external threats. And for those consummated attacks on our cyberspace, our defense must be adequate of kicking off follow-on attacks on internal networkers. Knowledge of actual attacks that have conciliated systems engenders the cardinal armature on which to erect sufficient defenses because our government agencies tasked to supervise such condition are not unlimited in budget, and the only sensible way to conform with these requisites is to entrench a baseline of information security device and controls that may be monitored without ceasing through automated mechanisms. It shall be understood that cyber attacks milk on the vulnerable areas in a project or program to procure entrée to other enterprise facility. The government agencies will surely continue to explore interconnectivity across agencies to improve its support upon its netizens and own operations. Defenses should center on addressing the most prevalent damaging attacks transpiring nowadays as well as those that likely to occur in the future. The government agencies assigned with this job must warrant congruous controls to effectively negative any attack. In short, a multiplicity of explicit technical activities must be assumed to bring forth a more consistent defense.

Another inconsistency I have encountered is on the government’s assumption of internet security when and well in fact, it cannot even secure its websites. Cyberspace has become the soapbox of the best and the unpleasant whatever that any person can think of. It should have a been a place at an opportune time to exchange ideas and artistic expressions if not for the cyberbullies that make it such an unhealthy environment to even bother visit.

I must admit that although I support a competent, efficient and unbiased cybercrime law, I am scared of what is laid before us after any of the two (RA 10175 and the Magna Carta) is in implementation. Until they are tested, I will not breathe in relief yet, if, after I have published and told the truth online, I won’t be damned. Most of the social media users are the young people and I bet they are not cognizant about the cybercrime laws so much so about its implications. These juveniles could be charged of libel even before they would even know its meaning.

As I have earlier stated, I do not promote the law and the bill. Until it is on testing ground, and has not in any way infringed my bill of rights granted by the constitution, then I will take side and succumb to whichever has preserved my freedom of speech and expression through the internet.

SY 2012-2013, Second Semester


Tech: RA 10173 and RA 10175

Introduction:

“Once you’ve lost your privacy, you realize you’ve lost an extremely valuable thing”

– Billy Graham

“So long as the laws remain such as they are today, employ some discretion: loud opinion forces us to do so; but in privacy and silence let us compensate ourselves for the cruel chastity we are obliged to display in public.”

– Marquis de Sade

In today’s fast pacing world, data integrates into our lives without being noticed. Privacy, a fundamental though not absolute is human right which underpins human dignity and other key values such as freedom of association and freedom of speech. It has become one of the most important human rights issues of the modern age. We need a law to ensure that our rapidly growing and changing data is protected. The clamor for creating that specific law started in the recent economic boom of BPO business. it is a tool in promotion of E-commerce. Maybe the intention of the government is to improve the system but it just so happened that it went the other way around. They over looked the deprivation of rights as a result of passing RA 10173 and RA 10175 into a law. It made a negative impact especially with the imposed penalties for every offense.

Statement of the Problem:

This research includes an examination of the RA 10173 and RA 10175 and its significant implication to the rights of an individual under Philippine Laws; specifically, it will seek to answer the following questions:

1. What is RA 10173?

2. What is RA 10175?

3. What are the advantages of Data Privacy Act?

4. What are the rights violated in implementing RA 10173 and how will the government respond to address such deprivation?

5. What are the advantages of Cyber Crime Law?

6. What are the rights violated in implementing RA 10175 and how will the government respond to address such deprivation?

Presentation, Analysis and Interpretation of Data

Data, Analysis and interpretations will be presented to provide answers to the questions on this study.

Problem 1: What is RA 10173?

Data Privacy Act of 2012 is an act protecting individual information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes enable to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth. The State recognizes the vital role of information and communications technology in nation-building and its inherent obligation to ensure that personal information in information and communications systems in the government and in the private sector are secured and protected. It applies to the processing of all types of personal information and to any natural and juridical person involved in personal information processing including those personal information controllers and processors who, although not found or established in the Philippines, use equipment that are located in the Philippines, or those who maintain an office, branch or agency in the Philippines.

Problem 2: What is RA 10175?

Cyber crime prevention act of 2012 is an act defining cyber crime, providing for prevention, investigation, suppression and the imposition of penalties therefore and for other purposes. The National Bureau of Investigation (NBI) and the Philippine National Police (PNP) shall be responsible for efficient and effective law enforcement of the provisions of this Act. The NBI and PNP shall organize a cyber crime unit or center manned by special investigators to exclusively handle cases involving violations of this Act.

Problem 3: What are the advantages of Data Privacy Act?

The newly approved Data Privacy Act benefits Information Technology and Business Process Outsourcing industry by making it in line with international standards of privacy. It also protects publishers, editors or duly accredited reporters of any newspaper, magazine or periodical of general circulation protection from being compelled to reveal the source of any news report or information appearing in said publication which was related in any confidence to such publisher, editor, or reporter.

Another good thing about data privacy Act, Under the personal information must be fairly and lawfully processed, Processed for specified purposes, Adequate, relevant and not excessive, Accurate, and where necessary, kept up to date, not kept for longer than is necessary, processed in line with the rights of the individual and Kept secure. In that way, the new law in personal information and it will prevent fraud and personal information theft. It helps preserve people’s personal information. The new law states:

“The State recognizes the vital role of information and communications technology (ICT) in nation-building and its inherent obligation to ensure that personal information in information and communications systems in the government and in the private sector are secured and protected.”

Along with the new law is the creation of the National Privacy Commission, which will administer and implement the Act as well as ensure the country complies with international standards for data protection.BPO industry, will bring in projected revenues of US$25 billion by 2016. It will also increase job openings from about 1 million to 4 million positions in the next four years which was supported by Angara in that way, we can say that it will not only secure our personal information, it will also open job opportunities in the country. Who are we to refuse such opportunity?

Lawful access, confidentiality obligation and security are just few of the obligations imposed by Guideline 8 and to be followed by BPO as well. The Lawful access rule says, “access to personal data in an information or communications system shall only be authorized in favor of the individual or entity having a legal right to the possession or the use of the file and solely for the authorized purpose. It shall not be made available to any person or party without the consent of the individual or entity in lawful possession, or in the absence of court order.” This is a very useful customer protection rule that indirectly prohibits selling personal data to no-authorized parties and when outside the data collection purpose.

Section 7 Guideline 8 establishes the confidentiality principle. Under this principle, any person who gets access to personal data in an information or communication system, pursuant to powers conferred under E-commerce law, ‘shall not convey or share the same with any other person.’ This confidentiality rule will have an important impact in the Philippines’ Medical Transcription BPO market. Fortunately it happens to be that Philippines is a major player in offshore Medical Transcription services and confidentiality is paramount in the medical field.

Guideline 8, section 8, addresses the issue of Security of Data. In Philippines, data controllers must implement organizational and technical means to assure protection of personal data from destruction, alteration or disclosure. If data controllers use the services of data processors, the first one must assure data processors follow the organizational and technical protection means established by the company and data controllers must provide data processors with specific instructions on processing personal data. This security rule also imposes data processors and those data controller’s employees a confidentiality duty even after the employment is terminated. (INTERNET LAW – Data Protection Law in Philippines’ Business Process Outsourcing Industry)

The general rule is that access to personal data in information and communications system shall only be authorized in favor of the individual or entity having a legal right to the possession or the use of the file and solely for the authorized purposes. Personal data shall not be made available to any person or party without the consent of the individual or entity in lawful possession, or in the absence of court order. Personal data is defined as any information relating to an identified or identifiable natural person. The intention of the Law speaks of an extension of sec. 3 of Art III of the constitution that states the privacy of communication and correspondence shall be violable except upon lawful; order of the court or when public safety and order requires prescribed by law. Encryption protects electronic messages from unauthorized access and use which is particularly important for secure Internet and email use. Increased use of encryption technologies has prompted the Government to enact controversial legislation allowing access to electronic data protected by encryption

Problem 4: What are the rights violated in implementing RA 10173 and how will the government

ART III Sec 7.Bill of Rights of the Constitution

The right of the people to information on matters of public concern shall be recognized. Access to official records and documents and papers pertaining to official acts, transactions or decisions as well as to government research data used as a basis for policy development, shall be afforded the citizen, subject to such limitations provided by law.

ART III Sec 19. (1) Bill of Rights of the Constitution

Excessive fines shall not be imposed, nor cruel, degrading or inhuman punishment inflicted. This is in conflict with RA 10173 sections:

SEC. 25. Unauthorized Processing of Personal Information and Sensitive Personal Information. – (a) The unauthorized processing of personal information shall be penalized by imprisonment ranging from one (1) year to three (3) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Two million pesos (Php2,000,000.00) shall be imposed on persons who process personal information without the consent of the data subject, or without being authorized under this Act or any existing law.

(b) The unauthorized processing of personal sensitive information shall be penalized by imprisonment ranging from three (3) years to six (6) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Four million pesos (Php4,000,000.00) shall be imposed on persons who process personal information without the consent of the data subject, or without being authorized under this Act or any existing law.

SEC. 26. Accessing Personal Information and Sensitive Personal Information Due to Negligence. – (a) Accessing personal information due to negligence shall be penalized by imprisonment ranging from one (1) year to three (3) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Two million pesos (Php2,000,000.00) shall be imposed on persons who, due to negligence, provided access to personal information without being authorized under this Act or any existing law.

(b) Accessing sensitive personal information due to negligence shall be penalized by imprisonment ranging from three (3) years to six (6) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Four million pesos (Php4,000,000.00) shall be imposed on persons who, due to negligence, provided access to personal information without being authorized under this Act or any existing law.

SEC. 27. Improper Disposal of Personal Information and Sensitive Personal Information. – (a) The improper disposal of personal information shall be penalized by imprisonment ranging from six (6) months to two (2) years and a fine of not less than One hundred thousand pesos (Php100,000.00) but not more than Five hundred thousand pesos (Php500,000.00) shall be imposed on persons who knowingly or negligently dispose, discard or abandon the personal information of an individual in an area accessible to the public or has otherwise placed the personal information of an individual in its container for trash collection.

b) The improper disposal of sensitive personal information shall be penalized by imprisonment ranging from one (1) year to three (3) years and a fine of not less than One hundred thousand pesos (Php100,000.00) but not more than One million pesos (Php1,000,000.00) shall be imposed on persons who knowingly or negligently dispose, discard or abandon the personal information of an individual in an area accessible to the public or has otherwise placed the personal information of an individual in its container for trash collection.

SEC. 28. Processing of Personal Information and Sensitive Personal Information for Unauthorized Purposes. – The processing of personal information for unauthorized purposes shall be penalized by imprisonment ranging from one (1) year and six (6) months to five (5) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00) shall be imposed on persons processing personal information for purposes not authorized by the data subject, or otherwise authorized under this Act or under existing laws.

The processing of sensitive personal information for unauthorized purposes shall be penalized by imprisonment ranging from two (2) years to seven (7) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Two million pesos (Php2,000,000.00) shall be imposed on persons processing sensitive personal information for purposes not authorized by the data subject, or otherwise authorized under this Act or under existing laws.

SEC. 29. Unauthorized Access or Intentional Breach. – The penalty of imprisonment ranging from one (1) year to three (3) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Two million pesos (Php2,000,000.00) shall be imposed on persons who knowingly and unlawfully, or violating data confidentiality and security data systems, breaks in any way into any system where personal and sensitive personal information is stored.

SEC. 30. Concealment of Security Breaches Involving Sensitive Personal Information. – The penalty of imprisonment of one (1) year and six (6) months to five (5) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00) shall be imposed on persons who, after having knowledge of a security breach and of the obligation to notify the Commission pursuant to Section 20(f), intentionally or by omission conceals the fact of such security breach.

SEC. 31. Malicious Disclosure. – Any personal information controller or personal information processor or any of its officials, employees or agents, who, with malice or in bad faith, discloses unwarranted or false information relative to any personal information or personal sensitive information obtained by him or her, shall be subject to imprisonment ranging from one (1) year and six (6) months to five (5) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00).

SEC. 32. Unauthorized Disclosure. – (a) Any personal information controller or personal information processor or any of its officials, employees or agents, who discloses to a third party personal information not covered by the immediately preceding section without the consent of the data subject, shall he subject to imprisonment ranging from one (1) year to three (3) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than One million pesos (Php1,000,000.00).

(b) Any personal information controller or personal information processor or any of its officials, employees or agents, who discloses to a third party sensitive personal information not covered by the immediately preceding section without the consent of the data subject, shall be subject to imprisonment ranging from three (3) years to five (5) years and a fine of not less than Five hundred thousand pesos (Php500,000.00) but not more than Two million pesos (Php2,000,000.00).

SEC. 33. Combination or Series of Acts. – Any combination or series of acts as defined in Sections 25 to 32 shall make the person subject to imprisonment ranging from three (3) years to six (6) years and a fine of not less than One million pesos (Php1,000,000.00) but not more than Five million pesos (Php5,000,000.00).

While it is true that we adhere in the Latin principle DURA LEX SED LEX or the law may be harsh but still it is the law, in my view the penalties that have been imposed is too much. It violates the right of the people not to be imposed with excessive fines. As we can observed, the fines range between php500,000 to 4,000,000. Though the intention of the law is to protect sensitive information, the penalties are too high that an ordinary man may not afford to comply.

Sec 3(a) Commission shall refer to the National Privacy Commission created by virtue of this Act.

The administration and implementation of the provisions of this act aim to create National privacy Commission however, it would also create overlapping of power

Problem 5: What are the advantages of Cyber Crime Law?

While it is true that there are so many protests in the passage of cyber crime Law which infact lead to suspension due to certain rights violation, advantages are as follows:

It punishes computer related forgery, fraud and identity theft, crimes in the internet, offenses against confidentiality, integrity and availability of computer data system, illegal access, illegal interception, data interference, system interference and misuse of devices, content related offenses on cybersex and child pornography, cyber squatting (the user of other person domain name to profit, misled, destroy the reputation and deprive others from registering) and offenses on libel committed through a computer system.

Cyber sex, a modern style of prostitution will now be considered as a crime and punishable. It will prevent citizens specially youth from poor sector from engaging and performing indecent acts using modern devices. Victims will be saved and Cyber sex operators will be imprisoned depending on the weight of the felony.
Cyber bullying involves libelous acts, cyber intimidation and moral torture by the use of internet through social networks and sites will be punishable and considered as crime. As I watched GMA news propaganda, I was astonished on how they managed to inform us on how to use internet properly. “Think before you Click” is an example that we must analyze every statement that we are about to post including the pictures and videos that may or may not be acceptable in the views of others specially it may not only be viewed by few but rather be viewed by everyone. Since the internet is universal, it is also a good thing to create guidelines in using internet as to the rights involved.

Since we are no longer living in Stone Age, almost everyone has access over the internet and most of us use online in our daily transactions. The Law protects online businesses from online fraud and any similar acts. Trade and industry will not only be easy but also set a safe option in putting up a business.
We cannot deny the fact that in spite of technological advances, our country remains unsatisfactory as to technical knowledge. There are some instances wherein Government websites were being hacked which resulted to impairment of activities in the government. The law punishes hackers, computer related forgery and online theft.
The increasing sophistication of information technology with its capacity to collect, analyze and disseminate information on individuals has introduced a sense of urgency to the demand for legislation. Computers linked together by high speed networks with advanced processing systems can create comprehensive dossiers on any person without the need for a single central computer system. New technologies developed by the defense industry are spreading into law enforcement, civilian agencies, and private companies.

Concern over privacy violations is now greater than at any time in recent history. Uniformly, populations throughout the world express fears about encroachment on privacy, prompting an unprecedented number of nations to pass laws which specifically protect the privacy of their citizens. Human rights groups are concerned that much of this technology is being exported to developing countries which lack adequate protections. Currently, there are few barriers to the trade in surveillance technologies. It is now common wisdom that the power, capacity and speed of information technology are accelerating rapidly. The extent of privacy invasion or certainly the potential to invade privacy increases rapidly.

Problem 6: What are the rights violated in implementing RA 10175 and how will the government respond to address such deprivation?

Though for some RA 10175 relates to e-martial law, crap, junk, cyber-martial law and dictatorial law, we can’t hide the fact that this law also has good effect on us, either for facebook or twitter users, bloggers, journalists, which in the first place have been badly affected by this law. But the thing is that only part of the law is not good, it is no other than the “sotto law” or what I just describe in the first phrases of this paragraph, the internet libel which directly put to grave our freedom of speech. Some congressmen and senators said that they overlooked the said law. It mistakenly signed and approved the law without taking into consideration the possible implication that would result to deprivation of rights of an individual. The violated right: Sec 4. No law shall be passed abridging the freedom of speech, of expression, or the press or right of the people to assemble and petition the redress of grievances.

It is in conflict with RA 10175 because comments and posts which may not be acceptable to others may lead us to jail. The law aims to make us responsible internet users. The only bad thing in the law is that, portion of it is inconsonant with Bill of rights in the constitution. If we cannot live with that kind of law, might as well proposed for revision.

Conclusion:

Though many of us were against with two laws, we have no choice but leave the benefit of the doubt that it also benefits us. The laws will maintain guidelines to be followed in responsible using of internet and sharing of sensitive information, peace for all internet users, minimize the cases of online accounts from being hacked, and uphold the copyright or ownership of software developers or any online and computer content on their time and blood invested crafts. Also on top of which is to put a stop the cybersex and cyber prostitution. It’s not that am very much against with the two laws, though despite of disadvantages it has also advantages, but we should let our government know that they have the power but we certainly have the rights. They should’ve thought over all possible consequences of anything before signing it into act. A single mistake will destroy not only their reputation for doing reckless authority misuse but also lead Filipino to possible deprivation of rights. Quoted from spokesmen Alex Deita, “Prior to the enactment of the new law, how many cybercriminals are enjoying their freedom to escape liability and punishment because there is no law covering their felonious acts?” However, as to my view, how many rights were deprive in passing the two laws? Thus, our law makers must be cautious in enactment of laws and check possible loop holes and assure whether the law will really address our present dilemma on a particular situation.


Sources:

http://gb-sb.blogspot.com/2012/08/what-is-ra-10173-or-data-privacy-act-of.html

http://www.yourrights.org.uk/yourrights/privacy/data-protection/index.shtml

http://home.earthlink.net/~davidlperry/edata.htm Personal Privacy and Electronic Data Transfers

http://altechzone.blogspot.com/2012/10/advantages-of-ra-10175-philippines-anti.html

http://news.ph.msn.com/regional/philippine-court-blocks-cybercrime-law


TECH&LAW: SB 3327 and RA 10175

Introduction:

“An unconstitutional act is not a law; it confers no rights; it imposes no duties; it affords no protection; it creates no office; it is in legal contemplation, as inoperative as though it had never been passed.”

-Norton v. Shelby County, 118 US 425 (1885)

We can’t deny the fact that we have a weak cyber law deterring cyber crimes. The main purpose of creating it is to punish cyber violators but it didn’t work that way. President Benigno Aquino III signed into law Republic Act 10175, the Anti-Cybercrime Law. The said law sought to give government more teeth against computer-related crimes like hacking, child pornography, and even online libel. But many groups protested what they called its high potential to restrain free speech. Following protests that saw hacker groups briefly attacking government websites, the Supreme Court issued a 120-day TRO against the law. It became the reason for the birth of SB 3327. A group of concerned citizens primarily composed of software designers, IT specialists, academics, bloggers, engineers, lawyers, human rights advocates—approached her office with a draft of the Magna Carta Philippine Internet Freedom. The group formulated the MCPIF through discussions in an open Facebook group, email, Google Hangout teleconferences, and social media channels like Twitter. In cyber world, freedom is not absolute. As cyber user, we must be cautious with our actions and expressions. Though a law was passed to safeguarded cyber activities, it must be necessary that the law must not contrary with our laws. It must not be a tool in depriving someone’s right. Constitution is the supreme law of the land. Everyone must adhere.

Statement of the problem:

1. What is Senate Bill No. 3327?

2. What is RA 10175?

3. What is the purpose of creating S.B 3327?

4. What is the difference between RA 10175 and SB 3327?

Presentation and Conclusion:

What is Senate Bill No. 3327?

It known as the Magna Carta for Philippine Internet Freedom (MCPIF), aims to protect the rights and freedoms of Filipino citizens, while acting on cybercrimes.

What is RA 10175?

President Benigno Aquino III signed into law Republic Act 10175, the Anti-Cybercrime Law. The said law sought to give government more teeth against computer-related crimes like hacking, child pornography, and even online libel. Cyber crime prevention act of 2012 is an act defining cyber crime, providing for prevention, investigation, suppression and the imposition of penalties therefore and for other purposes. The National Bureau of Investigation (NBI) and the Philippine National Police (PNP) shall be responsible for efficient and effective law enforcement of the provisions of this Act. The NBI and PNP shall organize a cyber crime unit or center manned by special investigators to exclusively handle cases involving violations of this Act.

What is the purpose of creating S.B 3327?

Our country needs a more effective cyberlaw because information and communications technology (ICT) and the Internet are drivers of economic growth. It will protect the rights and freedoms of Filipinos in cyberspace, while defining and penalizing cybercrimes.

State policy:

The state reaffirms its recognition of the vital role of communication and information in nation-building, as stated in Article II, sec 24 of the constitution.

The State recognizes, ensures and guarantees:

The fundamental right of every Filipino to connect to a free and open Internet access;

The transparent and participatory process of making Internet policy; The right to meritocracy where age, sex, race, position and qualification are deemed irrelevant, and skill is the ultimate determinant of acceptance; Art, beauty, and culture can be created on devices, and on the Internet; An education that promotes computers, devices, the Internet and technology to pursue life, liberty and happiness, and The fundamental right of each person to:

Free expression on the Internet; Universal access to reasonably fast and affordable networks;

The freedom to connect, to communicate, to write, to read, to watch, to speak, to listen, to learn, to create; The freedom to create and innovate without permission, and ensures the right of every Filipino to reasonable access to such creation and innovation, and the commitment to guarantee that such creators and innovators and inventors are not punished for their users’ action and,

To protect, preserve and defend the Filipino’s right to privacy, and to do the same for their ability to control how their data, and devices are used.

The state affirms that all the rights guaranteed by Article III shall apply to the Filipino people in their use, development, innovation and invention of information and communications technology and the internet.

What is the difference between RA 10175 and SB 3327?

SBN 3327 differs from R.A. 10175 in that it guarantees the right against illegal searches and seizures. R.A. 10175 violates the right to privacy and the Constitutional guarantee against illegal search and seizure through allowing the warrantless real-time collection of traffic data. MCPIF ensures due process by providing strict guidelines for any collection of any data, including the securing of warrants, obligating notification, and limiting seizure to data and excluding physical property. It mandates government agencies to provide security for the data they collect from citizens to ensure their right to privacy. “The dangerous ‘takedown’ clause of R.A. 10175, where the government may have a website or network blocked or restricted without due process of law, is absent in the MCPIF. The MCPIF also prohibits double jeopardy. R.A. 10175 allows double jeopardy through prosecution of offenses committed against its provisions and prosecution of offenses committed against the Revised Penal Code and special laws, even though the offenses are from a single act.

Conclusion:

Thus, while it is important to crack down on criminal activities on the internet, protecting constitutional rights like free expression, privacy, and due process should hold a higher place in crafting laws. If passed into law, SBN 3327 will be the first law to be created through “crowdsourcing,” an online process of getting work done by tapping people on the Internet who volunteer their talent and skills. It provides for court proceedings in cases where websites or networks are to be taken down, and prohibits censorship of content without a court order. It seeks to clarify the mandate and organization of the proposed Department of Information and Communications Technology (DICT), the creation of which is currently pending before Congress. Every Filipino deserves to connect to a free and open Internet access;

The transparent and participatory process of making Internet policy; The right to meritocracy where age, sex, race, position and qualification are deemed irrelevant, and skill is the ultimate determinant of acceptance; Art, beauty, and culture can be created on devices, and on the Internet; An education that promotes computers, devices, the Internet and technology to pursue life, liberty and happiness (state policy). At the end of the day, lawmakers must draft a bill which will not take away the rights that we suppose to enjoy. And as to the Filipino cyber users, we must be cautious with our speech, actions and expressions in or out of cyber world. If that would be possible, passing such laws won’t be necessary. I will not let anyone even a vague law to infringe my rights.


References:

http://www.gmanetwork.com/news/story/284606/scitech/technology/malacanang-open-to-proposed-anti-cybercrime-bill-v-2-0

http://www.journal.com.ph/index.php/news/top-stories/40353-miriam-pushes-better-cybercrime-law