Archive

Tag Archives: technology

I. INTRODUCTION

“All persons shall have the right to a speedy disposition of their cases before all judicial, quasi-judicial, or administrative bodies.” [1] Unfortunately, the aforesaid Constitutional provision cannot always be invoked due to a lot of factors that impede the process of administering proceedings such as: fortuitous events, unduly delay of the proceedings caused by counsels, and inadequate facilities to maintain documentary records.

The issue of documentation may seem to be easy to solve and does not entail that much problem as to the conduct of every judicial or quasi-judicial proceeding. However, records in a proceeding are not meant to last for a long time due to the materials being used in documentation and the manner employed in maintaining such documents, this is where the problem comes in and is more likely prevalent in a judicial proceeding.

Philippine Courts are inefficient in terms of providing prompt action regarding the concerns of its litigants. The reality is that, court records are printed in an ordinary piece of paper which may be printed in a bond paper or in an onion skin type of paper. Imagine what would the appearance of the document be, ten or twenty years after? Taints will appear all over the paper, and what is even worst, is when the words printed on the document fades and subsequently will become unreadable. What if the whole case records of were burnt by fire, soaked in water or eaten up by termites? How could this type of documentation be relied upon? What can be the recourse of the litigants in such cases?

Administering judicial processes is crucial for whatever may be the outcome of the proceeding, a right may be vested or a person may be deprived of his right. The reality of court processes entails a lot of procedure starting from the filing of the case until the rendering of the final judgment wherein a “proper documentation” is of the essence.

This paper will provide a clear picture of the interplay of different government agencies in connection to the administration of criminal and civil proceedings, how improper documentation impede the disposition of cases, and how such problems could be properly addressed by ELECTRONIC DOCUMENT REPOSITORIES.

II. A BIRD’S EYEVIEW OF COURT PROCEDURES

A. CRIMINAL CASES

A criminal action is one by which the State prosecutes a person for an act or omission punishable by law. [2]

A criminal action is instituted by filing a complaint before an appropriate office. How is this done? In some cases, complaints are prepared by counsels; there are cases wherein aggrieved parties seek assistance of the Station Investigation Detective Management Bureau (SIDMB) and Women and Child Protection’s Desk of the Philippine National Police to prepare their complaints.

A complaint is usually printed in an ordinary piece of paper, after which, the same shall be filed before the Office of the Prosecutor, or before the Municipal Trial Court depending on the nature of the offense.

When Information for a complaint by an aggrieved party has already been filed in court, the court, where the case was raffled, shall maintain the records of the case and the said record shall be relied upon by the judge, the counsels, and the parties to a case as the conduct of court proceeding moves on.

There are other government entities that are connected in the administration of a criminal action as well as the custody and monitoring of the accused once an information has already been filed, these government entities consist of the following:

a. Office of the Prosecutor- when a criminal case is filed in court, the prosecutor plays a vital role in prosecuting a criminal action. All criminal actions commenced by a complaint or information shall be prosecuted under the direction and control of the prosecutor. [3]

b. Public Attorney’s Office (PAO)-is an agency attached to the Department of Justice (DOJ) that provides free legal assistance to indigent litigants. It is mandated to provide indigent sector the access to counsel at the time of need, and implement the constitutional guarantee of free access to courts, due process and able protection of the laws [4]

c. Philippine National Police (PNP)-it provides law enforcement services through its regional, provincial, municipal, district and local police units all over the islands. enforce the law, to prevent and control crimes, to maintain peace and order, and to ensure public safety and internal security with the active support of the community. [5] It is the agency tasked in serving search warrants and warrants of arrest.

d. National Bureau of Investigation (NBI)-an agency of the Philippine government under the Department of Justice responsible for handling or solving sensational cases that is in the interest of the nation. [6]

e. Bureau of Jail Management and Penology (BJMP)-was created to address growing concern of jail management and penology problem. Its clients are detainees accused before a court who are temporarily confined in such jails while undergoing investigation, waiting final judgment and those who are serving sentence promulgated by the court 3 years and below. [7]

f. Bureau of Corrections (BUCOR)-is an agency under the Department of Justice that is responsible for the custody and rehabilitation of offenders sentenced to more than 3 years in prison. [8]

g. Parole and Probation Administration (PPA)- (Pangasiwaan sa Parol at Probasyon), abbreviated as PPA, is an agency of the Philippine government under the Department of Justice responsible for providing a less costly alternative to imprisonment of offenders who are likely to respond to individualized community based treatment programs. [9] Its function includes the exercise of general supervision over all parolees, and probationers. [10]

h. Board of Pardons and Parole, created by virtue of Act No. 4103 (1933) known as the Indeterminate Sentence Law, is an agency under the Department of Justice (DOJ) tasked to uplift and redeem valuable human resources to economic usefulness and to prevent unnecessary and excessive deprivation of personal liberty by way of parole or through executive clemency. [11]

A.1 Posting of Bail

There are two (2) ways wherein Information may be filed against an accused in Court, one of which is by conducting a preliminary investigation. It is an inquiry or proceeding to determine whether there is sufficient ground to engender a well-founded belief that a crime has been committed and the respondent is probably guilty thereof, and should be held for trial. [12] If the investigating prosecutor finds cause to hold respondent for trial, he shall prepare resolution and information. [13]

The Regional Trial Court, within ten (10) days from the filing of the complaint or information, the judge shall personally evaluate the resolution of the prosecutor and its supporting evidence. He may immediately dismiss the case if the evidence on record clearly fails to establish probable cause. If he finds probable cause he shall issue a warrant of arrest, [14] the same procedure with the Municipal Trial Court.

Another way wherein an Information may be filed in court is when the accused was arrested without warrant of arrest when a person. A peace officer or a private person may, without a warrant, arrest a person:

(a) When in his presence, the person to be arrested has committed, is actually committing or is attempting to commit an offense;

(b) When an offense has just been committed, he has probable cause to believe based on personal knowledge of facts and circumstances that a person to be arrested has committed it; and

(c) When the person to be arrested is a prisoner who has escaped from a penal establishment or place where he is serving final judgment or is temporarily confined while his case is pending, or has escaped while being transferred from one confinement to another. [15]

When a person is lawfully arrested without a warrant involving an offense which requires preliminary investigation, the complaint or information may be filed by the prosecutor without the need of such investigation provided that an inquest has been conducted. [16]

When an accused was arrested whether by virtue of a warrant of arrest or when lawfully arrested without a warrant, the person arrested shall be placed under detention. Initially, after being arrested, the accused is confined in a so called DETENTION CELL that is maintained by the Philippine National Police. When the court has issued a COMMITMENT ORDER, accused is then transferred to a penal institution which caters person arrested with pending cases, in most areas in the Philippines, particularly in Metro-Manila, the Bureau of Jail Management and Penology (BJMP).

The problem in the inefficiency of court records comes in when a person arrested intends to post bail (Is the security given for the release of a person in custody of law, furnished by him or a bondsman, to guarantee his appearance before any court as required under the conditions hereinafter specified. [17] ). Posting a bail is not as easy as furnishing the bond required for the temporary liberty of the accused. Before an accused may be released after posting bail, the accused must first secure CLEARANCE from: a) Office of the Clerk of Court of the Metropolitan and Regional Trial Court of the place where the accused was detained; and b) from the Warrant Section of the Philippine National Police. If the records of the aforesaid offices reveal that there are other pending cases against the accused who posted bail, he will not be released from jail until the accused posted bail for the other pending cases, it has been determined that the detained should not be held under custody or it will be proved that the detained accused is not the one being referred to by the records. After the clearance has been sought, the said clearance shall be returned to the penal institution where the accused was detained which shall serve as his pass on his way out of the prison cell.

Before the Office of the Clerk of Court of the Metropolitan and Regional Trial Court, cases filed before their office were maintained in a CRIMINAL DOCKET. It is usually a logbook which contains the title of the cases, case number, and the offense charged. In the Warrant Section of the Philippine National Police, the said office usually maintain logbooks wherein the persons subject for arrest ands the court issuing the warrant were written.

What if the records will reveal that a pending case with a pending warrant of arrest with the same name as the accused was found out? What if the alleged pending case was filed twenty or thirty years ago? If such occurrence will happen, the bondsman or the relatives of the accused has to verify the record before the court where the discovered pending case was filed. Unfortunately, when the case was filed way back five (5) years or more, the records of the case is usually piled up in a BODEGA. The records will only be revisited in the event that someone will verify the status of the case. Chances are, due to old age, some of the court documents are no longer readable.

What will be the recourse of the accused? Bondsman or the relatives of the detained, as the case may be, has to wait for several days before the record will be verified. Although every court maintains a CRIMINAL DOCKET, there are instances however that the criminal docket cannot be relied upon and there will be a need to dig the court record; and for this reason, an accused, who had already furnished his bail, will be deprived of his right to liberty until such time that it will be proven that there is no reason for the accused to be detained. Imagine the tedious task before an accused be released from jail just because of incompetent and inaccurate records? There is a need to go from one office to another just to seek clearance and to verify case records in the event that a pending case will be discovered; the accused has to wait for several days before he can be released just because of lack of proper documentation. The holding of the accused is fine if he is really being held for other offense; however, an accused shall be deprived of his liberty after posting bail if he is not the one being referred to by the records of the police authorities and of the court.

On another point of view, a person detained only has to seek clearance within the city or municipality where he is confined. The next question will be what if a detainee was charged for a particular offense in other city, municipality or province? What if the case filed is non-bailable and there is already an alias warrant issued for the arrest of the accused? Once a clearance is secured, the person will be released from jail not knowing that other courts in other city, municipality or province has issued a warrant of his arrest. In this case, an accused has the opportunity to escape for the other case or cases filed against him and the poor aggrieved party has no alternative but to wait until such time that the accused be apprehended.

A.2. Trial

a. Availability of Court Records for Counsel

One of the rights of the accused as provided in the Constitution states that:

“In all criminal prosecutions, the accused shall be presumed innocent until the contrary is proved, and shall enjoy the right to be informed of the nature and cause of the accusation against him, to have a speedy, impartial, and public trial, to meet the witnesses face to face, and to have compulsory process to secure the attendance of witnesses and the production of evidence in his behalf. However, after arraignment, trial may proceed notwithstanding the absence of the accused provided that he has been duly notified and his failure to appeal is unjustifiable-emphasis supplied. [18]

In relation thereof, the Rules of Court provides that:

“In all criminal prosecutions, the accused shall be entitled to the following rights:

(b) To be present and defend in person and by counsel at every stage of the proceedings, from arraignment to promulgation of the judgment. The accused, may however, waive his presence at the trial pursuant to the stipulations set forth in his bail, unless his presence at the trial, pursuant to the stipulations set forth in his bail, unless his presence is specifically ordered by the court for purposes of identification, The absence of the accused without justifiable cause at the trial of which he had notice shall be considered a waiver of his tight to be present thereat. When an accused under custody escapes, he shall be deemed to have waived his right to be present on all subsequent trial dates until custody over him regained. Upon motion, the accused may be allowed to defend himself in person when it sufficiently appears to the court that he can properly protect his rights without the assistance of counsel-emphasis supplied. [19]

At the onset of the trial, during the arraignment, there is a need for an accused to be assisted by a counsel until the termination of the trial, during the promulgation of judgment. In cases where an accused has no counsel, a counsel de officio shall be appointed by court to assist him, in most cases, a Public Attorney shall be appointed by court to assist an accused.

The State, as well as the private complainant shall be represented by a prosecutor in the prosecution of the criminal charge while the defense shall be undertaken by the defense counsel. Records of the case, particularly the transcripts of every proceeding are of the essence for counsels of opposing parties.

On the point of view of the public attorneys, there is a difficulty in maintaining court records due to voluminous cases being handled by them, most especially criminal cases. As of June 2009 there are about 443,177 pending criminal cases nationwide, of which a total of 249,511 cases or about 56.30% are handled by Public Attorneys Office. [20] Aside from the fact that PAO lawyers are handling almost one half (1/2) of the pending cases before our courts, admittedly, the delivery of service by the PAO lawyers are affected by the turn-over of its lawyers to other agencies. While recruitment is high, the turn-over of PAO personnel especially its lawyers is likewise fast due primarily to their search for greener pastures either by engaging in private practice or by transferring to other government agencies such as the National Prosecution Service (NAPROSS), Ombudsman, and the judiciary. [21] It becomes problematic when there has been a turn over of PAO Lawyer, when a new lawyer seats in before a court to handle a trial, he will usually request for a resetting of the case in order for him to gather the records of the case and be acquainted with the facts of each case assigned to him.

Imagine the hassle the lack of proper documentation creates not only to the parties but also to its counsels. The transfer of cases handled from one counsel to another without the proper turnover records will cause delay in the continuation of trial. The said instance both to litigants assisted by public prosecutors and public attorneys. Government counsels are not to be blamed for such occurrence; both public prosecutors and public attorneys are employed by the government to handle the prosecution and the defense of the litigants respectively in court. Government Offices are not like private law firms that can employ a good number of employees that could maintain and update case records, plus the fact that the lawyers belonging to the prosecution and public attorneys handle voluminous number of cases as compared to private counsels.

b. Calendar of Cases Set for Hearing

Another thing to note is the proper setting of the schedule of the setting of the criminal cases for trial. An accused will not bother the delay of the proceedings if he or she enjoys provisional liberty while the case is pending. However, in case of a detention prisoner, every delay in the continuation of his case will prolong his agony in waiting for the verdict of the court as well as his stay in the penal institution where detainee is confined.

The Rules of Court is explicit as to when the case of a detention prisoner must be set:

“(e). When the accused is under preventive detention, his case shall be raffled and its records shall be raffled and its records transmitted to the judge to whom the case was raffled within three (3) days from the filing of the information or complaint. The accused shall be arraigned within ten (10) days from the date of the raffle. The pre trial conference of his case shall be held within ten (10) days from the date of the raffle. The pre-trial conference of his case shall be held within ten (10) days after arraignment-emphasis supplied.” [22]

In relation to the above cited rule, the Supreme Court issued a Circular wherein pertinent portion provides that:

“The attention of this Court was invited by the Bureau of Jail Management and Penology and the Committee of the Witness Protection, Security and Benefit Program, Department of Justice, Manila, on the alarming number of detainees/prisoners in the City and Municipal Jails, nationwide, due to low disposition of criminal cases pending in our courts,

In order to minimize delay in resolving cases, all judges are enjoined to act promptly in cases pending in their respective salas, particularly criminal cases involving detention prisoner, pursuant to the mandate of Administrative Circular No. 4, dated September 22, 1988 x x x [23]

Despite the express provision of the Rules and of the Circular issued by the Supreme Court, a good number of detention prisoners that were currently detained at City and Municipal Jails all over the country were being deprived of their right to a speedy disposition of their cases pursuant to Article III, Section 16 of the 1987 Philippine Constitution as some accused had to wait for more that thirty (30) days before they will be brought to court for arraignment; though clogged criminal dockets is one of the reasons for the delayed proceedings, still, cases that needs to be prioritized were not being placed in the primary concern. Some of the detention prisoners were even already eligible to avail parole at the time of the promulgation of the judgment of their case.

One cause of the delay of the proceeding is when the records of a particular case has been overlooked by the person in-charge for the preparation of the calendar of cases. Every year, the criminal dockets of each court increases, chances are, the newly-filed cases were prioritized in the setting of the cases for hearing. Detention prisoners who have no relatives inquire and insist the setting of cases for hearing have no recourse but to wait for the time that their case will be set for hearing. The express mandate of the Rules has been rendered ineffectual due to the absence of the proper facility that will enable court employees to closely monitor the status of each cases filed before every sala of courts. Inventory of cases being prepared by the Clerk of Court and Criminal Dockets are not enough to completely eradicate the problem of prolonged delay in the setting of the cases for hearing. If the Rules will be strictly followed, a case filed against an accused must be dismissed by reason of delay in the administration of justice. The Speedy Trial Act of 1998 provides among others that:

“Section 13. Remedy When Accused is Not Brought to Trial Within the Time Limit.- If an accused is not brought to trial within the time limit required by required by Section 7 of this Act as extended by Section 9, the information shall be dismissed on the motion of the accused. The accused shall have the burden of proof of supporting such motion but the prosecution shall have the burden of going forward with the evidence in connection with the exclusion of time under Section 10 of this Act.

In determining whether to dismiss the case or with or without prejudice, the court shall consider, among other factors, the seriousness of the offense, the facts and circumstances of the case which led to the dismissal and the impact of a reprosecution on the implementation of this Act on the Administration of Justice. Failure of the accused to move dismissal prior to trial or entry of plea of guilty shall constitute a waiver of the right to dismissal under this section-emphasis supplied-emphasis supplied.” [24]

Those who were unaware of the mandate of the Speedy Trial Act were likewise deprived of their right to the speedy disposition of cases just because of the incompetency of court records.

A.3. Procedures after the promulgation of judgment

After the promulgation of the final judgment, a convicted prisoner has the following remedies: file a motion for reconsideration, motion for new trial or an appeal before the judgment becomes final. However, even if a convicted prisoner is already serving his sentence after conviction, there are instances which necessitate the verification of records in the lower courts.

a. Probation

Probation is a disposition under which a defendant, after conviction and sentence, is released subject to conditions imposed by the court and to the supervision of a probation officer. [25] The service of probation can be availed by a convicted prisoner if the sentenced imposed does not exceed six (6) years of imprisonment or a fine. In addition to the sentenced imposed, there are other requirements to which the Probation Law mandates before a convicted prisoner can be eligible for probation.

No person shall be placed on probation except upon prior investigation by the probation officer and a determination by the court that the ends of justice and the best interest of the public as well as that of the defendant will be served thereby. [26] The probation officer shall conduct a thorough investigation on whether an application for probation is qualified to avail the said privilege. The investigation that the officer is supposed to conduct consists of: interview with the applicant, background investigation by conducting a visit to the place of residence of an applicant and by conducting a records check to verify the records of other government offices to see whether there are other criminal cases filed against an applicant.

In conducting a records check, the probation officer sends requests to the following government offices: National Bureau of Investigation, Office of the Prosecutor, Office of the Clerk of Court of Metropolitan Trial Court and Regional Trial Court of the city or municipality where the applicant for probation was convicted.

The problem comes in when the records will reveal that a pending case was filed against a person who bears same name as the applicant. The aforesaid offices merely rely on their docket which contains merely the list of names of convicted prisoners or persons with pending cases or outstanding warrants without the certainty to whose person the records refer to and because of the unreliability of the records, an applicant for probation may be denied of his right to avail the same because of the incompetence of the records at hand.

b. Parole

Parole is the release from imprisonment, but without full restoration of liberty, as parolee is still in the custody of the law although not in confinement. [27] A convicted prisoner can apply for parole after serving the minimum penalty imposed under the provisions of the Indeterminate Sentence Law (Republic Act 4103, as amended). Though availing the benefits of the Indeterminate Sentence Law is not a matter of right as the grant of parole is subject to the evaluation of the Board of Pardons and Parole, the application for parole becomes difficult for convicted prisoners who appears to have pending cases before the lower courts.

The problem in the incompetency and accuracy of court records manifests when a convicted prisoner who has been transferred to the Bureau of Corrections applies for parole.

Pertinent provision of Presidential Decree No, 29 amending provides that:

“ x x x

(b) Persons who by reason of their sentence may be deprived of liberty for not more than three years or are subjected to a fine of not more than one thousand pesos, or are subjected to both penalties; but if a prisoner receives two or more sentences in the aggregate exceeding the period of three years, he shall not be considered a provincial prisoner. The imposition of subsidiary imprisonment shall not be taken into consideration in fixing the status of a prisoner hereunder except when the sentence imposes a fine only. x x x” [28]

An accused who was convicted for an imprisonment more than three (3) years shall be considered as “national prisoners;” in relation thereof, the Supreme Court issued a Circular concerning the transfer of the custody of prisoners wherein it is mandated that:

“x x x

In order to decongest provincial, city and municipal jails and to effect better control and supervision over national prisoners, all trial judges concerned are hereby directed to issue the corresponding mittimuses or commitment orders of national prisoners immediately after their conviction so that they may be remitted or transferred to the Bureau of Corrections in Muntinlupa, Metro Manila.” [29]

Once a convicted prisoner was transferred from provincial, and/or municipal jails, it will be more difficult for an applicant for parole to verify his pending cases appearing on the records of the Bureau of Corrections if there is any. What will happen in this case is that the Board of Pardons and Parole has to make a written communication with the concerned courts or with the Public Attorney’s Office to verify the status of a case, and to request certification, if possible, that the pending case that was found on record is no longer in existence. It will take a matter of weeks or months before the written communication from the Board may receive a response from the government agency concerned. The next question here would be: what if there are no more records available to verify the status of the case? For as long as the pending case that was found on the profile of the applicant for parole cannot be verified as to its status, he cannot qualify as a possible candidate for the grant of parole. Again, the poor convicted prisoner will be deprived of his right to avail such privilege only because of the incompetency of the records of our government agencies.

B. Civil Cases and Special Proceedings

A civil action is one by which a party sues another for the enforcement or protection of a right, or the prevention of a redress or a wrong. [30] On the other hand, a special proceeding is a remedy by which a party seeks to establish a status, a right or a particular fact. [31] A civil action or a special proceeding case is initiated by filing an appropriate initiatory pleading before the proper forum having jurisdiction over the cause of action.

Even though the causes of action in a civil case and in special proceedings do not involve deprivation of liberty as compared to criminal cases, still, incompetency of court records affect the substantial rights of the litigants.

The same with criminal cases, the rights of the litigants are affected in terms of the availability of records despite of the length of time that the case was filed, the easy access of the counsels to transcript and other pertinent court records, and also the priority in setting the cases for hearing.

B.1. Rule against Forum Shopping

One of the practices made by litigants in civil cases as well as special proceedings cases is the filing of complaints and/or petitions involving the same causes of action and parties to different forums to seek favorable judgment. This practice has been subject to abuse that in case of civil cases, defendants, who have no idea as to the course of actions that the plaintiffs are pursuing, might prejudice their right to due process of law.

“The Supreme Court has explained that there is forum shopping when, as a result of an adverse decision in one forum, or in anticipation thereof, a party seeks a favorable opinion in another forum through means other than appeal or certiorari by raising identical causes of action, subject matter and issues. Forum shopping exists when two or more actions involve the same transactions, essential facts and circumstances, and raise identical cause of action, subject-matter and issues. Another indication is when the elements of litis pendentia are present or where a final judgment in one case will amount to res judicata in the other case. The test is whether in the two or more pending cases, there is identity of parties, tights or causes of action and reliefs sought.” [32]

Despite the fact that it is mandatory that every initiatory pleading must be accompanied by a certification against forum shopping, the nature of cases filed before our courts cannot be closely monitored on whether a plaintiff or petitioner has violated the prohibition against forum shopping. Mere inventory of cases are not enough to assure that the rule against forum shopping has not been violated.

III. Conclusion

The situations cited in this work are based on the actual scenario are based on the situations encountered by the writer in her everyday exposure with litigants, prisoners and other government employees involved in the administration of justice. The clogged dockets are the primary reason for the difficulty in making an access to court records plus the fact that the documentation is done manually.

In every cause of action, a right is always being asserted. In either ways, the rights of the litigants and the parties involved in a case are always prejudiced the moment it becomes difficult to gain access to court records or when the court records can no longer be produced. After having discussed the scenarios that usually happen in a judicial proceeding, I came to realize and conclude that the following important rights are violated due to the incompetency in maintaining court records to wit:

a. The right to life, liberty and property without due process of law [33]

b. The right to speedy disposition of cases [34]

IV. Recommendation

With the present advancement in technology, the flaws in maintaining court records cited in this paper may be properly addressed by creating an ELECTRONIC COURT DOCUMENT REPOSITORIES. The proposal to create the same is not a novel issue. Several countries have already earmarked the use and study of maintaining an electronic court documents.

In Arizona, a study was conducted for the use of electronic document management; [35] the Virginia Court now maintains a Circuit Court Records System Search; [36] in Ohio, Hamilton County Probate Court maintains an electronic data base for probate court records; [37] King County District Court in Washington state has archived more than 1.7 million court records using an information infrastructure based on EMC document management products. [38]

Law makers must start considering implementation of a document management system that will enable local courts to have electronic document repositories for easy access and reference of the terminated, archived, and active cases filed in every sala of each courts in the country. Due to the increasing number of criminal, civil and special proceedings cases. Access to court records becomes more and more difficult as one could ever imagine.

A document management system for the maintenance of court records will answer the problem on maintaining the integrity and reliability of court records. A document management system (DMS) is a computer system (or set of computer programs) used to track and store electronic documents and/or images of paper documents. The term has some overlap with the concepts of content management system. [39]

I think the proposal for creating an ELECTRONIC COURT DOCUMENT REPOSITORES will not be difficult if the government will initiate an act to pursue the same. Take for example the database of the National Statistics Office (NSO), wherein the said government agency now maintains an electronic data base of all the birth, marriage and death certificates that were filed before their office. The creation of such will protect the interests of the litigants.

A. Contents of the Electronic Court Document Repositories

The actual court record consists of the complaint, responsive pleadings, if any, the minutes of the hearing, transcript of records, notice of hearings sent to the litigants, orders of the court and other motions filed by the litigants. I will suggest that a data base for the following must be maintained so that the administration of the judicial system will not be impeded by reason of defective court records.

  1. INVENTORY OF CASES- an inventory of all the cases filed before each sala of court must be had containing the case title, case number, date of filing, cause of action and the current status. The inventory must not only comprise the active cases, a separate inventory for terminated cases and archived cases must also maintained to that in cases where there is a need to verify terminated cases, access to the desired information will be easy.
  2. MINUTES OF THE HEARING- maintaining a data base for the minutes of the hearing of every case will aide the counsels, most especially the public prosecutors and the public attorneys in monitoring the status of each cases that they handle. Furthermore, it will aide newly appointed counsels in familiarizing with the cases that they are supposed to handle.
  3. TRANSCRIPT OF RECORDS- transcript of the testimonies of the witnesses made in open court is essential for every counsel in preparing for the trial. The current practice is that, stenographers only print a limited number of copies of the transcripts, so that is why in case of lost, it will be tedious to recover or to reprint the same. Having the transcript backed up in a data base will not create a hassle in case of lost of the transcript or in case of death of the stenographer who made the same.
  4. INVENTORY OF DETENTION PRISONERS with PENDING CASES- penal institutions maintain an inventory of its own as to the names and number of prisoners under their custody. It is humbly submitted, that a nationwide database must be maintained for detention prisoners or convicted prisoners who have pending cases or who are presently serving their sentences. The database must likewise contain the profiles of the prisoners so that it will be easier to verify the identity of every inmate in relation to criminal cases filed in every sala of court. Why is it essential? This is to inform the court having jurisdiction to the accused as to the number of years that a particular accused has been detained. A data base for such will likewise aide in conducting investigation for convicted accused who files an application for parole and probation. Plus, it will be easier for our local courts to monitor on whether the person to whom they have issued a warrant of arrest has been arrested or was detained in a penal institution outside their jurisdiction.

B. BENEFITS

If ever the proposal to maintain an ELECTRONIC COURT DOCUMENT REPOSITORIES will be pursued, the following benefits for the litigants could be had:

  1. A detained prisoner who had already posted bail can be released the soonest possible time due to the accessibility of records for clearance purposes;
  2. Violators of the rule against forum shopping can easily be monitored and the defendants will be relieved from repeated vexatious complaints that are filed against them simultaneously in different forums;
  3. Verification of pertinent pieces of information concerning an accused or a prisoner from one government agency to another will be easier;
  4. Counsels can easily gain access to records of the case that they are handling in case of loss;
  5. Cases that had long been pending can be now closely monitored and will be prioritized in setting the cases for trial.

C. LIMITATIONS

This proposal is not intended to totally replace the usual practice of paper based court records. This proposal is intended to create a back up copy for all court records so that in case of loss or destruction, a back up copy is readily available.

Likewise, an ELECTRONIC DOCUMENT COURT REPOSITIES is not intended to give an open access to all individuals. Maintaining an ELECTRONIC DOCUMENT SYSTEM is intended for the government agencies who are directly involved in the administration of judicial processes. Security measures must be considered in the implementation of this kind of project as to who can access the system. If access will be allowed for all, litigant’s right to privacy will be violated plus the fact that the litigants might be exposed to intriguing, defamatory and libelous acts of others.


Endnotes

[1] 1987 Philippine Constitution, Article III, Section 16.

[2] The 1997 Rules of Civil Procedure, Rule 1, Section 3(b).

[3] Rules of Court, Rule 110, Section 5.

[4] http://en.wikipilipinas.org/index.php?title=Public_Attorney%27s_Office.

[5] http://en.wikipilipinas.org/index.php?title=Philippine_National_Police.

[6] http://en.wikipilipinas.org/index.php?title=National_Bureau_of_Investigation.

[7] http://en.wikipilipinas.org/index.php?title=Bureau_of_Jail_Management_and_Penology.

[8] http://en.wikipilipinas.org/index.php?title=Bureau_of_Corrections.

[9] http://en.wikipilipinas.org/index.php?title=Parole_and_Probation_Administration.

[10] The Revised Administrative Code of 1997, Title III, Chapter 7, Section 23 (1).

[11] http://en.wikipilipinas.org/index.php?title=Board_of_Pardons_and_Parole.

[12] Revised Rules of Criminal Procedure, Rule 112, Section 1 (2000).

[13] Revised Rules of Criminal Procedure, Rule 112, Section 4 (2000).

[14] Revised Rules of Criminal Procedure, Rule 112, Section 6(a) (2000).

[15] Revised Rules of Criminal Procedure, Rule 113, Section 5 (2000).

[16] Revised Rules of Criminal Procedure, Rule 112, Section 6 (2000).

[17] Revised Rules of Criminal Procedure, Rule 114, Section 1 (2000).

[18] The 1987 Constitution of the Republic of the Philippines, Article III, Section 14(2).

[19] Revised Rules of Criminal Procedure, Rule 115, Section 1(b) (2000).

[20] http://www.pao.gov.ph/76/Accomplishment-Report-2009:-Executive-Summary.

[21] Id.,

[22] Revised Rules of Criminal Procedure, Rule 116, Section 1(e).

[23] Circular No. 56-92, October 1992.

[24] Republic Act 8493, Section 13 (1998).

[25] Probation Law of 1976 (P.D. No. 968, as amended). Section 3 (a).

[26] Probation Law of 1976 (P.D. 968, as amended). Section 5.

[27] Antonio Nachura, Outline Reviewer in Political Law 304 (2009).

[28] Presidential Decree No. 29, Section 2. (1972).

[29] Circular No. 49-92-A, April 20, 1992.

[30] The 1997 Rules of Civil Procedure, Section 2 (a).

[31] The 1997 Rules of Civil Procedure, Section 2 (b).

[32] Ligon vs. CA, et al., G.R. No. 127683, August 7, 1998; cf. Melo, et. al vs. CA, et al., G.R. No. 123686, November 16, 1999, cited in I Florenz D. Regalado, Remedial Law Compendium 161 (2005).

[33] 1987 Philippine Constitution, Article III, Section 1.

[34] 1987 Philippine Constitution, Article III, Section 16.

[35] Electronic Document Management Systems Study for the Arizona Courts by On Target Technology Consulting, June 9, 2009, available at http://www.supreme.state.az.us/COT/Subcommittees/edms/EDMSExecSumry.pdf.

[36] http://webdev.courts.state.va.us/cgi-bin/p/rms.cgi.

[37] http://www.probatect.org/courtrecords/index.htm.

[38] http://gcn.com/articles/2008/08/12/estorage-keeps-order-in-courts-documents.aspx.

[39] http://en.wikipedia.org/wiki/Document_management_system.

“A republic to be true to its name requires that the government rests on the consent of the people, consent freely given, intelligently arrived at, honestly recorded, and thereafter counted.” This was taken from the case of Bailles vs. Cabili, 27 SCRA 113 (1969). It is in line with the declaration of principles and state policies as embodied in the present constitution which provides that the Philippines is a democratic and republican state and as such, sovereignty resides in the people and all government authority emanates from them. (Article II, Section 1, 1987 Philippine Constitution) One of the methods wherein the people give its consent to the government is through election.

Election, as defined in one case decided by the Supreme Court, means the choice or selection of candidates to public office by popular vote through the use of the ballot. (Rulloda vs. Comelec, G. R. No. 154198, January 20, 2003). The right to vote in an election or simply stated, the right of suffrage, is a political right guaranteed, no less, by the Constitution. The provision on the qualifications of a voter, as prescribed in the Omnibus Election Code, is anchored on the constitutional provision on suffrage. It is said that in the exercise of the right to vote, each and everyone, regardless of stature in life, is equal. The rule is one voter, one ballot. The Filipinos exercise this right at least once every three years. During past elections, the right to vote is exercised by a registered voter by writing down in the ballot the names of the persons who the voter would like to serve this country.

This coming election, a different system of voting will be introduced. Although not entirely new, as a similar system had previously been used in some parts of the country – particularly in previous elections held in the Autonomous Region of Muslim Mindanao – it will be the first time that the system will be implemented nationwide. This new system involves the use of technology.

The May 2010 national and local elections will be adopting the automated election system. Automated election system is a system using appropriate technology which has been demonstrated in the voting, counting, consolidating, canvassing, and transmission of election results, and other electoral processes. (Section 2, RA 8436, as amended by RA 9369).

The introduction to the adoption of the automated election system began as early as 1996 when optical mark readers (OMR) were used in the ARMM Elections. This was a pilot testing of the feasibility of converting to an automated election system from the manual election system. Then in 1998, although the target was to have an automated election of the national elective post nationwide, it was instead partially implemented again in the ARMM. In 2008, the election, yet again, in ARMM was this time a fully automated election system which led to the decision to implement the same in the entire archipelago this coming May 2010.

For the past few months, the election fever never cooled down. Quite the opposite, the heat continues to intensify day after day. Election-related topics, whether expressed in the news, views, or opinions, are playing within the spectrum of confidence or apprehension. Some reports have been quite alarming as they try to insinuate that with this system of voting, there will be massive failure of election. While some are quickly dozed off with the assurance from the COMELEC that contingency plans, up to Plan D, are in place.

Authority of the Commission

The plan to have a national automated election system was supposed to materialize as early as 1998 during the May national elections. This was the intention of the lawmakers when they enacted Republic Act No. 8436 or the “Election Automation Act of 1997” as approved on December 22, 1997 by then President Fidel V. Ramos. RA No. 8436 is the law which granted the Commission on Elections the authority to use the automated election system starting with the May 11, 1998 national and local elections and during subsequent national and local electoral exercises.

The purpose of adopting the automated election system is to improve the election process by ensuring that the secrecy and sanctity of the ballot is maintained through a transparent and credible process which shall make the results fast, accurate and reflective of the genuine will of the people. This is espoused in the declaration of policy as stated under Section 1 of Republic Act 8436, as amended by Republic Act 9369.

However, automated election, as earlier mentioned, was not conducted in the 1998 elections and elections subsequent thereto, save for certain elections conducted in the Autonomous Region of Muslim Mindanao. In 2004, the anomaly involving the awarding of the contract for automation to Mega Pacific Consortium who had not participated in the public bidding rendered the contract void as decided by the Supreme Court. The contract on automation executed between Mega Pacific eSolutions, Inc. and the COMELEC was declared void due to violations of the law and grave abuse of discretion on the part of the COMELEC. (Information Technology Foundation of the Philippines vs. COMELEC, G.R. No. 159139, January 13, 2004).

Manual election system was still implemented from the 1998 national election up until the 2007 local election and the barangay election that followed. It was in January 23, 2007 when Congress passed the amendatory law RA 9369, otherwise known as the Poll Automation Law, which now applies in the preparation and conduct of the 2010 elections.

Under the Election Automation Act of 1997, the automated election shall be limited to the election of president, vice-president, senators and the party-list system. (Section 6, RA 8436). This has since been amended by the Poll Automation Law to include elective provincial and city or municipal officials in the automated election.

Paper-based Ballot and the PCOS

There are two types of automated election system: one is the paper-based election system, while the other one is the direct recording electronic election system. In the paper-based election system, paper ballots will be used for the casting of votes, while an electronic device will record, count, tabulate, consolidate and transmit the results of the vote count. In contrast, the direct recording electronic election system shall use electronic ballot displays where the voters can cast their votes, then the data will be processed by a computer program, and the election results will be transmitted electronically.

This coming May 10, 2010, the elections shall be conducted using the paper-based election system. The electronic device chosen for the poll automation is the Precinct Count Optical Scan (PCOS) machine where the paper ballots marked by hand by the voters will be fed into the machine and the same will be scanned, and the corresponding votes made will be recorded.

The same PCOS machines will be used to count the votes at the precinct level. It is also equipped, by attaching a transmission medium, to electronically transmit the voting result to its corresponding canvassing center.

Concerned Citizens

Commission on Elections (COMELEC) Chairman Jose A.R. Melo was quoted in a news article saying that this coming election will be the biggest single automated election ever conducted in the whole world.

As the country brace for this full automation of the national election, a number of concerns have been raised. The system has been facing the usual unfavorable response to change such as overwhelm, apprehension and confusion. Questions about the system have been brewing up. Individuals and groups from the different sector of society have been voicing out their concern, and demanding response, on this new system of voting.

Generally, concerns focus on the reliability of the electronic devices that will be used in the poll automation and the level of awareness and readiness of the voting public. Specifically, the matters that reached the news include delays in the delivery of the machines, dependability of the counting machines, signal problems, availability of electrical power supply, and the level of awareness of the voting public.

The more important concern is whether the non resolution of the problems raised will lead to a failure of election and disenfranchisement of the people’s vote.

Delivery Dilemma:

Early on, doubts have been raised on whether the number of machines specified in the contract will be produced and delivered in time. There were questions on the capability of Smartmatic-TIM, the winning bidder of the automation contract, to produce the required 82,200 units of PCOS machine.

The timely delivery of the machines, which was to be made in several batches, has to be done in time because the Poll Automation Law, under Section 11, mandates that there must be field testing and a mock election event in one or more cities/municipalities. A technical evaluation committee must certify, not later than three months before the date of the electoral exercise, that the machine is operating properly, securely, and accurately. The conduct of the field testing and the mock election are among the bases for the certification.

Despite this, the delivery of the machines has been subjected to constant delays due to numerous reasons allegedly beyond the control of the winning bidder.

Initially, the delay in delivery was caused by the transfer of the manufacturing plant from Taiwan to China. According to Smartmatic-TIM, there was a need for the transfer because the manufacturing plant in Taiwan was devastated by a typhoon which occurred sometime between September and October 2009.

By December 2009, the expected number of machines that should have been delivered was 42,000 units but only about 30,000 units was delivered. The explanation given by Smartmatic-TIM, this time, is that the delay is due to the high cost of shipping and traffic during the Christmas season

Due to these delays, some groups have been demanding the COMELEC to penalize Smartmatic-TIM arguing that the same is provided for in the automation contract and is therefore valid.

Nonetheless, Smartmatic was able to deliver all the 82,200 units of PCOS machine on February 27, 2010 which was one-day ahead of the deadline set by COMELEC for its delivery.

The units were kept in a safe warehouse in Cabuyao, Laguna where it will undergo laboratory testing in preparation for its use in less than two and a half months.

Counting Complexity:

The infomercial on automated election showed how easy it is to vote using the automated election system. To summarize, the voter simply has to go to his designated voting precinct. Next, the voter obtains his official ballot, together with a shading marker and a ballot secrecy folder, from the board of election inspectors. Then, the voter must shade the oval next to the name of the candidate he is voting for. During this part of the infomercial, the voter is reminded to completely, never partially or over, shade the oval and to be careful not to over vote. After the voter is done with the shading, he must proceed to the PCOS machine where the official ballot will be inserted in order for the machine to scan and record the same. The voter is again instructed to wait for the small screen on top of the machine to display a message verifying that his ballot has been successfully recorded and the same will slide down inside the opaque plastic ballot box. The last thing that the voter must do is to have the board of election inspectors put indelible ink on his right forefinger. It is that simple and it’s better automated so the infomercial shows as it ends.

Although it seems rather easy to vote in an automated election by watching this infomercial, the problem lies with the what if’s. First, the infomercial, although it made some emphasis on carefully shading the oval, it failed to clarify the effects if, what if, there was partial or worse over shading. With partial shading, there is a chance that the vote will not be counted by the machine. This is because the machine will rely on optical scanning and it may not read an incompletely shaded oval. Hopefully, if this happens, the machine will not immediately slide the ballot inside the ballot box, therefore giving the voter the chance to re-shade. On the other hand, if the voter over shades in the official ballot, either his shading went outside the oval, or that he shaded more oval than the maximum number of ovals per elective post, or both, with no intent to create a marking but simply a result of maybe a medical condition such as poor eyesight or uncontrollable shaking of the hand. What happens then? Will his vote for that elective post alone be void or will his entire ballot be invalidated? If the answer in either is in the affirmative, wouldn’t that constitute disenfranchisement of his vote despite the fact that it was an honest mistake?

Second, the COMELEC sample ballot measures 8in. x 29in. A standard student desk used in public school classrooms, which is commonly the same ones used in voting precincts, will measure approximately fifteen inches at most. With such a small space to place the extremely long official ballot, there could have accidental crimping of the ballots as the voter go from top to bottom while shading his choice. This crimping might result to creases which could be detected by the machine as unnecessary markings which could translate to invalidation of the ballot. Not to mention is the possibility of causing the same creasing as the voter try to protect the secrecy of his ballot using the secrecy folder which ordinarily measures thirteen inches or similar to long folders.

Looking at these scenarios, the question is, will the voter be allowed to ask for a replacement ballot and simply surrender the previous one and have it marked as spoiled? Under Section 14 of the Election Automation Act of 1997, a voter who spoils his/her ballot may be issued another ballot, which should not exceed once, subject to Section 11 of the same act which provides that the number of official ballots to be distributed to each precinct will be equal to the total number of registered voter for that precinct with a provision of additional four (4) ballots per precinct. However, these two provisions were amended under the Poll Automation Law. Section 13 of the Poll Automation Law amended Section 11 of the Election Automation Act of 1997 reducing the number of additional ballots from four (4) to three (3). Section 15 of the Poll Automation Law amended Section 14 of the Election Automation Act of 1997. The amendment made no mention if a voter can be reissued another ballot should he spoil his ballot. Under statutory construction, where a specific section of an old law is amended by the new law, the provision not included or omitted in the amended provision is deemed repealed. By applying this rule, one may conclude that the answer to the question is in the negative. However, the amended provision stated that the COMELEC shall prescribe the manner and procedure of voting. Thus, there still is a possibility that the old intention to allow the replacement of spoiled ballot not exceeding once per voter and a maximum of three for each precinct.

In the two previously mentioned scenarios, the fault is attributable to human error, then how about if it is the PCOS machine which would fail to read or refuse to receive the ballot? The COMELEC-SmartmaticTIM contingency plan provides that if the PCOS machine should malfunction and fail to count the votes in the precinct it is serving. It provides that in a situation where the PCOS machine experience technical difficulty such as it won’t read the ballots despite the absence of any markings that would otherwise invalidate it, then the Board of Election Inspectors are advised to call a technical expert from the Smartmatic to repair the unit. If the PCOS machine cannot be repaired, then another PCOS machine will be given to the precinct. This is the reason why there are excess units delivered as stipulated in the automation contract. However, if there will be no available extra PCOS machine, since there are only more or less 6,000 spare units, then the COMELEC may use the machine from a neighboring precinct. This PCOS machine will be reprogrammed to recognized the different set of ballots. If all else fails, then the COMELEC may decide to do manual polls.

The COMELEC has caused the preparation and printing of manual forms equivalent to 30% of the total registered voters as part of its continuity plan should there be malfunctions with the machines that would necessitate the reversion to manual polls.

Transmission Trouble:

Another issue raised by concerned individuals and groups involves the reliability of the medium for the transmission of vote results from the counting precincts to the canvassing center. There are fears that there might be signal problems on election day which will hamper and affect the transmission of the voting result.

Resolution No. 8809, promulgated by the Commission on Elections on March 30, 2010, covers the general instructions that will govern the consolidation, transmission and canvassing of votes by the municipal, city, provincial and district boards of canvasser.

The primary choice in the transmission of the result from the PCOS machine to the consolidation machines is the wireless broadband or USB modem which is serviced by any of the three biggest telecommunications company, Globe Telecoms, Smart Communications, and Sun Cellular, depending on the signal strength in the area where the counting precinct is located.

However, despite the claims of these telecommunication companies of having strong signal nationwide, in truth, there still remain not a few places where there are signal problems such as low signal or no signal at all. The latter are areas which are referred to as dead spots. This is the reason why the COMELEC is prepared not to depend on this transmission device alone, but as part of its general instructions governing transmission, there are several options laid down in the procedure for canvassing and consolidation.

With respect to the choice of transmission medium, the first option as mentioned is to use a USB modem. There are sims, the number of which shall depend on the location, that will come with the USB modem. If no connection can be established using the USB modem, a broadband global area network or BGAN, a satellite antenna, will be used. If still no connection can be established using the BGAN, an available VSAT or DSL may be used in transmitting the vote results. If electronic transmission of the vote results becomes impossible, then the reception and custody group will do there job.

A reception and custody group or RCG, as expressed under Section 22 of Resolution No. 8809, is a group, constituted by the board of canvassers, who is in charge of the reception and safekeeping of the main memory card and the hardcopies of the election returns. The RCG shall immediately submit to the board of canvassers the envelope containing the main memory card that has been labelled “NOT TRANSMITTED” in order to process the election return.

With a manual transmission of the memory card containing the election return, the same fear over the incidents involving the smuggling into the country of 5,000 signal jammers which allegedly would be used to disrupt the electronic transmission of the election returns or the certificates of canvass may be put to rest.

Power Supply

Electrical power availability has also been an issue in the shift to automated election system. The country has been experiencing rotating brownouts which initially spared the Luzon Island but eventually became a nationwide event with the failing of several power plants one after another with the onset of the El Niño Phenomenon. It was reported that the different power plants cannot produce enough supply of electricity to cover the huge demand of the consuming public.

Due to this current power supply deficiency, some groups have expressed their concern over the possibility of widespread power failure on election day. With the automation system dependent on power supply, the groups’ concern is that a power blackout would disrupt the automated poll.

Despite this more than occasional rotating brownouts, the public should not be too worrisome. The PCOS machine has a battery support that could last for 16 hours. The poll starts at seven o’clock in the morning and ends at three in the afternoon which may be extended if there are still registered voter who have not cast their votes within the thirty meter radius from the polling precinct. According to COMELEC Commissioner Melo, that the precinct level counting of votes will only take up an hour. With the eight hour precinct voting plus the one hour precinct counting, the normal time span will only be nine hours. There will be an excess of seven hour battery life, should there be extension in the voting.

Also, the use of portable power generators, which is common in this country who had experienced worse rotating brownouts in the early 90s, may also be resorted to if the 16 hour battery life of the PCOS machine is not sufficient.

Failure of Election

The foremost fear of the critics of the automation poll is that the scenarios mentioned will inevitably lead to a failure of election. However, the proponents countered that this fear, and not the problems posed, which is more detrimental to automation.

If the aforementioned situations are the only basis for a so called “failure of election”, then there wouldn’t be a failure of election to speak of. At worst, there will only be failure of automation and not a failure of election.

The failure of election can only be declared by the COMELEC on the grounds specified under Section 6 of the Omnibus Election Code. There are three cases when a failure of election may be declared: first, if, on account of force majeure, violence, terrorism, fraud, or other analogous causes the election in any polling place has not been held on the date fixed; or second, if, on account of force majeure, violence, terrorism, fraud, or other analogous causes the election in any polling place had been suspended before the hour fixed by law for the closing of the voting; or third, if, on account of force majeure, violence, terrorism, fraud, or other analogous causes after the voting and during the preparation and the transmission of the election returns or in the custody or canvass thereof, such election results in a failure to elect.

An additional requisite for failure of elections to be declared is that in any of the three cases, the failure or suspension of election would affect the result of election.

In conclusion, the COMELEC has taken the necessary precaution and has a continuity plan in place. Election day is but a month away. The voting public should give this automated election system a chance to prove itself as a worthy substitute to the familiar manual automation. After all, its precedent cannot boast itself as the better system as it had been marred by too many controversies of fraud anyway.


Sources:

INTRODUCTION

It was the year 2004 when I voted for the first time. I could not remember the exact date but I recall how hot and sweltering it was that day when my childhood friends and I lined up at the Comelec office in Valenzuela City to have ourselves registered as voters for the coming election in May that year. All six of us were first time voters and relatively new members of the nation’s workforce. Earning our own keep since graduating from our respective colleges and universities in 2002. The May 2004 election was a national one so I got to vote for the first time my choice for president, vice president, senators, district representative, party list representative and local officials for my hometown, Valenzuela City. I could not remember who I voted for in the other positions but I can still recall that my president was Senator Panfilo Lacson.

The national election in 2004 was when President Gloria Macapagal Arroyo sought to renew her post and hoped to serve a complete six year term as chief executive officer of the country. She went head to head with the King of Philippine Movies, the late Fernando Poe Jr.. Election 2004 was where President Arroyo was accused of massive cheating. It was that election season when the highly controversial “Gloriagate Scandal” was birthed and. It was discovered much later exposing to the public the very likely possibility that President Arroyo resorted to “dagdag-bawas” to make sure that she will be declared the winner. “The Gloriagate Scandal” is the wiretapped conversation between President Arroyo and Comelec Commissioner Garcillano where Ms. Arroyo was asking Garcillano about the “situation” in Mindanao. The opening line of the Garcillano tapes was the now infamous “Hello Garci?,” which was even made into ringtones by techsavvy Filipinos, who despite the gloom and the gravity of the issue still find a way to make light out of it.

The people, nevertheless, were outraged with the “Hello Garci?” expose. The administration took lashings from the angry opinion writers and radio commentators. Harsh criticisms were thrown President Arroyo’s way from every direction. Some even took the streets and stage huge protests and rallies. The Senate conducted investigations on the matter. It did not help that earlier Fernando Poe Jr. died, allegedly because of “sama ng loob” only months after losing in the election. With the Garcillano tapes, FPJ was practically made a martyr, a victim, the symbol of the oppressed under the regime of President Arroyo. It cost the President an on-air public apology but, as outrageous as it may seem, she remains in power and was never ousted in her seat.

The “Gloriagate” was nothing new. It just drew so much attention and outrage because it is the highest position in the land that was at stake. And at that time many people had already lost their confidence with the Arroyo administration. And also because it was the first time an evidence as incriminating and repulsive as that blew up on a national scale. But “dagdag-bawas” is an age old tradition among our politicians. These days you will never really know for sure who the cheaters are and who are really clean, if there is still one. Philippine politics is so dirty. And our elections had been marred with corruption and even violence as far as anyone can remember. Many people have lost their trust in the election system that a substantial number of Filipinos do not go out and vote on election day. Others have found it easier to just get sucked on the system of corruption and have their votes up for sale. I myself have started to become disillusioned. And while I will be voting this coming 2010 elections, I sometimes think that it will be a futile exercise because whoever gets elected will just do the same thing. And I am still young. Imagine the disillusionment of those who are more advance in age.

But there is always a silver lining as the saying goes. Our leaders took the initiative to reform the electoral system as evidence by the passing of Republic Act (RA) 8436 or the “Election Automation Act of 1997” which authorized the adoption of an automated election system (AES) in the May 11, 1998 national and local elections and onwards. The 1998, 2001 and 2004 elections, however, came and went but we still had purely manual elections. Then on January 23, 2007, RA 9369 was passed amending RA 8436 authorizing anew the Comelec to use an AES. The Comelec took on the challenge and adopted and pilot-tested an AES in the 2008 Autonomous Region of Muslim Mindanao (ARMM) baranggay elections. With the success of the ARMM election, Comelec felt that the whole country is ready for the full automation of our electoral system. Proponents and supporters of the AES thought that with a computerized election, the problem of cheating will be eliminated because vote tabulations will become faster so that there will be virtually no more room for cheaters to execute their evil plans. “Dagdag-bawas” and other forms of cheating, they say, were possible because of delays in the counting and transmission of votes. This, however, did not sit well with some naysayers and skeptics who argued that AES will not eliminate cheating. On the contrary it will just also mutate into computerized cheating, which is larger in scale and is, therefore, more frightening. So many ugly scenarios have been conjured up by these critics. Some of those were power failure on the day of the election itself, the machines breaking down and the vulnerability of the system to hacking.

The Concerned Citizens’ Movement, led by University of the Philippines law professor Atty. Harry Roque, filed a petition in the Supreme Court seeking to nullify the Comelec’s award of the 2010 Elections Automation Project to Smartmatic-TIM Corp. and to permanently prohibit Comelec and Smartmatic-TIM Corp. from signing and/or implementing the corresponding contract-award. On September 10, 2009, in an en banc decision (G.R. No. 188456), the Supreme Court dismissed the petition, upholding the legality of the poll automation in 2010. With that decision, it is now all systems go for automation and the criticisms of the non-believers would now have to be put aside and taken with a grain of salt.

So okay, automated elections is upon us and come May 10, 2010, we will be trooping to our respective precincts and will experience firsthand how to vote electronically. It is somewhat exciting as all untried and untested endeavors are. With the legality of the poll automation already settled, let us now look more closely to the machines and know how they work. For it is only when the machines are reliable, of course coupled with competency and integrity of the Comelec officials and personnel and an educated electorate, that we will have a successful computerized election. We now have to ask, how reliable is the AES?

AUTOMATED ELECTION SYSTEM: HOW RELIABLE IS IT?

On December 22, 1997, Congress enacted RA 8436 authorizing the adoption of an automated election system (AES) in the May 11, 1998 national and local elections and onwards. For some reasons, however, the 1998, 2001 and 2004 elections were not automated but still conducted manually. On January 23, 2007, RA 9369 was passed amending RA 8436, authorizing anew the Comelec to use an AES. Sections 6 and 10 of RA 9369 defined the specific mandates of Comelec with regard to automated elections:

SEC. 6. Section 6 of Republic Act No. 8436 is hereby amended to read as follows:

“SEC. 5 Authority to Use an Automated Election System. – To carry out the above-stated policy, the Commission on Elections, herein referred to as the Commission, is hereby authorized to use an automated election system or systems in the same election in different provinces, whether paper-based or a direct recording electronic election system as it may deem appropriate and practical for the process of voting, counting of votes and canvassing/consolidation and transmittal of results of electoral exercises: Provided, that for the regular national and local election, which shall be held immediately after effectivity of this Act, the AES shall be used in at least two highly urbanized cities and two provinces each in Luzon, Visayas and Mindanao, to be chosen by the Commission: Provided, further, That local government units whose officials have been the subject of administrative charges within sixteen (16) month prior to the May 14, 2007 election shall not be chosen: Provided, finally, That no area shall be chosen without the consent of the Sanggunian of the local government unit concerned. The term local government unit as used in this provision shall refer to a highly urbanized city or province. In succeeding regular national or local elections, the AES shall be implemented nationwide.”

SEC. 10. Section 8 of Republic Act No. 8436 is hereby amended to read as follow:

“SEC.12. Procurement of Equipment and Materials. – To achieve the purpose of this Act, the Commission in authorized to procure, in accordance with existing laws, by purchase, lease, rent or other forms of acquisition, supplies, equipment, materials, software, facilities, and other service, from local or foreign sources free from taxes and import duties, subject to accounting and auditing rules and regulation. With respect to the May 10, 2010 election and succeeding electoral exercises, the system procured must have demonstrated capability and been successfully used in a prior electoral exercise here or board. Participation in the 2007 pilot exercise shall not be conclusive of the system’s fitness.

“In determining the amount of any bid from a technology, software or equipment supplier, the cost to the government of its deployment and implementation shall be added to the bid price as integral thereto. The value of any alternative use to which such technology, software or equipment can be put for public use shall not be deducted from the original face value of the said bid.”

The AES, however, was not utilized for the May 2007 elections due to time and budget constraints.

RA 9369 also authorized the Comelec to create the Comelec Advisory Council and the Technical Evaluation Committee. The former is empowered, among other things, to recommend the most appropriate, secure, applicable and cost-effective technology to be applied in the AES, in whole or in part. The latter, on the other hand is tasked to certify, through an established international certification entity to be chosen by the Commission from the recommendations of the Advisory Council, not later than three months before the date of the electoral exercises, categorically stating that the AES, including its hardware and software components, is operating properly, securely, and accurately, in accordance with the provisions of RA 9369 and based on defined and documented standards.

Comelec was able to implement an AES in the 2008 baranggay elections in the ARMM. It uses two kinds of technologies: (a) direct recording electronics (DRE) technology in the province of Maguindanao, and (b) optical mark reader (OMR), specifically the Central Count Optical Scan (CCOS) for the rest of ARMM. The DRE uses a touch pad device where voters simply select their choice of candidates by touching selected areas of the touch pad. The voter then gets a paper printout that serves to inform the voter that the system recorded the votes properly and accurately. The OMR, on the other hand, uses paper ballots which contain the names of the candidates and the different races being contested where voters shade or mark the circles corresponding to the names of the candidates they choose to vote for. At the end of the election day, these paper ballots are then brought to a counting center where the ballots are scanned by a machine that detects the voter’s marks and counts their votes. Between the two, the DRE is a more expensive technology. Two different kinds of technologies were used in order to gain experience with using the two dominant automated election technologies as well as gain experience in combining the results from these two systems into a general or overall election outcome.

The success of the ARMM election paved the way for the Comelec to prepare for a full nationwide automation for the 2010 national and local polls, with the lessons learned from the ARMM experience influencing the choice of technology for the 2010 automated elections.

In March 2009, the Comelec released the Request for Proposal (RFP) or Terms of Reference (TOR) for the nationwide automation of the voting, counting, transmission, consolidation and canvassing of votes for the May 2010 elections referred to as the “2010 Elections Automation Project.” It consisted of three elaborate components: (1) Paper-based AES- (a) Election Management System (EMS), (b) Precinct Count Optic Scan (PCOS) System and (c) Consolidation/Canvassing System (CCS); (2) Provision for electronic transmission of election results using public telecommunication networks; and (3)Overall project management. The PCOS system is similar to the CCOS system in that they both use the OMR technology. Their difference lies in how the votes were counted afterwards. Under the CCOS, the voters drop their ballots in ballot boxes after they have filled them up and thereafter, these ballot boxes were brought to the counting centers where the ballots were scanned, counted and canvassed. We can say that the counting of the votes is centralized. Under the PCOS, the counting, consolidation and canvassing of the votes are done at the precinct level. There are no more ballot boxes as the ballots are directly feed into the PCOS machine. The results at the precinct are then electronically transmitted to the next level, and so on. The PCOS dispenses with the physical transportation of ballot boxes from the precincts to the counting centers.

Subsequently, the Comelec through its Special Bids and Awards Committee (SBAC) caused the publication in different newspapers of the “Invitation to Apply for Eligibility and to Bid” for the procurement of the goods and services to be used in the automation project. For this purpose also, Congress passed RA 9525 appropriating P11.3 billion pesos as supplemental budget for the automation project. After the bidding procedures, the Comelec declared the joint venture of Total Information Management Corp. (TIM) and Smartmatic International Corp. (Smartmatic) as the best complying bidder. Pursuant to a joint venture agreement, the two companies caused the incorporation of a joint venture corporation that would enter into the contract with Comelec. The Securities and Exchange Commission issued a certificate of incorporation in favor of Smartmatic TIM Corp. on July 8, 2009. On July 10, 2009, Comelec and Smartmatic TIM Corp executed a contract for the lease of goods and services to be used for the automation project.

HOW DOES THE PCOS WORK?

As of this writing, the Source Code of the AES has yet to be released so that I could not really describe the exact capabilities of the machine. The Source Code is defined under Sec. 2 of RA 9369 as “human readable instructions that define what the computer equipment will do.” But a reading of the draft of the CAC’s “Post-Election Report on the Use of Automated Election System in the 2008 ARMM Elections,” submitted to the Joint Congressional Oversight Committee on AES and the Comelec, as well as the Roque case, will give us a brief description on how the OMR technology works. This system uses paper ballots which contain the names of the candidates and the different races being contested. Voters then shade or mark the circles corresponding to the names of the candidates they choose to vote for. The filling up of the ballots then may be compared to answering test questions in NSAT or the UPCAT. The filled up ballots are then dropped in ballot boxes where they will be stored until closing of the voting and thereafter said boxes will be brought to a counting center where the ballots will be fed to machines which will count and canvass the votes, as in the case of CCOS. Or the ballots will be fed into a machine, which serves as the ballot box and the counting machine at the same time, as in the case of PCOS.

I had the chance to watch on television the “A 2010 Poll Automation Forum,” telecast live by the ANC, a local cable news network owned and operated by ABS-CBN, on September 21, 2009 at 8 pm. It was attended by representatives from the Comelec, Parish Pastoral Council for Responsible Voting (PPCRV), representatives of various political parties, representatives from the IT industry, NGOs and concerned citizens groups. The panel was composed of Director Ferdinand Rafanan, Chairman of the Comelec SBAC; Atty. Howard Calleja, legal counsel of PPCRV, Mr. Ray Anthony Roxas Chua III of the Commission on Information and Communications Technology and also Chairman of the Comelec CAC; and Mr. Cesar Flores, Sales Director of Smartmatic International Corp. In that forum Comelec-Smartmatic officials had conducted an actual demonstration on how voters will feed the filled up ballots into the machine as well as how to start the machine and close it after voting ends.

Some members of the audience were asked to participate as mock voters where they were given sample ballots and were asked to fill them up. A public school teacher in the audience was asked to pose as a Board of Election Inspector (BEI). She was given a key that she inserted in the designated key slot, a button was pressed and the machine opened. The BEI had to override the machine by typing a password or a passcode so that the machine will start. It gave out a paper printout indicating that the machine was already open, that it was empty and that it was ready to receive ballots. The mock voters lined up and one by one fed their ballots into the machine. The machine “ate” each ballot that was fed into it and thereafter it produced a paper printout (for each ballot fed) from where the voters may verify whether the machine had correctly recorded their votes. In one instance the machine rejected a ballot because it was an erroneous one. As explained by Comelec-Smartmatic officials, an erroneous ballot is a ballot wrongly shaded such as when the voters had smudged them. According to Comelec-Smartmatic officials, that kind of ballots will be rejected by the machine and true enough the erroneous ballot during the demonstration was actually rejected by the machine.

This particular matter, however, is contentious. In the column of Former Chief Justice Artemio V. Panganiban appearing in the Philippine Daily Inquirer (PDI) on October 18, 2009 (With Due Respect), he wrote that Comelec Commissioner Rene V. Sarmiento explained that “the PCOS will not reject ballots in case of over voting. They will merely not count the position wherein there was an over voting. In a scenario where a voter shades more than 12 senatorial slots, Commissioner Sarmiento said, “the PCOS will not count the votes for the senatorial position because of such over voting but the machine will count the other valid votes cast for other electoral positions.” Former Chief Justice Panganiban opined that it is rather confusing as TV viewers and the live audience at the forum witnessed the PCOS’ refusal to accept the erroneous ballot. He added that Commissioner Sarmiento’s response that the PCOS “will not reject the ballots” was belied by the stark TV demonstration. I could not exactly remember if the erroneous ballot in the demonstration was merely smudged or it has an over voting but I do remember that it was rejected by the machine. If it was merely smudged, then the Comelec-Smartmatic was right in saying that it will be rejected, but if it has over-voting, then indeed, Commissioner Sarmiento was mistaken in his response. Is it correct to assume then that if the ballot is smudged the machine will totally reject it and when the ballot has an over voting in it, the machine will still accept it but it will just invalidate the votes where there is an over voting? The Comelec really needs to clarify this issue. I think it needs to clearly define what constitutes an erroneous ballot and when will it be totally rejected by the machine. It also begs another question, what happens then to the rejected ballots? Can the voter asked for another ballot and repeat the process of filling it up and feeding it into the machine? If he/she cannot do so, then would it not be tantamount to depraving him/her of his/her right to vote? This matter was not addressed in the forum.

When voting ends, the machine will again produce a paper printout reflecting the total number of ballots fed into the machine, which should correspond with the total number of voters who actually voted in the given precinct, and the total number of votes cast for each elective position. The BEI again would have to override it to officially close the election.

DO THE PCOS MACHINES SATISFY THE MINIMUM SYSTEM CAPABILITIES PRESCRIBED BY RA 8436, AS AMENDED?

The Supreme Court, in its decision in the Roque case, answered the above question in the positive. The minimum system capabilities are provided for under Sec. 7 of RA 9369 (RA 8436, as amended):

“SEC.6. Minimum System Capabilities. – “The automated election system must at least have the following functional capabilities:

(a) Adequate security against unauthorized access:

(b) Accuracy in recording and reading of votes as well as in the tabulation, consolidation/canvassing, electronic transmission, and storage of results;

(c) Error recovery in case of non-catastrophic failure of device;

) System integrity which ensures physical stability and functioning of the vote recording and counting process;

(e) Provision for voter verified paper audit trail;

(f) System auditability which provides supporting documentation for verifying the correctness of reported election results;

) An election management system for preparing ballots and programs for use in the casting and counting of votes and to consolidate, report and display election result in the shortest time possible;

(h) Accessibility to illiterates and disable voters;

(i) Vote tabulating program for election, referendum or plebiscite;

(j) Accurate ballot counters;

(k) Data retention provision;

(l) Provide for the safekeeping, storing and archiving of physical or paper resource used in the election process;

(m) Utilize or generate official ballots as herein defined;

(n) Provide the voter a system of verification to find out whether or not the machine has registered his choice; and

(o) Configure access control for sensitive system data and function.

“In the procurement of this system, the Commission shall develop and adopt an evaluation system to ascertain that the above minimum system capabilities are met. This evaluation system shall be developed with the assistance of an advisory council.”

The SBAC Memorandum dated June 3, 2009, as approved by Comelec Resolution 8608, categorically stated that, based on the submitted report of the SBAC-Technical Working Group (TWG), Smartmatic TIM’s proposed systems and machines passed all the end-to-end demo tests using the 26-item checklist criteria adopted by the Comelec to ensure compliance with the above minimum systems capabilities with an accuracy rating test of at least 99.955%. Below is the reproduction in full of the corresponding answers/remarks to each of the 26 individual items.

ITEM REQUIREMENT REMARK/DESCRIPTION
1 Does the system allow manual feeding of a ballot into the PCOS machine? Yes. The proposed PCOS machine accepted the test ballots which were manually fed one at a time.
2 Does the system scan a ballot sheet at the speed of at least 2.75 inches per second? Yes. A 30-inch ballot was used in this test. Scanning the 30-inch ballot took 2.7 seconds, which translated to 11.11inches per second.
3 Is the system able to capture and store in an encrypted format the digital images of the ballot for at least 2,000 ballot sides (1,000 ballots, with back to back printing)? Yes the system captured the images of the 1,000 ballots in encrypted format. Each of the 1,000 images files contained the images of the front and back sides of the ballot, totalling to 2,000 ballot side.
 
To verify the captured ballot images, decrypted copies of the encrypted files were also provided. The same were found to be digitized representations of the ballots cast.
4 Is the system a fully integrated single device as described in item no. 4 of Component 1-B? Yes. The proposed PCOS is a fully integrated single device, with built-in printer and built-in data communications ports (Ethernet and USB).

5 Does the system have a scanning resolution of at least 200 dpi? Yes. A portion of a filled up marked oval was blown up using image editor software to reveal the number of dots per inch. The sample image showed 200 dpi.
 
File properties of the decrypted image file also revealed 200 dpi.
6 Does the system scan in grayscale? Yes. 30 shades of gray were scanned in the test PCOS machine, 20 of which were required, exceeding the required 4-bit/16 levels of gray as specified in the Bid Bulletin No. 19.
7 Does the system require authorization and authentication of all operators, such as, but not limited to, usernames and passwords, with multiple users access levels? Yes. The system required the use of a security key with different sets of passwords/PINs for Administrator and Operator users.
8 Does the system have an electronic display? Yes. The PCOS machine makes use of an LCD display to show information:
 
if a ballot may be inserted into the machine;
 
if a ballot is being processed; if a ballot is being rejected;
 
on other instructions and information to the voter/operator.
9 Does the system employ error handling procedures, including, but not limited to, the use of error prompts and other related instructions? Yes. The PCOS showed error messages on its screen whenever a ballot is rejected by the machine and gives instructions to the voter on what to do next, or when there was a ballot jam error.
10 Does the system count the voter’s vote as marked on the ballot with an accuracy rating of at least 99.995%? Yes. The two rounds of tests were conducted for this test using only valid marks/shades on the ballots. 20,000 marks were required to complete this test, with only one (1) allowable reading error.
 
625 ballots with 32 marks each were used for this test. During the comparison of the PCOS-generated results with the manually prepared/predetermined results, it was found out that there were seven (7) marks which were inadvertently missed out during ballot preparation by the TWG. Although the PCOS-generated results turned out to be 100% accurate, the 20,000-mark was not met thereby requiring the test to be repeated.
 
To prepare for other possible missed out marks, 650 ballots with (20,800 marks) were used for the next round of test, which also yielded 100% accuracy.
11 Does the system detect and reject fake or spurious, and previously scanned ballots? Yes. This test made use of one (1) photocopied ballot and one (1) “re-created” ballot. Both were rejected by the PCOS.
12 Does the system scan both sides of a ballot and in any orientation in one pass? Yes. Four (4) ballots with valid marks were fed into the PCOS machine in the four (4) portrait orientations specified in Bid Bulletin No. 4 (either back or front, upside down or right side up), and all were accurately captured.
13 Does the system have necessary safeguards to determine the authenticity of a ballot, such as, but not limited to, the use of bar codes, holograms, color shifting ink, micro printing, to be provided on the ballot, which can be recognized by the system? Yes. The system was able to recognize if the security features on the ballot are “missing”.
 
Aside from the test on the fake or spurious ballots (Item No. 11), three (3) test ballots with tampered bar codes and timing marks were used and were all rejected by the PCOS machine.
 
The photocopied ballot in the test for Item No. 11 was not able to replicate the UV ink pattern on top portion of the ballot causing the rejection of the ballot.
14 Are the names of the candidates pre-printed on the ballot? Yes. The Two sample test ballots of different lengths were provided: one (1) was 14 inches long while the other was 30 inches long. Both were 8.5 inches wide.
 
The first showed 108 pre-printed candidate names for the fourteen (14) contests/positions, including two (2) survey questions on gender and age group, and a plebiscite question.
 
The other showed 609 pre-printed candidate names, also for fourteen (14) positions including three (3) survey questions.
15 Does each side of the ballot sheet accommodate at least 300 names of candidates with a minimum font size of 10, in addition to other mandatory information required by law? Yes. The 30-inch ballot, which was used to test Item No. 2, contained 309 names for the national positions and 300 names for local positions. The total pre-printed names on the ballot totalled 609.
 
This type of test ballot was also used for test voting by the public, including members of the media.
 
Arial Narrow, font size 10, was used in the printing of the candidate names.
16 Does the system recognize full shade marks on the appropriate space on the ballot opposite the name of the candidate to be voted for? Yes. The ballots used for the accuracy test (Item No. 10), which made use of full shade marks, were also used in this test and were accurately recognized by the PCOS machine.
17 Does the system recognize partial shade marks on the appropriate space on the ballot opposite the name of the candidate to be voted for? Yes. Four (4) test ballots were used with one (1) mark each per ballot showing the following pencil marks:
 
top half shade;
bottom half shade;
left half shade; and
right half shade
 
These partial shade marks were all recognized by the PCOS machine
18 Does the system recognize check (ü) marks on the appropriate space on the ballot opposite the name of the candidate to be voted for? Yes. One (1) test ballot with one check (ü) mark, using a pencil, was used for this test.
 
The mark was recognized successfully.
19 Does the system recognize x marks on the appropriate space on the ballot opposite the name of the candidate to be voted for? Yes. One (1) test ballot with one x mark, using a pencil, was used for this test.
 
The mark was recognized successfully.
20 Does the system recognize both pencil and ink marks on the ballot? Yes. The 1000 ballots used in the accuracy test (Item No. 10) were marked using the proposed marking pen by the bidder.
 
A separate ballot with one (1) pencil mark was also tested. This mark was also recognized by the PCOS machine. Moreover, the tests for Items No. 17, 18 and 19 were made using pencil marks on the ballots.
21 In a simulation of a system shut down, does the system have error recovery features? Yes. Five (5) ballots were used in this test. The power cord was pulled from the PCOS while the 3rd ballot was in the middle of the scanning procedure, such that it was left “hanging” in the ballot reader.
 
After resumption of regular power supply, the PCOS machine was able to restart successfully with notification to the operator that there were two (2) ballots already cast in the machine. The “hanging” 3rd ballot was returned to the operator and was able to be re-fed into the PCOS machine. The marks on all five (5) were all accurately recognized.
22 Does the system have transmission and consolidation/canvassing capabilities? Yes. The PCOS was able to transmit to the CCS during the end-to-end demonstration using GLOBE prepaid Internet kit.
23 Does the system generate a backup copy of the generated reports, in a removable data storage device? Yes. The PCOS saves a backup copy of the ERs, ballot images, statistical report and audit log into a Compact Flash (CF) Card.
24 Does the system have alternative power sources, which will enable it to fully operate for at least 12 hours? Yes. A 12 bolt 18AH battery lead acid was used in this test. The initial test had to be repeated due to a short circuit, after seven (7) hours from start-up without ballot scanning. This was explained by TIM-Smartmatic to be caused by non-compatible wiring of the battery to the PCOS. A smaller wire than what is required was inadvertently used, likening the situation to incorrect wiring of a car battery. Two (2) COMELEC electricians were called to confirm TIM-Smartmatic’s explanation. The PCOS machine was connected to regular power and started successfully. The following day, the “re-test” was completed in 12 hours and 40 minutes xxx 984 ballots were fed into the machine. The ER, as generated by the PCOS was compared with predetermined result, showed 100% accuracy.
25 Is the system capable of generating and printing reports? Yes. The PCOS prints reports via its built-in printer which includes:
 
1. Initialization Report; 2. Election Returns (ER); 3. PCOS Statistical Report; 4. Audit Log.
26 Did the bidder successfully demonstrate EMS, voting counting, consolidation/canvassing and transmission? Yes. An end-to-end demonstration of all proposed systems was presented covering: importing of election data into the EMS; creation of election configuration data for the PCOS and the CCS using EMS; creation of ballot faces using EMS; configuring the PCOS and the CCS using the EMS-generated election configuration file; initialization, operation, generation of reports and backup using the PCOS; electronic transmission of results to the: [1] from the PCOS to city/municipal CCS and the central server. [2] from the city/municipal CCS to the provincial CCS. [3] from the provincial CCS to the national CCS; receipt and canvass of transmitted results: [1] by the city/municipal CCS from the PCOS. [2] by the provincial CCS from the city/municipal CCS. [3] by the national CCS from the provincial CCS; receipt of the transmittal results by the central server from the PCOS.

The tests, however, as admitted by the Comelec, were done literally in the Palacio del Governador building, where a room therein was made to simulate a town and the adjoining rooms a city, etc. As determined by the Supreme Court, the real worth of the PCOS system and the machines will only be determined after they shall have been subjected to the acceptance tests expressly specified in the RFP: (1) lab test, (2) field test, (3) mock election test, (4) transmission test and the (5) final test and sealing procedure of all PCOS and CCS units using the actual Election Day machine configuration. The final test shall be conducted at least three days before election after which the PCOS and CCS units shall be sealed for election day use.

It would also be worthy to note that per information on the website of Smartmatic, the SAES 1800 model of the PCOS machine, the same one offered by the company and accepted by Comelec, has an accuracy rating of over 99.99999%.

THE SUSCEPTIBILITY OF THE AES TO HACKING AND OTHER COMPUTER FRAUDS

Some people are afraid that the AES is vulnerable to hacking, just like the voting machines used in certain precincts in Florida, USA during the presidential election where George W. Bush went head to head with Al Gore. The fear, however, is somewhat misplaced. As determined by our Supreme Court, there are two differences between the AES adopted by US and the AES we are going to adopt. The first difference is with regard to the Source Code. The Source Code in the Florida precincts was allegedly kept secret by the machine manufacturing company and the American public did not know exactly how the machines counted their votes. The Source Code in our AES, on the other hand, shall be opened for review by political parties, candidates and the citizens’ arms or their representatives. Secondly, in the Florida precincts the machines did not count the votes but instead it appeared that the votes cast have been stored in a memory card that was brought to a counting center at the end of the day. In our AES, on the other hand, the PCOS machines in the precincts will also be the same machines that would tabulate and canvass the votes.

I think either way, whether the Source Code should be revealed to the public or not and whether the PCOS machines itself will count the votes or not, the AES may still be susceptible to hacking. In the ANC forum, a number of IT experts have expressed their fears in the fact that the Source Code will be revealed to the public. They said it would be a dangerous thing because by exposing how the system works, you will be giving the chance for hackers to study it and thought of ways to access it or interfere with it. They said it would be best if the Source Code not be revealed to the public. On the other hand, Manuel A. Alcuaz Jr., a columnist for PDI Business Section wrote and recommended on his July 6, 2006 column (Mapping the Future) that “OMR machines should not have any network connection. The election results should be copied to USB memory sticks, which can be subsequently loaded to a separate PC that will transmit the results to the Comelec canvassing system at the municipality and to the dominant majority parties, as well as the citizen’s arms such as PPCRV and Namfrel.” The ideas proposed by the IT experts and Mr. Alcuaz are exactly the same as that implemented in the Florida precincts. Both parties seemed confident that it is the proper thing to do and yet it proved to be a disaster in the US election. I think it just goes to show that not one method is perfect. Every method is at risk of being hacked. What the Comelec should do is to find a middle ground to balance interests and to find the best possible method that will result to minimal damage and would serve the greater good.

The Supreme Court, however had put much faith in the system when it concluded in the Roque case that even if the AES has its flaws, the system is well-protected with sufficient security measures in order to ensure honest elections. It explained that the possibility of hacking is very slim because the machines are only online when the results is being transmitted, which would only take about one or two minutes. Given the tiny span of time when the AES would be vulnerable (here the high court implied that hacking is possible only when the machine is online and not otherwise), one would need a super computer in order to hack the system.

THE POSSIBILITY OF A FAILURE OF ELECTION

To address the possibility of systems failure, one of the requirements provided for by the RFP to interested bidders is to submit continuity and back-up plans. Section 2 of RA 9369 defines continuity plan as “a list of contingency measures, and the policies for activation of such, that are put in place to ensure continuous operation of the AES.” Smartmatic TIM Corp. has provided continuity and back-up plans in case the machines failed on the day of the election itself, which includes the provision for 2,000 spare PCOS machines in addition to the 80,000 units assigned to equal number precincts all over the country. The continuity and back-up plans are intended to address the following eventualities: (1) the PCOS fails to scan ballots, (2) the PCOS scans the ballots but fails to print the election returns (ERs) and/or (3) the PCOS prints but fails to transmit the ERs. Should (1) or (2) occur the remedy would be to get a spare PCOS from the 2,000 units, if there is still an available one, otherwise the PCOS from another precinct will be used. Should all PCOS in the given municipality or city fail, then manual counting of ballots and manual accomplishment of ERs shall be resorted to in accordance with Comelec rules. And in the event that (3) occurs, the PCOS may be brought to the nearest precinct or polling center which has a functioning transmission facility.

The worst that could happen is when all the 82,000 machines failed on election day. While this is most unfortunate, the Supreme Court ruled that still there would be no failure of elections in this case. The remedy would be to go back to manual counting of votes and manual transmission of the ERs, PCOS being a paper-based technology. Even if all the machines break down the paper ballots would still be there. Therefore, failure of elections would be a very remote possibility.

POSSIBLE PROBLEMS WITH THE OMR TECHNOLOGY AS EXPERIENCED IN THE 2008 ARMM ELECTIONS

The ARMM elections in 2008 were observed to be generally peaceful and orderly as reported by the CAC in their Post-Election Report. The OMR technology was considered a user-friendly technology but some problems and issues were still encountered. The problems and issues were divided into two groups, technical problems on election day and those which were attributed to user experience. The problems which may be applicable to the PCOS system are listed below.

Technical problems on election day:

  1. Rejection of valid ballots that were crumpled or folded and those which contain unnecessary markings and smudges which slowed down the counting.
  2. Discrepancies in the counting of ballots between those who actually voted with results counted. In other words, there were missing ballots.
  3. Incidents of over voting due to BEI’s voting in their assigned precincts. Here the results were invalidated and Comelec had to override it.
  4. CCS was not programmed to accommodate failure of elections.
  5. The machines overheated, stopped functioning and had to be restarted.
  6. Constant paper jamming of ballots.
  7. Transmission problems caused by untried and untested private network installed too close on election day resulting to delay of the transmission and compromise the integrity and security of the AES.

Assessment of User Experience:

  1. Votes shaded in the ballot were exposed to tampering. There were reports of unscrupulous erasures.
  2. Distribution of the ballots was exposed to threat of advance shading.
  3. Voters accidentally scratched or ink-blot the ballots hampering its optical scanning.
  4. BEIs accidentally tore off the bar code of ballots resulting in their rejection.
  5. BEIs lack procedural knowledge on the disposition of invalid ballots.

The above scenarios are actually frightening if you would come to think of it. But there is not much we can do but assume and hope that the Comelec has carefully considered these things and formulated the necessary rules to prevent them from occurring or at the very least to minimize and control the damage when their occurrence is inevitable. Note that the problems above, even the technical ones, were actually due to human errors.

CONCLUSION

To the question of the reliability of the machines and the AES as a whole, it is very possible to achieve 100% reliability and credibility. After all machines are man-made inventions and there is no limit to what the human mind can think of and do. But 100% reliability and credibility though attainable remains to be an ideal also because, ironically, of human intervention. We can say the same thing here, 100% reliability and credibility remains to be an ideal, a dream, because, again, there is no limit to what the human mind can think of and do. Force majeure or acts of god, sure may affect the proper functioning of the machines or its breakdown but most doomsday scenarios connected with poll automation drawn by skeptics are possible only if humans intervene. As what Mr. Cesar Flores had aptly said in the ANC forum, the problem is not so much with the machines but with humans.

This is of course not to say that the we should just remain hopeful that the machines will not bogged down or that we should fully trust the electorate and be complacent. On the contrary we must be more vigilant in protecting our votes and ensuring that the integrity of the electoral system is upheld at all times. So I think that we should stop being so negative about the idea of going automated and instead focus our energies in helping the Comelec make the 2010 automation a success. We must welcome this change and consider it as a tool that will help restore the faith of the people in our electoral system and ultimately in our government.

The CAC in their Post-Election Report stated that “the consequent gains from using the OMR and DRE technologies were diminished by the inability to use them side-by-side with effective change management. There is a need to make all election stakeholders the subject and not the object of technology. Also, there is a need to prepare everyone for change (both psychologically and technically) before change can truly transform everyone’s mindset. Moreover, a change in the electoral values must go hand-in-hand with the desired electoral reforms. For in these situational realities, the problem of corruption cannot be solved by technology alone but by the individual and collective conversion of voters, politicians and election stakeholders.” (Emphasis added) This sentiment was also echoed by Senator Richard J. Gordon, the chief author of RA 9369, in an article he wrote in PDI dated March 21, 2009 and entitled “ Meeting the Test of Credibility.” He said, “One act of reform, of course, will not transform our electoral system and our Comelec into a haven for suffrage. The important thing, however, is that the reform process will now start.xxxxx With this paradigm shift in election management, public trust in our electoral processes can be nurtured again. And our credibility as a democratic society will be enhanced.”

The best tools to prevent the unthinkable from happening would be the acceptance of change and preparation, training and education of all election stakeholders.


BIBLIOGRAPHY

The following reading and research materials has helped me tremendously in completing this paper and supplemented my very limited knowledge on poll automation:

  • Republic Act No. 8436, An Act Authorizing the Commission on Elections to Use an Automated Election System in the May 11, 1998 National or Local Elections and in Subsequent National and Local Electoral Exercises, Providing Funds Therefor and for Other Purposes, December 22, 1997
  • Republic Act No. 9369, An Act Amending Republic Act No. 8436, Entitled “An Act Authorizing the Commission on Elections to Use an Automated Election System in the May 11, 1998 National or Local Elections and in Subsequent National and Local Electoral Exercises, to Encourage Transparency, Credibility, Fairness and Accuracy of Elections, Amending for the Purpose Batas Pambansa Blg. 881, as amended, Republic Act no. 7166 and Other Related Elections Laws, Providing Funds Therefor and for Other Purposes, January 23, 2007
  • A Draft of the Post-Election Report on the Use of Automated Election System (AES) in the 2008 ARMM Elections, submitted to the Joint Congressional Oversight Committee on Automated Election System and the Commission on Elections by the Comelec Advisory Council, October 23,2008 (http://www.cenpeg.org/2010%20ELECTIONS/CAC%20EVALUATION%20REPORT%20ARMM%20ELECTION%202008-11-16.pdf)
  • “Meeting the Test of Credibility” by Senator Richard J. Gordon, Philippine Daily Inquirer, October 21, 2009
  • “Automated Election Fraud,” Mapping the Future by Manuel A. Alcuaz Jr., Philippine Daily Inquirer, July 6, 2009
  • Harry L. Roque Jr. et al vs. Comelec et al, penned by Justice Presbiterio J. Velasco Jr., G.R. No. 188456, September 10, 2009
  • “Premature Campaign; Automation Back-up Plans,” With Due Respect by Former Chief Justice Artemio V. Panganiban, September 20, 2009
  • “A 2010 Poll Automation Forum,” live telecast on ABS-CBN News Channel, 8pm, September 21, 2009

Introduction

As the world enters into the new millennium, technology become more advanced and continues to develop rapidly. However, this advancement has created an impact on the environment resulting to climate change and increase propensity to natural disasters. In particular, the Asian and Pacific region is becoming more vulnerable to disasters. The Philippines being an archipelago whose area lies beneath the Circum-Pacific belt of fire has always been subjected to constant disasters and calamities. In addition, it is visited by an average of twenty typhoons a year. Recent events such as Typoon Ondoy create havoc even on urban areas not prone to floods before. The possibility experiencing disasters such as floods, typhoons, tornadoes, earthquakes, tsunamis, volcanic eruptions, drought, and flashflood is always present.

One of the key short comings identified during the recent disasters is lack of ICT solutions for disaster rescue and recovery. While number of disaster information systems is available, few would provide a robust system for data management support and functionality for disaster management. The World Summit on Information Society (WSIS) and the World Conference on Disaster Reduction endorsed the role of ICTs in effective disaster reduction. Finding affordable ICTsolutions for disaster reduction is a challenge to many nations in the Asian and Pacific region.Free and open source software (FOSS) is increasingly being used in many spheres of ICTsolutions including disaster management (http://www.sahana.lk/wiki/doku.)

The Sahana Free and Open Source Disaster Management System were conceived during the 2004 Dec Asian Tsunami. It was developed to help manage the scale of the disaster and was deployed by the government’s Center of National Operations (CNO) which included the Center of Humanitarian Agencies (CHA). Based on the success of this initial application and dire need good disaster management solutions particularly to handle large scale disasters SIDA funded a second phase through LSF (Lanka Software Foundation) to generalize the application for global use and to help in any large scale disaster. The project now grown to become a globally recognized project with deployments in many other disasters such as the Asian Quake in Pakistan (2005), Southern Leyte Mudslide Disaster in Phillipines (2006) and the Jogjarkata Earthquake in Indonesia (2006). The phase II funded by SIDA did much to foster the capability of the project and the global community (“Sahana Project”, 2005: http://sahana.sourceforge.net).

Following the Tsunami the system was rebuilt from scratch on the stable Free and Open Source technology stack, AMP ( Apache MySQL, PHP/Perl). The system is available for free for anyone to download and customize based on their requirements and the only latest release of Sahana just before the end of phase II has been downloaded over 8000 times from all over the world. The system is tested to work on GNU/Linux, Windows XP, Mac OS X and FreeBSD operating systems and is also available on a LiveCD or which boots up all from a CD drive without requiring installation. The system is very scalable and It can operate standalone on a laptop without network connection for a single responder up to a server cluster for 1000s of users. The focus on design has been on usability, adaptability and resilience to make it suitable for disaster scenarios (http://en.wikipedia.org/wiki/Sahana)

The primordial goal of Sahana is alleviate human suffering and help save lives through the efficient use of IT during a disaster. Its specific objectives is to bring together a diverse set of actors from Government, Emergency Management, NGOs, INGOs, spontaneous volunteers and victims in responding effectively to disasters. Another is to protect victim data and reduce the opportunity for data abuse. Lastly, Provide a Free and Open Source solution end-to-end available to everyone. The scope of the Sahana project is to be an integrated set of pluggable, web based disaster management applications that provide solutions to large-scale humanitarian problems in the relief phase of disaster (http://www .sahana.lk/wiki/doku .php?id=dev:home )

Sahana is a suite of web based sub-applications that provides solutions to different problems with regard to the information required for managing certain coordination problems during post-disaster. Beyond being a database of information the value it provides is in a well structured and usable interface and data design making the management of information simple. In phase II the Sahana project release 8 modules that address these problems called Missing Person Registry, Organization Registry, Request/Pledge Management System, Camp Registry, Inventory Management, Catalog, Messaging and Volunteer coordination.

Web Based Application Features

Helping Families and Next of Kin Find Each Other

Sahana help connect families and acquaintances quickly in order for them to support each other. For example in Sri Lanka there were hundreds of bulletin boards with pictures of missing people being pinned on them. Here IT can help with an on line bulletin board where persons can search by name, appearance, age group. Even if the victims or families do not have access themselves it is quite easy for any authorized NGO/civil society group to hook up to the central portal and provide that service in the area affected. There is also an on-line bulletin board of missing and found people which also captures the information of the person seeking to find their love ones. Pictures of the missing person and information such as the appearance, identity numbers and last known location can easily be uploaded (http://www.sahana.lk/wiki/doku.php?id=dev:home)

Coordinates All Aid Groups and Helping Them to Operate Effectively As One

The Tsunami in 2005 at Sri Lanka resulted in a massive outpour of support from INGOs, NGOs. If all groups are not coordinated effectively it results in problems such as clogged up supply routes, competition for providing support in some areas while other areas suffer a dearth of support. Thus, it will result to waste or surplusage of pledged and aid. The coordination requires a heavy work load if done manually which an It solution can provide and save time and resources. This way they could even self-distribute themselves evenly across affected regions just by being aware what other relief groups are doing (http://demo.sahana.lk/cvs/index.php?mod=mpr)

Capturing the Location of All Temporary Camps and Shelters

This sub-application of Sahana keeps track of the location and basic data of all the shelters in the region. It also provides a geospatial view to plot the location of the camps in the affected area.. Regardless of the type of needed to capture information of where it is located and how many people are in them to be able to know how to distribute aid effectively.

The Sahana Camps Registry

This sub application of Sahana keeps track of the location of all the camps in the region and some basic data on the facilities they might have and the number of people in them.

Effectively Utilizing the Pledges of Aid

During the 2005 Sri Lanka Tsunami there was an unprecedented response in terms of aid and supplies, however even 8 months after the Tsunami it was found out that a lot of those pledges of aid are not utilized. The main reason for this is that there is a lack of awareness and visibility to the aid available between those that require and those that can provide it. For example one NGO might get a specific request for aid, however probably only one of 100s of NGOs actually have supplies of that aid item. It would be impractical for this NGO to check with all those 100s of potential places to see if that item is available. Instead what we need is a well structured central repository of all aid being pledged and a track of detailed requests for aid. (http://demo.sahana.lk/cvs/index.php?mod=mpr).

Sahana Request Management System

The Sahana request management system is a central online repository where all relief organizations, relief works, government agents and camps can effectively match requests of aid and supplies to pledges of support. It effectively looks like an online aid trading system tracking request to fulfillment. It provides data on the request and pledges such as category, units, details and status. It also has the abilty to track partial fulfillment of the request.(http:// demo.sahana.lk/cvs/index.php? mod=cr&act=default)

Other Modules of the system

Inventory Management and Catalog System

Keeps track of inventories at a high enough granularity to account for the chaotic transfer of goods and aid. Features includes: tracking of inventories and item classification, inbuilt catalog based on WHO standards, but fully customizable, tracking of the transfer of goods from one inventory to another, tracking and warning of the expiry of aid items and co version of units to allow for summations (http://demo.sahana.lk/cvs/index.php?mod=rms&act=default)
Source: Sahana Demo Module Database 2007.

Child protection module

Keeps detailed track of children and their needs both in a disaster and conflict situation. This model was build specifically for the NGO Terre des Hommes.

Volunteer management system

Helps track volunteers, their skills and evenly distributes them to affected region for an organization. Features include: tracking of volunteers, their skills and their availability, allocation of volunteers to projects, ability of volunteers to manage their own skill and availability information, ability to search for volunteers based on skill and availability.

Messaging module (SMS / email / CAPs)

The messaging module helps to alert responders and victims of new events in their vicinity as they respond to a disaster: ability to create adhoc groups of SMS numbers and email addresses, ability to send SMS messages through a mobile phone attached to the computer, ability to send messages using the CAPS protocol.

Situation Awareness

This module gives an overview of the situation and allow people to add information on what is happening on the ground. Geographic map of situation with markers capturing incidents and objects and ability to attach a picture and text to a marker (http://en.wikipedia.org/wiki/Sahana).

Free and Open Source Software (FOSS)

There are multiple reasons why Free and Open Source software find a natural fit into humanitarian-ICT applications in general and why there seems to be limited propitiatory alternatives available. They are:

  • Very few countries and organizations today can afford to invest a lot of resources in disaster management when there is no disaster present. While this is obviously true of poor, developing nations, it is also true of richer, developed countries. This is because there are always higher priority items that need funding compared to disaster preparations for a disaster that may or may not happen. A FOSS approach provides a low budget, volunteer supplement and global way to build such systems
  • There is not much commercial interest in developing solutions in this domain as often during humanitarian disasters software licenses are given freely and it almost seems unethical to restrict software. With FOSS there need not even be any delays in getting permission for a license as anyone has the freedom to download the software and use it.
  • Also such systems should be shared, developed and owned globally as the problems they address are all too common for any country dealing with
    a disaster effectively making such software a global public good. The FOSS development and community mechanisms have a proven track record to build such goods.
  • The global community of IT volunteers who can contribute their goodwill to such causes by using their skills to develop and customize FOSS software for the disaster situations
  • As in conflict situations, during disasters segregation arises between Gov, NGOs and INGOs. The main reason is often the urgent circumstances, the lack of transparency and the lack of coordination capacity. So an open and transparent and globally owned system is more likely to be trusted to mediate between the groups. It will also help organizations self-distribute themselves based on what other organizations are doing in the affected region (http://en.wikipedia.org/wiki/Humanitarian-FOSS).
  • Finally no two disasters are alike. There are often localizations and customizations needed for the software before it can get applied effectively to the disasters. Some of these localizations include adding additional meta-data around the entities in the system or translating the system to handle entry in a particular language. With FOSS, the code is available for anyone to quickly pickup and make the needful customizations without restriction. Going the open source way can address the above concerns and using the open source development model, it is possible to develop this software at a much reduced cost compared to pure commercial development models (Chamindra de Silva, Sahana Free Open Sources Disaster Management System: Project Overview, Draft, 2007)

Deployment Strategy

The Sahana system can be deployed on a variety of models, ranging from operating totally within a single notebook computer (with or without a portable Wireless LAN) to a fully distributed, networked platform.

Large Scale Deployment

The normal deployment diagram briefly illustrates what a large scale deployment involving multiple groups may look like. It is often the case that the disaster coordination hub is away from the affected region as shown below and that network based operation is often possible even though the affected region might have their telecommunications infrastructure destroyed.

Available Sahana Installation Packages

Each release of Sahana is packaged in 5 main forms to make it easy for people to download and install it. They are given below:

  1. TAR.GZ Package: This is the source package of Sahana and as PHP is a scripting language (no compilation needed) it is a valid deployable package of Sahana. This is the best package to use for a Windows XP, OS X or FreeBSD installation of Sahana
  2. DEB Package: Debian is the largest community based linux distribution and additionally 100+ other distributions are based on debian
  3. RPM Package: For deployment on a commercial Redhat platform mainly, especially together with IBM servers. Additionally there our other distributions (e.g. CentrOS) that uses RPM compatible to Redhat.
  4. LiveCD Package: This is a Sahana CD package that boots the entire LAMP stack with Sahana pre-configured from the CD drive without touching the harddisk. This is ideal for Sahana demos or it is a portable installation of Sahana to be taken to the field with a USB drive.
  5. LiveUSB Package: This package is like a liveCD except it boot the LAMP base with Sahana pre-configured from a USB flashdisk. Lanka Software Foundation (http://www.linux.lk/ ~chamindra/docs/ Sahana-Brochure.pdf)

Access can be provided in the affected region with the support of groups such as Ericsson who provide wireless LAN based satellite based connectivity to networks (Sahana Free and Open Source Disaster and Management Project, Lanka Software Foundation 2005).

Lightweight Deployment

If such infrastructure does not exist, Sahana being a “lightweight” solution can efficiently scale down to a standalone laptop and a secured portable wireless access point if short-range network collaboration is required. Such a requirement is often the case in a disaster coordination hub when there is no Internet or power during the initial moments post-disaster. The Sahana system has been tested to work with the above equipment at appox 130W, which can be easily support by a solar panel, should power not be available. Additionally none of the applications depend on being connected to the Internet. Sahana also has the ability to synchronize data between multiple instances of Sahana. What this allows for is for responders or district offices to capture data on victims in the field and seamlessly exchange them with the other field offices, headquarters or responders by exchanging data in USB flash drives or CDs (http://en.wikipedia.org/wiki/Sahana).

Constraints on System

The system is quite flexible to handle different humanitarian disasters but it is Important to specify the boundaries of this system and allow it to focus on its scope and purpose. It must be used in relief, recovery and rehabilitation effort and not to be extensible beyond this. The system is not supposed to be extended to a government data center or similar registry of citizens. The technologies used on this project will have to conform to a FOSS license to ensure it is freely available to anyone.

To ensure ROI and utilization of this system, the Sahana project will have to be presented and showcased to many different organizations to bring up awareness and visibility of the availability of such a project to handle disaster response efforts. Typical place where we to present this system are at disaster management conferences, FOSS conferences, NGOs (Red cross, CARE, Transparency international, etc) relevant UN groups and governments. NGOs and similar groups in particular can serve to provide a lot of domain oriented requirements. It will also have to be hosted on its own website (Sahana Project”, 2005, http://sahana.sourceforge.net/)

Recognition of Sahana and Humanitarian-FOSS

Sahana has gained a tremendous amount of recognition in it’s short tenure both for the project and for the concepts it promotes, which is the application of FOSS for humanitarian ICT problems. The above alignment to FOSS was generalized and named “humanitarian-FOSS”, which is effectively the application of free and open source software to alleviate human suffering and was coined by the Sahana project. This concept finds a natural home not just in disaster management, but in a superset that extends to humanitarian ICT or any other ICT requirement which concerns the improvement of human welfare. We found that the currently taxonomies of projects on well known open source repositories like source forge or fresh meat does not presently allow us to bucket such projects easily and often get dropped into a miscellaneous classification bucket. However we believe there is a lot of potential for growth in this area and if positioned and promoted well, there should be many volunteers flocking to build and contribute to such projects globally, especially as the open source community operates with a strong set of ethics for the benefit of the community at large.

The concept is recognized by the Free Software Foundation (FSF), known as one of the two leading organizations responsible for the FOSS movement. The founder of FSF, Richard Stallman’s aspiration has been “help thy neighbor with software”, where projects like Sahana comes as a specialization of this where it is “help alleviate human suffering with software”. In recognition of this the FSF has created a new award for social benefit that was inspired by the Sahana project. (http://newsvac.newsforge.com/newsvac/05/11/05/0553230.html, http://www.fsf.org/news/social-benefit-award.html, http:// www. tectonic.co.za /view.php?id686)

Impact on Disasters in the Philippines

PD 1566 The National Calamity Preparedness Plan (Legal Bases of the Philippine Disaster and Management System, March, 2008).

“This Plan embraces all conceivable contingencies, making use of all available resources, both government and private. It also develops self-reliance by promoting and encouraging the spirit of self-help and mutual assistance among the local officials and their constituents. Each political and administrative subdivision of the country shall utilize their own resources before asking for assistance from neighboring entities or higher authority. While emergency preparedness is a joint responsibility of the national and local governments, its effectiveness will depend largely on the skills and resources and the involvement of private organizations and the general public in the area of disasters. Regular exercises and drills will be conducted at all levels to enhance the people’s reaction capability and ensure precision and spontaneity in responding to emergencies. The Regional offices of the departments shall provide similar support/assistance to the Regional Disaster Coordinating Council.”

This relationship shall be maintained down the line to the Barangay Disaster Coordinating Councils and their respective Disaster Operations Centers .Disaster Councils at the Regional, Provincial, Municipal/City and Barangay levels shall be established to complement the National Disaster Coordinating Council. Each Council shall have staff elements, stationed in their respective operations centers, composed of the following:

  • Damage Assessment and Needs Analysis Unit;
  • Emergency Management Information Service Unit;
  • Vulnerability Risk Reduction Management Unit;
  • Plans and Operations Unit; and a
  • Resource Unit;

Each council shall provide operating units for:

  • Communication Transportation Service and Early Warning Service;
  • Health Service;
  • Auxiliary Fire and Police Service;
  • Relief and Rehabilitation Service;
  • Public Information Service; and
  • Rescue, Evacuation and Engineering Service

Among the salient provisions of PD 1566 are the following:

  1. State policy on self- reliance among local officials and their constituents in responding to disasters or emergencies;
  2. Organization of disaster coordinating councils from the national down to the municipal level;
  3. Statement of duties and responsibilities of the National Disaster Coordinating Council (NDCC), RDCC and LDCCs;
  4. Preparation of the National Calamities and Disaster Preparedness Plan (NCDPP) by OCD and implementing plans by NDCC member-agencies;
  5. Conduct of periodic drills and exercises; and
  6. Authority for government units to program their funds for disaster preparedness activities in addition to the 2% calamity fund as provided for in PD 474 (amended by RA 8185)

The software has subsequently been used by both the Government and civil society in other disasters around the world. These include the Philippines Mudslide Disaster – February 2006. On February 17, 2006, a devastating mudslide killed over 1,800 Filipinos in Guinsaugon in the southern part of Leyte Island in the Philippines. IBM immediately contacted the Sahana core team and the Lanka Software Foundation to deploy Sahana. IBM provided an initial list of required customizations for the Philippines deployment. The customizations were analysed and divided into two groups. The first groups of simple modifications were those that could be directly completed by Sahana clients using the administrative interface. One paragraph about what this interface can support. The second group of customizations required significant modification to the core modules of Sahana. Organization registry, Camps registry, Missing persons and Request management system were heavily customized. To streamline the customization process, a demonstration server for the ongoing modifications was setup at http://www.sahana.lk and the IBM team continually reviewed the customizations. The major modifications were completed within 7 days. Over the course of the disaster, approximately 50 organizations and about 1000 missing people were managed and five camps were also established and supported (http://www.stii.dost.gov.ph/sntpost/NewPOST/JanMar2006/IT_helps_Guinsaugon_rise_again.html)

The following is a quote from Avelino J. Cruz, Jr., Secretary of National Defense, Philippines, to exemplify the impact Sahana had as a disaster
management system:

“The NDCC and OCD value SAHANA’s contribution to the relief and rehabilitation phases of the Southern Leyte landslides and recognize the tremendous boost to our preparedness for future disasters. While SAHANA cannot solve all the problems in a disaster, it is an excellent tool
to create registries that can provide timely and reliable information on missing persons, donated goods and services, camp locations, and the like. It is technology that can help many people in a disaster. In fact, there is no greater innovation that matters more than that which saves lives.” (http://www.emdat.net/documents/bangkok06/PhilippinesManagingDisasterInfo.pdf#search=%22sahana%20philippines%22http://202.90.128.18/index.php?mod=or&act=view_org)

Disaster losses can be reduced through observations relating to hazards such as: wildland fires; volcanic eruptions; earthquakes; tsunamis; subsidence; landslides; avalanches; ice; floods; extreme weather; and pollution events. Systems implementation will bring a more timely dissemination of information through better coordinated systems for monitoring, predicting, risk assessment, early warning, mitigating, and responding to hazards at local, national, regional, and global levels.

After experiencing the destruction of the Leyte mudslide, the havoc created by typhoons such as Milenyo, Ondoy and Feria, The PDCC and LGU’s must consider the use of free and open source software as an important part of their strategic thrust in information technology, requiring that its use be considered when it provides a feasible alternative to propriety software. Developing countries like Philippines, with the resources constraints they face, view free and open source software as a means to reduce the cost of IT investmentsand increase its productivity. The imperatives to adopt free and open source software in particularly in public the sector are motivated by the desire for independence, security and autonomy and as a means to address intellectual property rights enforcement. Open source plays a key role among development agencies including NGOs and INGO’s for effective disaster rescue and recovery. Sahana is web-based free and open source software especially designed for disaster management.

Introduction of the Sahana system made relief efforts more efficient. It improved rapid information sharing and coordination to avoid redundancy, wastage and to provide aid to the right place at the right time. Besides, it provided situational awareness on tracing people and aid distribution which acted as a decision support for policy makers. This resulted in less over laps and more efficient distribution of relief among the victims. Due to the success of Sahana system in alleviating human suffering during Tsunami, it was adopted by Pakistan and Indonesia to manage their respective disasters.

Conclusion and Recommendation

Sahana has been used to manage past disasters in Philippines. This proves that Sahana Disaster and Management System is applicable and useful in times of natural calamities in the country and must be adopted as part of their national disaster management strategy.

Sahana can be of immense help to Asian and Pacific member countries, where 42 percent of the world disasters have occurred during the past three decades (http://www.earthquakepakistan.com images /IBM_CRT_Pakistan_Mission_Report.pdf )

The Philippines should invest in disaster management customized and pre-deployed Sahana in preparation for future disasters. It must be customized to cater or respond to typhoons and flood which is the common calamity our country expected to be encountered endlessly.

In this context, Sahana, provides the best option as it is already being developed and customized for disaster management. It offers low cost, volunteer supplemented, global system for disaster management. There is little commercial interest in developing open source solutions during humanitarian disasters when proprietary software is freely available. But Sahana could be downloaded free and use without any licensing fees.

Sahana is a global public good and available for anyone who desires to help in any humanitarian cause. Customization would include localization into the indigenous languages and having voice portals for counties with low literacy rates. The interfaces will include metric oriented reports customized to the decision makers of the various organizations and also a roll up of the public data should be provided to assess the overall impact and relief estimates of the disaster. It should also provide transparency to the aid donors to give a degree of comfort on effectiveness of their sponsored organization. At the same time the information should be secured and should reduce the possibility of data privacy violation or abuse for adverse reasons (e.g. identify theft, property theft). The Philippines have to be receptive and sensitive to these challenges must utilize least cost IT solutions to manage natural disasters. Hence, supporting the development of Sahana disaster management system could be a core objective in the regional agenda to fight against natural disasters.


References:


I. INTRODUCTION

Mankind’s survival in his only planet called Earth is in peril. Global warming or climate change is currently the biggest threat to man’s existence. Is it really happening? If yes, are humans causing it?

Yes. Earth is already showing many signs of worldwide climate change.

  • Average temperatures have climbed 1.4 degrees Fahrenheit (0.8 degree Celsius) around the world since 1880, much of this in recent decades, according to NASA’s Goddard Institute for Space Studies.
  • The rate of warming is increasing. The 20th century’s last two decades were the hottest in 400 years and possibly the warmest for several millennia, according to a number of climate studies. And the United Nations’ Intergovernmental Panel on Climate Change (IPCC) reports that 11 of the past 12 years are among the dozen warmest since 1850.
  • The Arctic is feeling the effects the most. Average temperatures in Alaska, western Canada, and eastern Russia have risen at twice the global average, according to the multinational Arctic Climate Impact Assessment report compiled between 2000 and 2004.
  • Arctic ice is rapidly disappearing, and the region may have its first completely ice-free summer by 2040 or earlier. Polar bears and indigenous cultures are already suffering from the sea-ice loss.
  • Glaciers and mountain snows are rapidly melting—for example, Montana’s Glacier National Park now has only 27 glaciers, versus 150 in 1910. In the Northern Hemisphere, thaws also come a week earlier in spring and freezes begin a week later.
  • Coral reefs, which are highly sensitive to small changes in water temperature, suffered the worst bleaching—or die-off in response to stress—ever recorded in 1998, with some areas seeing bleach rates of 70 percent. Experts expect these sorts of events to increase in frequency and intensity in the next 50 years as sea temperatures rise.
  • An upsurge in the amount of extreme weather events, such as wildfires, heat waves, and strong tropical storms, is also attributed in part to climate change by some experts. [1]

The sad reality regarding the changes abovementioned is that humans are very likely to have caused the same.

  • Industrialization, deforestation, and pollution have greatly increased atmospheric concentrations of water vapor, carbon dioxide, methane, and nitrous oxide, all greenhouse gases that help trap heat near Earth’s surface.
  • Humans are pouring carbon dioxide into the atmosphere much faster than plants and oceans can absorb it.
  • These gases persist in the atmosphere for years, meaning that even if such emissions were eliminated today, it would not immediately stop global warming.
  • Some experts point out that natural cycles in Earth’s orbit can alter the planet’s exposure to sunlight, which may explain the current trend. Earth has indeed experienced warming and cooling cycles roughly every hundred thousand years due to these orbital shifts, but such changes have occurred over the span of several centuries. Today’s changes have taken place over the past hundred years or less.
  • Other recent research has suggested that the effects of variations in the sun’s output are “negligible” as a factor in warming, but other, more complicated solar mechanisms could possibly play a role.[2]

Our country was not spared by the devastation caused by these natural calamities. A month ago, the Philippines was battered by successive super typhoons which meteorologists claimed were the effect of global warming.

In this time of cyber technology and development, can we use these advancements in technology as an instrument to heal Mother Nature or this technology contributes to its further degradation.

II. TOXICITY OF ELECTRONIC DEVICES (E-WASTE)

In today’s fast-moving digital age of high-technology electronic products, the unfortunate by- products are the obsolescent equipment that gets discarded.

One estimate suggests that by 2010, 100m phones and 300m personal computers will be thrown on the rubbish tip.

Most of these contain toxic cocktail of substances including lead, mercury and arsenic.

At the moment a lot of this waste ends up, often illegally, in dumping sites around the globe, especially in the developing world.

Computers and mobile phones contain a large variety of chemicals and plastics which can cause serious harm if not dealt with correctly.

Eric Karofsky from AMR Research advises companies about getting rid of such troublesome waste.

“There are all sorts of problems. These are toxic materials that need to be collected and recycled appropriately.

“If not, they are severe environmental hazards for both the population that lives near landfills as well as the world.”

“Ideally an approved collector will accept it,” Mr Karofsky adds. “They will erase data on the hard drive or destroy it physically.”

He feels that unless companies are punished there will always be computer waste ending up illegally dumped in Africa, India and China.

“Until severe financial penalties are levied upon the brands, these laws will not help much.”

A 2005 study by the environmental group Greenpeace found that as much as 47% of waste found at 18 European seaports was illegal, much of it toxic and headed for export. [3]

This similar predicament is also a reality in the Philippines. Electronic device purchases in the Philippines are increasing despite the dire economic situation. People are buying more computers, mobile phones and electric appliances, as prices are going down and performance improving. However, few are aware of the dangers of electronic waste. [4]

While electronic waste in the Philippines remains low, environmental group Greenpeace warns that the lack of legislation against proper disposal and management of e-waste could have dire effects on the country’s ecology and human health in the future. [5]

The European Union (EU) has already foreseen the impact of the IT industry on the production of e-waste. The EU has signed into law the Waste Electrical and Electronic Equipment Directive” that requires manufacturers, private firms and individuals to properly dispose obsolete electronic equipment.

Different states in the United States have implemented their own e-waste disposal directives with others totally banning electronic devices being thrown in landfills.

Such specific law on e-waste is not available in the Philippines. Even the National Solid Waste Management Commission generally designates electronic garbage as one of the “special garbage” based on the definition of the Ecological Solid Waste Management Act of 2000, the only law the mentions electronic devices. There is also no long-term study made about e-waste in the Philippines. [6]

Due to the lack of proper legislation and take back initiatives from private companies selling computer equipment, Greenpeace Southeast Asia Toxic Waste Campaigner Beau Baconguis said the Philippines could suffer from an e-waste problem in the next five years.

She said the Philippines is also becoming host to many call centers and business process outsourcing companies that purchase and eventually replace computers after three to four years.

Baconguis said they have approached members of the House of Congress several times in the past years to lobby for an electronic waste law.

However, political upheavals and lack of understanding of the environmental issues related to e-waste among lawmakers placed proposed legislations in the backburner, she said. [7]

However, despite the current political and legislative status regarding such initiatives the computer industry is increasingly waking up to the need to control where its products end up when their useful life is over.

III. GREEN COMPUTING [8]

Green computing or green IT, refers to environmentally sustainable computing or IT. It is “the study and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems—such as monitors, printers, storage devices, and networking and communications systems—efficiently and effectively with minimal or no impact on the environment.

Green IT also strives to achieve economic viability and improved system performance and use, while abiding by our social and ethical responsibilities. Thus, green IT includes the dimensions of environmental sustainability, the economics of energy efficiency, and the total cost of ownership, which includes the cost of disposal and recycling. It is the study and practice of using computing resources efficiently.”

With increasing recognition that man-made greenhouse gas emissions are a major contributing factor to global warming, enterprises, governments, and society at large now have an important new agenda: tackling environmental issues and adopting environmentally sound practices. Greening our IT products, applications, services, and practices is both an economic and an environmental imperative, as well as our social responsibility. Therefore, a growing number of IT vendors and users are moving toward green IT and thereby assisting in building a green society and economy.

The goals of green computing are similar to green chemistry; reduce the use of hazardous materials,
maximize energy efficiency during the product’s lifetime, and promote recyclability or biodegradability of defunct products and factory waste.

A number of focus areas and activities were identified as the primary concern for green computing. These are: design for environmental sustainability; energy-efficient computing; power management; data center design, layout, and location; server virtualization; responsible disposal and recycling; regulatory compliance; green metrics, assessment tools, and methodology; environment- related risk mitigation; use of renewable energy sources; and eco-labeling of IT products.

Modern IT systems rely upon a complicated mix of people, networks and hardware; as such, a green computing initiative must be systemic in nature, and address increasingly sophisticated problems.

Elements of such a solution may comprise items such as end user satisfaction, management restructuring, regulatory compliance, disposal of electronic waste, telecommuting, virtualization of server resources, energy use, thin client solutions, and return on investment (ROI).

The imperative for companies to take control of their power consumption, for technology and more generally, therefore remains acute. One of the most effective power management tools available in 2009 may still be simple, plain, common sense.

Below, are the few green computing initiatives being pursued and implemented by various technology developers.

A. Approaches to green computing [9]

a. Algorithmic efficiency

The efficiency of algorithms has an impact on the amount of computer resources required for any given computing function and there are many efficiency trade-offs in writing programs. As computers have become more numerous and the cost of hardware has declined relative to the cost of energy, the energy efficiency and environmental impact of computing systems and programs has received increased attention. A study by Alex Wissner-Gross, a physicist
at Harvard, estimated that the average Google search released 7 grams of carbon dioxide (CO2).

However, Google disputes this figure, arguing instead that a typical search produces only 0.2 grams of CO2. Algorithms can also be used to route data to data centers where electricity is less expensive. MIT, Carnegie Mellon University, and Akamai project up to a 40 percent savings on energy costs.

b. Virtualization

Computer virtualization refers to the abstraction of computer resources, such as the process of running two or more logical computer systems on one set of physical hardware. The concept originated with the IBM mainframe operating systems of the 1960s, but was commercialized for x86-compatible computers only in the 1990s. With virtualization, a system administrator could combine several physical systems into virtual machines on one single, powerful system, thereby unplugging the original hardware and reducing power and cooling consumption. Several commercial companies and open-source projects now offer software packages to enable a transition to virtual computing. Intel Corporation and AMD have also built proprietary virtualization enhancements to the x86 instruction set into each of their CPU product lines, in order to facilitate virtualized computing.

c. Terminal Servers

Terminal servers have also been used in green computing methods. When using terminal servers, users connect to a central server; all of the computing is done at the server level but the end user experiences the operating system. These can be combined with thin clients, which use up to 1/8 the amount of energy of a normal workstation, resulting in a decrease of energy costs and consumption. There has been an increase in using terminal services with thin clients to create virtual labs. Examples of terminal server software include Terminal Services for Windows, the Aqua Connect Terminal Server for Mac, and the Linux Terminal Server Project (LTSP) for the Linux operating system.

d. Power management

The Advanced Configuration and Power Interface (ACPI), an open industry standard, allows an operating system to directly control the power saving aspects of its underlying hardware. This allows a system to automatically turn off components such as monitors and hard drives after set periods of inactivity. In addition, a system may hibernate, where most components (including the CPU and the system RAM) are turned off. ACPI is a successor to an earlier Intel- Microsoft standard called Advanced Power Management, which allows a computer’s BIOS to control power management functions.

Some programs allow the user to manually adjust the voltages supplied to the CPU, which reduces both the amount of heat produced and electricity consumed. This process is called undervolting. Some CPUs can automatically undervolt the processor depending on the workload; this technology is called “SpeedStep” on Intel processors, “PowerNow!”/”Cool’n’Quiet” on AMD chips, LongHaul on VIA CPUs, and LongRun withTransmeta processors.

e. Power supply

Desktop computer power supplies (PSUs) are generally 70–75% efficient, dissipating the remaining energy as heat. An industry initiative called 80 PLUS certifies PSUs that are at least 80% efficient; typically these models are drop-in replacements for older, less efficient PSUs of the same form factor. As of July 20, 2007, all new Energy Star 4.0-certified desktop PSUs must be at least 80% efficient.

f. Storage

Smaller form factor (e.g. 2.5 inch) hard disk drives often consume less power per gigabyte than physically larger drives.

Unlike hard disk drives, solid-state drives store data in flash memory or DRAM. With no moving parts, power consumption may be reduced somewhat for low capacity flash based devices. Even at modest sizes, DRAM-based SSDs may use more power than hard disks, (e.g., 4GB i-RAM uses more power and space than laptop drives). Though most flash based drives are generally slower for writing than hard disks, in a recent case study Fusion-io, manufacturers of the world’s fastest Solid State Storage devices, managed to reduce the carbon footprint and operating costs of MySpace data centers by 80% while increasing performance speeds beyond that which is was attainable by multiple hard disk drives in Raid 0. In response, MySpace was able to permanently retire several of their servers, including all heavy-load servers, further reducing their carbon footprint.

As hard drive prices have fallen, storage farms have tended to increase in capacity to make more data available online. This includes archival and backup data that would formerly have been saved on tape or other offline storage. The increase in online storage has increased power consumption. Reducing the power consumed by large storage arrays, while still providing the benefits of online storage, is a subject of ongoing research.

g. Video Card

A fast GPU may be the largest power consumer in a computer.

Energy efficient display options include:

  • No video card – use a shared terminal, shared thin client, or desktop sharing software if display required.
  • Use motherboard video output – typically low 3D performance and low power.
  • Select a GPU based on average wattage or performance per watt.

h. Display

LCD monitors typically use a cold-cathode fluorescent bulb to provide light for the display. Some newer displays use an array of light-emitting diodes (LEDs) in place of the fluorescent bulb, which reduces the amount of electricity used by the display.

i. Materials recycling

Computer systems that have outlived their particular function can be repurposed, or donated to various charities and non-profit organizations. However, many charities have recently imposed minimum system requirements for donated equipment. Additionally, parts from outdated systems may be salvaged and recycled through certain retail outlets and municipal or private recycling centers.

Recycling computing equipment can keep harmful materials such as lead, mercury, and hexavalent chromium out of landfills, but often computers gathered through recycling drives are shipped to developing countries where environmental standards are less strict than in North America and Europe. The Silicon Valley Toxics Coalition estimates that 80% of the post-consumer e-waste collected for recycling is shipped abroad to countries such as China, India, and Pakistan.

Computing supplies, such as printer cartridges, paper, and batteries may be recycled as well.

j. Telecommuting

Teleconferencing and telepresence technologies are often implemented in green computing initiatives. The advantages are many; increased worker satisfaction, reduction of greenhouse gas emissions related to travel, and increased profit margins as a result of lower overhead costs for office space, heat, lighting, etc. The savings are significant; the average annual energy consumption for U.S. office buildings is over 23 kilowatt hours per square foot, with heat, air conditioning and lighting accounting for 70% of all energy consumed. Other related initiatives, such as hotelling, reduce the square footage per employee as workers reserve space only when they need it. Many types of jobs — sales, consulting, field service — integrate well with this technique.

Voice over IP (VoIP) reduces the telephony wiring infrastructure by sharing the existing Ethernet copper. VoIP and phone extension mobility also made Hot desking and more practical.

IV. CONCLUSION

We are currently living in a fast-paced and challenging times. Products being offered nowadays have convenience of use as a major factor. In order to satisfy convenience, technology is creating and innovating ways to make life simple and within reach for the modern man. However, this progress and development lead to man’s own undoing. Care and nurture of the environment were sacrificed as payment for these. The tell-tale signs are evident. Is it too late for mankind to reverse the effects of the abuses he did?

Through the efforts, concerted and unified, from people of all nations, man can triumphantly overcome this problem. Every people in every nation are requested to be aware in their activities that contribute to global warming. People are told to recycle and reuse. Consciousness regarding waste management is aroused in their minds. As a result, computer companies were also encouraged to contribute to this movement. These companies did not turn a deaf ear to such request. Technology as we know now is developing advances in their field conscious and aware of environmental changes they can offer to save nature.

The Philippines is among the nations which clamor for environmental protection. However, legislation towards this subject has yet to be initiated. Our legislators are pre-occupied with political bickering that, in a way, they forget or neglect this most pressing issue in our midst. Legislation on the regulation and control in the use of cyberspace is an important aspect in today’s human activities.

However, law on the care of the environment is a subject that should take precedence over the latter.

Enforcement of laws involving regulation and control of cyberspace will be ineffectual when, in the future, the only planet, our Mother Earth, will become a desolate and arid wasteland.


Footnotes

[1] Global Warming Fast Facts. http://news.nationalgeographic.com/news/2004/12/1206_041206_global_warming.html

[2] Ibid.

[3] Takatsuki, Yo. Dealing with Toxic Computer Waste. http://news.bbc.co.uk/2/hi/business/6110018.stm

[4] Article by Alexander Villafania from Inquirer.net. Finding reuse for Electronic refuse. http://www.envirocycle‐inc.com/news.php

[5] Villafania, Alexander Inquirer.net. Greenpeace warns of future dangers of e‐waste in RP. http://blogs.inquirer.net/insidescience/2008/07/31/greenpeace‐warns‐of‐future‐dangers‐of‐e‐waste‐in‐
rp/

[6] Article by Alexander Villafania from Inquirer.net. Finding reuse for Electronic refuse. http://www.envirocycle‐inc.com/news.php

[7] Villafania, Alexander Inquirer.net. Greenpeace warns of future dangers of e‐waste in RP. http://blogs.inquirer.net/insidescience/2008/07/31/greenpeace‐warns‐of‐future‐dangers‐of‐e‐waste‐in‐
rp/

[8] Green Computing from Wikipedia, the free encyclopedia. http://en.wikipedia.org/wiki/Green_computing

[9] Ibid.



Author licensed this article under Creative Commons Attribution 3.0 Philippine license