Professional Documents
Culture Documents
RULE 1 COVERAGE
Sec. 2. Cases covered. — These Rules shall apply to the criminal and
civil actions and proceeding, as well as quasi-judicial and administrative
cases.
(i) “Electronic key” refers to a secret code which secures and defends
sensitive information that crosses over public channels into a form
decipherable only with a matching electronic key.
(n) “Private Key” refers to the key of a key pair used to create a digital
signature.
(o) “Public Key” refers to the key of a key pair used to verify a digital
signature.
NOTES:
Assymetric Cryptosystem- one key (private key) is used to make the electronic
document while another (public key) is used to
open it. However, by applying a formula (hash
function) to the electronic message, one can
determine if it was sent by the particular person
identified with the public key.
The interpretation of these Rules shall also take into consideration the
international origin of Republic Act No. 8792, otherwise known as the Electronic
Commerce Act.
Xxxxx
Xxxxx
5
Xxxx
xxxxxx
Thus, when the Senate consequently voted to adopt the term “electronic data
message,” it was consonant with the explanation of Senator Miriam
Defensor-Santiago that it would not apply “to telexes or faxes, except
computer-generated faxes, unlike the United Nations model law on
electronic commerce.” In explaining the term “electronic record” patterned after
the E-Commerce Law of Canada, Senator Defensor-Santiago had in mind the term
“electronic data message.” This term then, while maintaining part of the UNCITRAL
Model Law’s terminology of “data message,” has assumed a different context, this
time, consonant with the term “electronic record” in the law of Canada. It accounts
for the addition of the word “electronic” and the deletion of the phrase “but not
limited to, electronic data interchange (EDI), electronic mail, telegram, telex or
telecopy.” Noteworthy is that the Uniform Law Conference of Canada, explains the
term “electronic record,” as drafted in the Uniform Electronic Evidence Act, in a
manner strikingly similar to Sen. Santiago’s explanation during the Senate
deliberations:
Facsimile transmissions are not, in this sense, “paperless,” but verily are
paper-based.
“Clearly then, the IRR went beyond the parameters of the law when it adopted
verbatim the UNCITRAL Model Law’s definition of “data message,” without
considering the intention of Congress when the latter deleted the phrase “but not
limited to, electronic data interchange (EDI), electronic mail, telegram, telex or
telecopy.” The inclusion of this phrase in the IRR offends a basic tenet in the
exercise of the rule-making power of administrative agencies. After all, the power
of administrative officials to promulgate rules in the implementation of a statute is
necessarily limited to what is found in the legislative enactment itself. The
8
implementing rules and regulations of a law cannot extend the law or expand its
coverage, as the power to amend or repeal a statute is vested in the
Legislature.[91] Thus, if a discrepancy occurs between the basic law and an
implementing rule or regulation, it is the former that prevails, because the law
cannot be broadened by a mere administrative issuance—an administrative
agency certainly cannot amend an act of Congress.[92] Had the Legislature really
wanted ordinary fax transmissions to be covered by the mantle of the Electronic
Commerce Act of 2000, it could have easily lifted without a bit of tatter the entire
wordings of the UNCITRAL Model Law.”
Nota Bene: Citing the MCC Case above, the Supreme Court in the case of
Ellery March G. Torres vs. PAGCOR, (G.R. No. 193531, December 14, 2011)
ruled, which was sent through a facsimile machine was INADMISSIBLE, not only
that a letter reconsideration of the petitioner of his dismissal because it is not
sanctioned by the Revised Uniform Rules on the Administrative Cases in the Civil
Service but also because it is not considered as electronic evidence under the E-
Commerce Act.
Aznar sued Citibank alleging that the bank had blacklisted his credit card
and for this reason the same was dishonored by different establishments in
Malaysia and forced him to pay in cash for his purchases.
Held:
Even if examined under the Rules on Electronic Evidence, which took effect
on August 1, 2001, and which is being invoked by Aznar in this case, the
authentication of Exh. “G” would still be found wanting.
(a) by evidence that it had been digitally signed by the person purported to
have signed the same;
(c) other evidence showing its integrity and reliability to the satisfaction of
the judge.
Aznar claims that his testimony complies with par. (c), i.e., it constitutes the
“other evidence showing integrity and reliability of Exh. “G” to the satisfaction of
the judge.” The Court is not convinced. Aznar’s testimony that the person from
Ingtan Agency merely handed him the computer print-out and that he thereafter
asked said person to sign the same cannot be considered as sufficient to show
said print-out’s integrity and reliability. As correctly pointed out by Judge Marcos
in his May 29, 1998 Decision, Exh. “G” does not show on its face that it was issued
by Ingtan Agency as Aznar merely mentioned in passing how he was able to
secure the print-out from the agency; Aznar also failed to show the specific
business address of the source of the computer print-out because while the name
of Ingtan Agency was mentioned by Aznar, its business address was not reflected
in the print-out.
RCBC Bankard Services Corp. v. Oracion, Jr., G.R. No. 223274, [June 19,
2019)
Evidently, petitioner could not have complied with the Rules on Electronic
Evidence because it failed to authenticate the supposed electronic
documents through the required affidavit of evidence. As earlier pointed out,
what petitioner had in mind at the inception (when it filed the complaint) was to
have the annexes admitted as duplicate originals as the term is understood in
relation to paper-based documents. Thus, the annexes or attachments to the
complaint of petitioner are inadmissible as electronic documents, and they cannot
be given any probative value.
(b) The electronic signature was affixed by that person with the intention of
authenticating or approving the electronic document to which it is related or
to indicate such person’s consent to the transaction embodied therein; and
(c) The methods or processes utilized to affix or verify the electronic signature
operated without error or fault.
(b) The digital signature was created during the operational period of a
certificate; r
11
(d) The message associated with a digital signature has not been altered from
the time it was signed; and,
(e) A certificate had been issued by the certification authority indicated therein.
(a) The reliability of the manner or method in which it was generated, stored or
communicated, including but not limited to input and output procedures,
controls, tests and checks for accuracy and reliability of the electronic data
message or document, in the light of all the circumstances as well as any
relevant agreement;
(b) The reliability of the manner in which its originator was identified;
(d) The familiarity of the witness or the person who made the entry with the
communication and information system;
(e) The nature and quality of the information which went into the
communication and information system upon which the electronic data
message or electronic document was based; or
(f) Other factors which the court may consider as affecting the accuracy or
integrity of the electronic document or electronic data message.
(a) Whether the information and communication system or other similar device
was operated in a manner that did not affect the integrity of the electronic
document, and there are no other reasonable grounds to doubt the integrity
of the information and communication system;
(b) Whether the electronic document was recorded or stored by a party to the
proceedings with interest adverse to that of the party using it; or
12
(c) Whether the electronic document was recorded or stored in the usual and
ordinary course of business by a person who is not a party to the proceedings
and who did not act under the control of the party using it.
RULE 8
We agree with the CA that the hearsay evidence rule is inapplicable. Section
1, Rule 8 of the Rules on Electronic Evidence expressly exempts from the rule on
hearsay evidence memorandum, report, record or data compilation of acts, events,
conditions, opinions, or diagnoses, made by electronic, optical or other similar
means at or near the time of or from transmission or supply of information by a
person with knowledge thereof, and kept in the regular course or conduct of a
business activity, and such was the regular practice to make the memorandum,
report, record, or data compilation by electronic, optical or similar means, all of
which are shown by the testimony of the custodian or other qualified witnesses.
Coros, being an officer of BPI who had custody of the documents, was qualified to
testify thereon.
13
“Complainant was able to prove by his testimony in conjunction with the text
messages from respondent duly presented before the Committee that the latter asked for
One Million Pesos (P1,000,000.00) in exchange for a favorable decision of the former’s
pending case with the CA. The text messages were properly admitted by the Committee
since the same are now covered by Section 1(k), Rule 2 of the Rules on Electronic Evidence
which provides:
Will the admission of SMS messages violate the sender’s right to privacy?
Text messages are to be proved by the testimony of a person who was a party to
the same or has personal knowledge of them (People v. Enojas y Hingpit, G.R.
|||
May a video call substitute for personal appearance for a notary public to
perform a notarial act?
In this case, the lawyer who notarized a counter-affidavit when the affiants
were not present, cited the Rules on Electronic Evidence, and alleged that the
video call conversation can be considered a "substitute of personal presence of a
person while physically absent from the place of the other party."
RULING:
RULE 12 EFFECTIVITY
SEC. 2. Effectivity. – These Rules shall take effect on the first day of
August 2001 following their publication before the 20th of July 2001 in two
newspapers of general circulation in the Philippines.
ii. The electronic document is reliable in the light of the purpose for
which it was generated and in the light of all relevant circumstances.
(b) Paragraph (a) applies whether the requirement therein is in the from of an
obligation or whether the law simply provides consequences for the document not
being presented or retained in its original from.
(c) Where the law requires that a document be presented or retained in its
original form, that requirement is met by an electronic document if-
This Act does not modify any statutory any statutory rule relating to admissibility of
electronic data massages or electronic documents, except the rules relating to
authentication and best evidence.
(a) A method is used to identify the party sought to be bound and to indicate
said party's access to the electronic document necessary for his consent or
approval through the electronic signature;
(b) Said method is reliable and appropriate for the purpose for which the
electronic document was generated or communicated, in the light of all
circumstances, including any relevant agreement;
(d) The other party is authorized and enable to verify the electronic signature
and to make the decision to proceed with the transaction authenticated by
the same.
(a) The electronic signature is the signature of the person to whom it correlates;
and
(b) The electronic signature was affixed by that person with the intention of
signing or approving the electronic document unless the person relying on
the electronically designed electronic document knows or has noticed of
defects in or unreliability of the signature or reliance on the electronic
signature is not reasonable under the circumstances.
(a) the integrity of the information from the time when it was first
generated in its final form, as an electronic document is shown by
evidence aliunde or otherwise; and
(a) the criteria for assessing integrity shall be whether the information
has remained complete and unaltered, apart from the addition of any
endorsement and any change which arises in the normal course of
communication, storage and display ; and
(b) On the ground that it is not in the standard written form, and the
electronic data message or electronic document meeting, and
complying with the requirements under Sections 6 or7 hereof shall be
the best evidence of the agreement and transaction contained therein.
(iii) Enables the identification of its originator and addressee, as well as the
detemination of the date and the time it was sent or received.