Professional Documents
Culture Documents
ISSUE: Whether all the elements of cyberlibel as punished under Section 4 (c)(4) of Republic
Act No. 10175 are present, so as to warrant the conviction of the accused or not.
HELD:
Yes. Libel is defined as “a public and malicious imputation of a crime, or of a vice or
defect, real or imaginary, or any act, omission, condition, status or circumstances tending to
cause dishonor, discredit or contempt of a natural or juridical person, or to blacken the memory
of the dead.” The elements of libel are: a) the allegation of a discreditable act or condition
concerning another; b) publication of the charge; c) identity of the person defamed; and d)
existence of malice. In addition, it must be committed through the use of a computer system or
any similar means which may be devised in the future.
A thorough reading of the subject article reveals that, clearly, there were several crimes
imputed upon the person of Keng. The published article attribute to Keng the following crimes
and illegal activities: human trafficking and drug smuggling, murder, smuggling of fake
cigarettes, and alleged involvement in illegal transactions of granting special investors residence
visas to Chinese nationals for a fee. The article has created in the minds of ordinary readers that
Keng has a disgraceful reputation despite the same imputations being refuted by two letters from
PDEA and his NBI clearance.
For the second element, the Court cited the Supreme Court decisions in Brillante v. CA
which provides that each publication constitutes one offense of libel without qualification as to
whether it was modified or not. Applying the said ruling, as long as the defamatory statement is
published several times, it gives rise to as many offenses as there are publications.
Some petitioners also raise the constitutionality of related Articles 353, 354, 361, and 362 of the
RPC on the crime of libel and move the strike down the penal provisions on libel as well.
HELD:
On Section 4(a)(1) on Illegal Access
The Court finds nothing in Section 4(a)(1) on Illegal Access that calls for the application
of the strict scrutiny standard since no fundamental freedom, like speech, is involved in
punishing what is essentially a condemnable act – accessing the computer system of another
without right. It is a universally condemned conduct. Ethical hackers evaluate the target system’s
On Section 13
The contents of materials sent or received through the internet belong to their authors or
recipients and are to be considered private communications. But it is not clear that a service
provider has an obligation to indefinitely keep a copy of the same as they pass its system for the
benefit of users. By virtue of Section 13, however, the law now requires service providers to
keep traffic data and subscriber information relating to communication services for at least six
months from the date of the transaction and those relating to content data for at least six months
from receipt of the order for their preservation. In fact, the user ought to have kept a copy of that
data when it crossed his computer if he was so minded. The service provider has never assumed
responsibility for their loss or deletion while in its keep. At any rate, as the Solicitor General
correctly points out, the data that service providers preserve on orders of law enforcement
authorities are not made inaccessible to users by reason of the issuance of such orders. The
process of preserving data will not unduly hamper the normal transmission or use of the same.
On Section 14
The process envisioned in Section 14 is being likened to the issuance of a subpoena.
Petitioners’ objection is that the issuance of subpoenas is a judicial function. But it is well-settled
that the power to issue subpoenas is not exclusively a judicial function. Executive agencies have
the power to issue subpoena as an adjunct of their investigatory powers.
Besides, what Section 14 envisions is merely the enforcement of a duly issued court warrant, a
function usually lodged in the hands of law enforcers to enable them to carry out their executive
functions. The prescribed procedure for disclosure would not constitute an unlawful search or
seizure nor would it violate the privacy of communications and correspondence. Disclosure can
be made only after judicial intervention.
On Section 15