You are on page 1of 28

The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

THE PHILIPPINE QUARTERLY THE OFFICIAL PUBLICATION OF THE


ARELLANO UNIVERSITY SCHOOL OF LAW

IT Law Journal E-LAW CENTER AND IT LAW SOCIETY

VOLUME 1, N UMBER 2

what’s
Inside
E-COUR
E-COURT: CHANGING THE TRIAL ENVIRONMENT
OURT
by Ma. Cristina A. Ramos
1 T-C
E OURT: CHANGING THE
RIAL ENVIRONMENT

2E DITORIAL

P HILIPPINE
FIGURES

4 IWMD?
M

7 IRS
D
EANS OF

NTERNET
I
F ACTS

S THERE SUCH A THING AS


T HE W EB AS A
ESTRUCTION:
THE SUPPOSED THREAT OF
CYBERTERRORISM

D ECENCY
EGULATION VS . F REE
& n November 2003, a
Memorandum of Agreement (MOA) was
signed by Sen. Aquilino Pimentel Jr., Court
Administrator Presbitero Velasco Jr. and
Mayor Jejomar Binary of the City of Makati
for the installation of the country's first
electronic court.

The electronic court (E-court) project is an


initiative of Sen. Pimentel, driven by his desire
implement Section 16 of the Bill of Rights
providing for the litigants' right to speedy
disposition of cases. It is well recognized that
the time spent by the parties in waiting for the
transcript of stenographic notes is a fact most
contributory to the current 'at a snail's pace'
disposition of cases. With the computerization
of the transcription, the parties will be assured
that before they leave the courtroom, they
will have the copies of the transcript of the
PEECH (THE US CASE OF
ASHCROFT VS. ACLU) to allow the courts to maximize the use of proceedings with them.
technology in enhancing the court processes.
For its initial budget, Sen. Pimentel allocated Moreover, for an enhanced case
FROM FREE TO FEE?
10 P2 million of his Priority Development management or case administration, the
project includes a computer linkage to the
Assistance Fund. A counterpart of P2 million
15 JC URISPRUDENCE
YBERLAW
IN
shall be provided by the city government of
Makati. The installation of E-courts in other
Supreme Court. This feature will allow the
Office of the Court Administrator to effectively
regional trial courts will depend on the monitor the cases pending in the trial court
16 IGATT
NTERNATIONAL E-TRADE:
VS. GATS
willingness of the local government units to
provide a counterpart amount to shoulder the
and to check the letter's compliance with the
guidelines and rules issued by the Supreme
initial budget of said courts. Court as regards the disposition of the cases
17 LT EXICON OF C YBERLAW
ERMINOLOGIES
Features of the E-court
before it. Surely, this will be an effective
measure for the High Court to exercise its
supervisory functions over the lower courts.
18 PC21 HILIPPINES AS KNOWLEDGE
ENTER OF A SIA IN THE The E-courts will have three major
Perhaps the best feature of the E-court project
ST CENTURY innovations, namely: computer-aided
transcription (CAT) facilities, case is the tele-video conference room. This is a
administration or case management system closed-circuit video room which allows child
21 RAR MENDMENTS TO TEH 1998
ULES OF THE HOUSE OF and tele-video conference room. witnesses to testify outside the courtroom but
EPRESENTATIVES within its vicinity to prevent them from being
E LECTORAL T RIBUNAL
(HRET) The computer-aided transcription facilities will intimidated or influenced by the accused or
allow courts to provide transcripts of the other persons. This facility will certainly protect
proceedings to be printed and distributed at vulnerable witnesses especially children
22 L REGAL CITATION: WEBSITES
AS EFERENCE the end of every hearing. With these facilities,
parties will not have to wait for weeks or even
whose appearance before the courts could
be traumatic to them.
months before they can be furnished with
26 [LBEGALWEB]
WWW.SUPREMECOURT.GOV.PH:
RINGING THE JUDICIARY
copies of the transcripts of the proceedings. To illustrate the advantage of the child witness
room, Atty. Ivan John Uy, Chief of the
CLOSER TO THE PUBLIC
The introduction of this digital recording and >> [ 3 ] E-Court
transcription system in our courts will best
28 DH-L
E AW CENTER EXECUTIVE
IRECTOR ATTENDS
ARVARD INTERNET LAW
PROGRAM 1
Editorial

T he e-Law Center
would like to publicly express its
deepest appreciation to the Arellano
University School of Law and the
Arellano Law Foundation, particularly
to Dean Mariano Magsalin Jr. and Mr.
Florentino Cayco III, for their
unwavering commitment to make the
law school at the forefront of cyber law
of helping the Center in the realization
of its vision and various activities entails
a lot of personal sacrifice considering
the fact that almost all of them are
working students, not to mention the
rigors of their law studies.

Very few people in our country realize


how global developments in
education, research, advocacy in the information technology have sharply
country. increased during the last decade. The
observation that information technology
With their continuing support, the e- would affect the way people live is a
Law Center was able to cause the certainty, and not a mere fallacious
publication of this IT Law Journal, now statement. As the demand for
on its second issue. In my capacity as information technology increases, the
Executive Director of the Center, I was need to address related legal concerns
also fortunate to participate in the and issues also grow in the same The issue also carries an article on
2004 Internet Law Program of the proportion. Hence, there is no iota of cyberterrorism, or as the author puts
Berkman Center for Internet and doubt that the vision set by the law it: “Web as a Means of Destruction”
Society of the Harvard Law School last school in 1997 to produce technology (WMD). The recent decision of the US
May 2004. The website oriented lawyers and professors Supreme Court in the case of “Ashcroft
www.lawphil.net is fast becoming the appropriately responds to global vs. ACLU” on the constitutionality of
leading repository of on-line legal trends. Expect the e-Law Center to be the Child On Line Protection Act
resources and jurisprudence in the at the forefront in the realization of (COPA) is also discussed in this journal.
country. this vision. The case presented a constitutional
clash between the government’s right
On a personal note, I also wish to In this issue, the banner story is the to regulate Internet content and the
commend the dedication and electronic court (e-Court) project right of the people to free speech. For
invaluable contributions of Arellano initiated by Senator Aquilino Pimentel the legal web section, this issue features
law students who compose the IT Law Jr. in cooperation with Supreme Court the website of the Philippine Supreme
Society headed by Michael Vernon M. Administrator Presbitero Velasco Jr. Court, accessible at
Guerrero. I recognize that their task and Makati City Mayor Jejomar Binay. www.supremecourt.gov.ph.

Editorial Board The Philippine Quarterly IT Law Philippine IT Facts and Figures
Journal is the official publication of the e-
C HAIRMAN Women’s Internet Usage 1
in the Philippines
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

Law Center and the IT Law Society of the


Atty. Jaime N. Soriano, CPA, MNSA Arellano University School of Law. It is
published quarterly. Women as % of Internet Users,
M EMBERS 2000 51.0
Ailyn L. Cortez Contributions to the Philippine Quarterly IT
Charilyn A. Dee Law Journal express the views of their authors Total Women Internet users
and not necessarily the views of the Arellano in 000s 76.5
Jhonelle S. Estrada
Peter Joseph L. Fauni University School of Law.
Total number Internet users
Carlyn Marie Bernadette C. Ocampo- For subscriptions, contact: in 000s 150
Guerrero
Michael Vernon M. Guerrero THE PHILIPPINE QUARTERLY Internet users as % of total
Ma. Cristina A. Ramos It Law Journal population 0.6
e-Law Center
2/F Heilbronn Hall Female professionals and
Arellano University School of Law technical workers as % of total 65.1
Volume 1, Issue 2 Taft Avenue corner Menlo Street
Pasay City 1300 Philippines Female literacy rates 94.3
© 2004. All Rights Reserved. Tels. +63 2 404-3089, 404-3090, 404-3091
Reconstituted November 2006. Proportions http://www.arellanolaw.net Source:
may differ slightly from original printed copy. itlawjournal@arellanolaw.net 1
Hafkin and Taggart (2001)

2
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2
<< [ 1 ] E-Court everything will be digitized so that it Atty. Uy discussed the possible set-up
would be a paperless court. The of a paperless court. He said that big
Management Information System project, as conceptualized, does not law firms would be allowed to enroll
Office (MISO) of the Supreme Court, include a system that allows electronic in the digital court system so that they
gave as an example the examination filing of pleadings. will have an access to the system.
of a child who was allegedly raped by There would be a virtual terminal
her father or uncle. "The concept of the E-court is to wherein the documents (pleadings,
provide technological facility available motions, etc.) from the enrolled law
With the present procedure in our now that is most cost-effective and yet firms will be sent to the Supreme Court
courts, the child will have to expose will have significant impact on the and it will be the Supreme Court who
herself to an embarrassing and courtroom," Atty. Uy said. will send the document to the trial
traumatic experience connected with courts. He said that for authentication
the litigation of the rape case as she As the project is intended to be purposes a centralized processing of
will have to narrate before the court implemented the soonest possible time, documents must be had. Otherwise,
the rape incident with the accused in only those things that are workable in there would be difficulties in the
front of her and with all the relatives a short period were considered, management of traffic and in the
and neighbors attending the hearing. placing special emphasis on the budget validation of the legitimacy of the law
"It is already such a trauma being a constraints. firm.
victim; you're all again a victim the
second time when you have to narrate Doing a paperless court where Moreover, the MISO Chief stressed that
it in front of that kind of audience. For everything is digitized requires solving it would be very expensive if the
an adult, it is already traumatic. "what a lot of other issues. First, a lot of rules judiciary will install multiple servers lieu
more for a child?" said Atty. Uy. have to be changed; Second, a of a central processing office. With the
paperless court in which everything is country's dwindling resources, the
Certainly, this is what the child witness digitized has a huge funding judiciary will just have to make the best
room seeks to prevent-the traumatic requirement; Third, most of the judges out of its finances.
effect on the child brought about by in the trial courts do not want to read
testifying in front of the judge, the the text of the cases in the computer With the current efforts of the Supreme
accused and other people. Aside from monitor. They still prefer to read them Court, the optimistic outlook of Atty. Uy,
the features mentioned above, the E- on paper. Most probably, therefore, the assistance of the likes of Sen.
court will also have a website for despite the e-filing, judges would still Pimentel, and the cooperation of the
dissemination of information to the ask to have the e-filed motions, local government units, full automation
public regarding the cases filed pleadings and other orders and notices of the judiciary will soon be realized.
therein. printed on paper. Taking these factors There will be expediency in the
into consideration, a paperless court disposition of cases. The rights of both
Currently, the project is lodged before is not feasible at this point in time, parties will be observed. They will be
the Urban Development Division of the according to the MISO Chief. accorded with protection from
City of Makati- The division is emotional harm. Justice will be the end
preparing for the specifications of the Towards a digital court in view. When that time comes, it will
facilities to be submitted to the not just be a victory of a party in a
procurement office of the Department Optimistic as he is, Atty. Uy said that case. Rather, it will be a victory of all
of Budget and Management. the High Court would probably start its the party litigants as the best interest
initiative towards a paperless court in of justice is served.
Not a paperless court five years' time. However, he foresees
that full automation of the courtroom * Based on the interview with Atty. Ivan
The MISO Chief clarified that the E- will be selective at first. John Enrile Uy (MISO Chief, Supreme
court project is not a court where Court of the Philippines)

“MY HOPE IS TO PUSH THIS COMMON SENSE ALONG. I HAVE BECOME INCREASINGLY AMAZED BY THE POWER OF THIS IDEA
OF INTELLECTUAL PROPERTY AND, MORE IMPORTANTLY, ITS POWER TO DISABLE CRITICAL THOUGHT BY POLICY MAKERS AND
CITIZENS. THERE HAS NEVER BEEN A TIME IN OUR HISTORY WHEN MORE OF OUR ‘CULTURE’ WAS AS ‘OWNED’ AS IT IS NOW.
AND YET THERE HAS NEVER BEEN A TIME WHEN THE CONCENTRATION OF POWER TO CONTROL THE USES OF CULTURE HAS
BEEN AN UNQUESTIONINGLY ACCEPTED AS IT IS NOW.” (PROF. LAWRENCE LESSIG, IN HIS BOOK “FREE CULTURE: HOW BIG
MEDIA USES TECHNOLOGY AND THE LAW TO LOCK DOWN CULTURE AND CONTROL CREATIVITY.”)

3
Features

IS THERE SUCH A THING AS WMD?


THE WEB AS A MEANS OF DESTRUCTION: THE SUPPOSED THREAT OF CYBERTERRORISM
By Michael Vernon M. Guerrero

C Cyberterrorism

yberterrorism,

terrorism. Cyberspace is the non-


as
compound word, simply suggests the
convergence of cyberspace and

physical terrain created by computer


a

systems, [ 1 ] or that it is the “virtual


world,” i.e. the “symbolic – true, false,
binary, metaphoric representations of
people, however subtle the difference
may be in certain cases. This distinction
is important in differentiating
cyberterrorism from the growing
phenomenon of hacktivism.

It has been likewise suggested that the


definition of cyberterrorism is that of
“the premeditated, politically motivated
attack against information, computer
weapon. [ 10 ] The term, however, is so
indiscriminately used that one who
possesses firearms or explosives, and
having an adverse political opinion,
would easily qualify as a terrorist. The
prevalent situation, wherein
governments are the ones active in
labeling organizations and individuals
as terrorists, subtly suggests that
governments and their agents are
information – that place in which systems, computer programs, and data excluded as actors of terrorism, and
computer programs function and data which result in violence against non- which, of course, is erroneous as
moves.” [ 2 ] Terrorism, on the other combatant targets by sub-national governments themselves are capable
hand, is the unlawful use or threatened groups or clandestine agents.” [ 6 ] This of intimidating or coercing societies.
[ 11 ]
use of force or violence by a person narrow definition is premised on the An accurate definition of terrorism
or an organized group against people definition of terrorism provided by the and terrorists has remained debatable,
or property with the intention of United States Department of State, [ 7 ] as the circumstances involving it are
intimidating or coercing societies or and aims to differentiate itself from extremely complex and highly political.
governments, often for ideological or other computer abuses such as It is not unusual thus that, for example,
political reasons, [ 3 ] or simply as the economic espionage and information a Palestinian organization such as the
systematic use of violence as a means warfare, which are deemed Hamas is considered a terrorist
to intimidate or coerce societies or “legitimate” offensive and defensive organization by Israel and the United
governments. [ 4 ] Construing the term functions of governments. States for deploying suicide bombers
cyberterrorism in a manner similar to against the Israeli population, while
the simple arithmetic of one plus one In sum, whether or not governments Palestinians consider Israel as a terrorist
may mislead people to think that are excluded from the definition of state for committing alleged atrocities
making a terrorist organization active cyberterrorism, what is apparent is that against their people and assassinating
on the Internet, through website for an attack to qualify as that key militant leaders such as the late
postings and chatroom recruitments, pertaining to cyberterrorism, it should Hamas leader Abdel Aziz Rantisi. [ 12 ]
would already constitute result in violence against persons or
cyberterrorism. The term must be property, or at least cause enough Further, the statement “One man’s
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

distinguished from mere activism in the harm to generate fear. [ 8 ] Attacks terrorist is another man’s freedom
manner the latter is being pursued involving computer systems that lead fighter” reflects genuine doubt about
over the Internet. to physical injury or death, massive the contemporary, else the state-
disruption of public utilities, or severe suggested, understanding of the term
Cyberterrorism is generally economic loss would constitute “terrorist.” Strong disagreements, as
understood as the unlawful attacks and cyberterrorism. On the other hand, to the labeling of the Jewish group
threats of attack against computers, expensive nuisance or disruption of “Irgun Zeva’i Le’umi” (abbreviated as
networks, and the information stored non-essential services will not qualify Etzel; Palestine, 1940s), the Viet Cong
therein when done to intimidate or as cyberterrorism. (South Vietnam, 1950s), the
coerce a government or its people in Provisional IRA (Northern Ireland,
furtherance of political or social Who is a terrorist anyway 1960s), and the African National
objectives. [ 5 ] Emphasis is made on Congress (South Africa, 1980s) as
the phrase “to intimidate or coerce,” A terrorist is one that engages in acts terrorist organizations, have been
a degree further than to merely or an act of terrorism, [ 9 ] or a radical made in the past. As the matter relates
“influence” a government or its who employs terror as a political to the Philippines, the Abu Sayyaf

4
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2
Group (ASG) and the Communist Party c. Hamas activists have been said to a. In 1998, the ethnic Tamil guerillas
of Philippines/New People’s Army use chat rooms and emails to plan swamped Sri Lankan embassies
(CPP/NPA) are listed as terrorist operations and coordinate with emails with messages that
organizations by the United States activities. read “We are the Internet Black
Department of State. [ 13 ] A Philippine Tigers and we’re doing this to
communist guerilla would insist, of Hacktivism. It is the marriage of disrupt your communications.”
course, on the validity of his struggle. Hacking (or aptly Cracking) and The volume of the emails sent was
Activism. Hacktivism is, in essence, 800 emails a day for a period of
What CyberTerrorism is not electronic civil disobedience, which two weeks.
methods includes virtual sit-ins and
Internet-aided Activism. This is the blockades, automated e-mail bombs, b. A file transfer protocol site
normal, non-disruptive use of the web hacks and computer break-ins, operated by the Arkansas Highway
Internet in support of an agenda or and computer viruses and worms. A and Transportation Department
cause, and in fact, utilizes the Internet virtual sit-in or blockade is made was turned into a repository of
as a tool to communicate and possible by the use of “hacking tools” Osama bin Laden videos, jihadist
coordinate action. Activists may be able by a sizable number of individuals songs and terrorist incident videos
to locate official policy statements, against a particular website, such as in July 2004. Links to those files
analyses, discussions, and other by saturating the target server with then were posted at al Ansar, a
documents and items related to their network packets, among others, for the radical Islamist Web site.
mission. They can publish information, purpose of calling attention to the cause
and disinformation, posted in their of the protesters by disrupting normal The Supposed Threat of
website or in newsgroups, or distributed operations and blocking access to CyberTerrorism
in emails. They may participate in facilities. E-mail bombing is done by
dialogue and debate on policy issues bombarding a recipient with thousands Some security experts believe that
through e-mail, newsgroups, web of messages at once, distributed with CyberTerrorism is an unsettling reality
forums, and chat. They may use the the aid of automated tools. Web hacks due to the convergence of the physical
Internet to coordinate action among or Computer break-ins, which are world and the virtual world. Barry C.
members and with other organizations rather common, are done by gaining Collin of the institute of Security for
and individuals. They may also pursue access to websites and replacing some Security and Intelligence (Stanford
direct lobbying of decision makers. It of the content with their own, or by University) outlined the various
is, however, observed that the Internet tampering with the Domain Name possibilities in which a cyberterrorist
is not currently an adequate tool for Service so that the site’s domain name may attack: (1) a cyberterrorist will
public political movement as the more resolves to the IP address of another remotely access the processing control
successful organizations are those who site. Lastly, computer viruses and systems of a cereal manufacturer,
utilize traditional advocacy methods, worms have been used to spread change the levels of iron supplement,
including the use of the more protest message and/or cause serious and sicken and kill the children of a
expensive broadcasting media to reach damage to target computer systems. nation enjoying their food; (2) a
the public. cyberterrorist will place a number of
Hacktivism methods such as web hack computerized bombs around a city, all
Terrorists groups likewise pursue the and email bombing were used simultaneously transmitting unique
activities of cyberactivism, as their extensively during the Kosovo conflicts numeric patterns, each bomb
activities are in fact an activism of the by both Serbs and Americans citizens, receiving each other’s pattern; (3) a
extreme kind. They put up their with Chinese nationals following suit cyberterrorist will disrupt the banks, the
websites to air their propaganda, attacking American websites after the international financial transactions, and
recruit supporters, communicate and accidental bombing of the Chinese the stock exchanges; (4) a
coordinate action. Their use of the embassy in Belgrade at that time. cyberterrorist will attack the next
Internet is ancillary only to their usual, Chinese and Taiwanese hackers generation of air traffic control systems,
if not violent, activities. To note: exchange web hack attacks in 1999 and collide two large civilian aircraft;
following Taiwan’s president statement (5) a cyberterrorist will remotely alter
a. The Hizbullah operates its own that China must deal with Taiwan on a the formulas of medication at
website (www.hizbollah.org) “state-to-state” basis. The use of pharmaceutical manufacturers; and
hacktivism methods, however, are not (6) a cyberterrorist may decide to
b. In 1996, Bin Laden’s exclusive to unarmed individuals and remotely change the pressure in gas
headquarters in Afghanistan was organizations. It must be noted that: lines, causing a valve failure, and a
equipped with computers and block of sleepy suburb detonates and
communication equipment. burns. [ 14 ] Mark M. Pollitt of the FBI

5
Laboratory challenges the plausibility The bottom line remains that there has managing the infrastructure failing
of Collin’s scenarios inasmuch as there been no instance of anyone ever to detect the first 45 tries.
is sufficient human involvement in the having been killed by a terrorist using
control processes used today. In the a computer. There has been no b. Transportation. In 1997, a
cereal plant scenario, the quantity of evidence that any terrorist organization hacker shut down the control tower
iron that would be required for the has resorted to direct use of computers services as the Worcester,
cereals to be toxic is substantial that and computer networks for any sort of Massachusetts airport. Although it
assembly line workers would notice in serious destructive activity. At this time, did not cause any accidents,
as much as the assembly line would the concept of cyberterrorism as a services were affected.
run out of iron sooner or later. In the reality is in the same level of the
air traffic control scenario, pilots are phantom of weapons of mass c . Emergency services. In the
trained to be aware of the situation and destruction that are supposed to be United States, in 1997, a Swedish
operate even without the assistance of developed and stashed in Iraq. hacker jammed the 911
air traffic controllers at all. [ 15 ] Further, Cyberterrorism is not an immediate emergency telephone system
in the computerized bomb scenario, reality. throughout west-central Florida. A
there is doubt for terrorists to deploy Louisiana man made a similar act
sophisticated bombs, which are Focusing on the real threats in 2002 by tricking a handful of
dependent on complex systems and MSN TV users into running a
other technical considerations, to Dismissing the immediate threat of malicious e-mail attachment that
replace crude homemade bombs, cyberterrorism, however, does not reprogrammed their set-top boxes
which are easier to deploy. On the warrant complacency. Terrorism is as to dial 911 emergency response.
other hand, the gas lines scenario may real as computer crimes are. Although He was arrested February 2004
be an apparent threat, inasmuch as they are experienced independently, and was charged with
there are unconfirmed reports of an these problems need to be addressed. CyberTerrorism.
instance where hackers, in Citizens have to be protected,
collaboration with an insider, were said economic loss should be prevented, d. Government services. In 1998,
to have a used a Trojan horse to gain and negligence should be abated. several government and university
control of the central switchboard of websites received “denial of
Gazprom, the Russian state-run gas The protection of critical utilities or service” attacks, preventing
monopoly and the largest natural gas infrastructure – telecommunications, servers from answering network
producer and largest gas supplier to banking and finance, electrical power, connections and crashing
Western Europe, which controls gas oil and gas distribution and storage, computers. This has been a
flows in pipelines. [ 16 ] Notwithstanding water supply and sewage, common occurrence in the past
this isolated instance, most critical transportation, emergency services, years. On the other hand, also in
utilities and sensitive military systems and government services – for one, 1998, the US Defense
enjoy the most basic form of Internet must be protected from attacks, Department’s unclassified
security, i.e. that they are “air-gapped” whether the source of such attacks has networks were penetrated,
or in other words are not physically a political agenda or not. allowing hackers to access
connected to the Internet and are personnel and payroll information.
therefore inaccessible to outside In the past, there have been prominent
hackers. It would be a leap of computer-aided attacks on critical It is thus necessary that computer asset
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

imagination to consider the immediate utilities, some of which are: managers should be aware which
possibility of a hacker to control systems should be “air-gapped” from
computers that would launch nuclear a. Water supply and sewage. In other networks to prevent the risk of
weapons, or to hijack satellite systems April 2000, a disgruntled intrusions by unauthorized personnel,
or other high-consequence assets. It consultant-turned-hacker in if not crackers, or loosely, hackers.
would also be a leap of imagination to Maroochy Shire, Australia Precaution should be taken as to issues
consider the contamination of water compromised a waste of security vis-à-vis new technology
supply and explosion of chemical management control system and that may deployed, including those
factories, tasks which are harder to do loosed millions of gallons of raw pertaining to wireless technology.
physically, can be made instantly just sewage on the town. The former Public policy should be clear as to the
because of the prominence of the insider tried to unleash the waste minimum standards required in the
Internet. [ 17 ] in 46 tries, with the personnel maintenance of computer systems in
>> [24] Is there such a thing as WMD?

6
Features

The Philippine Quarterly IT Law Journal :: Volume 1, Number 2


INTERNET DECENCY REGULATION VS. FREE SPEECH
(THE US CASE OF ASHCROFT VS. ACLU)
By Jaime N. Soriano

O n June 29, 2004, the US


Supreme Court upheld the ruling of
the Court of Appeals for the Third
Circuit enjoining the enforcement of
the Child Online Protection Act (COPA)
because the law "likely" violated the
free-speech clause of the First
Amendment of the US Constitution.
The decision was reached by the High
Court in the case of Ashcroft, Attorney-
The law also provides for an
affirmative defense to commercial web
speakers who restrict access to harmful
materials by requiring the use of credit
cards and other measures feasible
under available technology. In
determining whether or not an Internet
material is harmful to minors, the law
calls for the application of the following
standards: (i) contemporary
test' provided for by the law would
essentially require web content to abide
by the most restrictive community
standards given the peculiar
geography-free nature of cyberspace.
The standard imposed by the law was
unconstitutionally overbroad, according
to the appellate court.

In a petition for certiorari filed in 2001


General v. American Civil Liberties community standard test, (ii) depictions , the US Justice Department asked the
Union, et. al. (No. 03-218) in a of sexual act or exposure of sexual US Supreme Court to reverse the
narrowly divided vote of 5-1. organs, and (iii) the lack of serious decision of the Third Circuit Appellate
literary, artistic, political or scientific Court affirming the ruling of the
Factual Antecedent value for minors of the web content Federal District Court in Pennsylvania.
taken as a whole. On May 13, 2002, the Supreme
Alarmed over the exposure of minors Court, without making any categorical
to sexually explicit materials in the Expectedly, civil libertarians also ruling on the constitutionality of COPA,
Internet, US Congress enacted the submitted COPA to judicial scrutiny. In rendered judgment holding that the
Communications Decency Act of February 1999, a US District Court "contemporary community standard"
1996. This law sought to penalize for the Eastern District of Pennsylvania test, standing alone, is not
persons and organizations that issued an injunction preventing the unconstitutionally overbroad. The High
knowingly transmit or display obscene government from enforcing the law. Court emphasized that its decision was
or indecent materials and messages The District Court held that COPA was limited on that narrow issue. At the
to minors over the Internet. In a invalid because there is no way to same time, it ordered the appellate
constitutional challenge posed by the prevent minors from harmful material court to decide on a wide range of
American Civil Liberties Union in the on the Internet without also burdening First Amendment issues posed by the
case of (521 US 844), the US adults from access to protected speech. law and determine whether the District
Supreme Court in 1997 struck down Restricting access through credit cards Court was correct in granting
this law for violating First Amendment. or adult access codes as affirmative preliminary injunction in the
The Court argued that the law was not defense would unduly burden free enforcement of COPA.
narrowly tailored to serve compelling speech. The court likewise found that
governmental interest and other government failed to prove that the law On remand, the Third Circuit Court of
regulatory alternatives, that are least was the least restrictive means Appeals, on March 6, 2003, affirmed
restrictive, are available. available to achieve the public goal of its earlier decision finding COPA in
restricting harmful materials to minors violation of the First Amendment
With the constitutional nullity of the in the Internet. because it denied access to online
Communications Decency Act, the US speech that is legally permissible for
Congress, a year later, enacted COPA On appeal, the Third Circuit Court of adults. The appellate court also held
also in response to the clamor against Appeals affirmed the findings of that the law was not the least restrictive
Internet pornography. The law imposes unconstitutionality of COPA by the approach available to government to
a hefty fine and six months Federal District Court but on a different serve the interest of preventing minors
imprisonment for knowingly posting ground, The appellate court anchored from using the Internet to gain access
website contents for commercial its ruling on the fact that the to indecent materials.
purposes that are harmful to minors. contemporary community standards

7
Consequently, the US Supreme Court statute was enacted to serve.' of free speech under the First
was called upon to review the xxxx When plaintiffs challenge Amendment.
constitutionality of COPA for the second a content-based speech
time. restriction, the burden is on the In allowing the preliminary injunction
Government to prove that the to stand, pending a full trial on the
The Majority Ruling proposed alternatives will not merits by the District Court, the
be as effective as the Supreme Court was concerned about
It can be recalled that COPA was challenged statute."' (citation the potential and extraordinary harm
enacted a couple of years after its omitted) the law posed on protected speech.
predecessor-statute, the Despite the availability of affirmative
Communications Decency Act of The High Court noted that the Federal defense to possible violators, the Court
1996, was declared unconstitutional District Court granted the preliminary observed that web speakers would
for violating the constitutional dictum injunction on the pretext of the likely resort to self-censorship than risk
on free expression. Thus, the majority proposition that other alternatives, less the perils of criminal prosecution.
opinion written by Justice Kennedy, and restrictive and more effective than
joined by Justices Stevens, Souter, COPA, are available to restrict The majority of the highly divided court
Thomas, and Ginsburg, began with children's access to indecent materials. recognizes however that the factual
the following declaration: These alternatives include the so-called circumstances of the case may not
"blocking and filtering software". reflect current technological realities.
"The imperative of according And this is a serious flaw in any case
respect to the Congress, Filters are less restrictive than COPA involving the Internet, as this technology
however, does not permit us to because they "impose selective evolves at a rapid pace. The factual
depart from well-established restrictions on speech at the receiving findings of the District Court were made
First Amendment principles. end, not universal restrictions, at the five years ago, in 1999. In maintaining
Instead, we must hold the source". Filters restrict minors from all the preliminary injunction and
Government to its constitutional sorts of pornography, not only from remanding the case for trial on the
burden of proof." American websites. If COPA were merits, the parties to the case would
upheld, filtering software would be given ample opportunity to update
The Court, in this case, further diminish its effectiveness because and supplement their respective facts
explained by saying that the US content providers would simply move to reflect present-day technology, and
Constitution "demands that content- their operations overseas, beyond the allow the District Court to decide the
based restrictions on speech be jurisdiction of American courts. While case based on the current legal
presumed invalid, and that the filters are not the perfect solution to landscape.
Government bear the burden of the problem being addressed by
showing their constitutionality. This is COPA, the Court observed the failure On remand, the Supreme Court does
true even when Congress twice has of government to show proof that the not discount the possibility that
attempted to find a constitutional mechanisms provided for under the government may be able to prove the
means to restrict, and punish, the law is less restrictive than available constitutionality of COPA as the least
speech in question." filtering technologies. restrictive alternative available to satisfy
its legislative imperatives.
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

To uphold the constitutionality of a The Supreme Court also took note of


statute that regulates free speech, like the findings of the Federal District The Dissenting Opinion
COPA, the Supreme Court, reiterating Court that verification systems, like
the doctrine it laid down in Reno vs. credit cards and access code, may be In his dissenting opinion, Justice Scalia
ACLU, said: the subject of evasion and finds the COPA constitutional and
circumvention, even by the minors should not be subject of an exacting
"A statute that 'effectively themselves. In fact, the Congressional standard of review. Since the law
suppresses a large amount of Commission on Child Online Protection punishes only violators of commercial
speech that adults have a indisputably found that filters are more pornography in the Internet - a form
constitutional right to receive effective than age verification methods of business activity that could be
and to address to one another in limiting minors from accessing banned entirely consistent with the
. . . is unacceptable if less Internet pornography. Hence, COPA provisions of the First Amendment -
restrictive alternatives would be failed the "least restrictive alternative" COPA does not raise any constitutional
at least as effective in achieving test to justify a limitation on the exercise concern.
the legitimate purpose that the

8
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2
Justices Breyer, O'Connor, and Chief result might be an alternative that is The Internet is a new form of mass
Justice Rehnquist also departed from extremely effective but in the process, media that obviously fits within the
the majority opinion but agreed with will tax heavily on government framework of constitutionally protected
the majority that the law should be resources. Thus, there is no other less speech in a democratic space. In this
subjected to the "most exacting restrictive way to advance the jurisdiction, the Bill of Rights of the
scrutiny". They argued that the "least compelling interest to protect minors 1987 Constitution provides:
restrictive alternative" test is a from Internet pornography. Hence,
comparative term that cannot be COPA should be viewed as "Sec. 4. No law shall be passed
satisfied without examining "both the constitutional within the framework of abridging the freedom of
extent to which the Act regulates the First Amendment. All told, the speech, of expression, or of the
protected expression and the nature minority justices of the Supreme Court press, or the right of the people
of the burdens it imposes on that do not see any compelling and logical peaceably to assemble and
expression". need to remand the case to the District petition the Government for
Court for the reception of additional redress of grievances."
The dissenters argued that in the first evidence.
place the Internet materials classified Since cyberspace is not defined by any
as legally obscene does not enjoy the Impression territorial boundaries the most serious
mantle of protection of the First challenge to governments all over the
Amendment citing the landmark case The ruling of the US Supreme Court world is how to regulate and exercise
of Miller vs. California (413 US 15). did not actually put an end to the jurisdiction over Internet activities that
The opinion also noted that the law nagging constitutional issue of whether serve as avenues for the commission
does not censor, in fact, the materials or not the Child Online Protection Act of crimes, and destroy the basic social
within its ambit but merely requires (COPA) violates the free speech clause norms and values of society like
web providers, of content considered of the First Amendment. As stated in pornography or obscenity. To a certain
harmful to children, to limit access the opening statement of the opinion extent, the Internet may capitulate the
through a verification screen. of the Court: state's traditional exercise of police
power unless governments act together
The minority justices also find that the "We must decide whether the to address this issue in unison, through
presence of the filtering system is not Court of Appeals was correct treaties and international covenants.
an alternative legislative approach to to affirm a ruling by the District
the problem of protecting minors from Court that enforcement of Some has maintained the view that this
commercial pornography. This system COPA should be enjoined state regulation is unnecessary and will
is part of the status quo when Congress because the statute likely only hamper the full development of
enacted COPA. And by definition, violates the First Amendment. information technology to serve the
status quo is always less restrictive than (italics supplied) ends of society. Their view is to allow
a new regulatory law for it "is always the advent, and look forward to the
less restrictive to do nothing than to do From this perspective and with the introduction, of new technologies that
something". They concluded that remand of the case to the District Court would effectively deter the use of the
filtering software, as presently for trial on the merits, it is certain that information superhighway in the
available, does not solve the problem the US Supreme Court would be finally commission of illicit, illegal, immoral
COPA seeks to address. It is precisely pass judgment on the law for the third or even plainly unacceptable web
the inadequacies of the filtering system time sometime in the future. It appears practices, an act of self-regulation.
that prompted Congress to pass the law from the court decision that the
rather than rely on its voluntary use. constitutional permissibility or The constitutional challenge on COPA,
The obvious fact is - that despite the impermissibility of the law hangs on beyond the clash between a
existence of this blocking and filtering the balance based on the evidence that compelling state interest to shield
software, Internet pornography would be presented before the District minors from pornography and the
continues to proliferate. Court on the "least restrictive freedom of adults to free expression,
alternative" test. The final is also a reflection on who should, and
The dissenting view also attacked the determination on the constitutional can adequately, regulate the Internet:
"less restrictive alternatives" challenge to COPA could still go either state laws or technology itself.
propounded by the majority calling on way.
the government to encourage the use
of blocking and filtering software. The

9
Features

FROM FREE TO FEE


FEE??
by Ailyn L. Cortez

The only matters certain in life are death and taxes, says an old adage.

G Taxation in the Philippines

overnments make
exactions for revenue in order to
support their subsistence and execute
their indisputable and genuine
objectives. The underlying tone of
taxation is governmental necessity,
without it government can neither exist
employ the Transmission Control
Protocol/ Internet Protocol, or any
predecessor or successor protocols to
such protocol, to communicate
information of all kinds by wire or
radio. [ 3 ] Indeed, it is a network of
networks.

John Gage, as cited by Lallana (2003),


13. Australia
14. Netherlands
15. Spain
16. India
17. Poland
18. Sweden
19. Malaysia
20. Philippines
10,630,000
9,730,000
7,890,000
7,000,000
6,400,000
6,020,000
5,700,000
4,500,000

nor endure. "Taxes are the lifeblood argues that - "The Internet is not a thing, Source: CIA World Factbook
of the government and their prompt a place, a single technology, or a mode Unless otherwise noted,
and certain availability are an of governance: it is an agreement. In information in this page is
imperious need." [ 1 ] As noted by Justice a language of those who build it, it is accurate as of January 1, 2003
Vitug (2000), this phrase has often protocol, a way of behaving. What is
been used to justify the need for startling the world is the dramatic Taxation and the Internet
summary remedies in the collection of spread of this agreement, sweeping
taxes. To borrow the words of Cooley, across all arenas - commerce, E-commerce means any transactions
as cited by Justice Vitug (2000), the communications, governance - that rely conducted over the Internet or through
power to tax "reaches to every trade on the exchange of symbols." [ 4 ] The Internet access, comprising the sale,
or occupation, to every object of nature of Internet communication is lease, license, offer or delivery of
industry, use or enjoyment, to every decentralized where its use is limited property, goods, services, or
species of possession; and it imposes only by imagination without any information, whether or not for
a burden which, in case of failure to boundaries in mind; it does not follow consideration, and includes the
discharge, may be followed by seizure a exact, conventional or uniform provision of Internet access. [ 5 ] With
or confiscation of property. No attribute pathway. As such, the Internet has the explosion of e-commerce, it is
of sovereignty is more pervading and become the fastest growing medium. understandable why the government
at no point does the power of the In a country comparison of Internet has been grappling to extend its
government affect more constantly posted by CIA World Factbook, the collection arm in the Internet. In 2001,
and intimately all the relations of life Philippines ranked 20 with 4.5 million the Department of Finance of the
than through the exactions made Internet users as of 2003. Hence, Philippines announced that it would be
under it. [ 2 ] revenue authorities see the new golden reviewing the possibility of taxing e-
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

goose that lays the golden eggs of the commerce transactions. Indeed, an
At present, e-commerce transactions new millennium. interesting business. But how it is
within the Philippines are not taxed. taxed? By whom and where? A
Since the total value of such business Country Internet users complex matter with complex issues
is still small, however, closing this 1. United States 165,750,000 to resolve.
loophole is not yet a priority for the 2. Japan 56,000,000
government... not just yet. 3. China 45,800,000 In Internet Transactions, the primary
4. United Kingdom 34,300,000 device used for Internet commerce is
Internet 5. Germany 32,100,000 the World Wide Web Page. The World
6. Korea, South 25,600,000 Wide Web can be simply defined as a
The term Internet means collectively 7. Italy 19,250,000 multimedia interactive portion of the
the myriad of computer and 8. Russia 18,000,000 Internet, which visually resembles a
telecommunications facilities including 9. France 16,970,000 catalogue or brochure and provides a
equipment and operating software, 10. Canada 16,840,000 presence for its operators on the
which comprise the interconnected 11.Brazil 13,980,000 Internet. The best comparison may be
world-wide network of networks that 12. Taiwan 11,600,000 to an international telephone directory

10
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2
combining both white and yellow matter. Hopeless to find new sources Proposals of Taxing the Net
pages. The main difference, however, of income, a taxman should defy the
is that once a user finds an entry that lure of saying: "Tax the Internet now, The primordial consideration in Internet
interests him, he may then retrieve ask questions later." Taxation is the type of tax that would
more detailed information by following be utilized. Here are some proposals
electronic links to other related pages. Opposing Views on Internet in taxing the net.
A common transaction on the Internet Taxation
is the downloading, or retrieval, of Bit Tax. The term bit tax means any
software from a computer located in * Positive. The first group views tax on electronic commerce expressly
another country. A user begins the that taxing the Internet is just and imposed on or measured by volume
process by using a "directory- reasonable. For them, the idea of of digital information transmitted
assistance"-like search tool to find exempting Internet transactions electronically or the volume of digital
pages that fit his search parameters. from taxes is illogical. No information transmitted electronically
Once a suitable entry is selected, the discrimination can be had between or the volume of digital information
user clicks on it and his computer goes an online and brick-and-mortar per unit of time transmitted
to that page. The user will usually then business. To allow otherwise would electronically, but does not include
find a text and graphical environment be equivalent to granting such taxes imposed on the provision of
where for example, software products business a clear tax subsidy. telecommunication services. [ 7 ] The
are described and offered. The final Moreover, they are convinced that proponent of the bit tax is Arthur
step when the user requests a program, the online retail market will soon Condell, a Canadian economist. As
for example a or business application, account for sizable chunk of quoted by Atty. Jovi Tanada Yam,
and it is sent, usually in minutes, right national revenue. This is "whether the digital bit is part of a
to the user's computer. If the operators evidenced by the growing trend foreign exchange transaction, a
of a given Web site charge for a in Internet and online business business teleconference, an Internet e-
product or service, a credit card or activities. Hence, failure to take mail or an electronic check clearance,
other electronic payment system may advantage of this will mean lost each bit is a physical manifestation of
be used. [ 6 ] revenues for the government. the New Economy at work. Thus, the
new wealth of nations is to be found in
Clearly, consumers are getting a ride * Negative. The second group the trillion of digital bits of information
on sales tax from online purchases at believes that a free market on the pulsing through global networks." [ 8 ] It
no cost. Perhaps, they are reaping the Internet will encourage commerce represents a new tax base that is at
benefits of a of a temporary tax to exploit this innovative means of the heart of the new economy. It is also
haziness that needs a well-structured exchange instead of the traditional a new tax base that is growing. It is a
system to eradicate ambiguity. Easier system. Internet is too young and tax base that can be easily identified,
said than done. fragile a medium for its derived one where collection is in few hands.
profits to survive the complex web In the New Economy, it would be a tax
The difficulties arise because most tax of national and local taxes. that is difficult to avoid. [ 9 ]
laws and regulations were passed Merchants who utilize this mode
before the beginning of electronic of transaction are anxious of the Soete's Tax proposal. The advocate
commerce. Such laws and regulations complex collection system that of this proposal is Luc Soete, an
are rooted in concepts of physical might be compulsorily economist who served as chairman of
location or presence. Determining incorporated in their existing a European Commission advisory
where the transaction is sited and process. Moreover, the panel on information technology issues.
identifying key taxing points are often vulnerability of Internet transaction His idea is to tax cyberspace bit by bit.
important to the administration of should not be opened to the He says that "the new tax base for
taxes. Then again, the intricacies elements of taxation as this would Internet commerce is to be found in
revolving around the Internet poses a discourage people from bringing these fast moving bits. We need to
difficult issue in identifying the key into play this revolutionary method. adjust the taxation forms to make sure
taxing points of Internet transactions. As a consequence, it will they will include these new Internet
While tax compliance relies on such accelerate the technological activities." [ 10 ] The suggested bit tax is
geographical restrictions, such may not advancement and intensification of a turnover on interactive digital traffic.
exist in the cyber world to identify key the Internet. To put it simply, this "Moving from the old highway to the
taxing points. Indubitably, the multi- group considers Internet taxes metaphor of a new highway, Soete's
faceted nature of Internet and e- would significantly jeopardize the proposal is to tax the digital traffic on
commerce makes Internet taxation an growth of e-commerce. the Information Highway. Whether the
extremely complex and compound tax is levied an the traffic carried by a

11
fiber optic cable or on microwave or Union has joined the US, Japan and warehouse - a retailer must have in a
whether the tax is levied on interactive other like-minded countries in keeping consumer's state to be required by that
satellite traffic, the bit tax presents a the Internet duty-free, until the dust of state to collect sales taxes.
way of accessing the new wealth being cyberspace settles. [ 12 ]
created by the New Economy." Soete The US Supreme Court in Quill
suggested the tax rate to be .000001 Internet Taxation in the United Corporation v. North Dakota, [ 17 ]
US cents per bit, or about one US cent States pronounced that in order for an out-
per megabit. Soete contrasted the bit of-state company to collect sales taxes
tax to the VAT: "The main consumption President William J. Clinton signed the from another state, physical presence
and production tax levied in the Internet Tax Freedom Act on October (nexus) requirement must be
European countries is the VAT. VAT 21, 1998. On November 28, 2001, established. This means that any taxes
allows material goods and services to President George Bush signed into law levied on Internet sales must be the
be taxed at their various points of a two year extension to the ITFA. It is same as those levied on the same sales
production and value creation - in a an act that imposed a three-year if they occur in a physical store or
way that is quite easy quantifiable." in moratorium on new taxes on Internet through mail order. A state may not,
cyberspace, Soete's bit tax would access fees. The main goal of this act for example, assess one tax rate for
replace the VAT on immaterial goods was to prohibit new taxes from being merchandise that is purchased in a
and services. The idea is to levy taxes levied on the using the Internet, such physical store while levying another tax
only as "a proportion of the intensity of as those paid by customers of America rate for the same merchandise
the information transmission." The term Online. [ 13 ] purchased through the Internet. The
"transmission" means the number of Internet Tax Freedom Act proscribes
bits flowing across the wires, not their Sales Tax or Use Tax. The term this. To have a nexus, a company must
"transaction value." [ 11 ] sales tax or use tax that is imposed on have a store, office, warehouse or a
or incident to the sale, purchase, salesperson in That locality.
Loopholes in these proposals. storage, consumption, distribution, or
Soete's bit tax has been attacked on other use of tangible personal property Purposes of ITFA. The Internet Tax
many aspects. At what rate should or services as may be defined by laws Freedom Act moratorium prevents
nations tax digital bits? How would the imposing such tax and which is states from enacting discriminatory
new taxes be collected? Critics raise a measured by the amount of the sales taxes on online sales. For instance,
ruckus that a bit tax will prove injurious price or other charge for such property under the moratorium, a state is
to the future of the Internet because it or service. [ 14 ] prohibited from charging a new or
would be extremely expensive for higher tax on online sales that is not
consumers to pay the bit tax. At Soete's The current moratorium does not likewise levied on sales achieved
rate of one cent per megabit, you can exempt an online transaction from a offline. [ 18 ]
just imagine that cost of downloading state's sales tax. The moratorium has
a two-hour movie with a transfer rate never been on sales taxes- that is a As pointed out by Bick (2000) another
of two megabytes-per-second. misnomer. The moratorium is on new purpose of the Internet Tax Freedom
Besides, the cost of the procedure and taxes. [ 15 ] If a state in its exercise of Act is to prohibit double or multiple
technical means for collecting such a taxing authority chooses to levy a sales taxation of a single transaction. For
tax would likely be higher than the tax, that liability exists without regard example, if the buyer of a product must
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

revenue, especially as micro-payments to the medium used to make the pay taxes on the purchase and the
for minuscule chunks of information purchase (in person, by telephone or seller of the same product must pay
become commonplace. Moreover, mail, or online). If the business does taxes on the sale to that particular
some technologies - like satellite not meet the constitutional test of a buyer, this is a multiple tax and is
communication - simply make it substantial physical presence in a states prohibited by the Internet Tax Freedom
impossible to monitor bitstreams. On that would require the business to Act. Another example would be if an
the political front, the bit tax was collect and remit the sales tax to that e-vendor is located in a state that
temporarily rejected by the European state then consumers in those states sources such income to the state and
Union. Soete admitted that "the core that impose sales taxes who make taxes it where the income-producing
goal of the European Union policy is purchases from out-of-state businesses activity occurred, and sales are made
to accelerate the diffusion of are liable to pay a use tax on those to a jurisdiction that sources such
information technology in Europe. And purchases. [ 16 ] income to the state where the benefit
any idea that could slow down is received and taxes levied, double
investments and growth in this areas Nexus Rule. Nexus refers to the taxation is possible on the same
being rejected - just because it comes physical presence - such as a sales transaction. [ 19 ]
at the wrong time." The European force, distribution center, or a

12
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2
To give effect to the purposes of ITFA, Commerce. The tax issue is just one For a moderate fee, registration with
the establishment of Advisory of many complicated questions." And an online commercial registry could
Commission on Electronic commerce until a simple principle can be be done via the web. Companies or
was convened. propounded, that Internet businesses traders would be required to provide
would be taxed no more and no less the necessary information such as the
Advisory Commission on that they are in the physical world, if owner's name, his or her physical
Electronic Commerce (ACEC). not, a moratorium on taxes should be address, tax domicile, telephone
The Internet Tax Freedom Act declared. [ 21 ] In achieving this, global number, fax number, e-mail address,
established the commission to study the standards to prop up the Net should web url and domain name. A UBL
application of taxes to e-commerce and be established. would then be attributed and would be
telecommunications. The commission required in all business transactions
was composed of three federal, eight Uniform Business Locator. One including credit card payments and
private, eight state and local of the major problems facing tax bank transfers as well as for all
government representatives, including authorities in the context of electronic dealings with tax authorities All UBL's
Utah Gov. Michael O. Leavitt, Virginia commerce is that of the identify of the would be contained in a planet-wide
Gov. James Gilmore, and Washington parties involved in commercial distributed database a bit like for the
Gov. Gary Locke. The commission sent transactions. In consumer sales over domain name system. Clicking on a
a report to Congress on April 12, the Internet, the parties may not be UBL on a web page would call up a
2000, but failed to reach the required known to each other, lest it be via the small window containing the entry for
supermajority (two-thirds) to make company handling credit card that company. The outstanding question
findings and make recommendations. transactions. In the use of digital with such a system would be that of
The commission refused to accept a money, the ability to trace transactions the authentication of the company or
"minority" report from Gov. Leavitt on and identify those involved may be trader concerned and the verification
behalf of state and local government even more difficult. Knowing who you that the UBL provided by a web page
representatives. [ 20 ] The goal of the are dealing with is a right if not a or the trader's electronic caddy was
commission was to study the issues necessity of the buyer. It is also really that of the trader in question. A
surrounding Internet taxation and necessary for fiscal accountability. To part guarantee in the latter case could
report back with a formal resolve this issue, Alan McCluskey be provided by binding payments to
recommendation. (1998) proposed the Uniform Business the UBL - putting somebody else's UBL
Locator. This method uniquely identifies would lead to the money going to that
At the heart of the controversy are a business or trader and attributes that other company. [ 22 ]
sales taxes. Currently, states can't force entity to a specific country. There would
an out-of-state business to collect them be some difficulties with attributing a Streamlined Sales Tax Project.
unless that business has a physical company to a given jurisdiction. It This project is an effort by states, with
presence in state. The result is that remains to be seen if the definition of input from local governments and the
when a purchase is made across state the domicile of a company is private sector, to design, test, and
lines, sales taxes often aren't paid. Few satisfactorily covered by current tax implement radically simplified sales
states have made any real effort to legislation and how one would deal with and use tax system for the 21st century.
collect those "lost" taxes directly. multiple domiciles. One might well Spearheaded by the National
Instead, state and local officials want need a system that catered for multiple Governors Association, the
Congress to let them draft out-of-state mappings of a company to varying Streamlined Sales Project would
firms as tax collectors. However, the jurisdictions. UBLs would not need to require participating states to have only
commission was not able to secure the be memorized as they are used one tax rate for personal property or
two-thirds vote needed to deliver a essentially as handles to call up more services effective by the end of 2005.
formal recommendation. detailed and readily understandable Included in those services would be
information from the database. As a online sales. [ 23 ] The goal of the Project
Think Globally, Act Locally result they could be randomly is to substantially reduce or eliminate
generated, unique alphanumeric the costs and burdens of sales tax
Everyone makes an effort to strings except for the part designed to compliance for businesses through a
understand these complex issues. As identify the country. The latter might combination of simplified laws and
correctly pointed out by Atty. Jovi Yam, easily be done using the current two administrative policies and the
"the best way all of us can help the letter ISO country codes. Subsidiaries implementation of a no-cost system for
Net grow is to work collaboratively on or branches within a company could retailers. [ 24 ]
what the Net really needs: an possibly be treated like subdomains of
uncomplicated infrastructure for fused, the UBL of the parent company. Under the SSTP model legislation,
convoluted, cross-border Internet states will develop uniform product

13
codes and sourcing rules, uniform business establishment. However, if you intention the tax authorities should not
definition of what is taxable, and do not live in the same location as the bias market choices by their action. The
simplify administration policies that are retailer, you do not pay taxes to that following are the basic issues to be
consistent with other participating states retailer for your state. [ 28 ] Following resolved by the Department of Finance
in the compact. This NGA-led project an online purchase, consumers are in achieving a polished and well-
is seeking to standardize sales tax laws, supposed to go to the Bureau of Internal developed scheme of taxing the net.
making them e-commerce friendly. In Revenue Web site to fill out a form
November 12, 2002, a draft for the documenting their purchase, where 1. Auditing System. Business
proposed subject was finalized and they are charged a fee. [ 29 ] As for now, establishments issue receipts in
named Streamlined Sales and Use Tax the government cannot demand out- every transaction. Pursuant to this
Agreement. of-town merchants collect sales tax receipts, the BIR can keep track of
unless a company has a nexus, or the operations of the business.
As such the US Supreme Court physical presence within that locality. With the advent of Internet
specifically left it to the Congress to Transactions, BIR should come up
"decide whether, when, and to what Conclusion with the scheme of an efficient
extent the States may burden interstate method of determining On-line
mail order concerns with a duty to In the Philippines, the basic question is transactions in lieu of the receipts
collect. [ 25 ] Congress has the power to to tax or not to tax On-line Transactions. issued in ordinary mortar and brick
modify the existing physical presence Surely, the BIR is seeing a potential business.
standard on which businesses have gold mine. However we should not
relied since 1967 (National Belles discount the fact that E-commerce in 2. Tax planning for E-business. Since
Hess Inc. v. Department of Revenue the country is relatively young. It seems most of our tax laws were enacted
Illinois 386 U.S. 753 (1967)) and best that our government takes a back prior the advent of the Internet, a
provide the states with the authority to seat for a while and carefully collaboration of the DOF, IT experts
impose new collection responsibilities scrutinizes the possibility of exploring and businesses taking advantage
on out of state vendors. Neither the the new heights of Internet Taxation. of the NET will be an edge in
Constitution nor the Court imposes any devising a structure with the
limitation on Congress' power to The Department of Finance should corresponding tax implications of
regulate interstate commerce in this make a thorough study and the Internet Transactions.
regard, and the business community investigation in dealing the complicated
urges the Congress to require nature of Internet Taxation. Haste 3. Efficient Tax Strategy. In taxing On-
meaningful simplification of the states' makes waste. If the Internet is seen as line transactions, the issue boils
sales and use tax regime before a tax panacea, the lack of legal down into the efficiency of tax
undercutting the important bright-line framework to address the issues of administration. It would be sheer
standards on which businesses Internet's technological leaps and idiocy to propose taxing measures
historically have relied. [ 26 ] bounds is a significant barrier to the in Internet transactions while BIR
advocates of taxing the Net. Why kill has been missing out in collecting
Philippine Set-up. The Nexus rule the goose that lays the golden eggs? A the proper amount of revenue
exists because our own Supreme Court Well-developed tax policy in traversing from other taxpayers. If the
has said that the government has no the Information SuperHighway will problem is the system, all tax
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

authority to collect taxes from out of definitely preserve the goose that lays measures are bound to fail.
town merchants. Technically, the the golden eggs without sacrificing the
consumer is supposed to pay usage fundamental principles of sound tax "There are no obvious solutions at this
tax on any purchase in which the system: Fiscal Adequacy, point, but there are many questions as
merchant has not collected sales tax. Administrative Feasibility and most to how to make future tax laws work.
When you purchase items in a bricks- importantly Theoretical Justice. Many are concerned about the expense
and mortar store, you can pay any and of developing a tool that would allow
all local and sales tax that apply to your Taxing the net should be fair to the online merchants to convert the sales
purchase as part of the transaction. The average taxpayer. The notion of tax on purchase depending on the
business acts as a tax collector for the neutrality on online transaction should customer's whereabouts. Also, there
local governments". [ 27 ] If you purchase prevail because On-line commerce is are worries about the use of encryption
something through the mail, you pay not radically different from any other technologies that could allow people
taxes on the transaction only if you live form of commerce, but also and and steer around a Net Sales tax. For
in the same location as the retailer's above all, on the basis of their declared now, e-commerce continues to grow

>> [25] From Free to Fee

14
Jurisprudence in CyberLaw

The Philippine Quarterly IT Law Journal :: Volume 1, Number 2


A & M RECORDS, INC., ET AL. VS. NAPSTER INC.
239 F3d 1004 (9th Cir. 2001)

(This section will be a regular feature infringement Plaintiffs seek injunctive save the expense of purchasing
of the journal to highlight significant relief. authorized copies. The second factor
cases decided in the Philippines and also exist. Works that are creative in
in foreign jurisdictions relating to Issue: Whether Napster can be held nature are 'closer to the core of
information technology) liable for direct infringement? intended copyright protection' It was
determined by the court that the
by Jhonelle S. Estrada Held: The evidence showed that plaintiffs' 'copyrighted musical
majority of Napster users use the compositions and sound recordings
Facts: Plaintiffs are engaged in the service to download and upload are creative in nature', thus cuts against
commercial recording, distribution and copyrighted music; acts that constitutes a finding of fair use under the second
sale of copyrighted musical direct infringement of plaintiffs' musical factor. Under the third factor, records
compositions. It was alleged in the compositions, recordings. It was also show that Napster users engage in
complaint that NAPSTER is a established that Napster users infringe 'wholesome copying' of copyrighted
contributory and vicarious copyright at least two of the copyright exclusive materials because file transferring
infringer. NAPSTER facilitates the rights; the rights of reproduction and involves copying the entirety of the
transmission of MP3 files between and distribution. Its contention that its users copyrighted work. The Effect of Use in
among its users, through a process do not directly infringe plaintiffs' Market shows that Napster use harms
called "peer to peer" file sharing. copyrights because its users are the market for their copyrighted
NAPSTER allows its users to: 1) make engaged in fair use of the material musical compositions and sound
MP3 music files stored on individual cannot be given weight. Several factors recordings. Its defense of fair use is
computer hard drives available for were considered to determine its untenable.
copying by other Napster users; 2) defense of fair use of the material.
search for MP3 music files stored on These are 1. the purpose and Issue [2]: Whether Napster can be
other user's computers; and 3) transfer character of the use, 2. the nature of held liable for direct infringement
exact copies of the contents of other the copyrighted material, 3. the uncle r the doctrine of (a) contributory
users' MP3 files from one computer to "amount and substantiality of the copyright infringement, or (b) vicarious
another via the Internet. The portion used" in relation to the work as copyright infringement.
NAPSTER's Music Share Software the whole; and 4. the effect of the use
made these functions available without upon the potential market or the value Held [2]: (a) "One who, with
charge from NAPSTER's Internet site. of the work. The "purpose and knowledge of the infringing activity,
The Plaintiffs claimed that NAPSTERS character" factor focuses on whether induces, causes or materially
users were engaged in the wholesale and to what extent the new work is contributes to the infringing conduct of
reproduction and distribution of 'transformative' this factor also requires another, may be held liable as a
copyrighted works, all constituting the court to determine whether the "contributory infringer" Contributory
Direct Infringement. They also claimed alleged infringing use is commercial liability requires that the secondary
that NAPSTER, is secondarily liable for or non-commercial. The court infringer "know or have reason to know
the Direct Infringement under two determined that Napster users engage of direct infringement. The records
doctrines of copyright law: contributory in commercial use of the copyrighted must show that NAPSTER has
copyright infringer and vicarious materials. Direct economic benefit is knowledge, both actual and
copyright infringement. NAPSTER on not required to demonstrate a constructive of direct infringement.
the other hand contends that its user commercial use, but it is the repeated Napster was proven to have actual
do not directly infringe plaintiffs' and exploitative copying of copyrighted knowledge when: l. a document
copyrights because the users are works. The record shows that repeated authored by Napster co-founder
engaged in the fair use of the material and exploitative unauthorized copies mentioned 'the need to remain
and that it doe not know of the direct of copyrighted works were made to ignorant of users' real names and IP
>> [24] Jurisprudence in CyberLaw

15
Features

INTERNATI
NTERNATIONAL E-TRADE: GA
TIONAL TT VS. GA
GAT TS
GATS
by Jaime N. Soriano

T he 1948 General
Agreement on Tariffs and Trade
(GATT), now supported by more than
120 countries, led to the formation in
1995 of the World Trade Organization
(WTO).

GATT practices the following principles


in international trade:
General Agreement on Trade in
Services (GATS), Agreement on
Telecommunications Services (ATS)
and the Trade Relation Aspects of
Intellectual Property Rights (TRIPS).

On 12 June 1996, the United Nations


Commission on International Trade
Law (UNCITRAL) adopted the "Model
With the tremendous potential for
growth in e-commerce and the new
opportunities it creates in international
commerce, Trade Ministers at the
Second Ministerial Conference of the
WTO in Geneva on May 20, 1998
have adopted a "Declaration on
Global Electronic Commerce" to
establish a work program to examine
Law on Electronic Commerce" in all trade-related issues relating to
· Non-Discrimination: This is furtherance of its mandate to promote global electronic commerce.
reflected in the Most Favored the harmonization and unification of Member-nations also declared that they
Nation Clause that, in essence, international trade iaw and remove would continue their current practice
mandates a country granting a unnecessary obstacles to international of not imposing customs duties on
trade advantage or favor to one trade caused by inadequacies and electronic transmissions.
country to give that same divergence in the law affecting trade.
advantage to all contracting The Model Law was prepared in WTO Director-General Renato
parties. response to a major change in the Ruggiero Indicated at the Ottawa
means by which communications are Ministerial in October 1998 that the
· National Treatment: This means made between parties using goal of the WTO was not to create a
that imported goods are to be computers or other modern technology set of new rules to govern the electronic
treated as if they were domestic in doing business. It also serves a guide marketplace, but rather to use existing
products and any form of for the establishment of relevant frameworks already in place. He said
discrimination against them in legislation in nations where none that existing agreements such as the
favor of like national products, is presently exists. GATS, TRIPS and ATS are WTO
prohibited. agreements that already in one form
In March 1998, the WTO released a or another deal with e-commerce
· Transparency: This provides that study entitled: "Electronic Commerce related issues. [ 3 ]
trade measures should be made and the Role of the WTO". The study
known to other contracting parties examined the potential gains to Certain exceptions are provided under
to ensure that the system of international trade arising from the GATS in relation to the GATT standards
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

multilateral trade rules are in fact increased use of the Internet for or principles. The member states can
operating. All laws, regulations, commercial purposes. [ 1 ] choose the services in which they make
and tariffs of member countries market access and 'national treatment'
should be published and open. The WTO study also contended that commitments. They can limit the
the Internet, as an Instrument for degree of market access and the
Trade of goods dominated international international trade, should fall under national treatment they provide. They
trade when GATT was established. GATS. The study emphasized that it is can even take a limited exception even
Much later, trade of services (such as not always clear from GATS how the from the 'Most Favored Nation' clause
transportation, travel, banking, market access and national treatment obligation, for a period of ten (10)
insurance, and telecommunications) commitments of member countries years. Use of quotas where
and trade of ideas (like inventions and cover the supply of Internet access government wishes to maintain
designs) became important services. A distinction should be made limitations on market access are
commodities of international between the supply of Internet access permitted, unlike in GATT. [ 4 ]
commerce. In keeping with these services, and the supply of other
developments, GATT was amended services using the Internet as a medium In June 2000, the Asia Pacific
and updated into new WTO of delivery: whether the supply is in Economic Cooperation (APEC) also
Agreements along side with the the GATS or GATT regime. [ 2 ] agreed to a moratorium on the

16
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2
imposition of customs duties on formally adopt the understanding that services, for instance, applies equally
electronic transmission among electronic commerce falls within the whether those services are provided
member-nations. scope of existing WTO rules. This will by letter, fax or over the Internet.
ensure a predictable, trade-liberalizing However, some question whether
On November 14, 2001, a Ministerial environment, promote the growth of specific commitments made during the
Declaration was adopted during the e-commerce, and create opportunities Uruguay Round, predating the e-
Doha WTO ministerial meeting for trade for WTO members at all commerce era, should include supply
declaring "that members will maintain stages of development. [ 7 ] over electronic networks. [ 9 ]
their current practice of not Imposing
customs duties on electronic At the center of e-commerce trade There is much to be done also by way
transmissions until the Fifth Session." dilemma is the definition of goods and of international regulatory cooperation
In the United States, the thrust of the services. There is a consensus that a with the expected growth of cross-
government with respect to electronic book ordered online, but delivered border trade in e-commerce. Data
commerce is to ensure that trade over physically, for the purposes of privacy, encryption technology,
the Internet remains unimpeded. Thus, international trade rules, is considered development of secure payments
the United States has sought to keep as "goods". This concept Makes the systems and taxation, among others,
cyberspace "duty free" -- that is, free book subject to the international rules would raise legitimate public policy
from tariffs or customs duties on for trade in goods, the GATT. However, questions that should not result to
electronic transmissions (the data when the same book is delivered restrictions in electronic trade. [ 10 ]
streams that constitute products and electronically (by downloading it to the With the borderless nature of
services in cyberspace). [ 5 ] computer) there is no agreement cyberspace, negotiations and
whether this digital product should be understanding among member-
A cyberspace free of customs does not treated as a good under GATT or a countries will play a vital role in the
mean that physical goods ordered over service, which would make it subject emergence of information technology
the Internet are free from customs to a GATS regime. Not a trivial as a more effective medium of
duties. Nor does it mean that items distinction, since there are important international trade.
ordered electronically are exempt differences between the rules covering
from internal taxes. Duty-free goods and services, including the type Endnotes
cyberspace merely means that of market access granted and non-
1. p. 23-26, Sax, Michael M., "International
electronic transmissions corning from discrimination between national and Electronic Trade Carrying out Consumer
abroad are not subject to customs foreign suppliers. For example, and Commercial Transactions on the
duties at the border. A delivery discrimination against foreign suppliers Internet", originally submitted as LL.M.
requirement to Osgoode Hall Law
mechanism based on an open network, is, in general, forbidden for trade in School York University, Toronto, Canada
where borders are meaningless, goods, but not for trade in services. International Trade and Competition
imposing customs duties at the border The status of these e-products is as yet Law program, 4 January 1999.
would be a burden that would slow the to be agreed by governments in the 2. Ibid.
3. Ibid.
growth of electronic commerce. [ 6 ] WTO. [ 8 ] 4. Ibid.
5. Marantis, Demetrios, and McHale,
While no country currently imposes Another issue is whether commitments Jonathan, Office of the US Trade
duties on electronic transmissions. the made under WTO agreements - in Representative (USTR), "The Internet and
Customs Duties"
United States is the only WTO member particular related to services - are 6. Ibid.
that has formalized this commitment "technologically neutral" - i.e., whether 7. Ibid.
by specifying it in its tariff schedule. they also cover electronic delivery. 8. Nielson, Julia and Morris, Rosemary, "E-
The United States is encouraging all Generally, WTO members and Commerce and Trade: Resolving
Dilemmas", OECD Observer, 30 March
WTO members to make a similar, commentators argue that a country's 2001.
internationally binding commitment. It commitment to open its market for 9. Ibid.
has also urged member nations to cross border supply of accountancy 10. Ibid.

LEXICON OF CYBERLAW TERMINOLOGY


(This will be a regular section to acquaint law a common point and elimination of the ability of different network
practitioners, students and researchers on differences between the provisioning platforms to carry any kind of service;
legal terms in IT law preferably from the of video, voice and data, using digital and the coming together of consumer
Philippine context). and other emerging technologies; the devices such as, but not limited to, the
coming together of two or more telephone, television and personal
"Convergence" refers to disparate disciplines or technologies;
technologies moving together towards >> [23] Lexicon of Cyberlaw Terminology

17
Features

PHILIPPINES AS KNOWLEDGE CENTER OF ASIA IN THE 21ST CENTURY


by Carlyn Marie Bernadette C. Ocampo-Guerrero

F programmers, are very much in


ilipino IT
practitioners, including technicians and

demand all over the world, such as in


advanced countries as United States,
Australia and Singapore, acquiring a
stature of proficiency second to Indian
programmers who are dominating the
IT outsource market today. But various
and institutional environment that will
encourage the growth of IT use and
the IT industry in the country. Those
involved in telecommunications,
education and R&D will each play their
own supportive roles
telecommunication is for the physical
infrastructure, education for the
adequate preparation of the labor
--
initiatives, as well as economic and
technical cooperation, within Asia-
Pacific Cooperation during the Manila-
Subic ministerial and leaders meetings
in 1996.

The Philippine Situation. The principal


strengths of the Philippine IT industry
include a well-educated, price-
professional groups and related force, the R&D community for competitive labor force, English
organizations today have sprouted with developing local products and proficient, with a growing track record
the purpose of honing the skills of our applications, and for adapting of successful IT work, fast-growing
IT professionals and expanding their technology sourced overseas to telecom infrastructure, government
capabilities. All these scattered efforts Philippine conditions, as well as to act interest in the industry, less regulation
are now being harnessed and in a broader capacity as government than those of some of its neighbors,
coordinated by the Philippine National or private business. good capabilities to dealing with foreign
Technical Council, which can boldly partners, and strong entrepreneurship.
assert that the international community In industry, it hopes to turn the Yet, there are missing elements for
now sees the Philippines as an Philippines into an Asian hub of integrated IT diffusion in the Philippines
emerging IT-competitive economy. software development and training. compared with other countries such as:
And sees that private industry will adopt improved access to IT technology and
The Council sets out a clear vision that IT solutions for competitiveness and know-how from other countries across
by the end of the first half of the 21st develop a global niche for Philippine industries; preferential treatment of
century, "the Philippines will have laid IT products and services. In advanced local users in learning from
the infrastructure for every business, government, it seeks to improve foreign firms; more integrated
every agency of government, every capacity and efficiency and to approaches to national strategies for
school, and every home to have professionalize bureaucracy. In IT diffusion -- e.g. pace setting activities
access to information technology. By education, public and private in cost-sharing, government-industry
2005, Philippine companies will be education and training institutions will partnerships, and IT consultancies;
producing competitive IT products for adopt IT in their curricula and develop user-oriented IT strategy to encourage
world markets. Within the first decade, a critical mass of IT professionals and building a critical mass of local IT firms;
an IT literate workforce. And in overall
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

it will be a leader in IT education, IT- support to creating world-class


assisted training, and in the application support services, it seeks to create managerial skills in information
of information and knowledge of policies, programs, institutions, and a management and organization.
business, professional services, and culture that would make the Philippines
the arts. And telecommunications will achieve the Council's goal. Globally, competition in electronics has
provide the infrastructure for shifted away from final assemblers and
interconnection and networking IT became a concern of multilateral vertical control to "open-but-owned"
throughout the Philippine archipelago." policy agreements, particularly within systems, with standard owners going
Its goal, therefore, is to make the the General Agreement on Trade in after a growing installed base of
Philippines as the Knowledge Center Services (GATS) within the World Trade customers. These opportunities are yet
of Asia. Organization and the Framework to be tapped by the Philippines.
Agreement within ASEAN for
The role of government in Philippine expanding intro-regional trade in In telecommunications, Agila II was
IT development is that of an enabler, services. The National Information launched in 1997, with a reach
lead user, and partner of the private Technology Council noted that IT covering all Southeast Asian countries
sector providing national information permeated various trade and and some parts of China and Japan. It
Infrastructure and the policy, program, investment liberalization and facilitation further expands local

18
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2
telecommunications and broadcast trading by using investor terminals launched its own campaign to bring
infrastructure without depending on located at the public galleries. An out a competitive IT industry. The
foreign-owned satellite facilities. Four electronic link-up with the Securities Intellectual Property Rights Code,
telecommunications bills were in and Exchange Commission started in Republic Act No. 8393, seeks to
consideration in Congress: Proposed 1996. A paperless trading system was impose stiffer penalties and fees for
Reorganization of the National introduced in 1997, with the settlement the manufacture, distribution and use
Telecommunications Commission; and clearing of transactions using of unlicensed software. House
Cable Television Rationalization Bill; certificates replaced by a book-entry Resolution 890, called for the
Anti-telecom Fraud Bill; Arbitrary system of transferring ownership for interconnection of local Internet Service
Resistance to Interconnection which equities and lodging the certificates in providers into on Internet exchange.
seeks to criminalize the refusal of a a central repository. A clearing facility The exchange, to be otherwise known
company to interconnect. is being built to supplement the central as the RPWEB, electronically links up
stock depository. via the Internet the entire government
More Internet Service Providers are organization.
expanding their services to include The Philippine electronics industry is
content provision as well. The first the country's major export winner. The The Government's Action Agenda.
Philippine Internet Exchange or PhIX, industry is export-oriented, essentially
was launched in 1997. PhIX is a engaged in assembly manufacturing A . Provide the Policy Environment.
network access point that allows ISPs and labor intensive activities,
to exchange local Internet traffic within dominated by multinational 1. Adoption and implementation of
the Philippines without having to corporations (MNCs) such as Intel, policies to promote increased
investments in IT and related
connect host servers overseas. The Texas Instruments, Fujitsu, Matsushita,
electronics industries--e.g., through
PhIX was established by PLDT and Toshiba and others.
strategic partnerships, venture
interconnects Infocom, Iphil, Mozcom, capital.
Virtualink, and Worldtel. In Education., Quality and expertise
distinguish the Filipino IT professional. Specific Actions followed were
The banking industry is one of the Filipinos find it easy working on legacy promulgating administrative
Philippine pioneers in IT use. Megalink applications as well as fourth legislative measures to promote
operated the first shared network of generation languages. Thousands of wider private sector participation in
automated teller machines (ATMs) and Filipinos are adept with mainframes venture capital financing to expand
was the first switch company to and experienced in minicomputer the capital base for IT R&D and other
undertake ISO 9000 certification. And operations. Filipino microcomputer IT-related development ventures;
Among other IT projects in banking are professionals have experience with
the following: the Philippine Dealing connectivity and data communications Adoption measures to promote
System (PDS), an electronic off-floor through Local Area Networks (LAN) strategic partnerships and alliances
by local companies/institutions with
foreign exchange trading system that and micromain frame links. The use
leading international R&D
has been in place since 1992; the of IT to improve teaching, learning ,
institutions, technology providers,
Philippine Dollar Transfer System and educational management in basic developers, and manufacturers;
(PDDTS), a vehicle and electronic education was introduced through
facility to handle and monitor Schools of the Future equipped with Promotion of technological
bookkeeping claims to US dollars being multimedia facilities opened in innovation and experimentation by
traded among participating banks; Camarines Sur in 1997. Various creating new products, services and
IDInet Philippines Inc., a company electronic information networks are applications;
jointly owned by Ayala Corp. and encouraging greater inter-action within
Singapore Network; Project Abstract the country's networks are encouraging Focus R&D on high-value added IT
Secure (PAS), a functional collaboration greater inter-action within the country's products and services as well as on
between the Bureau of Customs (BOC) S&T community: the Science Academe product creation/design and
and the BAP, where an electronic and Research Network NARNET aims improvement in high growth sectors
system has been put in place to verify to connect to the Net thousands of such as telecommunications
software development (information
the proper payment of customs/taxes tertiary and secondary schools all over
systems, common application
and to remit payments electronically the Philippines; the Science and
packages, educational/courseware
through the banks. Technology education network packages, multimedia applications,
(STEDNET); and the Health R&D computer animation, promotional
The Philippine Stock Exchange set up Information network (HERDIN). products etc.).
an electronic trading system in 1994
and provided the investing public with In Government. With the support of
access to market information during private sector, the Government

19
2. Adoption of more investor-friendly the Internet, to ensure information accounting, auditing, monitoring
policies systems and procedures in security and network reliability. reporting, etc.
government.
5. Promoting telecommuting/ E . Organize for Action:
Specific actions such as Fast-track teleworking, particularly in software Institutional Reforms
legislation/adoption of development and multimedia
administrative measures to further production. 1. Reorganizing the NITC to broaden
liberalize foreign investment; and strengthen private sector.
C . Develop the IT Manpower Base
Establishing fast lane services for 2. Involvement in IT development
foreign investors/businessmen at 1. Producing the critical mass of IT activities.
ports of entry and when transacting professionals and IT-literate
business with government to create manpower including competent IT 3. Constituting NITC task forces to
investor-friendly environment; educators and teachers at all levels. carry out specific IT 21 programs/
actions.
Organizing a taskforce on 2. Designating from among IT training
monitoring and public institutions, universities or colleges 4. Organizing a private sector Advisory
accountability aimed at making the IT Centers of Excellence as a form Council to facilitate meaningful
administrative and policy of recognition and reward. private sector participation in the
environment for more conducive for implementation of IT 21.
investing and doing business in the 3. Organizing a nationwide network
Philippines. of Core Competency institutions in 5. Strengthening the NCC to enable it
IT in partnership with local and to better carry out its primary
3. Implementation of Philippine international development mandate of promoting widespread
commitments to international institutions and business use of IT in government.
agreements that affect the IT sector organizations.
favorably -e.g. the IT Agreement 6. Creating a comprehensive database
(ITA). 4. Conducting continuing IT education management, monitoring and
for teachers/trainors, IT practitioners benchmarking system for key IT
4. Adaptation of administrative and workers. indicators.
measures to effectively enforce the
laws on intellectual property rights 5. Adopting dual-tech approach in IT F. Marketing the National IT plan
(IPR), particularly as they affect IT education and training. for the 21st Century
products and services.
6. Establishing high-quality distance 1. Organizing task forces to undertake
5. Rationalization and coordination of education and learning. a nationwide communication and
development of technoparks and advocacy program, including
cybercities throughout the country for 7. Developing and implement life-long focused It trade missions and
greater complimentarity in learning through the internet. international roadshows.
investments and infrastructure
development. D. Pump-prime IT Industry 2. Developing, producing, and
Development disseminating promotional materials
B . Enhance the Physical on IT21 and the Philippine IT Action
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

Infrastructure 1. Implementing a government-wide Agenda.


computerization program with
1. Accelerating universal access, i.e., emphasis on the development and 3. Creating a Philippine website
Making telecommunications services deployment of front-line, mission- promoting IT 21 and IT Action
accessible and affordable to all, by critical and common application Agenda.
completing telecommunications information systems.
programs, especially in underserved In conclusion, Phase Three involves
areas. 2. Providing appropriate financing developing a global niche for the
support to allow active participation Philippine IT in knowledge products and
2. Fast-tracking the formulation and by private sector in R&D and in the services. It looks to sustaining IT
implementation of the Philippine development and the incubation of innovation geared towards knowledge
Information Infrastructure (PII). new products and solutions. creation, pushing for higher levels of
growth for the Philippine IT industry,
3. Intensifying investment promotion in Fast-tracking measures to streamline
and sustaining its role as "The
the telecommunications industry. administrative processes and
procedures in government Knowledge Center in Asia".
4. Formulating appropriate cyber laws procurement, budgeting,
Source: www.neda.gov.ph/ads/IT21/
in the use of networks, particularly

20
Features

The Philippine Quarterly IT Law Journal :: Volume 1, Number 2


AMENDMENTS TO THE 1998 RULES OF THE HOUSE OF REPRESENTATIVES
ELECTORAL TRIBUNAL (HRET)
by Carlyn Marie Bernadette C. Ocampo-Guerrero

O n 1 April 2003, the


Amendments at the 1998 Rules of the
House of Representatives Electoral
Tribunal (HRET) were adopted.
Specifically, Rules 1 (Title), 4
(Organization), 11 (Administrative
staff), 16 (Election protest), 21
(Summary dismissal of election
contest), 31 (Filing fees), 32 (Cash
evidence if it complies with the rules
on admissibility prescribed by the Rules
of Court and related laws and is
authenticated in the manner prescribed
by the said Rules. The definition of
Electronic document is a reiteration of
the definition given in the Rule 2
(Definition of Terms and Construction)
of Electronic Evidence of the SC (REE
Rule 75 are the factors in assessing
the evidentiary weight of an electronic
document. Rule 76 are the factors to
be considered when it comes to the
integrity of an Information and Rule
77 are the exceptions to the Hearsay
Rule. On the other hand, how the
presumptions provided for in Rule 77
may be overcome is provided for in
deposit), 34 (Legal fees), 35 (When of the SC). Rule 78. Both rules are reiteration
ballot boxes, election returns and other of Rule 8, Secs. 1 and 2, Business
election documents brought before the Rule 68 states that an electronic Records as Exception to the Hearsay
tribunal), 36 (Revision teams), 37 document shall be regarded as the Rule.
(Revisors; Compensation), 39 equivalent of an original document
(Procedure during revision), 40 under the Best Evidence Rule. Rule Rule 79, Affidavit of Evidence, and
(Where revision done; Who may be 69, expounds on how a copy of a Rule 80, the process required from
present), 48 (Photographing or document shall or shall not be the affiant with regard to the affirmance
photocopying, and 59 (Time limit for admissible to the same extent as the of the contents of the affidavit in open
presentation of evidence) were original. Both Rules 68 and 69 are court, as well as the procedure of
amended. The former Rules 66 to 83 lifted from Rule 4, Secs. 1 and 2, Best cross-examination by the adverse
of the 1998 Rules were renumbered Evidence Rule party are reiterations of Rule 9, Sec.
as Rules 86 to 103 in the current rules 1 and 2, Method of Proof.
to admit 20 new rules on Electronic In Rule 70, various means are
Evidence, applying therefore provisions presented on how a person seeking to Rule 81 lays down the procedure to
of the Rules of Electronic Evidence introduce an electronic document may be followed after summarily hearing
(A.M. No. 01-701-SC) promulgated prove its authenticity. Rule 71, Proof the parties pursuant to Rules 79 and
in July, 2001 to electoral matters of Electronically Notarized Document, 80 of the above Rules; Rule 82
involving the HRET. Moreover, the points that a document electronically affirms the necessity of transcription
renumbered Rules 88 (Pilot precincts; notarized shall be considered as a by the stenographer, stenotypist or
Initial revision), 94 (Finality and public document and proved as a other recorder of the entire proceeding
execution of decisions; Motion for notarial document under the Rules of the examination of a witness done
reconsideration), 95 (Entry of promulgated by the Supreme Court electronically; Rule 83 declares that
Judgment), 96 (Procedure after finality (lifted from Rule 5, Secs. 1, 2 and 3, the electronic evidence and recording
of decision; Execution of decision; Authentication of Electronic of it as well as stenographic notes shall
Publication of decisions), and 103 Documents.) form part of the record of the case.
(Effectivity) were also modified. Rules 81 to 83 are all reiteration of
Rule 72 details the various manner Rule 10, Sec. 1,2,3 on Examination
Rules 66 to 85 of the amended on how an electronic signature may of Witnesses.
HRET Rules state the rules on how be authenticated. Rule 73 are the
electronic documents or electronic data disputable presumptions relating to Rule 84 sets forth the condition when
message may be used, offered and Electronic Signature. Rule 74, on the audio, video and similar evidence shall
admitted in evidence. other hand, are the disputable be admissible in Court; and Rule 85
presumptions relating to Digital states how ephemeral (lasting only a
Rule 67, as stated in Rule 3, Sec. 2 Signatures. (Rules 72, 73 and 74 are very short time) electronic
on Electronic Documents (A.M. No. reiteration of Rule 6, Sec. 1, 2, 3 and communication which includes
01-7-01-SC), declares that an 4 on Electronic Signatures.) telephone conversation, text messages,
electronic document is admissible in
>> [24] Amendments to HRET Rules

21
Features

LEGAL CITATI
ITA ON: WEBSITES AS REFERENCE
TION
by Jhonelle S. Estrada

W hen lawyers argue


their case and judges write their
opinion, they cite authority. Reference
is made to the statutes, regulations and
jurisprudence found to be applicable
to the given state of facts. Thus, the
reader and the writer must master the
language of "Legal Citation."
professional norms that introduced
generations of law students to legal
citation and the other one is the "ALWD
CITATION MANUAL" which is an
alternative reference designed for
instructional use, prepared by the
Association of Legal Writing Directors.

BlueBook and the ALWD Citation


journals, etc. and now, due to the
advancement in Information
Technology and with the proliferation
of websites, its use as a reference
material became a common thing.
Thus, here comes the Big Question,
HOW DO WE CITE WEBSITES AS OUR
REFERENCE MATERIAL? The Bluebook
and the ALWD Citation Manual both
Definition and purpose Manual provided certain examples.

Legal Citation is defined as [ 1 ] "a The Bluebook, although used earlier a. BLUEBOOK:
standard that allows one writer to refer than the ALWD CITATION MANUAL Federal Judicial Center, Federal
to legal authorities with sufficient has been much criticized. It was said Judicial Center Publications (visited
precision and generality that others can that it has too many editions and that July 10, 1999) <http://
follow the references. A reference students control the Bluebook. The www.fjc.gov/pubs.html>
properly written in legal citation helps: Bluebook has been created primarily
by law students. Their lack of b. ALWD CITATION MANUAL:
a. Identify the document and experience and their being turned over Federal Judicial Center, Federal
document part to which the author by 100% every few years has Judicial Center Publications <http:/
is referring. contributed to difficulties with the / w w w. f j c . g o v / p u b s . h t m l >
Bluebook. (accessed July 10, 1999)
b. Provide the reader with sufficient
information to find the document The members of the Association of The ALWD Citation Manual moved the
and document part in the sources Legal Writing Directors (ALWD) find it date to the end to be more consistent
the reader has available (which frustrating to teach citations found in with other sources. ALWD uses
may or may not be the same the Bluebook, prompting members of "accessed" instead of "visited" to give a
sources as those used by the ALWD formed a committee and chose more professional tone and be
writer), and a person to write a new citation consistent with non-legal citation guides
manual, giving birth to the ALWD
c. Furnish important additional Citation Manual. "The ALWD Citation The book "Basic Legal Writing" by
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

information about the referenced Manual is not merely a reference Mauricio Ulep provided for different
material and its connection to the book, but is also a teaching book" It guidelines in citing Internet sources for
writer's argument that a reader aims to simplify some of the rules in legal documents.
trying to decide whether or not to citation, reduce inconsistencies, make
pursue the reference would want rules responsive to the needs of a. For Periodical Articles
to know" lawyers as well as scholars and to
provide stability and uniformity of For Journals available on the web:
Some students and practitioners find citation rules. Author(s), 'title of article,' volume,
difficulty in citing authorities. Legal Journal title, article Reference
Citation is a technical language that Websites (year) <Journal Uniform Resource
should be mastered. Some writers Locator> [paragraph pinpoint]
even said that it is easier to read than The Art of Legal Citation is complicated.
to write. Two of the most widely used Most students find it hard to cite Where an article is published on
manuals in legal citation is the authorities coming from the the web but is not part of the
"BLUBOOK" which is a codification of conventional sources such as books, journal:

22
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2
Author(s), 'title of article,' The use of websites can help one get regarding that certain subject, and he/
Homepage Title, relevant all the necessary data easier. One she relied completely on websites, he/
Organization, article reference need not go to the library to borrow she is not the only one who will be
(year), <Uniform Resource various books on the subject. It is more misled by the wrong information but
Locator> (Copy on file with accessible. All that a person has to do his readers as well. His/Her reader's
Author) [paragraph pinpoint] is log on, on the Internet. It is cheaper outlook might be tainted and they might
because it saves the person money arrive into erroneous conclusion
b. For Cases published in Electronic from photocopying books, journals, regarding that certain topic.
form: and cases. Websites are sometimes
Surname of parties, [Court more updated. It is much easier to Conclusion
Identifier] G.R. docket number and revise. Yet, the use of websites as a
date of promulgation (Unreported, reference material also has its The use of websites as a reference
ponente) <uniform resource drawbacks. There are still a range of material became an ordinary thing, but
locator> at date file retrieved doubts regarding its validity. There are we should bear in mind, that websites
[pinpoint] critics questioning the validity of the should only be supplement information
resources, since one can write about coming from the conventional sources.
c. For Statutes/Rules published in something and just post it without the We should avoid using it as our sole
electronic form: approval of the appropriate authority. reference, because it is not a conclusive
State/country, Title of statutes/ One cannot even be sure regarding reference material.
rules, date adopted or the authenticity of documents found in Endnotes
promulgated by name of authority websites. There is also no certainty
1. Martin, Peter "Introduction to Basic Legal
<uniform resource locator> at regarding the person who made the Writing" , (2003 ed) <http//
date file retrieved (paragraph websites. Any person who has no www.law.cornell edu/citation>
pinpoint] expertise or is not accredited in that
Bibliography
particular field can just give his/her
d. For E-mail view, and can become an expert all of 1. Martin, Peter, "Introduction to Basic Legal
Author of e-mail, message. a sudden. Thus, a person should not Citation," (2003 ed) >http://
Subject line of the message entirely base his findings or opinions www.law.cornell.edu/citation>
2. Schiess, Wayne, "Meet ALWD: The New
[online available e-mail: name of on documents found in websites. Books Citation Manual", (2002) <http://
recipient @ address.edu. from are still more accurate because it has schiess.freeservers.com/alwd.html>
author @) address.edu.date of the approval of the proper authorities 3. Jamar, Steven, "A Review of ALWD
message. and has undergone various processes Citation Manual" Citation System for the
Law (2000) <http://
before it is published and printed. The www.law.harvard.edu/faculty/pages/
Advantages and Disadvantages reliability of websites can also be jamar/scholarship/alwdciterev.htm>
questioned, since its contents can be 4. UCHastings College of Law, "Legal
Since the use of websites became a easily changed. A problem may even Writing and Research" (2000-2001).
<http://uchastings.edu/wr-o1/classes/
common practice nowadays, its use a arise if the websites are not always alwd.manual.htm>
reference material has its advantages updated. If a person write a certain 5. Ulep, Mariano "Basic Legal Writing."
and disadvantages. document and has no knowledge (2002)

<< [17] Lexicon of Cyberlaw Terminology "Intermediary" refers to a person to that electronic document. (Sec. 5
computer. (Sec. 6 (d), Chapter 1, Part who in behalf of another person and (i), R. A. No. 8792)
II, Implementing Rules and Regulations with respect to a particular electronic
of the E-Commerce Act of 2000). document sends, receives and/or "Telecommunications" refer to any
stores or provides other services in process which enables a
"Interconnection" refers to the respect of that electronic document. telecommunications entity to send and
linkage, by wire, radio, satellite or (Sec. 5 (h), R. A. No. 8792) receive voice, data, electronic
other means, of two or more existing messages, written or printed fixed or
telecommunication carriers or "Originator" refers to a person by moving pictures, music or visible or
operators with one another for the whom, or on whose behalf, the audible signals or any control signals
purpose of allowing or enabling the electronic document purports to have of any design and for any purpose by
subscribers of one carrier or operator been created, generated and/or sent. wire, radio or other electromagnetic,
to access or reach the subscribers of The term does not include a person optical, or technological means. (Sec.
the other carriers or operators. (Sec. acting as an intermediary with respect 3 (a), R. A. No. 7925)
3 (k), R. A. No. 7925)

23
<< [15] Jurisprudence in Cyberlaw << [6] Is there such a thing as WMD? House of Representatives.” Georgetown
University, 23 May 2000. Retrieved 4
addresses, since they are exchanging relation with the critical utility that they May 2004. http://
are designed to support, as a means www.cs.georgetown.edu/~denning/
pirated music.; and 2. the Recording
infosec/cyberterror.html
Industry Association of America (RIAA) to minimize negligence on the matter, 6. Pollitt, Mark M. “CyberTerrorism: Fact
informed Napster of more than and prevent potential disasters as a or Fancy?” Retrieved 4 May 2004. http:/
12,000 infringing files, some of which result thereof. Pollitt made an apt /www.cs.georgetown.edu/~denning/
reminder on this matter. He said, “As infosec/pollitt.html
are still available. There is also 7. “The term ‘Terrorism’ means
constructive knowledge because: 1. we build more and more technology premeditated, politically motivated
executives have recording industry; 2. into our civilization, we must ensure violence perpetuated against non-
that there is sufficient human oversight combatant targets by sub-national
they have enforced intellectual groups or clandestine agents.” United
property rights in other instances; 3. and intervention to safeguard those
States Department of State, “Patterns of
whom technology serves.” [ 18 ] Global Terrorism,” Washington DC,
Napster executives have downloaded
1996
copyrighted songs from the system and 8. Denning, Dorothy E. http://
On the other hand, critical data must
4. they have promoted the site with www.cs.georgetown.edu/~denning/
likewise be protected. The infosec/cyberterror.html, supra.
"screen shots listing infringing files."
Government should provide the ample 9. The American Heritage®, supra.
Napster provides the 'site and facilities' protection through the enactment of 10. WordNet ® 1.6, supra.
for direct infringement. Plaintiff's claim laws for stiffer penalties against e-mail 11. The word “terrorism” entered into
that Napster can be held liable for bombing or flooding, denial of service
European languages in the wake of the
French revolution of 1789 when the
contributory copyright infringement is attacks, and computer break-ins. The government in Paris tried to impose its
meritorious. government and industries must find radical new order on a reluctant
solutions to increase the quality of citizenry. As a result, the first meaning
(b) Vicarious copyright liability is 'an of the word “terrorism,” as recorded by
system security, mass-market computer the Académie Française in 1798, was
outgrowth' of respondeat superior. It products, and emergency technical “system or rule of terror,” a reminder
extends beyond an employer/ response. The economic consequence that terror is often at its bloodiest when
employee relationship to cases in which of crashed or unusable systems and used by dictatorial governments against
their own citizens. See BBC, History, The
a defendant has the right and ability to corrupted data is clear. In the end, Changing Faces of Terrorism. http://
supervise the infringing activity and also anything that would threaten economic www.bbc.co.uk/history/war/sept_11/
has a direct financial interest in such viability may appear to be greater than changing_faces_01.shtml
12. CNN.com – Hamas leader killed in air
activities.' The court finds Napster's the threat of physical harm, for
strike – Apr 17, 2004. Retrieved 4 May
failure to police the system's eventually what is worse than the death 2004. http://edition.cnn.com/2004/
"premises," combined with a showing that we fear is the reality of borderline W O R L D / m e a s t / 0 4 / 1 7 /
existence that we have to endure. mideast.violence/index.html. See also
that Napster financially benefits from CNN.com - Ambassador: Hamas leader
the continuing availability of infringing Endnotes was ‘doctor of death’ – Apr 19, 2004.
files on its system, leads to the Retrieved 4 May 2004. http://
1. What is Cyber? A word definition from edition.cnn.com/2004/WORLD/meast/
imposition of vicarious liability. 04/19/ un.rantisi/index.html
the Webopedia Computer Dictionary.
Retrieved 4 May 2004. http:// 13. Appendix B - Background Information
The order of Preliminary Injunction is w w w. w e b o p e d i a . c o m / T E R M / c / on Designated Foreign Terrorist
Organizations. Retrieved 4 May 2004.
affirmed with modifications. cyber.html. http://
http://www.globalsecurity.org/security/
www.webopedia.com/. Copyright, 2004
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

<< [21] Amendments to HRET Rules Jupitermedia. All rights reserved. library/report/2004/pgt_2003/
Reprinted with permission from http:// pgt_2003_31711pf.htm
chatroom sessions, streaming audio, www.internet.com. 14. Collin, Barry C., “11th Annual
streaming video and other electronic 2. Collin, Barry C., “The Future of International Symposium on Criminal
CyberTerrorism,” Proceedings of 11th Justice: The Future of Cyberterrorism,
form of communication shall be where the physical and virtual worlds
Annual International Symposium on
proven by the testimony of a person Criminal Justice Issues, The University converge.” Retrieved on 4 May 2004.
who was a party to the same or has of Illinois at Chicago, 1996 http:// http://afgen.com/terrorism1.html
w w w.acsp.uic.edu/OICJ/CONFS/ 15. Pollitt, Mark M., “Cyberterrorism: Fact
personal knowledge thereof. Both rules or Fancy?” Retrieved 4 May 2004 http:/
terror02.htm
are taken from Rule 11, Secs. 1 and /www.cs.georgetown.edu/~denning/
3. The American Heritage® Dictionary of
2 on Audio, Photographic, Video and the English Language, Fourth Edition infosec/pollitt.html
Ephemeral Evidence. Copyright © 2000 by Houghton Mifflin 16. Denning, Dorothy E. http://
Company. Published by Houghton Mifflin www.cs.georgetown.edu/~denning/
Company. All rights reserved. infosec/cyberterror.html, supra.
Therefore, Rules 66 to 85 is just a 4. WordNet ® 1.6, © 1997 Princeton 17. Green, Joshua. “The Myth of
repetition or reiteration of the Rules University. Cyberterrorism.” Retrieved 4 May 2004.
on Electronic Evidence as promulgated 5. Denning, Dorothy E.. “Testimony before http://www.washingtonmonthly.com/
the Special Oversight Panel on Terrorism features/2001/0211.green.html
by the Supreme Court (A.M. No. 01- 18. Pollitt, Mark M., “Cyberterrorism: Fact
Committee on Armed Services US
7-01-SC). or Fancy?” supra.

24
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2
<< [14] From Free to Fee 10. Yam, Jovi (2001). Net taxation: The Bit 21. Yam, Jovi (2001). Net Taxation: Duty-
Tax. Accessed. http:// free cyberspace... for now. Accessed
and thrive in a sheltered marketplace. w w w. i t m a t t e r s . c o m . p h / c o l u m n / June 12, 2004. http://
[ 30 ]
At the end of the day, nothing is yam_07052001.html www.itmatters.com.ph/ column/
11. Ibid. yam_06282001.html.
more satisfying that to have days of 12. Ibid. 22. McCluskey, Alan (1998). Taxation and
free Internet. 13. Glover, Marilee (year). Taxation and the the Internet. Accessed.
Internet. http://web.utk.edu/ w w w. c o n n e c t e d . o r g / g o v e r n /
Endnotes ~mglover/IS567Paper.html taxation.html
14. No. 17, Section 1104, The Internet Tax 23. Mark, Roy (2002). End of the Beginning:
1. Commisioner v Pineda, 21 SCRA 105 Act. Accessed May 17, 2004. http:// Internet Sales Tax. Accessed July 01,
2. Vitug and Acosta (2000). Tax Law and www,gseis.ucla.edu/iclp/itfa.htm 2004. http://www.internetnews.com/
Jurisprudence. Second Edition, pg 3. 15. Andal, Dean ( ). "Electronic Commerce: ec-news/article.php/1499501
Quezon City, Philippines, Rex Bookstore. "Bright Line" Definition of Nexus 24. National Governors association
3. No.6, Section 1104, The Internet Tax Needed." Cal-Tax Digest. Sept. 1999. accessed May 19, 2004. http://
Freedom Act. Accessed May 17, 2004. Accessed May 28, 2004. http:// www.nga.org/legislativeUpdate/HHS/
http://www,gseis.ucla.edu/iclp/itfa.htm w w w. c a l t a x . o r g / M E M B E R / d i g e s t / 1,2243„00.html
4. Lallana, E. (2003) www eprimers.org/ sep99/sep99-4.htm. 25. Quill v North Dakota 504 US 298 (1992)
Infoage/page44.asp 16. ______. Internet Taxation: Myth versus 26. ______. Internet Taxation: Myth versus
5. No.3, Section 1104, The Internet Tax Fact." http:// Fact." http://
Freedom Act. Accessed May 17, 2004. w w w. s a l e s t a x s i m p l i f i c a t i o n . o r g / w w w. s a l e s t a x s i m p l i f i c a t i o n . o r g /
http://www.gseis.ucla.edu/iclp/itfa.htm documents/myth.doc. Accessed 1 July documents/myth.doc. Accessed 1 July
6. Muscovitch, Zac (-). Accessed July 16, 2004. 2004.
2004. http://www.firstmonday.dk/ 17. 504 US 298 27. Glover, Marilee (year). Taxation and the
Issues/issue2_10/muscovitch/ 18. ______. Internet Taxation: Myth versus Internet. http://web.utk.edu/
index.html#Conclusion Fact." http:// ~mglover/IS567Paper.html
7. No.1, Section 1104, The Internet Tax w w w. s a l e s t a x s i m p l i f i c a t i o n . o r g / 28. Ibid.
Freedom Act. Accessed May 17, 2004. documents/myth.doc. Accessed 1 July 29. Mangalindan, Marciano (2000). The
http://www,gseis.ucla.edu/iclp/itfa.htm 2004. Web Tax is Free... or is it? Accessed 1
8. Yam, Jovi (2001). Net taxation: The Bit 19. Glover, Marilee (year). Taxation and the July 2004. http://trim811.addsites.com/
Tax. http://www.itmatters.com.ph/ Internet. http://web.utk.edu/ webtax.html
column/yam_07052001.html ~mglover/IS567Paper.html 30. Mangalindan, Marciano (2000). The
9. Cordell, Arthur(1996). New Taxes for a 20. National Governors association Web Tax is Free... or is it? Accessed 1
New Economy. Accessed July 14, 2004. accessed May 19, 2004. http:// July 2004. http://trim811.addsites.com/
http://www.usask.ca/library/gic/v2n4/ www.nga.org/legislativeUpdate/HHS/ webtax.html
cordell/cordell.html 1,2243„00.html

<< [28] Harvard Internet Law Program · Jonathan Zittrain, Professor of Law
· Yochai Benkler, Professor of Law at · Lawrence Lessig, Professor of Law and Faculty Co-Director and co-
Yale Law School with J. D. at Harvard and John A. Wilson Distinguished founder of the Berkman Center and
Law School. He clerked tot US Faculty Scholar at Stanford Law serves as its first executive director
Supreme Court Associate Justice School. He is the founder of the from 1997-2000. His research
Stephen Breyer and had extensive Berkman Center and Chairman of includes the technologies and
research and papers on the effects the Creative Commons. He was a politics of control of Internet
of laws, as well as political and recipient of the Cyberspace Law architecture and protocol and the
economic theory, that regulate Excellence Award from the American future of the open source software.
information production and Bar Association and was named as
exchange. one of the Scientific American's "Top In his ten page Participation Report to
50 Innovators" in 2002. He is an Law School Dean Mariano Magsalin
· William Fisher III, Hale and Dorr author of various books on Jr. and Mr. Florentino Cayco III, Prof.
Professor of Intellectual Property at cyberlaw, his most recent being: "Free Soriano said that the program gave
Harvard Law School, Faculty Culture: How Big Media Uses
him a better perspective of the current
Director of the Berkman Center and Technology and the Law to Lock
Down Culture and Control
issues affecting the Internet from the
specializes in intellectual property
Creativity". legal, political, economic and
law and the implications of Internet
and technology on copyright, and
technological perspectives. He also
author of "Promises to Keep". · Charles Nesson, Professor of Law at noted that many of the participants are
Harvard Law School, Faculty Co- unaware of current developments in
· Jerry Kang, Professor of Law of UCLA Director and co-founder of the technology law in the Philippines.
and visiting professor of Harvard Berkman Center in 1997. He
Law School. His scholarship pursuits clerked for US Supreme Court The Berkman Center for Internet and
include civil procedure, race and Associate Justice John Marshall Society observed that this year's
communication. He is the author of Harlan and continues to incorporate program was a great success. It was
the leading casebook, cutting-edge technology in his law
the largest and arguably the best of
"Communications Law & Policy: classes.
the 6th Internet Law Programs hosted
Cases and Materials".
by the center.

25
LegalWeb

WWW.SUPREMECOURT.GOV.PH:
BRINGING THE JUDICIARY CLOSER TO THE PUBLIC
by Ma. Cristina A. Ramos

This section is a continuing series of articles of a formal judicial structure and its check whether a person is indeed a
featuring various websites which may be
changes through the years. member of the bar, he or she can find
relevant to legal practitioners, legal

I researchers, and law students.


it out in a mouse click.
"Vision/Mission" contains the policy
n 1998, the statement of the Judicial Branch. The section on "Publication" is the space
Supreme Court of the Philippines reserved for interesting works of the
made information from and about the "Justices" makes the public acquainted members of the Bench. At present, it
judiciary available to the world through with the present justices of the Supreme contains three articles written by Justice
the Internet. Court as it provides for the profiles of Artemio V. Panganiban entitled "Battles
the latter placing special emphasis on in the Supreme Court," "Justice and
For almost six years now the official their educational background and stint Faith" and "Leadership By Example."
website of the Supreme Court has in the judiciary and legal profession.
been functioning as a clearinghouse Photographs of each of the justices are The "Directory" provides a list of contact
for information from and about the also posted in these pages. numbers of the different offices in the
Judicial Branch of the Philippine Supreme Court. It contains a list of the
government. The site has also been The organizational structure of the telephone numbers of the First, Second
helpful to legal practitioners, judges, Philippine court system is shown in and Third Divisions, PHILJA,
legal researchers and law students as "Organizational Structure." A space is Presidential Electoral Tribunal,
the site contains up-to-date information also provided for the Supreme Court's Management Information System
necessary in the field of law. organizational chart in the same page Office, Judicial and Bar Council, the
but chart is not yet posted. Offices of the Clerk of Court, Bar
The homepage provides links to pages Confidant, Court Reporter, Chief
about the following: announcements "Announcements" is a virtual public Attorney, and Court Administrator. The
from the Supreme Court, history of the bulletin board wherein invitations to contact number of the different
Highest Tribunal, its mission and vision, apply for eligibility and to bid, notices services such as Administrative,
the present justices, the Court's of awards and similar information are Medical, Dental, Library and Printing,
organizational structure, bar matters, posted. are likewise displayed. Other offices
decisions, resolutions, circulars and whose contact numbers are listed in
orders, references, publications, news "News and Information" is almost the site are the following: Judicial
and information, frequently asked similar to "Announcements" as it also Records Office, Fiscal Management
functions as a virtual bulletin board. and Budget Officer, financial Services
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

questions, the Philippine Judicial


Academy (PHILJA) and telephone Under this section, the following are Division/ Internal Audit Division,
directory of the Supreme Court. posted: Search for 2004 Chief Justice Program Management Office,
Davide Awardees, Cultivation of Ethical Committee on Halls of Justice, and
Information from and about the Values in the Judiciary (a speech of Security and Maintenance Unit in
Judiciary the Chief Justice), downloadable Baguio City.
awards forms for judicial excellence.
Under "History" is a brief story of the Frequently Asked Questions
Court. It traces the beginnings of the One of the interesting parts of the site
Judicial Branch of the Philippine is "Bar Matters." Under it, one can find The site also gives space for the
Government starting from the time the the list of successful bar examinees frequently asked questions under
Spaniards came wherein judicial from 1998-2003. It also contains a "FAQ." Some of the questions may be
authority was being exercised in its list of bar topnotchers from the pre- trivial but they are merely reflective of
primitive. It provides for the laws and war period up to present and the roll the fact that some trivial questions are
issuances that led to the introduction of attorneys. Hence, if one wants to worth asking as the answers are

26
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2
sometimes not known even to those PHILJA mouse, he or she can update himself
learned in the law. The following are of the latest circulars and orders.
the questions answered in this section. The site www.supremecourt.gov.ph
contains pages about the Philippine Aside from jurisprudence, resolutions,
1. What are the three branches of Judicial Academy (PHILJA). PHILJA's circulars and orders, the "References"
government? pages provide, among others, section provides for the rules recently
2. What is the difference between information about the academy, the promulgated by the Supreme Court.
the Judiciary and the Supreme programs and courses being offered, Among those posted in the site are the
Court? the on-going seminars and its projects following: 2004 Rules on Notarial
3. What is the difference between with partners. Practice, Administrative Matter No. 03-
the Supreme Court and the 08-01-SC (Fixing the Lifetime of Bonds
Department of Justice? Legal Research Service in Civil Actions or Proceedings), A.M.
4. What is the Bench and the Bar? No. 03-03-03-SC (Consolidation of
5. What are Shari'a courts? Are these The official website of the Supreme Intellectual Property Courts With
Courts under the Supreme Court? Court contains important research Commercial Courts), Rule on
6. What does the term En Banc materials for the members of the Guardianship of Minors, Amendment
mean? Why are there three bench and the bar and to those who to the Rules on Summary Procedure,
divisions in the Supreme Court? are in the field of
7. How are justices of the Supreme law. The sections
Court and the Court of Appeals on "Decisions,"
and the judges of the lower courts "Resolutions,"
appointed? "Circulars and
8. What is the reason behind the Orders" and
mandatory retirement age of 70 "References"
for members of the Bench? form part of a
9. What are the functions of the 'virtual library' of
Court Administrator? Is the Office the Judiciary.
of the Court Administrator (OCA)
under the Supreme Court? "Decisions"
10. What cases are elevated or can contains the full
be appealed to the Supreme text of the
Court? decisions handed
11. Does the Supreme Court decide down by the
on cases that have not been tried Court. They are The homepage of the Philippine Supreme Court (http://
in inferior or lower courts? grouped based www.supremecourt.gov.ph). The website was launched in 1998.
12. What does the term on the months on
"jurisprudence" mean? which they were
13. Is there a prescribed time frame promulgated. The depository, though Rules on Legal Separation, Declaration
for the Supreme Court to review not complete as it contains only those of absolute Nullity of Void Marriages
cases appealed to it? How about promulgated starting January 1999, and Annulment of Voidable Marriages
lower courts? includes all the latest decisions of the and Rule on Adoption.
Highest Tribunal. The same is true with
For sure, even a person in the field of the "Resolutions." This section does not "References" also contains the 1987
law may find one or two of these contain all the resolutions issued by the Constitution, the Rules of Court and
questions interesting. It may also be Court but it provides for the full text of Legal Fees and Costs.
true that although a person those passed from January 1999 up
understands the terms and has an idea to this date. Indeed, the Judicial Branch is
on the above queries, still, when asked satisfactorily adapting to the needs of
to explain them to a third person, he Before the advent of the the times. The volume and quality of
or she may find a hard time to make "www.supremecourt.gov.ph," a legal the information available in
an intelligent response. Want for practitioner had to browse the pages www.supremecourt.gov.ph only show
answers? Just visit the site and you can of the newspapers to be updated with that the Judiciary is not lagging behind
find intelligent and well explained the Supreme Court Circulars and and is prepared for technology
answers to the questions above. Orders. Now, with just one click of the revolution.

27
The Center and the Society

E-LAW CENTER EXECUTIVE DIRECTOR ATTENDS


HARVARD INTERNET LAW PROGRAM
by Peter Joseph L. Fauni

P rof. Jaime N.
Soriano, Executive Director of the eLaw
Center, participated in the 2004
Internet Law Program of the Berkman
Center for Internet & Society of the
Harvard Law School in Cambridge,
Massachusetts.

The Internet Law Program is a regular


international development
and intellectual property.

This year's program was


held at the Austin Hall of
the Harvard Law School
on May 13-15, 2004.
Similar programs were
held off-campus in the
offering of the Berkman Center for past, notably in Brazil,
Internet & Society to provide a Stanford University in the
comprehensive survey of the changing US, and Singapore.
legal system that govern the Internet The 2004 Internet Law
and give the participants from various Program drew 125 Prof. Soriano with Ms. Robyn Mintz, Executive Director of
jurisdictions the opportunity to discuss participants from 20 the Berkman Center for Internet and Society of Harvard
recent legal developments with leading countries. Half of the Law School (right), and Ms. Rebecca MacKinnon, CNN
scholars in the field. participants though came Tokyo Bureau Chief and Harvard Fellow (left)
from the United States. The
The Berkman Center for Internet & participants included lawyers, prior to the on-site sessions: A Crash
Society is a pro-active research government officials, corporate Course in Internet Technologies,
program founded to explore executives, technology experts, Regulation, The Technical is Political:
cyberspace, share in its study and help educators, and representatives of Access to an Open Information
process its development. It represents cause-oriented, mass media, and Environment, and Legal Regulation of
a network of faculty, students, fellows, research groups. Digital Media.
entrepreneurs, lawyers, and virtual
architects working to identify and The program actually started on 14 During the three-day program at
engage with the challenges and April 2004 with the launching of online Harvard Law School, leading
opportunities of cyberspace under a instruction modules accessible only to professors and Internet law experts
common understanding of the Internet confirmed participants and moderated presented an in-depth and thought
as a social and political space. Current by Derek Bambauer, a third year provoking discussion on the following
projects include digital media, Internet student of Harvard Law School and subjects: Pornography - An Application
The Philippine Quarterly IT Law Journal :: Volume 1, Number 2

and politics, net governance, student fellow at the Berkman Center. of Law, Norms, Market, Architecture,
Topics included: Copyright Physical Layer: Wires and Wireless,
and Peer-to-Peer Copying, Logical Layer: End-to-End, Lessons
Alternatives to Intellectual from the Domain Name Controversy,
Property, Privacy, Freedom of Content Layer: The Future of Copyright
Expression on the Internet, on the Internet, Free Culture, Peer
Legal Regulation on Production of Information, Pressing
Interconnectivity, Cybercrime, Issues, Intellectual Property Protection
Online Business Method for Code? SCO and the Fight Over
Patents, Domain Names, Software Patents, Privacy, and The
Jurisdiction and Zoning, and, Internet and Politics.
Access to the Internet.
Faculty members of the Harvard Law
The participants were also School who took part in the program
Prof. Soriano with Prof. Lawrence Lessig of Harvard provided with the following were the following:
Law School and Founder of the Berkman Center for
Internet and Society.
four-taped lectures in DVD
format for mandatory viewing >> [25] Harvard Internet Law Program

28

You might also like