Professional Documents
Culture Documents
01-7-01-SC July 17, 2001 (d) "Computer" refers to any single or interconnected
device or apparatus, which, by electronic, electro-
RULES ON ELECTRONIC EVIDENCE mechanical or magnetic impulse, or by other means with
the same function, can receive, record, transmit, store,
process, correlate, analyze, project, retrieve and/or
Acting on the Memorandum dated 18 June 2001 of the Committee produce information, data, text, graphics, figures, voice,
on the Revision of the Rules of Court to Draft the Rules on E- video, symbols or other modes of expression or perform
Commerce Law [R.A. No. 8792] submitting the Rules on any one or more of these functions.
Electronic Evidence for this Court's consideration and approval, the
Court Resolved to APPROVED the same.
(e) "Digital signature" refers to an electronic signature
consisting of a transformation of an electronic document
The Rules on Electronic Evidence shall apply to cases pending after or an electronic data message using an asymmetric or
their effectivity. These Rules shall take effect on the first day of public cryptosystem such that a person having the initial
August 2001 following thier publication before the 20th of July in untransformed electronic document and the signer's
two newspapers of general circulation in the Philippines public key can accurately determine:
RULES ON ELECTRONIC EVIDENCE ii. whether the initial electronic document had
been altered after the transformation was made.
Rule 1
COVERAGE (f) "Digitally signed" refers to an electronic document or
electronic data message bearing a digital signature
Section 1. Scope. – Unless otherwise provided herein, these Rules verified by the public key listed in a certificate.
shall apply whenever an electronic document or electronic data
message, as defined in Rule 2 hereof, is offered or used in evidence. (g) "Electronic data message" refers to information
generated, sent, received or stored by electronic, optical
Section 2. Cases covered. – These Rules shall apply to all civil or similar means.
actions and proceedings, as well as quasi-judicial and
administrative cases. (h) "Electronic document" refers to information or the
representation of information, data, figures, symbols or
Section 3. Application of other rules on evidence. – In all matters other modes of written expression, described or however
not specifically covered by these Rules, the Rules of Court and represented, by which a right is established or an
pertinent provisions of statutes containing rules on evidence shall obligation extinguished, or by which a fact may be
apply. proved and affirmed, which is received, recorded,
transmitted, stored, processed, retrieved or produced
electronically. It includes digitally signed documents and
Rule 2 any print-out or output, readable by sight or other means,
DEFINITION OF TERMS AND CONSTRUCTION which accurately reflects the electronic data message or
electronic document. For purposes of these Rules, the
Section 1. Definition of terms. – For purposes of these Rules, the term "electronic document" may be used interchangeably
following terms are defined, as follows: with "electronic data message".
(a) "Asymmetric or public cryptosystem" means a system (i) "Electronic key" refers to a secret code which secures
capable of generating a secure key pair, consisting of a and defends sensitive information that crosses over public
private key for creating a digital signature, and a public channels into a form decipherable only with a matching
key for verifying the digital signature. electronic key.
(b) "Business records" include records of any business, (j) "Electronic signature" refers to any distinctive mark,
institution, association, profession, occupation, and characteristic and/or sound in electronic form,
calling of every kind, whether or not conducted for profit, representing the identity of a person and attached to or
or for legitimate or illegitimate purposes. logically associated with the electronic data message or
electronic document or any methodology or procedure
employed or adopted by a person and executed or
(c) "Certificate" means an electronic document issued to
adopted by such person with the intention of
support a digital signature which purports to confirm the
authenticating, signing or approving an electronic data
identity or other significant characteristics of the person
message or electronic document. For purposes of these
who holds a particular key pair.
Rules, an electronic signature includes digital signatures.
1|E V I D E N C E S P E C I A L LAWS
(k) "Ephemeral electronic communication" refers to Section 2. Copies as equivalent of the originals. – When a
telephone conversations, text messages, chatroom document is in two or more copies executed at or about the same
sessions, streaming audio, streaming video, and other time with identical contents, or is a counterpart produced by the
electronic forms of communication the evidence of which same impression as the original, or from the same matrix, or by
is not recorded or retained. mechanical or electronic re-recording, or by chemical reproduction,
or by other equivalent techniques which accurately reproduces the
(l) "Information and communication system" refers to a original, such copies or duplicates shall be regarded as the
system for generating, sending, receiving, storing or equivalent of the original.
otherwise processing electronic data messages or
electronic documents and includes the computer system Notwithstanding the foregoing, copies or duplicates shall not be
or other similar devices by or in which data are recorded admissible to the same extent as the original if:
or stored and any procedure related to the recording or
storage of electronic data messages or electronic (a) a genuine question is raised as to the authenticity of
documents. the original; or
(m) "Key pair" in an asymmetric cryptosystem refers to (b) in the circumstances it would be unjust or inequitable
the private key and its mathematically related public key to admit the copy in lieu of the original.
such that the latter can verify the digital signature that the
former creates.
Rule 5
AUTHENTICATION OF ELECTRONIC DOCUMENTS
(n) "Private key" refers to the key of a key pair used to
create a digital signature.
Section 1. Burden of proving authenticity. – The person seeking to
introduce an electronic document in any legal proceeding has the
(o) "Public key" refers to the key of a key pair used to burden of proving its authenticity in the manner provided in this
verify a digital signature. Rule.
Section 2. Construction. – These Rules shall be liberally construed Section 2. Manner of authentication. – Before any private
to assist the parties in obtaining a just, expeditious, and inexpensive electronic document offered as authentic is received in evidence, its
determination of cases. authenticity must be proved by any of the following means:
The interpretation of these Rules shall also take into consideration (a) by evidence that it had been digitally signed by the
the international origin of Republic Act No. 8792, otherwise known person purported to have signed the same;
as the Electronic Commerce Act.
(b) by evidence that other appropriate security procedures
Rule 3 or devices as may be authorized by the Supreme Court or
ELECTRONIC DOCUMENTS by law for authentication of electronic documents were
applied to the document; or
Section 1. Electronic documents as functional equivalent of paper-
based documents. – Whenever a rule of evidence refers to the term (c) by other evidence showing its integrity and reliability
writing, document, record, instrument, memorandum or any other to the satisfaction of the judge.
form of writing, such term shall be deemed to include an electronic
document as defined in these Rules.
Section 3. Proof of electronically notarized document. – A
document electronically notarized in accordance with the rules
Section 2. Admissibility. – An electronic document is admissible in promulgated by the Supreme Court shall be considered as a public
evidence if it complies with the rules on admissibility prescribed by document and proved as a notarial document under the Rules of
the Rules of Court and related laws and is authenticated in the Court.
manner prescribed by these Rules.
Rule 6
Section 3. Privileged communication. – The confidential character ELECTRONIC SIGNATURES
of a privileged communication is not lost solely on the ground that
it is in the form of an electronic document.
Section 1. Electronic signature. – An electronic signature or a
digital signature authenticated in the manner prescribed hereunder
Rule 4 is admissible in evidence as the functional equivalent of the
BEST EVIDENCE RULE signature of a person on a written document.
Section 1. Original of an electronic document. – An electronic Section 2. Authentication of electronic signatures. – An electronic
document shall be regarded as the equivalent of an original signature may be authenticated in any of the following manner:
document under the Best Evidence Rule if it is a printout or output
readable by sight or other means, shown to reflect the data
accurately. (a) By evidence that a method or process was utilized to
establish a digital signature and verify the same;
2|E V I D E N C E S P E C I A L LAWS
(b) By any other means provided by law; or limited to the hardware and computer programs or
software used as well as programming errors;
(c) By any other means satisfactory to the judge as
establishing the genuineness of the electronic signature. (d) The familiarity of the witness or the person who made
the entry with the communication and information
Section 3. Disputable presumptions relating to electronic system;
signatures. – Upon the authentication of an electronic signature, it
shall be presumed that: (e) The nature and quality of the information which went
into the communication and information system upon
(a) The electronic signature is that of the person to whom which the electronic data message or electronic document
it correlates; was based; or
(b) The electronic signature was affixed by that person (f) Other factors which the court may consider as
with the intention of authenticating or approving the affecting the accuracy or integrity of the electronic
electronic document to which it is related or to indicate document or electronic data message.
such person's consent to the transaction embodied
therein; and Section 2. Integrity of an information and communication system. –
In any dispute involving the integrity of the information and
(c) The methods or processes utilized to affix or verify communication system in which an electronic document or
the electronic signature operated without error or fault. electronic data message is recorded or stored, the court may
consider, among others, the following factors:
Section 4. Disputable presumptions relating to digital signatures. –
Upon the authentication of a digital signature, it shall be presumed, (a) Whether the information and communication system
in addition to those mentioned in the immediately preceding or other similar device was operated in a manner that did
section, that: not affect the integrity of the electronic document, and
there are no other reasonable grounds to doubt the
integrity of the information and communication system;
(a) The information contained in a certificate is correct;
(b) Whether the electronic document was recorded or
(b) The digital signature was created during the stored by a party to the proceedings with interest adverse
operational period of a certificate; to that of the party using it; or
(c) No cause exists to render a certificate invalid or (c) Whether the electronic document was recorded or
revocable; stored in the usual and ordinary course of business by a
person who is not a party to the proceedings and who did
(d) The message associated with a digital signature has not act under the control of the party using it.
not been altered from the time it was signed; and,
Rule 8
(e) A certificate had been issued by the certification BUSINESS RECORDS AS EXCEPTION TO THE HEARSAY
authority indicated therein. RULE
Rule 10
EXAMINATION OF WITNESSES
Rule 11
AUDIO, PHOTOGRAPHIC, VIDEO, AND EPHEMERAL
EVIDENCE
4|E V I D E N C E S P E C I A L LAWS
ARTICLE II Republic of the Philippines
RECTIFICATION OF SIMULATED BIRTHS Congress of the Philippines
Metro Manila
Section 6. Inadmissible Evidence. - All petitions, documents, Fifteenth Congress
records, and papers relating to adoption and rectification of Second Regular Session
simulated births under this Act cannot be used as evidence against
those who simulated the birth of a child or who cooperated in the Begun and held in Metro Manila, on Monday, the twenty-fifth day
execution of such simulation in any criminal, civil, or of July, two thousand eleven.
administrative proceeding.
[REPUBLIC ACT NO. 10173]
(1) File a written motion at least fifteen (15) days before SEC. 3. Definition of Terms. – Whenever used in this Act, the
trial, specifically describing the evidence and stating the following terms shall have the respective meanings hereafter set
purpose for which it is offered, unless the court, for good forth:
cause, requires a different time for filing or permits filing
during trial; and (a) Commission shall refer to the National Privacy Commission
created by virtue of this Act.
(2) Serve the motion on all parties and the guardian ad
litem at least three (3) days before the hearing of the (b) Consent of the data subject refers to any freely given, specific,
motion. informed indication of will, whereby the data subject agrees to the
collection and processing of personal information about and/or
Before admitting such evidence, the court must conduct a hearing relating to him or her. Consent shall be evidenced by written,
in chambers and afford the child, his guardian ad litem, the parties, electronic or recorded means. It may also be given on behalf of the
and their counsel a right to attend and be heard. The motion and the data subject by an agent specifically authorized by the data subject
record of the hearing must be sealed and remain under seal and to do so.
protected by a protective order set forth in section 31(b). The child
shall not be required to testify at the hearing in chambers except (c) Data subject refers to an individual whose personal information
with his consent. is processed.
5|E V I D E N C E S P E C I A L LAWS
not processed by equipment operating automatically in response to (3) Issued by government agencies peculiar to an individual which
instructions given for that purpose, the set is structured, either by includes, but not limited to, social security numbers, previous or
reference to individuals or by reference to criteria relating to current health records, licenses or its denials, suspension or
individuals, in such a way that specific information relating to a revocation, and tax returns; and
particular person is readily accessible.
(4) Specifically established by an executive order or an act of
(f) Information and Communications System refers to a system for Congress to be kept classified.
generating, sending, receiving, storing or otherwise processing
electronic data messages or electronic documents and includes the SEC. 4. Scope. – This Act applies to the processing of all types of
computer system or other similar device by or which data is personal information and to any natural and juridical person
recorded, transmitted or stored and any procedure related to the involved in personal information processing including those
recording, transmission or storage of electronic data, electronic personal information controllers and processors who, although not
message, or electronic document. found or established in the Philippines, use equipment that are
located in the Philippines, or those who maintain an office, branch
(g) Personal information refers to any information whether or agency in the Philippines subject to the immediately succeeding
recorded in a material form or not, from which the identity of an paragraph: Provided, That the requirements of Section 5 are
individual is apparent or can be reasonably and directly ascertained complied with.
by the entity holding the information, or when put together with
other information would directly and certainly identify an This Act does not apply to the following:
individual.
(a) Information about any individual who is or was an officer or
(h) Personal information controller refers to a person or employee of a government institution that relates to the position or
organization who controls the collection, holding, processing or use functions of the individual, including:
of personal information, including a person or organization who
instructs another person or organization to collect, hold, process,
use, transfer or disclose personal information on his or her behalf. (1) The fact that the individual is or was an officer or employee of
The term excludes: the government institution;
(1) A person or organization who performs such functions as (2) The title, business address and office telephone number of the
instructed by another person or organization; and individual;
(2) An individual who collects, holds, processes or uses personal (3) The classification, salary range and responsibilities of the
information in connection with the individual’s personal, family or position held by the individual; and
household affairs.
(4) The name of the individual on a document prepared by the
(i) Personal information processor refers to any natural or juridical individual in the course of employment with the government;
person qualified to act as such under this Act to whom a personal
information controller may outsource the processing of personal (b) Information about an individual who is or was performing
data pertaining to a data subject. service under contract for a government institution that relates to
the services performed, including the terms of the contract, and the
(j) Processing refers to any operation or any set of operations name of the individual given in the course of the performance of
performed upon personal information including, but not limited to, those services;
the collection, recording, organization, storage, updating or
modification, retrieval, consultation, use, consolidation, blocking, (c) Information relating to any discretionary benefit of a financial
erasure or destruction of data. nature such as the granting of a license or permit given by the
government to an individual, including the name of the individual
(k) Privileged information refers to any and all forms of data which and the exact nature of the benefit;
under the Rules of Court and other pertinent laws constitute
privileged communication. (d) Personal information processed for journalistic, artistic, literary
or research purposes;
(l) Sensitive personal information refers to personal information:
(e) Information necessary in order to carry out the functions of
(1) About an individual’s race, ethnic origin, marital status, age, public authority which includes the processing of personal data for
color, and religious, philosophical or political affiliations; the performance by the independent, central monetary authority and
law enforcement and regulatory agencies of their constitutionally
and statutorily mandated functions. Nothing in this Act shall be
(2) About an individual’s health, education, genetic or sexual life of construed as to have amended or repealed Republic Act No. 1405,
a person, or to any proceeding for any offense committed or alleged otherwise known as the Secrecy of Bank Deposits Act; Republic
to have been committed by such person, the disposal of such Act No. 6426, otherwise known as the Foreign Currency Deposit
proceedings, or the sentence of any court in such proceedings; Act; and Republic Act No. 9510, otherwise known as the Credit
Information System Act (CISA);
6|E V I D E N C E S P E C I A L LAWS
(f) Information necessary for banks and other financial institutions to be known as the National Privacy Commission, winch shall have
under the jurisdiction of the independent, central monetary the following functions:
authority or Bangko Sentral ng Pilipinas to comply with Republic
Act No. 9510, and Republic Act No. 9160, as amended, otherwise (a) Ensure compliance of personal information controllers with the
known as the Anti-Money Laundering Act and other applicable provisions of this Act;
laws; and
(b) Receive complaints, institute investigations, facilitate or enable
(g) Personal information originally collected from residents of settlement of complaints through the use of alternative dispute
foreign jurisdictions in accordance with the laws of those foreign resolution processes, adjudicate, award indemnity on matters
jurisdictions, including any applicable data privacy laws, which is affecting any personal information, prepare reports on disposition
being processed in the Philippines. of complaints and resolution of any investigation it initiates, and, in
cases it deems appropriate, publicize any such
SEC. 5. Protection Afforded to Journalists and Their Sources. report: Provided, That in resolving any complaint or investigation
– Nothing in this Act shall be construed as to have amended or (except where amicable settlement is reached by the parties), the
repealed the provisions of Republic Act No. 53, which affords the Commission shall act as a collegial body. For this purpose, the
publishers, editors or duly accredited reporters of any newspaper, Commission may be given access to personal information that is
magazine or periodical of general circulation protection from being subject of any complaint and to collect the information necessary to
compelled to reveal the source of any news report or information perform its functions under this Act;
appearing in said publication which was related in any confidence
to such publisher, editor, or reporter. (c) Issue cease and desist orders, impose a temporary or permanent
ban on the processing of personal information, upon finding that the
SEC. 6. Extraterritorial Application. – This Act applies to an act processing will be detrimental to national security and public
done or practice engaged in and outside of the Philippines by an interest;
entity if:
(d) Compel or petition any entity, government agency or
(a) The act, practice or processing relates to personal information instrumentality to abide by its orders or take action on a matter
about a Philippine citizen or a resident; affecting data privacy;
(b) The entity has a link with the Philippines, and the entity is (e) Monitor the compliance of other government agencies or
processing personal information in the Philippines or even if the instrumentalities on their security and technical measures and
processing is outside the Philippines as long as it is about recommend the necessary action in order to meet minimum
Philippine citizens or residents such as, but not limited to, the standards for protection of personal information pursuant to this
following: Act;
(1) A contract is entered in the Philippines; (f) Coordinate with other government agencies and the private
sector on efforts to formulate and implement plans and policies to
(2) A juridical entity unincorporated in the Philippines but has strengthen the protection of personal information in the country;
central management and control in the country; and
(g) Publish on a regular basis a guide to all laws relating to data
(3) An entity that has a branch, agency, office or subsidiary in the protection;
Philippines and the parent or affiliate of the Philippine entity has
access to personal information; and (h) Publish a compilation of agency system of records and notices,
including index and other finding aids;
(c) The entity has other links in the Philippines such as, but not
limited to: (i) Recommend to the Department of Justice (DOJ) the prosecution
and imposition of penalties specified in Sections 25 to 29 of this
(1) The entity carries on business in the Philippines; and Act;
(2) The personal information was collected or held by an entity in (j) Review, approve, reject or require modification of privacy codes
the Philippines. voluntarily adhered to by personal information
controllers:Provided, That the privacy codes shall adhere to the
underlying data privacy principles embodied in this Act: Provided,
Back To Top further,That such privacy codes may include private dispute
CHAPTER II resolution mechanisms for complaints against any participating
THE NATIONAL PRIVACY COMMISSION personal information controller. For this purpose, the Commission
shall consult with relevant regulatory agencies in the formulation
SEC. 7. Functions of the National Privacy Commission. – To and administration of privacy codes applying the standards set out
administer and implement the provisions of this Act, and to monitor in this Act, with respect to the persons, entities, business activities
and ensure compliance of the country with international standards and business sectors that said regulatory bodies are authorized to
set for data protection, there is hereby created an independent body principally regulate pursuant to the law: Provided, finally. That the
7|E V I D E N C E S P E C I A L LAWS
Commission may review such privacy codes and require changes The Privacy Commissioner, the Deputy Commissioners, or any
thereto for purposes of complying with this Act; person acting on their behalf or under their direction, shall not be
civilly liable for acts done in good faith in the performance of their
(k) Provide assistance on matters relating to privacy or data duties. However, he or she shall be liable for willful or negligent
protection at the request of a national or local agency, a private acts done by him or her which are contrary to law, morals, public
entity or any person; policy and good customs even if he or she acted under orders or
instructions of superiors: Provided, That in case a lawsuit is filed
against such official on the subject of the performance of his or her
(l) Comment on the implication on data privacy of proposed duties, where such performance is lawful, he or she shall be
national or local statutes, regulations or procedures, issue advisory reimbursed by the Commission for reasonable costs of litigation.
opinions and interpret the provisions of this Act and other data
privacy laws;
SEC. 10. The Secretariat. – The Commission is hereby authorized
to establish a Secretariat. Majority of the members of the
(m) Propose legislation, amendments or modifications to Philippine Secretariat must have served for at least five (5) years in any
laws on privacy or data protection as may be necessary; agency of the government that is involved in the processing of
personal information including, but not limited to, the following
(n) Ensure proper and effective coordination with data privacy offices: Social Security System (SSS), Government Service
regulators in other countries and private accountability agents, Insurance System (GSIS), Land Transportation Office (LTO),
participate in international and regional initiatives for data privacy Bureau of Internal Revenue (BIR), Philippine Health Insurance
protection; Corporation (PhilHealth), Commission on Elections (COMELEC),
Department of Foreign Affairs (DFA), Department of Justice
(o) Negotiate and contract with other data privacy authorities of (DOJ), and Philippine Postal Corporation (Philpost).
other countries for cross-border application and implementation of
respective privacy laws; Back To Top
CHAPTER III
(p) Assist Philippine companies doing business abroad to respond PROCESSING OF PERSONAL INFORMATION
to foreign privacy or data protection laws and regulations; and
SEC. 11. General Data Privacy Principles. – The processing of
(q) Generally perform such acts as may be necessary to facilitate personal information shall be allowed, subject to compliance with
cross-border enforcement of data privacy protection. the requirements of this Act and other laws allowing disclosure of
information to the public and adherence to the principles of
transparency, legitimate purpose and proportionality.
SEC. 8. Confidentiality. – The Commission shall ensure at all times
the confidentiality of any personal information that comes to its
knowledge and possession. Personal information must, be:,
SEC. 9. Organizational Structure of the Commission. – The (a) Collected for specified and legitimate purposes determined and
Commission shall be attached to the Department of Information and declared before, or as soon as reasonably practicable after
Communications Technology (DICT) and shall be headed by a collection, and later processed in a way compatible with such
Privacy Commissioner, who shall also act as Chairman of the declared, specified and legitimate purposes only;
Commission. The Privacy Commissioner shall be assisted by two
(2) Deputy Privacy Commissioners, one to be responsible for Data (b) Processed fairly and lawfully;
Processing Systems and one to be responsible for Policies and
Planning. The Privacy Commissioner and the two (2) Deputy (c) Accurate, relevant and, where necessary for purposes for which
Privacy Commissioners shall be appointed by the President of the it is to be used the processing of personal information, kept up to
Philippines for a term of three (3) years, and may be reappointed date; inaccurate or incomplete data must be rectified,
for another term of three (3) years. Vacancies in the Commission supplemented, destroyed or their further processing restricted;
shall be filled in the same manner in which the original
appointment was made.
(d) Adequate and not excessive in relation to the purposes for
which they are collected and processed;
The Privacy Commissioner must be at least thirty-five (35) years of
age and of good moral character, unquestionable integrity and
known probity, and a recognized expert in the field of information (e) Retained only for as long as necessary for the fulfillment of the
technology and data privacy. The Privacy Commissioner shall purposes for which the data was obtained or for the establishment,
enjoy the benefits, privileges and emoluments equivalent to the exercise or defense of legal claims, or for legitimate business
rank of Secretary. purposes, or as provided by law; and
The Deputy Privacy Commissioners must be recognized experts in (f) Kept in a form which permits identification of data subjects for
the field of information and communications technology and data no longer than is necessary for the purposes for which the data were
privacy. They shall enjoy the benefits, privileges and emoluments collected and processed: Provided, That personal information
equivalent to the rank of Undersecretary. collected for other purposes may lie processed for historical,
statistical or scientific purposes, and in cases laid down in law may
8|E V I D E N C E S P E C I A L LAWS
be stored for longer periods: Provided, further,That adequate (d) The processing is necessary to achieve the lawful and
safeguards are guaranteed by said laws authorizing their processing. noncommercial objectives of public organizations and their
associations: Provided, That such processing is only confined and
The personal information controller must ensure implementation of related to the bona fide members of these organizations or their
personal information processing principles set out herein. associations: Provided, further, That the sensitive personal
information are not transferred to third parties: Provided,
finally, That consent of the data subject was obtained prior to
SEC. 12. Criteria for Lawful Processing of Personal Information. – processing;
The processing of personal information shall be permitted only if
not otherwise prohibited by law, and when at least one of the
following conditions exists: (e) The processing is necessary for purposes of medical treatment,
is carried out by a medical practitioner or a medical treatment
institution, and an adequate level of protection of personal
(a) The data subject has given his or her consent; information is ensured; or
(b) The processing of personal information is necessary and is (f) The processing concerns such personal information as is
related to the fulfillment of a contract with the data subject or in necessary for the protection of lawful rights and interests of natural
order to take steps at the request of the data subject prior to entering or legal persons in court proceedings, or the establishment, exercise
into a contract; or defense of legal claims, or when provided to government or
public authority.
(c) The processing is necessary for compliance with a legal
obligation to which the personal information controller is subject; SEC. 14. Subcontract of Personal Information. – A personal
information controller may subcontract the processing of personal
(d) The processing is necessary to protect vitally important interests information: Provided, That the personal information controller
of the data subject, including life and health; shall be responsible for ensuring that proper safeguards are in place
to ensure the confidentiality of the personal information processed,
(e) The processing is necessary in order to respond to national prevent its use for unauthorized purposes, and generally, comply
emergency, to comply with the requirements of public order and with the requirements of this Act and other laws for processing of
safety, or to fulfill functions of public authority which necessarily personal information. The personal information processor shall
includes the processing of personal data for the fulfillment of its comply with all the requirements of this Act and other applicable
mandate; or laws.
(f) The processing is necessary for the purposes of the legitimate SEC. 15. Extension of Privileged Communication. – Personal
interests pursued by the personal information controller or by a information controllers may invoke the principle of privileged
third party or parties to whom the data is disclosed, except where communication over privileged information that they lawfully
such interests are overridden by fundamental rights and freedoms of control or process. Subject to existing laws and regulations, any
the data subject which require protection under the Philippine evidence gathered on privileged information is inadmissible.
Constitution.
Back To Top
SEC. 13. Sensitive Personal Information and Privileged CHAPTER IV
Information. – The processing of sensitive personal information RIGHTS OF THE DATA SUBJECT
and privileged information shall be prohibited, except in the
following cases: SEC. 16. Rights of the Data Subject. – The data subject is entitled
to:
(a) The data subject has given his or her consent, specific to the
purpose prior to the processing, or in the case of privileged (a) Be informed whether personal information pertaining to him or
information, all parties to the exchange have given their consent her shall be, are being or have been processed;
prior to processing;
(b) Be furnished the information indicated hereunder before the
(b) The processing of the same is provided for by existing laws and entry of his or her personal information into the processing system
regulations: Provided, That such regulatory enactments guarantee of the personal information controller, or at the next practical
the protection of the sensitive personal information and the opportunity:
privileged information: Provided, further, That the consent of the
data subjects are not required by law or regulation permitting the (1) Description of the personal information to be entered into the
processing of the sensitive personal information or the privileged system;
information;
(2) Purposes for which they are being or are to be processed;
(c) The processing is necessary to protect the life and health of the
data subject or another person, and the data subject is not legally or
physically able to express his or her consent prior to the processing; (3) Scope and method of the personal information processing;
Any information supplied or declaration made to the data subject SEC. 17. Transmissibility of Rights of the Data Subject. – The
on these matters shall not be amended without prior notification of lawful heirs and assigns of the data subject may invoke the rights of
data subject: Provided, That the notification under subsection (b) the data subject for, which he or she is an heir or assignee at any
shall not apply should the personal information be needed pursuant time after the death of the data subject or when the data subject is
to a subpoena or when the collection and processing are for incapacitated or incapable of exercising the rights as enumerated in
obvious purposes, including when it is necessary for the the immediately preceding section.
performance of or in relation to a contract or service or when
necessary or desirable in the context of an employer-employee
relationship, between the collector and the data subject, or when the SEC. 18. Right to Data Portability. – The data subject shall have
information is being collected and processed as a result of legal the right, where personal information is processed by electronic
obligation; means and in a structured and commonly used format, to obtain
from the personal information controller a copy of data undergoing
processing in an electronic or structured format, which is
(c) Reasonable access to, upon demand, the following: commonly used and allows for further use by the data subject. The
Commission may specify the electronic format referred to above, as
(1) Contents of his or her personal information that were processed; well as the technical standards, modalities and procedures for their
transfer.
(2) Sources from which personal information were obtained;
SEC. 19. Non-Applicability. – The immediately preceding sections
(3) Names and addresses of recipients of the personal information; are not applicable if the processed personal information are used
only for the needs of scientific and statistical research and, on the
basis of such, no activities are carried out and no decisions are
(4) Manner by which such data were processed; taken regarding the data subject: Provided, That the personal
information shall be held under strict confidentiality and shall be
(5) Reasons for the disclosure of the personal information to used only for the declared purpose. Likewise, the immediately
recipients; preceding sections are not applicable to processing of personal
information gathered for the purpose of investigations in relation to
any criminal, administrative or tax liabilities of a data subject.
(6) Information on automated processes where the data will or
likely to be made as the sole basis for any decision significantly
affecting or will affect the data subject; Back To Top
CHAPTER V
SECURITY OF PERSONAL INFORMATION
(7) Date when his or her personal information concerning the data
subject were last accessed and modified; and
SEC. 20. Security of Personal Information. – (a) The personal
information controller must implement reasonable and appropriate
(8) The designation, or name or identity and address of the personal
organizational, physical and technical measures intended for the
information controller;
protection of personal information against any accidental or
unlawful destruction, alteration and disclosure, as well as against
(d) Dispute the inaccuracy or error in the personal information and any other unlawful processing.
have the personal information controller correct it immediately and
accordingly, unless the request is vexatious or otherwise
(b) The personal information controller shall implement reasonable
unreasonable. If the personal information have been corrected, the
and appropriate measures to protect personal information against
personal information controller shall ensure the accessibility of
natural dangers such as accidental loss or destruction, and human
both the new and the retracted information and the simultaneous
dangers such as unlawful access, fraudulent misuse, unlawful
receipt of the new and the retracted information by recipients
destruction, alteration and contamination.
thereof: Provided, That the third parties who have previously
received such processed personal information shall he informed of
its inaccuracy and its rectification upon reasonable request of the (c) The determination of the appropriate level of security under this
data subject; section must take into account the nature of the personal
information to be protected, the risks represented by the processing,
the size of the organization and complexity of its operations,
10 | E V I D E N C E S P E C I A L LAWS
current data privacy best practices and the cost of security Back To Top
implementation. Subject to guidelines as the Commission may issue CHAPTER VI
from time to time, the measures implemented must include: ACCOUNTABILITY FOR TRANSFER OF PERSONAL
INFORMATION
(1) Safeguards to protect its computer network against accidental,
unlawful or unauthorized usage or interference with or hindering of SEC. 21. Principle of Accountability. – Each personal information
their functioning or availability; controller is responsible for personal information under its control
or custody, including information that have been transferred to a
(2) A security policy with respect to the processing of personal third party for processing, whether domestically or internationally,
information; subject to cross-border arrangement and cooperation.
(3) A process for identifying and accessing reasonably foreseeable (a) The personal information controller is accountable for
vulnerabilities in its computer networks, and for taking preventive, complying with the requirements of this Act and shall use
corrective and mitigating action against security incidents that can contractual or other reasonable means to provide a comparable
lead to a security breach; and level of protection while the information are being processed by a
third party.
(4) Regular monitoring for security breaches and a process for
taking preventive, corrective and mitigating action against security (b) The personal information controller shall designate an
incidents that can lead to a security breach. individual or individuals who are accountable for the organization’s
compliance with this Act. The identity of the individual(s) so
designated shall be made known to any data subject upon request.
(d) The personal information controller must further ensure that
third parties processing personal information on its behalf shall
implement the security measures required by this provision. Back To Top
CHAPTER VII
SECURITY OF SENSITIVE PERSONAL
(e) The employees, agents or representatives of a personal INFORMATION IN GOVERNMENT
information controller who are involved in the processing of
personal information shall operate and hold personal information
under strict confidentiality if the personal information are not SEC. 22. Responsibility of Heads of Agencies. – All sensitive
intended for public disclosure. This obligation shall continue even personal information maintained by the government, its agencies
after leaving the public service, transfer to another position or upon and instrumentalities shall be secured, as far as practicable, with the
termination of employment or contractual relations. use of the most appropriate standard recognized by the information
and communications technology industry, and as recommended by
the Commission. The head of each government agency or
(f) The personal information controller shall promptly notify the instrumentality shall be responsible for complying with the security
Commission and affected data subjects when sensitive personal requirements mentioned herein while the Commission shall monitor
information or other information that may, under the circumstances, the compliance and may recommend the necessary action in order
be used to enable identity fraud are reasonably believed to have to satisfy the minimum standards.
been acquired by an unauthorized person, and the personal
information controller or the Commission believes (bat such
unauthorized acquisition is likely to give rise to a real risk of SEC. 23. Requirements Relating to Access by Agency Personnel to
serious harm to any affected data subject. The notification shall at Sensitive Personal Information. – (a) On-site and Online Access –
least describe the nature of the breach, the sensitive personal Except as may be allowed through guidelines to be issued by the
information possibly involved, and the measures taken by the entity Commission, no employee of the government shall have access to
to address the breach. Notification may be delayed only to the sensitive personal information on government property or through
extent necessary to determine the scope of the breach, to prevent online facilities unless the employee has received a security
further disclosures, or to restore reasonable integrity to the clearance from the head of the source agency.
information and communications system.
(b) Off-site Access – Unless otherwise provided in guidelines to be
(1) In evaluating if notification is unwarranted, the Commission issued by the Commission, sensitive personal information
may take into account compliance by the personal information maintained by an agency may not be transported or accessed from a
controller with this section and existence of good faith in the location off government property unless a request for such
acquisition of personal information. transportation or access is submitted and approved by the head of
the agency in accordance with the following guidelines:
(2) The Commission may exempt a personal information controller
from notification where, in its reasonable judgment, such (1) Deadline for Approval or Disapproval – In the case of any
notification would not be in the public interest or in the interests of request submitted to the head of an agency, such head of the agency
the affected data subjects. shall approve or disapprove the request within two (2) business
days after the date of submission of the request. In case there is no
action by the head of the agency, then such request is considered
(3) The Commission may authorize postponement of notification disapproved;
where it may hinder the progress of a criminal investigation related
to a serious breach.
11 | E V I D E N C E S P E C I A L LAWS
(2) Limitation to One thousand (1,000) Records – If a request is SEC. 27. Improper Disposal of Personal Information and Sensitive
approved, the head of the agency shall limit the access to not more Personal Information. – (a) The improper disposal of personal
than one thousand (1,000) records at a time; and information shall be penalized by imprisonment ranging from six
(6) months to two (2) years and a fine of not less than One hundred
(3) Encryption – Any technology used to store, transport or access thousand pesos (Php100,000.00) but not more than Five hundred
sensitive personal information for purposes of off-site access thousand pesos (Php500,000.00) shall be imposed on persons who
approved under this subsection shall be secured by the use of the knowingly or negligently dispose, discard or abandon the personal
most secure encryption standard recognized by the Commission. information of an individual in an area accessible to the public or
has otherwise placed the personal information of an individual in its
container for trash collection.
The requirements of this subsection shall be implemented not later
than six (6) months after the date of the enactment of this Act.
(b) The improper disposal of sensitive personal information shall be
penalized by imprisonment ranging from one (1) year to three (3)
SEC. 24. Applicability to Government Contractors. – In entering years and a fine of not less than One hundred thousand pesos
into any contract that may involve accessing or requiring sensitive (Php100,000.00) but not more than One million pesos
personal information from one thousand (1,000) or more (Php1,000,000.00) shall be imposed on persons who knowingly or
individuals, an agency shall require a contractor and its employees negligently dispose, discard or abandon the personal information of
to register their personal information processing system with the an individual in an area accessible to the public or has otherwise
Commission in accordance with this Act and to comply with the placed the personal information of an individual in its container for
other provisions of this Act including the immediately preceding trash collection.
section, in the same manner as agencies and government employees
comply with such requirements.
SEC. 28. Processing of Personal Information and Sensitive
Personal Information for Unauthorized Purposes. – The processing
Back To Top of personal information for unauthorized purposes shall be
CHAPTER VIII penalized by imprisonment ranging from one (1) year and six (6)
PENALTIES months to five (5) years and a fine of not less than Five hundred
thousand pesos (Php500,000.00) but not more than One million
SEC. 25. Unauthorized Processing of Personal Information and pesos (Php1,000,000.00) shall be imposed on persons processing
Sensitive Personal Information. – (a) The unauthorized processing personal information for purposes not authorized by the data
of personal information shall be penalized by imprisonment ranging subject, or otherwise authorized under this Act or under existing
from one (1) year to three (3) years and a fine of not less than Five laws.
hundred thousand pesos (Php500,000.00) but not more than Two
million pesos (Php2,000,000.00) shall be imposed on persons who The processing of sensitive personal information for unauthorized
process personal information without the consent of the data purposes shall be penalized by imprisonment ranging from two (2)
subject, or without being authorized under this Act or any existing years to seven (7) years and a fine of not less than Five hundred
law. thousand pesos (Php500,000.00) but not more than Two million
pesos (Php2,000,000.00) shall be imposed on persons processing
(b) The unauthorized processing of personal sensitive information sensitive personal information for purposes not authorized by the
shall be penalized by imprisonment ranging from three (3) years to data subject, or otherwise authorized under this Act or under
six (6) years and a fine of not less than Five hundred thousand existing laws.
pesos (Php500,000.00) but not more than Four million pesos
(Php4,000,000.00) shall be imposed on persons who process SEC. 29. Unauthorized Access or Intentional Breach. – The
personal information without the consent of the data subject, or penalty of imprisonment ranging from one (1) year to three (3)
without being authorized under this Act or any existing law. years and a fine of not less than Five hundred thousand pesos
(Php500,000.00) but not more than Two million pesos
SEC. 26. Accessing Personal Information and Sensitive Personal (Php2,000,000.00) shall be imposed on persons who knowingly and
Information Due to Negligence. – (a) Accessing personal unlawfully, or violating data confidentiality and security data
information due to negligence shall be penalized by imprisonment systems, breaks in any way into any system where personal and
ranging from one (1) year to three (3) years and a fine of not less sensitive personal information is stored.
than Five hundred thousand pesos (Php500,000.00) but not more
than Two million pesos (Php2,000,000.00) shall be imposed on SEC. 30. Concealment of Security Breaches Involving Sensitive
persons who, due to negligence, provided access to personal Personal Information. – The penalty of imprisonment of one (1)
information without being authorized under this Act or any existing year and six (6) months to five (5) years and a fine of not less than
law. Five hundred thousand pesos (Php500,000.00) but not more than
One million pesos (Php1,000,000.00) shall be imposed on persons
(b) Accessing sensitive personal information due to negligence who, after having knowledge of a security breach and of the
shall be penalized by imprisonment ranging from three (3) years to obligation to notify the Commission pursuant to Section 20(f),
six (6) years and a fine of not less than Five hundred thousand intentionally or by omission conceals the fact of such security
pesos (Php500,000.00) but not more than Four million pesos breach.
(Php4,000,000.00) shall be imposed on persons who, due to
negligence, provided access to personal information without being SEC. 31. Malicious Disclosure. – Any personal information
authorized under this Act or any existing law. controller or personal information processor or any of its officials,
employees or agents, who, with malice or in bad faith, discloses
12 | E V I D E N C E S P E C I A L LAWS
unwarranted or false information relative to any personal Back To Top
information or personal sensitive information obtained by him or CHAPTER IX
her, shall be subject to imprisonment ranging from one (1) year and MISCELLANEOUS PROVISIONS
six (6) months to five (5) years and a fine of not less than Five
hundred thousand pesos (Php500,000.00) but not more than One SEC. 38. Interpretation. – Any doubt in the interpretation of any
million pesos (Php1,000,000.00). provision of this Act shall be liberally interpreted in a manner
mindful of the rights and interests of the individual about whom
SEC. 32. Unauthorized Disclosure. – (a) Any personal information personal information is processed.
controller or personal information processor or any of its officials,
employees or agents, who discloses to a third party personal SEC. 39. Implementing Rules and Regulations (IRR). – Within
information not covered by the immediately preceding section ninety (90) days from the effectivity of this Act, the Commission
without the consent of the data subject, shall he subject to shall promulgate the rules and regulations to effectively implement
imprisonment ranging from one (1) year to three (3) years and a the provisions of this Act.
fine of not less than Five hundred thousand pesos (Php500,000.00)
but not more than One million pesos (Php1,000,000.00).
SEC. 40. Reports and Information. – The Commission shall
annually report to the President and Congress on its activities in
(b) Any personal information controller or personal information carrying out the provisions of this Act. The Commission shall
processor or any of its officials, employees or agents, who discloses undertake whatever efforts it may determine to be necessary or
to a third party sensitive personal information not covered by the appropriate to inform and educate the public of data privacy, data
immediately preceding section without the consent of the data protection and fair information rights and responsibilities.
subject, shall be subject to imprisonment ranging from three (3)
years to five (5) years and a fine of not less than Five hundred
thousand pesos (Php500,000.00) but not more than Two million SEC. 41. Appropriations Clause. – The Commission shall be
pesos (Php2,000,000.00). provided with an initial appropriation of Twenty million pesos
(Php20,000,000.00) to be drawn from the national government.
Appropriations for the succeeding years shall be included in the
SEC. 33. Combination or Series of Acts. – Any combination or General Appropriations Act. It shall likewise receive Ten million
series of acts as defined in Sections 25 to 32 shall make the person pesos (Php10,000,000.00) per year for five (5) years upon
subject to imprisonment ranging from three (3) years to six (6) implementation of this Act drawn from the national government.
years and a fine of not less than One million pesos
(Php1,000,000.00) but not more than Five million pesos
(Php5,000,000.00). SEC. 42. Transitory Provision. – Existing industries, businesses
and offices affected by the implementation of this Act shall be
given one (1) year transitory period from the effectivity of the IRR
SEC. 34. Extent of Liability. – If the offender is a corporation, or such other period as may be determined by the Commission, to
partnership or any juridical person, the penalty shall be imposed comply with the requirements of this Act.
upon the responsible officers, as the case may be, who participated
in, or by their gross negligence, allowed the commission of the
crime. If the offender is a juridical person, the court may suspend or In case that the DICT has not yet been created by the time the law
revoke any of its rights under this Act. If the offender is an alien, he takes full force and effect, the National Privacy Commission shall
or she shall, in addition to the penalties herein prescribed, be be attached to the Office of the President.
deported without further proceedings after serving the penalties
prescribed. If the offender is a public official or employee and lie or SEC. 43. Separability Clause. – If any provision or part hereof is
she is found guilty of acts penalized under Sections 27 and 28 of held invalid or unconstitutional, the remainder of the law or the
this Act, he or she shall, in addition to the penalties prescribed provision not otherwise affected shall remain valid and subsisting.
herein, suffer perpetual or temporary absolute disqualification from
office, as the case may be. SEC. 44. Repealing Clause. – The provision of Section 7 of
Republic Act No. 9372, otherwise known as the “Human Security
SEC. 35. Large-Scale. – The maximum penalty in the scale of Act of 2007”, is hereby amended. Except as otherwise expressly
penalties respectively provided for the preceding offenses shall be provided in this Act, all other laws, decrees, executive orders,
imposed when the personal information of at least one hundred proclamations and administrative regulations or parts thereof
(100) persons is harmed, affected or involved as the result of the inconsistent herewith are hereby repealed or modified accordingly.
above mentioned actions.
SEC. 45. Effectivity Clause. – This Act shall take effect fifteen (15)
SEC. 36. Offense Committed by Public Officer. – When the days after its publication in at least two (2) national newspapers of
offender or the person responsible for the offense is a public officer general circulation.
as defined in the Administrative Code of the Philippines in the
exercise of his or her duties, an accessory penalty consisting in the Republic Act No. 6981 April 24, 1991
disqualification to occupy public office for a term double the term
of criminal penalty imposed shall he applied.
AN ACT PROVIDING FOR A WITNESS PROTECTION,
SECURITY AND BENEFIT PROGRAM AND FOR OTHER
SEC. 37. Restitution. – Restitution for any aggrieved party shall be PURPOSES
governed by the provisions of the New Civil Code.
13 | E V I D E N C E S P E C I A L LAWS
Be it enacted by the Senate and House of Representatives of the of the Senate or the Speaker of the House of Representatives, as the
Philippines in Congress assembled: case may be.
Section 1. Name of Act. - This Act shall be known as the "Witness Section 5. Memorandum of Agreement With the Person to be
Protection, Security and Benefit Act". Protected. - Before a person is provided protection under this Act,
he shall first execute a memorandum of agreement which shall set
Section 2. Implementation of Program. - The Department of forth his responsibilities including:
Justice, hereinafter referred to as the Department, through its
Secretary, shall formulate and implement a "Witness Protection, a) to testify before and provide information to all
Security and Benefit Program", hereinafter referred to as the appropriate law enforcement officials concerning all
Program, pursuant to and consistent with the provisions of this Act. appropriate proceedings in connection with or arising
from the activities involved in the offense charged;
The Department may call upon any department, bureau, office or
any other executive agency to assist in the implementation of the b) to avoid the commission of the crime;lawphi1Ÿ
Program and the latter offices shall be under legal duty and
obligation to render such assistance. c) to take all necessary precautions to avoid detection by
others of the facts concerning the protection provided him
Section 3. Admission into the Program. - Any person who has under this Act;
witnessed or has knowledge or information on the commission of a
crime and has testified or is testifying or about to testify before any d) to comply with legal obligations and civil judgments
judicial or quasi-judicial body, or before any investigating against him;
authority, may be admitted into the Program:
e) to cooperate with respect to all reasonable requests of
Provided, That: officers and employees of the Government who are
providing protection under this Act; and
a) the offense in which his testimony will be used is a
grave felony as defined under the Revised Penal Code, or f) to regularly inform the appropriate program official of
its equivalent under special laws;lawphi1Ÿ his current activities and address.1awphi1©
b) his testimony can be substantially corroborated in its Section 6. Breach of the Memorandum of Agreement. -
material points; Substantial breach of the memorandum of agreement shall be a
ground for the termination of the protection provided under this
c) he or any member of his family within the second civil Act: Provided, however, That before terminating such protection,
degree of consanguinity or affinity is subjected to threats the Secretary of Justice shall send notice to the person involved of
to his life or bodily injury or there is a likelihood that he the termination of the protection provided under this Act, stating
will be killed, forced, intimidated, harassed or corrupted therein the reason for such termination.
to prevent him from testifying, or to testify falsely, or
evasively, because or on account of his testimony; and Section 7. Confidentiality of Proceedings. - All proceedings
involving application for admission into the Program and the action
d) he is not a law enforcement officer, even if he would taken thereon shall be confidential in nature. No information or
be testifying against the other law enforcement officers. documents given or submitted in support thereof shall be released
In such a case, only the immediate members of his family except upon written order of the Department or the proper court.
may avail themselves of the protection provided for under
this Act. Any person who violates the confidentiality of said proceedings
shall upon conviction be punished with imprisonment of not less
If the Department, after examination of said applicant and other than one (1) year but not more than six (6) years and deprivation of
relevant facts, is convinced that the requirements of this Act and its the right to hold a public office or employment for a period of five
implementing rules and regulations have been complied with, it (5) years.
shall admit said applicant to the Program, require said witness to
execute a sworn statement detailing his knowledge or information Section 8. Rights and Benefits. - The witness shall have the
on the commission of the crime, and thereafter issue the proper following rights and benefits:ITC-ALF
certification. For purposes of this Act, any such person admitted to
the Program shall be known as the Witness.
(a) To have a secure housing facility until he has testified
or until the threat, intimidation or harassment disappears
Section 4. Witness in Legislative Investigations. - In case of or is reduced to a manageable or tolerable level. When
legislative investigations in aid of legislation, a witness, with his the circumstances warrant, the Witness shall be entitled to
express consent, may be admitted into the Program upon the relocation and/or change of personal identity at the
recommendation of the legislative committee where his testimony expense of the Program. This right may be extended to
is needed when in its judgment there is pressing necessity therefor: any member of the family of the Witness within the
Provided, That such recommendation is approved by the President second civil degree of consanguinity or affinity.
14 | E V I D E N C E S P E C I A L LAWS
(b) The Department shall, whenever practicable, assist the Section 10. State Witness. - Any person who has participated in the
Witness in obtaining a means of livelihood. The Witness commission of a crime and desires to be a witness for the State, can
relocated pursuant to this Act shall be entitled to a apply and, if qualified as determined in this Act and by the
financial assistance from the Program for his support and Department, shall be admitted into the Program whenever the
that of his family in such amount and for such duration as following circumstances are present:
the Department shall determine.
(a) the offense in which his testimony will be used is a
(c) In no case shall the Witness be removed from or grave felony as defined under the Revised Penal Code or
demoted in work because or on account of his absences its equivalent under special laws;
due to his attendance before any judicial or quasi-judicial
body or investigating authority, including legislative (b) there is absolute necessity for his testimony;
investigations in aid of legislation, in going thereto and in
coming therefrom: Provided, That his employer is
notified through a certification issued by the Department, (c) there is no other direct evidence available for the
within a period of thirty (30) days from the date when the proper prosecution of the offense committed:
Witness last reported for work: Provided, further, That in
the case of prolonged transfer or permanent relocation, (d) his testimony can be substantially corroborated on its
the employer shall have the option to remove the Witness material points;
from employment after securing clearance from the
Department upon the recommendation of the Department (e) he does not appear to be most guilty; and
of Labor and Employment.
1.2 The court shall issue an order requiring the parties to avail of
interrogatories to parties under Rule 25 and request for admission
by adverse party under Rule 26 or at their discretion make use of
dispositions under Rule 23 or other measures under Rules 27 and
28 within five days from the filing of the answer. 1 A copy of the
order shall be served upon the defendant together with the
summons and upon the plaintiff.
Within five (5) days from date of filing of the reply, 2 the plaintiff
must promptly move ex parte that the case be set for pre-trial
conference. 3 If the plaintiff fails to file said motion within the
given period, the Branch COC shall issue a notice of pre-trial.
17 | E V I D E N C E S P E C I A L LAWS