You are on page 1of 17

A.M. No.

01-7-01-SC             July 17, 2001 (d) "Computer" refers to any single or interconnected
device or apparatus, which, by electronic, electro-
RULES ON ELECTRONIC EVIDENCE mechanical or magnetic impulse, or by other means with
the same function, can receive, record, transmit, store,
process, correlate, analyze, project, retrieve and/or
Acting on the Memorandum dated 18 June 2001 of the Committee produce information, data, text, graphics, figures, voice,
on the Revision of the Rules of Court to Draft the Rules on E- video, symbols or other modes of expression or perform
Commerce Law [R.A. No. 8792] submitting the Rules on any one or more of these functions.
Electronic Evidence for this Court's consideration and approval, the
Court Resolved to APPROVED the same.
(e) "Digital signature" refers to an electronic signature
consisting of a transformation of an electronic document
The Rules on Electronic Evidence shall apply to cases pending after or an electronic data message using an asymmetric or
their effectivity. These Rules shall take effect on the first day of public cryptosystem such that a person having the initial
August 2001 following thier publication before the 20th of July in untransformed electronic document and the signer's
two newspapers of general circulation in the Philippines public key can accurately determine:

17th July 2001. i. whether the transformation was created using


the private key that corresponds to the signer's
public key; and

RULES ON ELECTRONIC EVIDENCE ii. whether the initial electronic document had
been altered after the transformation was made.
Rule 1
COVERAGE (f) "Digitally signed" refers to an electronic document or
electronic data message bearing a digital signature
Section 1. Scope. – Unless otherwise provided herein, these Rules verified by the public key listed in a certificate.
shall apply whenever an electronic document or electronic data
message, as defined in Rule 2 hereof, is offered or used in evidence. (g) "Electronic data message" refers to information
generated, sent, received or stored by electronic, optical
Section 2. Cases covered. – These Rules shall apply to all civil or similar means.
actions and proceedings, as well as quasi-judicial and
administrative cases. (h) "Electronic document" refers to information or the
representation of information, data, figures, symbols or
Section 3. Application of other rules on evidence. – In all matters other modes of written expression, described or however
not specifically covered by these Rules, the Rules of Court and represented, by which a right is established or an
pertinent provisions of statutes containing rules on evidence shall obligation extinguished, or by which a fact may be
apply. proved and affirmed, which is received, recorded,
transmitted, stored, processed, retrieved or produced
electronically. It includes digitally signed documents and
Rule 2 any print-out or output, readable by sight or other means,
DEFINITION OF TERMS AND CONSTRUCTION which accurately reflects the electronic data message or
electronic document. For purposes of these Rules, the
Section 1. Definition of terms. – For purposes of these Rules, the term "electronic document" may be used interchangeably
following terms are defined, as follows: with "electronic data message".

(a) "Asymmetric or public cryptosystem" means a system (i) "Electronic key" refers to a secret code which secures
capable of generating a secure key pair, consisting of a and defends sensitive information that crosses over public
private key for creating a digital signature, and a public channels into a form decipherable only with a matching
key for verifying the digital signature. electronic key.

(b) "Business records" include records of any business, (j) "Electronic signature" refers to any distinctive mark,
institution, association, profession, occupation, and characteristic and/or sound in electronic form,
calling of every kind, whether or not conducted for profit, representing the identity of a person and attached to or
or for legitimate or illegitimate purposes. logically associated with the electronic data message or
electronic document or any methodology or procedure
employed or adopted by a person and executed or
(c) "Certificate" means an electronic document issued to
adopted by such person with the intention of
support a digital signature which purports to confirm the
authenticating, signing or approving an electronic data
identity or other significant characteristics of the person
message or electronic document. For purposes of these
who holds a particular key pair.
Rules, an electronic signature includes digital signatures.

1|E V I D E N C E S P E C I A L LAWS
(k) "Ephemeral electronic communication" refers to Section 2. Copies as equivalent of the originals. – When a
telephone conversations, text messages, chatroom document is in two or more copies executed at or about the same
sessions, streaming audio, streaming video, and other time with identical contents, or is a counterpart produced by the
electronic forms of communication the evidence of which same impression as the original, or from the same matrix, or by
is not recorded or retained. mechanical or electronic re-recording, or by chemical reproduction,
or by other equivalent techniques which accurately reproduces the
(l) "Information and communication system" refers to a original, such copies or duplicates shall be regarded as the
system for generating, sending, receiving, storing or equivalent of the original.
otherwise processing electronic data messages or
electronic documents and includes the computer system Notwithstanding the foregoing, copies or duplicates shall not be
or other similar devices by or in which data are recorded admissible to the same extent as the original if:
or stored and any procedure related to the recording or
storage of electronic data messages or electronic (a) a genuine question is raised as to the authenticity of
documents. the original; or

(m) "Key pair" in an asymmetric cryptosystem refers to (b) in the circumstances it would be unjust or inequitable
the private key and its mathematically related public key to admit the copy in lieu of the original.
such that the latter can verify the digital signature that the
former creates.
Rule 5
AUTHENTICATION OF ELECTRONIC DOCUMENTS
(n) "Private key" refers to the key of a key pair used to
create a digital signature.
Section 1. Burden of proving authenticity. – The person seeking to
introduce an electronic document in any legal proceeding has the
(o) "Public key" refers to the key of a key pair used to burden of proving its authenticity in the manner provided in this
verify a digital signature. Rule.

Section 2. Construction. – These Rules shall be liberally construed Section 2. Manner of authentication. – Before any private
to assist the parties in obtaining a just, expeditious, and inexpensive electronic document offered as authentic is received in evidence, its
determination of cases. authenticity must be proved by any of the following means:

The interpretation of these Rules shall also take into consideration (a) by evidence that it had been digitally signed by the
the international origin of Republic Act No. 8792, otherwise known person purported to have signed the same;
as the Electronic Commerce Act.
(b) by evidence that other appropriate security procedures
Rule 3 or devices as may be authorized by the Supreme Court or
ELECTRONIC DOCUMENTS by law for authentication of electronic documents were
applied to the document; or
Section 1. Electronic documents as functional equivalent of paper-
based documents. – Whenever a rule of evidence refers to the term (c) by other evidence showing its integrity and reliability
writing, document, record, instrument, memorandum or any other to the satisfaction of the judge.
form of writing, such term shall be deemed to include an electronic
document as defined in these Rules.
Section 3. Proof of electronically notarized document. – A
document electronically notarized in accordance with the rules
Section 2. Admissibility. – An electronic document is admissible in promulgated by the Supreme Court shall be considered as a public
evidence if it complies with the rules on admissibility prescribed by document and proved as a notarial document under the Rules of
the Rules of Court and related laws and is authenticated in the Court.
manner prescribed by these Rules.
Rule 6
Section 3. Privileged communication. – The confidential character ELECTRONIC SIGNATURES
of a privileged communication is not lost solely on the ground that
it is in the form of an electronic document.
Section 1. Electronic signature. – An electronic signature or a
digital signature authenticated in the manner prescribed hereunder
Rule 4 is admissible in evidence as the functional equivalent of the
BEST EVIDENCE RULE signature of a person on a written document.

Section 1. Original of an electronic document. – An electronic Section 2. Authentication of electronic signatures. – An electronic
document shall be regarded as the equivalent of an original signature may be authenticated in any of the following manner:
document under the Best Evidence Rule if it is a printout or output
readable by sight or other means, shown to reflect the data
accurately. (a) By evidence that a method or process was utilized to
establish a digital signature and verify the same;
2|E V I D E N C E S P E C I A L LAWS
(b) By any other means provided by law; or limited to the hardware and computer programs or
software used as well as programming errors;
(c) By any other means satisfactory to the judge as
establishing the genuineness of the electronic signature. (d) The familiarity of the witness or the person who made
the entry with the communication and information
Section 3. Disputable presumptions relating to electronic system;
signatures. – Upon the authentication of an electronic signature, it
shall be presumed that: (e) The nature and quality of the information which went
into the communication and information system upon
(a) The electronic signature is that of the person to whom which the electronic data message or electronic document
it correlates; was based; or

(b) The electronic signature was affixed by that person (f) Other factors which the court may consider as
with the intention of authenticating or approving the affecting the accuracy or integrity of the electronic
electronic document to which it is related or to indicate document or electronic data message.
such person's consent to the transaction embodied
therein; and Section 2. Integrity of an information and communication system. –
In any dispute involving the integrity of the information and
(c) The methods or processes utilized to affix or verify communication system in which an electronic document or
the electronic signature operated without error or fault. electronic data message is recorded or stored, the court may
consider, among others, the following factors:
Section 4. Disputable presumptions relating to digital signatures. –
Upon the authentication of a digital signature, it shall be presumed, (a) Whether the information and communication system
in addition to those mentioned in the immediately preceding or other similar device was operated in a manner that did
section, that: not affect the integrity of the electronic document, and
there are no other reasonable grounds to doubt the
integrity of the information and communication system;
(a) The information contained in a certificate is correct;
(b) Whether the electronic document was recorded or
(b) The digital signature was created during the stored by a party to the proceedings with interest adverse
operational period of a certificate; to that of the party using it; or

(c) No cause exists to render a certificate invalid or (c) Whether the electronic document was recorded or
revocable; stored in the usual and ordinary course of business by a
person who is not a party to the proceedings and who did
(d) The message associated with a digital signature has not act under the control of the party using it.
not been altered from the time it was signed; and,
Rule 8
(e) A certificate had been issued by the certification BUSINESS RECORDS AS EXCEPTION TO THE HEARSAY
authority indicated therein. RULE

Rule 7 Section 1. Inapplicability of the hearsay rule. – A memorandum,


EVIDENTIARY WEIGHT OF ELECTRONIC DOCUMENTS report, record or data compilation of acts, events, conditions,
opinions, or diagnoses, made by electronic, optical or other similar
Section 1. Factors for assessing evidentiary weight. – In assessing means at or near the time of or from transmission or supply of
the evidentiary weight of an electronic document, the following information by a person with knowledge thereof, and kept in the
factors may be considered: regular course or conduct of a business activity, and such was the
regular practice to make the memorandum, report, record, or data
compilation by electronic, optical or similar means, all of which are
(a) The reliability of the manner or method in which it shown by the testimony of the custodian or other qualified
was generated, stored or communicated, including but not witnesses, is excepted from the rule on hearsay evidence.
limited to input and output procedures, controls, tests and
checks for accuracy and reliability of the electronic data
message or document, in the light of all the circumstances Section 2. Overcoming the presumption. – The presumption
as well as any relevant agreement; provided for in Section 1 of this Rule may be overcome by
evidence of the untrustworthiness of the source of information or
the method or circumstances of the preparation, transmission or
(b) The reliability of the manner in which its originator storage thereof.
was identified;
Rule 9
(c) The integrity of the information and communication METHOD OF PROOF
system in which it is recorded or stored, including but not
3|E V I D E N C E S P E C I A L LAWS
Section 1. Affidavit evidence. – All matters relating to the Rule 12
admissibility and evidentiary weight of an electronic document may EFFECTIVITY
be established by an affidavit stating facts of direct personal
knowledge of the affiant or based on authentic records. The Section 1. Applicability to pending cases. – These Rules shall apply
affidavit must affirmatively show the competence of the affiant to to cases pending after their effectivity.
testify on the matters contained therein.
Section 2. Effectivity. – These Rules shall take effect on the first
Section 2. Cross-examination of deponent. – The affiant shall be day of August 2001 following their publication before the 20th of
made to affirm the contents of the affidavit in open court and may July 2001 in two newspapers of general circulation in the
be cross-examined as a matter of right by the adverse party. Philippines.

Rule 10
EXAMINATION OF WITNESSES

Section 1. Electronic testimony. – After summarily hearing the


parties pursuant to Rule 9 of these Rules, the court may authorize
the presentation of testimonial evidence by electronic means.
Before so authorizing, the court shall determine the necessity for
such presentation and prescribe terms and conditions as may be
necessary under the circumstances, including the protection of the
rights of the parties and witnesses concerned.

Section 2. Transcript of electronic testimony. – When examination


of a witness is done electronically, the entire proceedings, including
the questions and answers, shall be transcribed by a stenographer,
stenotypist or other recorder authorized for the purpose, who shall
certify as correct the transcript done by him. The transcript should
reflect the fact that the proceedings, either in whole or in part, had
been electronically recorded.

Section 3. Storage of electronic evidence. – The electronic


evidence and recording thereof as well as the stenographic notes
shall form part of the record of the case. Such transcript and
recording shall be deemed prima facie evidence of such
proceedings.

Rule 11
AUDIO, PHOTOGRAPHIC, VIDEO, AND EPHEMERAL
EVIDENCE

Section 1. Audio, video and similar evidence. – Audio,


photographic and video evidence of events, acts or transactions
shall be admissible provided it shall be shown, presented or
displayed to the court and shall be identified, explained or
authenticated by the person who made the recording or by some
other person competent to testify on the accuracy thereof.

Section 2. Ephemeral electronic communications. – Ephemeral


electronic communications shall be proven by the testimony of a
person who was a party to the same or has personal knowledge
thereof. In the absence or unavailability of such witnesses, other
competent evidence may be admitted.

A recording of the telephone conversation or ephemeral electronic


communication shall be covered by the immediately preceding
section.

If the foregoing communications are recorded or embodied in an


electronic document, then the provisions of Rule 5 shall apply.

4|E V I D E N C E S P E C I A L LAWS
ARTICLE II Republic of the Philippines
RECTIFICATION OF SIMULATED BIRTHS Congress of the Philippines
Metro Manila
Section 6. Inadmissible Evidence. - All petitions, documents, Fifteenth Congress
records, and papers relating to adoption and rectification of Second Regular Session
simulated births under this Act cannot be used as evidence against
those who simulated the birth of a child or who cooperated in the Begun and held in Metro Manila, on Monday, the twenty-fifth day
execution of such simulation in any criminal, civil, or of July, two thousand eleven.
administrative proceeding.
[REPUBLIC ACT NO. 10173]

AN ACT PROTECTING INDIVIDUAL PERSONAL


A.M. NO. 004-07-SC             November 21, 2000 INFORMATION IN INFORMATION AND
COMMUNICATIONS SYSTEMS IN THE GOVERNMENT
RULE ON EXAMINATION OF A CHILD WITNESS AND THE PRIVATE SECTOR, CREATING FOR THIS
PURPOSE A NATIONAL PRIVACY COMMISSION, AND
FOR OTHER PURPOSES
Section 30. Sexual abuse shield rule. -
Be it enacted, by the Senate and House of Representatives of the
(a) Inadmissible evidence. - The following evidence is Philippines in Congress assembled:
not admissible in any criminal proceeding involving
alleged child sexual abuse:
CHAPTER I
GENERAL PROVISIONS
(1) Evidence offered to prove that the alleged
victim engaged in other sexual behavior; and
SECTION 1. Short Title. – This Act shall be known as the “Data
Privacy Act of 2012”.
(2) Evidence offered to prove the sexual
predisposition of the alleged victim.
SEC. 2. Declaration of Policy. – It is the policy of the State to
protect the fundamental human right of privacy, of communication
(b) Exception. - Evidence of specific instances of sexual while ensuring free flow of information to promote innovation and
behavior by the alleged victim to prove that a person growth. The State recognizes the vital role of information and
other than the accused was the source of semen, injury, or communications technology in nation-building and its inherent
other physical evidence shall be admissible. obligation to ensure that personal information in information and
communications systems in the government and in the private
A party intending to offer such evidence must: sector are secured and protected.

(1) File a written motion at least fifteen (15) days before SEC. 3. Definition of Terms. – Whenever used in this Act, the
trial, specifically describing the evidence and stating the following terms shall have the respective meanings hereafter set
purpose for which it is offered, unless the court, for good forth:
cause, requires a different time for filing or permits filing
during trial; and (a) Commission shall refer to the National Privacy Commission
created by virtue of this Act.
(2) Serve the motion on all parties and the guardian ad
litem at least three (3) days before the hearing of the (b) Consent of the data subject refers to any freely given, specific,
motion. informed indication of will, whereby the data subject agrees to the
collection and processing of personal information about and/or
Before admitting such evidence, the court must conduct a hearing relating to him or her. Consent shall be evidenced by written,
in chambers and afford the child, his guardian ad litem, the parties, electronic or recorded means. It may also be given on behalf of the
and their counsel a right to attend and be heard. The motion and the data subject by an agent specifically authorized by the data subject
record of the hearing must be sealed and remain under seal and to do so.
protected by a protective order set forth in section 31(b). The child
shall not be required to testify at the hearing in chambers except (c) Data subject refers to an individual whose personal information
with his consent. is processed.

(d) Direct marketing refers to communication by whatever means


of any advertising or marketing material which is directed to
particular individuals.

(e) Filing system refers to any act of information relating to natural


or juridical persons to the extent that, although the information is

5|E V I D E N C E S P E C I A L LAWS
not processed by equipment operating automatically in response to (3) Issued by government agencies peculiar to an individual which
instructions given for that purpose, the set is structured, either by includes, but not limited to, social security numbers, previous or
reference to individuals or by reference to criteria relating to current health records, licenses or its denials, suspension or
individuals, in such a way that specific information relating to a revocation, and tax returns; and
particular person is readily accessible.
(4) Specifically established by an executive order or an act of
(f) Information and Communications System refers to a system for Congress to be kept classified.
generating, sending, receiving, storing or otherwise processing
electronic data messages or electronic documents and includes the SEC. 4. Scope. – This Act applies to the processing of all types of
computer system or other similar device by or which data is personal information and to any natural and juridical person
recorded, transmitted or stored and any procedure related to the involved in personal information processing including those
recording, transmission or storage of electronic data, electronic personal information controllers and processors who, although not
message, or electronic document. found or established in the Philippines, use equipment that are
located in the Philippines, or those who maintain an office, branch
(g) Personal information refers to any information whether or agency in the Philippines subject to the immediately succeeding
recorded in a material form or not, from which the identity of an paragraph: Provided, That the requirements of Section 5 are
individual is apparent or can be reasonably and directly ascertained complied with.
by the entity holding the information, or when put together with
other information would directly and certainly identify an This Act does not apply to the following:
individual.
(a) Information about any individual who is or was an officer or
(h) Personal information controller refers to a person or employee of a government institution that relates to the position or
organization who controls the collection, holding, processing or use functions of the individual, including:
of personal information, including a person or organization who
instructs another person or organization to collect, hold, process,
use, transfer or disclose personal information on his or her behalf. (1) The fact that the individual is or was an officer or employee of
The term excludes: the government institution;

(1) A person or organization who performs such functions as (2) The title, business address and office telephone number of the
instructed by another person or organization; and individual;

(2) An individual who collects, holds, processes or uses personal (3) The classification, salary range and responsibilities of the
information in connection with the individual’s personal, family or position held by the individual; and
household affairs.
(4) The name of the individual on a document prepared by the
(i) Personal information processor refers to any natural or juridical individual in the course of employment with the government;
person qualified to act as such under this Act to whom a personal
information controller may outsource the processing of personal (b) Information about an individual who is or was performing
data pertaining to a data subject. service under contract for a government institution that relates to
the services performed, including the terms of the contract, and the
(j) Processing refers to any operation or any set of operations name of the individual given in the course of the performance of
performed upon personal information including, but not limited to, those services;
the collection, recording, organization, storage, updating or
modification, retrieval, consultation, use, consolidation, blocking, (c) Information relating to any discretionary benefit of a financial
erasure or destruction of data. nature such as the granting of a license or permit given by the
government to an individual, including the name of the individual
(k) Privileged information refers to any and all forms of data which and the exact nature of the benefit;
under the Rules of Court and other pertinent laws constitute
privileged communication. (d) Personal information processed for journalistic, artistic, literary
or research purposes;
(l) Sensitive personal information refers to personal information:
(e) Information necessary in order to carry out the functions of
(1) About an individual’s race, ethnic origin, marital status, age, public authority which includes the processing of personal data for
color, and religious, philosophical or political affiliations; the performance by the independent, central monetary authority and
law enforcement and regulatory agencies of their constitutionally
and statutorily mandated functions. Nothing in this Act shall be
(2) About an individual’s health, education, genetic or sexual life of construed as to have amended or repealed Republic Act No. 1405,
a person, or to any proceeding for any offense committed or alleged otherwise known as the Secrecy of Bank Deposits Act; Republic
to have been committed by such person, the disposal of such Act No. 6426, otherwise known as the Foreign Currency Deposit
proceedings, or the sentence of any court in such proceedings; Act; and Republic Act No. 9510, otherwise known as the Credit
Information System Act (CISA);

6|E V I D E N C E S P E C I A L LAWS
(f) Information necessary for banks and other financial institutions to be known as the National Privacy Commission, winch shall have
under the jurisdiction of the independent, central monetary the following functions:
authority or Bangko Sentral ng Pilipinas to comply with Republic
Act No. 9510, and Republic Act No. 9160, as amended, otherwise (a) Ensure compliance of personal information controllers with the
known as the Anti-Money Laundering Act and other applicable provisions of this Act;
laws; and
(b) Receive complaints, institute investigations, facilitate or enable
(g) Personal information originally collected from residents of settlement of complaints through the use of alternative dispute
foreign jurisdictions in accordance with the laws of those foreign resolution processes, adjudicate, award indemnity on matters
jurisdictions, including any applicable data privacy laws, which is affecting any personal information, prepare reports on disposition
being processed in the Philippines. of complaints and resolution of any investigation it initiates, and, in
cases it deems appropriate, publicize any such
SEC. 5. Protection Afforded to Journalists and Their Sources. report: Provided, That in resolving any complaint or investigation
– Nothing in this Act shall be construed as to have amended or (except where amicable settlement is reached by the parties), the
repealed the provisions of Republic Act No. 53, which affords the Commission shall act as a collegial body. For this purpose, the
publishers, editors or duly accredited reporters of any newspaper, Commission may be given access to personal information that is
magazine or periodical of general circulation protection from being subject of any complaint and to collect the information necessary to
compelled to reveal the source of any news report or information perform its functions under this Act;
appearing in said publication which was related in any confidence
to such publisher, editor, or reporter. (c) Issue cease and desist orders, impose a temporary or permanent
ban on the processing of personal information, upon finding that the
SEC. 6. Extraterritorial Application. – This Act applies to an act processing will be detrimental to national security and public
done or practice engaged in and outside of the Philippines by an interest;
entity if:
(d) Compel or petition any entity, government agency or
(a) The act, practice or processing relates to personal information instrumentality to abide by its orders or take action on a matter
about a Philippine citizen or a resident; affecting data privacy;

(b) The entity has a link with the Philippines, and the entity is (e) Monitor the compliance of other government agencies or
processing personal information in the Philippines or even if the instrumentalities on their security and technical measures and
processing is outside the Philippines as long as it is about recommend the necessary action in order to meet minimum
Philippine citizens or residents such as, but not limited to, the standards for protection of personal information pursuant to this
following: Act;

(1) A contract is entered in the Philippines; (f) Coordinate with other government agencies and the private
sector on efforts to formulate and implement plans and policies to
(2) A juridical entity unincorporated in the Philippines but has strengthen the protection of personal information in the country;
central management and control in the country; and
(g) Publish on a regular basis a guide to all laws relating to data
(3) An entity that has a branch, agency, office or subsidiary in the protection;
Philippines and the parent or affiliate of the Philippine entity has
access to personal information; and (h) Publish a compilation of agency system of records and notices,
including index and other finding aids;
(c) The entity has other links in the Philippines such as, but not
limited to: (i) Recommend to the Department of Justice (DOJ) the prosecution
and imposition of penalties specified in Sections 25 to 29 of this
(1) The entity carries on business in the Philippines; and Act;

(2) The personal information was collected or held by an entity in (j) Review, approve, reject or require modification of privacy codes
the Philippines. voluntarily adhered to by personal information
controllers:Provided, That the privacy codes shall adhere to the
underlying data privacy principles embodied in this Act: Provided,
Back To Top further,That such privacy codes may include private dispute
CHAPTER II resolution mechanisms for complaints against any participating
THE NATIONAL PRIVACY COMMISSION personal information controller. For this purpose, the Commission
shall consult with relevant regulatory agencies in the formulation
SEC. 7. Functions of the National Privacy Commission. – To and administration of privacy codes applying the standards set out
administer and implement the provisions of this Act, and to monitor in this Act, with respect to the persons, entities, business activities
and ensure compliance of the country with international standards and business sectors that said regulatory bodies are authorized to
set for data protection, there is hereby created an independent body principally regulate pursuant to the law: Provided, finally. That the

7|E V I D E N C E S P E C I A L LAWS
Commission may review such privacy codes and require changes The Privacy Commissioner, the Deputy Commissioners, or any
thereto for purposes of complying with this Act; person acting on their behalf or under their direction, shall not be
civilly liable for acts done in good faith in the performance of their
(k) Provide assistance on matters relating to privacy or data duties. However, he or she shall be liable for willful or negligent
protection at the request of a national or local agency, a private acts done by him or her which are contrary to law, morals, public
entity or any person; policy and good customs even if he or she acted under orders or
instructions of superiors: Provided, That in case a lawsuit is filed
against such official on the subject of the performance of his or her
(l) Comment on the implication on data privacy of proposed duties, where such performance is lawful, he or she shall be
national or local statutes, regulations or procedures, issue advisory reimbursed by the Commission for reasonable costs of litigation.
opinions and interpret the provisions of this Act and other data
privacy laws;
SEC. 10. The Secretariat. – The Commission is hereby authorized
to establish a Secretariat. Majority of the members of the
(m) Propose legislation, amendments or modifications to Philippine Secretariat must have served for at least five (5) years in any
laws on privacy or data protection as may be necessary; agency of the government that is involved in the processing of
personal information including, but not limited to, the following
(n) Ensure proper and effective coordination with data privacy offices: Social Security System (SSS), Government Service
regulators in other countries and private accountability agents, Insurance System (GSIS), Land Transportation Office (LTO),
participate in international and regional initiatives for data privacy Bureau of Internal Revenue (BIR), Philippine Health Insurance
protection; Corporation (PhilHealth), Commission on Elections (COMELEC),
Department of Foreign Affairs (DFA), Department of Justice
(o) Negotiate and contract with other data privacy authorities of (DOJ), and Philippine Postal Corporation (Philpost).
other countries for cross-border application and implementation of
respective privacy laws; Back To Top
CHAPTER III
(p) Assist Philippine companies doing business abroad to respond PROCESSING OF PERSONAL INFORMATION
to foreign privacy or data protection laws and regulations; and
SEC. 11. General Data Privacy Principles. – The processing of
(q) Generally perform such acts as may be necessary to facilitate personal information shall be allowed, subject to compliance with
cross-border enforcement of data privacy protection. the requirements of this Act and other laws allowing disclosure of
information to the public and adherence to the principles of
transparency, legitimate purpose and proportionality.
SEC. 8. Confidentiality. – The Commission shall ensure at all times
the confidentiality of any personal information that comes to its
knowledge and possession. Personal information must, be:,

SEC. 9. Organizational Structure of the Commission. – The (a) Collected for specified and legitimate purposes determined and
Commission shall be attached to the Department of Information and declared before, or as soon as reasonably practicable after
Communications Technology (DICT) and shall be headed by a collection, and later processed in a way compatible with such
Privacy Commissioner, who shall also act as Chairman of the declared, specified and legitimate purposes only;
Commission. The Privacy Commissioner shall be assisted by two
(2) Deputy Privacy Commissioners, one to be responsible for Data (b) Processed fairly and lawfully;
Processing Systems and one to be responsible for Policies and
Planning. The Privacy Commissioner and the two (2) Deputy (c) Accurate, relevant and, where necessary for purposes for which
Privacy Commissioners shall be appointed by the President of the it is to be used the processing of personal information, kept up to
Philippines for a term of three (3) years, and may be reappointed date; inaccurate or incomplete data must be rectified,
for another term of three (3) years. Vacancies in the Commission supplemented, destroyed or their further processing restricted;
shall be filled in the same manner in which the original
appointment was made.
(d) Adequate and not excessive in relation to the purposes for
which they are collected and processed;
The Privacy Commissioner must be at least thirty-five (35) years of
age and of good moral character, unquestionable integrity and
known probity, and a recognized expert in the field of information (e) Retained only for as long as necessary for the fulfillment of the
technology and data privacy. The Privacy Commissioner shall purposes for which the data was obtained or for the establishment,
enjoy the benefits, privileges and emoluments equivalent to the exercise or defense of legal claims, or for legitimate business
rank of Secretary. purposes, or as provided by law; and

The Deputy Privacy Commissioners must be recognized experts in (f) Kept in a form which permits identification of data subjects for
the field of information and communications technology and data no longer than is necessary for the purposes for which the data were
privacy. They shall enjoy the benefits, privileges and emoluments collected and processed: Provided, That personal information
equivalent to the rank of Undersecretary. collected for other purposes may lie processed for historical,
statistical or scientific purposes, and in cases laid down in law may

8|E V I D E N C E S P E C I A L LAWS
be stored for longer periods: Provided, further,That adequate (d) The processing is necessary to achieve the lawful and
safeguards are guaranteed by said laws authorizing their processing. noncommercial objectives of public organizations and their
associations: Provided, That such processing is only confined and
The personal information controller must ensure implementation of related to the bona fide members of these organizations or their
personal information processing principles set out herein. associations: Provided, further, That the sensitive personal
information are not transferred to third parties: Provided,
finally, That consent of the data subject was obtained prior to
SEC. 12. Criteria for Lawful Processing of Personal Information. – processing;
The processing of personal information shall be permitted only if
not otherwise prohibited by law, and when at least one of the
following conditions exists: (e) The processing is necessary for purposes of medical treatment,
is carried out by a medical practitioner or a medical treatment
institution, and an adequate level of protection of personal
(a) The data subject has given his or her consent; information is ensured; or

(b) The processing of personal information is necessary and is (f) The processing concerns such personal information as is
related to the fulfillment of a contract with the data subject or in necessary for the protection of lawful rights and interests of natural
order to take steps at the request of the data subject prior to entering or legal persons in court proceedings, or the establishment, exercise
into a contract; or defense of legal claims, or when provided to government or
public authority.
(c) The processing is necessary for compliance with a legal
obligation to which the personal information controller is subject; SEC. 14. Subcontract of Personal Information. – A personal
information controller may subcontract the processing of personal
(d) The processing is necessary to protect vitally important interests information: Provided, That the personal information controller
of the data subject, including life and health; shall be responsible for ensuring that proper safeguards are in place
to ensure the confidentiality of the personal information processed,
(e) The processing is necessary in order to respond to national prevent its use for unauthorized purposes, and generally, comply
emergency, to comply with the requirements of public order and with the requirements of this Act and other laws for processing of
safety, or to fulfill functions of public authority which necessarily personal information. The personal information processor shall
includes the processing of personal data for the fulfillment of its comply with all the requirements of this Act and other applicable
mandate; or laws.

(f) The processing is necessary for the purposes of the legitimate SEC. 15. Extension of Privileged Communication. – Personal
interests pursued by the personal information controller or by a information controllers may invoke the principle of privileged
third party or parties to whom the data is disclosed, except where communication over privileged information that they lawfully
such interests are overridden by fundamental rights and freedoms of control or process. Subject to existing laws and regulations, any
the data subject which require protection under the Philippine evidence gathered on privileged information is inadmissible.
Constitution.
Back To Top
SEC. 13. Sensitive Personal Information and Privileged CHAPTER IV
Information. – The processing of sensitive personal information RIGHTS OF THE DATA SUBJECT
and privileged information shall be prohibited, except in the
following cases: SEC. 16. Rights of the Data Subject. – The data subject is entitled
to:
(a) The data subject has given his or her consent, specific to the
purpose prior to the processing, or in the case of privileged (a) Be informed whether personal information pertaining to him or
information, all parties to the exchange have given their consent her shall be, are being or have been processed;
prior to processing;
(b) Be furnished the information indicated hereunder before the
(b) The processing of the same is provided for by existing laws and entry of his or her personal information into the processing system
regulations: Provided, That such regulatory enactments guarantee of the personal information controller, or at the next practical
the protection of the sensitive personal information and the opportunity:
privileged information: Provided, further, That the consent of the
data subjects are not required by law or regulation permitting the (1) Description of the personal information to be entered into the
processing of the sensitive personal information or the privileged system;
information;
(2) Purposes for which they are being or are to be processed;
(c) The processing is necessary to protect the life and health of the
data subject or another person, and the data subject is not legally or
physically able to express his or her consent prior to the processing; (3) Scope and method of the personal information processing;

(4) The recipients or classes of recipients to whom they are or may


be disclosed;
9|E V I D E N C E S P E C I A L LAWS
(5) Methods utilized for automated access, if the same is allowed (e) Suspend, withdraw or order the blocking, removal or destruction
by the data subject, and the extent to which such access is of his or her personal information from the personal information
authorized; controller’s filing system upon discovery and substantial proof that
the personal information are incomplete, outdated, false, unlawfully
(6) The identity and contact details of the personal information obtained, used for unauthorized purposes or are no longer necessary
controller or its representative; for the purposes for which they were collected. In this case, the
personal information controller may notify third parties who have
previously received such processed personal information; and
(7) The period for which the information will be stored; and
(f) Be indemnified for any damages sustained due to such
(8) The existence of their rights, i.e., to access, correction, as well inaccurate, incomplete, outdated, false, unlawfully obtained or
as the right to lodge a complaint before the Commission. unauthorized use of personal information.

Any information supplied or declaration made to the data subject SEC. 17. Transmissibility of Rights of the Data Subject. – The
on these matters shall not be amended without prior notification of lawful heirs and assigns of the data subject may invoke the rights of
data subject: Provided, That the notification under subsection (b) the data subject for, which he or she is an heir or assignee at any
shall not apply should the personal information be needed pursuant time after the death of the data subject or when the data subject is
to a subpoena or when the collection and processing are for incapacitated or incapable of exercising the rights as enumerated in
obvious purposes, including when it is necessary for the the immediately preceding section.
performance of or in relation to a contract or service or when
necessary or desirable in the context of an employer-employee
relationship, between the collector and the data subject, or when the SEC. 18. Right to Data Portability. – The data subject shall have
information is being collected and processed as a result of legal the right, where personal information is processed by electronic
obligation; means and in a structured and commonly used format, to obtain
from the personal information controller a copy of data undergoing
processing in an electronic or structured format, which is
(c) Reasonable access to, upon demand, the following: commonly used and allows for further use by the data subject. The
Commission may specify the electronic format referred to above, as
(1) Contents of his or her personal information that were processed; well as the technical standards, modalities and procedures for their
transfer.
(2) Sources from which personal information were obtained;
SEC. 19. Non-Applicability. – The immediately preceding sections
(3) Names and addresses of recipients of the personal information; are not applicable if the processed personal information are used
only for the needs of scientific and statistical research and, on the
basis of such, no activities are carried out and no decisions are
(4) Manner by which such data were processed; taken regarding the data subject: Provided, That the personal
information shall be held under strict confidentiality and shall be
(5) Reasons for the disclosure of the personal information to used only for the declared purpose. Likewise, the immediately
recipients; preceding sections are not applicable to processing of personal
information gathered for the purpose of investigations in relation to
any criminal, administrative or tax liabilities of a data subject.
(6) Information on automated processes where the data will or
likely to be made as the sole basis for any decision significantly
affecting or will affect the data subject; Back To Top
CHAPTER V
SECURITY OF PERSONAL INFORMATION
(7) Date when his or her personal information concerning the data
subject were last accessed and modified; and
SEC. 20. Security of Personal Information. – (a) The personal
information controller must implement reasonable and appropriate
(8) The designation, or name or identity and address of the personal
organizational, physical and technical measures intended for the
information controller;
protection of personal information against any accidental or
unlawful destruction, alteration and disclosure, as well as against
(d) Dispute the inaccuracy or error in the personal information and any other unlawful processing.
have the personal information controller correct it immediately and
accordingly, unless the request is vexatious or otherwise
(b) The personal information controller shall implement reasonable
unreasonable. If the personal information have been corrected, the
and appropriate measures to protect personal information against
personal information controller shall ensure the accessibility of
natural dangers such as accidental loss or destruction, and human
both the new and the retracted information and the simultaneous
dangers such as unlawful access, fraudulent misuse, unlawful
receipt of the new and the retracted information by recipients
destruction, alteration and contamination.
thereof: Provided, That the third parties who have previously
received such processed personal information shall he informed of
its inaccuracy and its rectification upon reasonable request of the (c) The determination of the appropriate level of security under this
data subject; section must take into account the nature of the personal
information to be protected, the risks represented by the processing,
the size of the organization and complexity of its operations,
10 | E V I D E N C E S P E C I A L LAWS
current data privacy best practices and the cost of security Back To Top
implementation. Subject to guidelines as the Commission may issue CHAPTER VI
from time to time, the measures implemented must include: ACCOUNTABILITY FOR TRANSFER OF PERSONAL
INFORMATION
(1) Safeguards to protect its computer network against accidental,
unlawful or unauthorized usage or interference with or hindering of SEC. 21. Principle of Accountability. – Each personal information
their functioning or availability; controller is responsible for personal information under its control
or custody, including information that have been transferred to a
(2) A security policy with respect to the processing of personal third party for processing, whether domestically or internationally,
information; subject to cross-border arrangement and cooperation.

(3) A process for identifying and accessing reasonably foreseeable (a) The personal information controller is accountable for
vulnerabilities in its computer networks, and for taking preventive, complying with the requirements of this Act and shall use
corrective and mitigating action against security incidents that can contractual or other reasonable means to provide a comparable
lead to a security breach; and level of protection while the information are being processed by a
third party.
(4) Regular monitoring for security breaches and a process for
taking preventive, corrective and mitigating action against security (b) The personal information controller shall designate an
incidents that can lead to a security breach. individual or individuals who are accountable for the organization’s
compliance with this Act. The identity of the individual(s) so
designated shall be made known to any data subject upon request.
(d) The personal information controller must further ensure that
third parties processing personal information on its behalf shall
implement the security measures required by this provision. Back To Top
CHAPTER VII
SECURITY OF SENSITIVE PERSONAL
(e) The employees, agents or representatives of a personal INFORMATION IN GOVERNMENT
information controller who are involved in the processing of
personal information shall operate and hold personal information
under strict confidentiality if the personal information are not SEC. 22. Responsibility of Heads of Agencies. – All sensitive
intended for public disclosure. This obligation shall continue even personal information maintained by the government, its agencies
after leaving the public service, transfer to another position or upon and instrumentalities shall be secured, as far as practicable, with the
termination of employment or contractual relations. use of the most appropriate standard recognized by the information
and communications technology industry, and as recommended by
the Commission. The head of each government agency or
(f) The personal information controller shall promptly notify the instrumentality shall be responsible for complying with the security
Commission and affected data subjects when sensitive personal requirements mentioned herein while the Commission shall monitor
information or other information that may, under the circumstances, the compliance and may recommend the necessary action in order
be used to enable identity fraud are reasonably believed to have to satisfy the minimum standards.
been acquired by an unauthorized person, and the personal
information controller or the Commission believes (bat such
unauthorized acquisition is likely to give rise to a real risk of SEC. 23. Requirements Relating to Access by Agency Personnel to
serious harm to any affected data subject. The notification shall at Sensitive Personal Information. – (a) On-site and Online Access –
least describe the nature of the breach, the sensitive personal Except as may be allowed through guidelines to be issued by the
information possibly involved, and the measures taken by the entity Commission, no employee of the government shall have access to
to address the breach. Notification may be delayed only to the sensitive personal information on government property or through
extent necessary to determine the scope of the breach, to prevent online facilities unless the employee has received a security
further disclosures, or to restore reasonable integrity to the clearance from the head of the source agency.
information and communications system.
(b) Off-site Access – Unless otherwise provided in guidelines to be
(1) In evaluating if notification is unwarranted, the Commission issued by the Commission, sensitive personal information
may take into account compliance by the personal information maintained by an agency may not be transported or accessed from a
controller with this section and existence of good faith in the location off government property unless a request for such
acquisition of personal information. transportation or access is submitted and approved by the head of
the agency in accordance with the following guidelines:
(2) The Commission may exempt a personal information controller
from notification where, in its reasonable judgment, such (1) Deadline for Approval or Disapproval – In the case of any
notification would not be in the public interest or in the interests of request submitted to the head of an agency, such head of the agency
the affected data subjects. shall approve or disapprove the request within two (2) business
days after the date of submission of the request. In case there is no
action by the head of the agency, then such request is considered
(3) The Commission may authorize postponement of notification disapproved;
where it may hinder the progress of a criminal investigation related
to a serious breach.

11 | E V I D E N C E S P E C I A L LAWS
(2) Limitation to One thousand (1,000) Records – If a request is SEC. 27. Improper Disposal of Personal Information and Sensitive
approved, the head of the agency shall limit the access to not more Personal Information. – (a) The improper disposal of personal
than one thousand (1,000) records at a time; and information shall be penalized by imprisonment ranging from six
(6) months to two (2) years and a fine of not less than One hundred
(3) Encryption – Any technology used to store, transport or access thousand pesos (Php100,000.00) but not more than Five hundred
sensitive personal information for purposes of off-site access thousand pesos (Php500,000.00) shall be imposed on persons who
approved under this subsection shall be secured by the use of the knowingly or negligently dispose, discard or abandon the personal
most secure encryption standard recognized by the Commission. information of an individual in an area accessible to the public or
has otherwise placed the personal information of an individual in its
container for trash collection.
The requirements of this subsection shall be implemented not later
than six (6) months after the date of the enactment of this Act.
(b) The improper disposal of sensitive personal information shall be
penalized by imprisonment ranging from one (1) year to three (3)
SEC. 24. Applicability to Government Contractors. – In entering years and a fine of not less than One hundred thousand pesos
into any contract that may involve accessing or requiring sensitive (Php100,000.00) but not more than One million pesos
personal information from one thousand (1,000) or more (Php1,000,000.00) shall be imposed on persons who knowingly or
individuals, an agency shall require a contractor and its employees negligently dispose, discard or abandon the personal information of
to register their personal information processing system with the an individual in an area accessible to the public or has otherwise
Commission in accordance with this Act and to comply with the placed the personal information of an individual in its container for
other provisions of this Act including the immediately preceding trash collection.
section, in the same manner as agencies and government employees
comply with such requirements.
SEC. 28. Processing of Personal Information and Sensitive
Personal Information for Unauthorized Purposes. – The processing
Back To Top of personal information for unauthorized purposes shall be
CHAPTER VIII penalized by imprisonment ranging from one (1) year and six (6)
PENALTIES months to five (5) years and a fine of not less than Five hundred
thousand pesos (Php500,000.00) but not more than One million
SEC. 25. Unauthorized Processing of Personal Information and pesos (Php1,000,000.00) shall be imposed on persons processing
Sensitive Personal Information. – (a) The unauthorized processing personal information for purposes not authorized by the data
of personal information shall be penalized by imprisonment ranging subject, or otherwise authorized under this Act or under existing
from one (1) year to three (3) years and a fine of not less than Five laws.
hundred thousand pesos (Php500,000.00) but not more than Two
million pesos (Php2,000,000.00) shall be imposed on persons who The processing of sensitive personal information for unauthorized
process personal information without the consent of the data purposes shall be penalized by imprisonment ranging from two (2)
subject, or without being authorized under this Act or any existing years to seven (7) years and a fine of not less than Five hundred
law. thousand pesos (Php500,000.00) but not more than Two million
pesos (Php2,000,000.00) shall be imposed on persons processing
(b) The unauthorized processing of personal sensitive information sensitive personal information for purposes not authorized by the
shall be penalized by imprisonment ranging from three (3) years to data subject, or otherwise authorized under this Act or under
six (6) years and a fine of not less than Five hundred thousand existing laws.
pesos (Php500,000.00) but not more than Four million pesos
(Php4,000,000.00) shall be imposed on persons who process SEC. 29. Unauthorized Access or Intentional Breach. – The
personal information without the consent of the data subject, or penalty of imprisonment ranging from one (1) year to three (3)
without being authorized under this Act or any existing law. years and a fine of not less than Five hundred thousand pesos
(Php500,000.00) but not more than Two million pesos
SEC. 26. Accessing Personal Information and Sensitive Personal (Php2,000,000.00) shall be imposed on persons who knowingly and
Information Due to Negligence. – (a) Accessing personal unlawfully, or violating data confidentiality and security data
information due to negligence shall be penalized by imprisonment systems, breaks in any way into any system where personal and
ranging from one (1) year to three (3) years and a fine of not less sensitive personal information is stored.
than Five hundred thousand pesos (Php500,000.00) but not more
than Two million pesos (Php2,000,000.00) shall be imposed on SEC. 30. Concealment of Security Breaches Involving Sensitive
persons who, due to negligence, provided access to personal Personal Information. – The penalty of imprisonment of one (1)
information without being authorized under this Act or any existing year and six (6) months to five (5) years and a fine of not less than
law. Five hundred thousand pesos (Php500,000.00) but not more than
One million pesos (Php1,000,000.00) shall be imposed on persons
(b) Accessing sensitive personal information due to negligence who, after having knowledge of a security breach and of the
shall be penalized by imprisonment ranging from three (3) years to obligation to notify the Commission pursuant to Section 20(f),
six (6) years and a fine of not less than Five hundred thousand intentionally or by omission conceals the fact of such security
pesos (Php500,000.00) but not more than Four million pesos breach.
(Php4,000,000.00) shall be imposed on persons who, due to
negligence, provided access to personal information without being SEC. 31. Malicious Disclosure. – Any personal information
authorized under this Act or any existing law. controller or personal information processor or any of its officials,
employees or agents, who, with malice or in bad faith, discloses
12 | E V I D E N C E S P E C I A L LAWS
unwarranted or false information relative to any personal Back To Top
information or personal sensitive information obtained by him or CHAPTER IX
her, shall be subject to imprisonment ranging from one (1) year and MISCELLANEOUS PROVISIONS
six (6) months to five (5) years and a fine of not less than Five
hundred thousand pesos (Php500,000.00) but not more than One SEC. 38. Interpretation. – Any doubt in the interpretation of any
million pesos (Php1,000,000.00). provision of this Act shall be liberally interpreted in a manner
mindful of the rights and interests of the individual about whom
SEC. 32. Unauthorized Disclosure. – (a) Any personal information personal information is processed.
controller or personal information processor or any of its officials,
employees or agents, who discloses to a third party personal SEC. 39. Implementing Rules and Regulations (IRR). – Within
information not covered by the immediately preceding section ninety (90) days from the effectivity of this Act, the Commission
without the consent of the data subject, shall he subject to shall promulgate the rules and regulations to effectively implement
imprisonment ranging from one (1) year to three (3) years and a the provisions of this Act.
fine of not less than Five hundred thousand pesos (Php500,000.00)
but not more than One million pesos (Php1,000,000.00).
SEC. 40. Reports and Information. – The Commission shall
annually report to the President and Congress on its activities in
(b) Any personal information controller or personal information carrying out the provisions of this Act. The Commission shall
processor or any of its officials, employees or agents, who discloses undertake whatever efforts it may determine to be necessary or
to a third party sensitive personal information not covered by the appropriate to inform and educate the public of data privacy, data
immediately preceding section without the consent of the data protection and fair information rights and responsibilities.
subject, shall be subject to imprisonment ranging from three (3)
years to five (5) years and a fine of not less than Five hundred
thousand pesos (Php500,000.00) but not more than Two million SEC. 41. Appropriations Clause. – The Commission shall be
pesos (Php2,000,000.00). provided with an initial appropriation of Twenty million pesos
(Php20,000,000.00) to be drawn from the national government.
Appropriations for the succeeding years shall be included in the
SEC. 33. Combination or Series of Acts. – Any combination or General Appropriations Act. It shall likewise receive Ten million
series of acts as defined in Sections 25 to 32 shall make the person pesos (Php10,000,000.00) per year for five (5) years upon
subject to imprisonment ranging from three (3) years to six (6) implementation of this Act drawn from the national government.
years and a fine of not less than One million pesos
(Php1,000,000.00) but not more than Five million pesos
(Php5,000,000.00). SEC. 42. Transitory Provision. – Existing industries, businesses
and offices affected by the implementation of this Act shall be
given one (1) year transitory period from the effectivity of the IRR
SEC. 34. Extent of Liability. – If the offender is a corporation, or such other period as may be determined by the Commission, to
partnership or any juridical person, the penalty shall be imposed comply with the requirements of this Act.
upon the responsible officers, as the case may be, who participated
in, or by their gross negligence, allowed the commission of the
crime. If the offender is a juridical person, the court may suspend or In case that the DICT has not yet been created by the time the law
revoke any of its rights under this Act. If the offender is an alien, he takes full force and effect, the National Privacy Commission shall
or she shall, in addition to the penalties herein prescribed, be be attached to the Office of the President.
deported without further proceedings after serving the penalties
prescribed. If the offender is a public official or employee and lie or SEC. 43. Separability Clause. – If any provision or part hereof is
she is found guilty of acts penalized under Sections 27 and 28 of held invalid or unconstitutional, the remainder of the law or the
this Act, he or she shall, in addition to the penalties prescribed provision not otherwise affected shall remain valid and subsisting.
herein, suffer perpetual or temporary absolute disqualification from
office, as the case may be. SEC. 44. Repealing Clause. – The provision of Section 7 of
Republic Act No. 9372, otherwise known as the “Human Security
SEC. 35. Large-Scale. – The maximum penalty in the scale of Act of 2007”, is hereby amended. Except as otherwise expressly
penalties respectively provided for the preceding offenses shall be provided in this Act, all other laws, decrees, executive orders,
imposed when the personal information of at least one hundred proclamations and administrative regulations or parts thereof
(100) persons is harmed, affected or involved as the result of the inconsistent herewith are hereby repealed or modified accordingly.
above mentioned actions.
SEC. 45. Effectivity Clause. – This Act shall take effect fifteen (15)
SEC. 36. Offense Committed by Public Officer. – When the days after its publication in at least two (2) national newspapers of
offender or the person responsible for the offense is a public officer general circulation.
as defined in the Administrative Code of the Philippines in the
exercise of his or her duties, an accessory penalty consisting in the Republic Act No. 6981             April 24, 1991
disqualification to occupy public office for a term double the term
of criminal penalty imposed shall he applied.
AN ACT PROVIDING FOR A WITNESS PROTECTION,
SECURITY AND BENEFIT PROGRAM AND FOR OTHER
SEC. 37. Restitution. – Restitution for any aggrieved party shall be PURPOSES
governed by the provisions of the New Civil Code.

13 | E V I D E N C E S P E C I A L LAWS
Be it enacted by the Senate and House of Representatives of the of the Senate or the Speaker of the House of Representatives, as the
Philippines in Congress assembled: case may be.

Section 1. Name of Act. - This Act shall be known as the "Witness Section 5. Memorandum of Agreement With the Person to be
Protection, Security and Benefit Act". Protected. - Before a person is provided protection under this Act,
he shall first execute a memorandum of agreement which shall set
Section 2. Implementation of Program. - The Department of forth his responsibilities including:
Justice, hereinafter referred to as the Department, through its
Secretary, shall formulate and implement a "Witness Protection, a) to testify before and provide information to all
Security and Benefit Program", hereinafter referred to as the appropriate law enforcement officials concerning all
Program, pursuant to and consistent with the provisions of this Act. appropriate proceedings in connection with or arising
from the activities involved in the offense charged;
The Department may call upon any department, bureau, office or
any other executive agency to assist in the implementation of the b) to avoid the commission of the crime;lawphi1Ÿ
Program and the latter offices shall be under legal duty and
obligation to render such assistance. c) to take all necessary precautions to avoid detection by
others of the facts concerning the protection provided him
Section 3. Admission into the Program. - Any person who has under this Act;
witnessed or has knowledge or information on the commission of a
crime and has testified or is testifying or about to testify before any d) to comply with legal obligations and civil judgments
judicial or quasi-judicial body, or before any investigating against him;
authority, may be admitted into the Program:
e) to cooperate with respect to all reasonable requests of
Provided, That: officers and employees of the Government who are
providing protection under this Act; and
a) the offense in which his testimony will be used is a
grave felony as defined under the Revised Penal Code, or f) to regularly inform the appropriate program official of
its equivalent under special laws;lawphi1Ÿ his current activities and address.1awphi1©

b) his testimony can be substantially corroborated in its Section 6. Breach of the Memorandum of Agreement. -
material points; Substantial breach of the memorandum of agreement shall be a
ground for the termination of the protection provided under this
c) he or any member of his family within the second civil Act: Provided, however, That before terminating such protection,
degree of consanguinity or affinity is subjected to threats the Secretary of Justice shall send notice to the person involved of
to his life or bodily injury or there is a likelihood that he the termination of the protection provided under this Act, stating
will be killed, forced, intimidated, harassed or corrupted therein the reason for such termination.
to prevent him from testifying, or to testify falsely, or
evasively, because or on account of his testimony; and Section 7. Confidentiality of Proceedings. - All proceedings
involving application for admission into the Program and the action
d) he is not a law enforcement officer, even if he would taken thereon shall be confidential in nature. No information or
be testifying against the other law enforcement officers. documents given or submitted in support thereof shall be released
In such a case, only the immediate members of his family except upon written order of the Department or the proper court.
may avail themselves of the protection provided for under
this Act. Any person who violates the confidentiality of said proceedings
shall upon conviction be punished with imprisonment of not less
If the Department, after examination of said applicant and other than one (1) year but not more than six (6) years and deprivation of
relevant facts, is convinced that the requirements of this Act and its the right to hold a public office or employment for a period of five
implementing rules and regulations have been complied with, it (5) years.
shall admit said applicant to the Program, require said witness to
execute a sworn statement detailing his knowledge or information Section 8. Rights and Benefits. - The witness shall have the
on the commission of the crime, and thereafter issue the proper following rights and benefits:ITC-ALF
certification. For purposes of this Act, any such person admitted to
the Program shall be known as the Witness.
(a) To have a secure housing facility until he has testified
or until the threat, intimidation or harassment disappears
Section 4. Witness in Legislative Investigations. - In case of or is reduced to a manageable or tolerable level. When
legislative investigations in aid of legislation, a witness, with his the circumstances warrant, the Witness shall be entitled to
express consent, may be admitted into the Program upon the relocation and/or change of personal identity at the
recommendation of the legislative committee where his testimony expense of the Program. This right may be extended to
is needed when in its judgment there is pressing necessity therefor: any member of the family of the Witness within the
Provided, That such recommendation is approved by the President second civil degree of consanguinity or affinity.

14 | E V I D E N C E S P E C I A L LAWS
(b) The Department shall, whenever practicable, assist the Section 10. State Witness. - Any person who has participated in the
Witness in obtaining a means of livelihood. The Witness commission of a crime and desires to be a witness for the State, can
relocated pursuant to this Act shall be entitled to a apply and, if qualified as determined in this Act and by the
financial assistance from the Program for his support and Department, shall be admitted into the Program whenever the
that of his family in such amount and for such duration as following circumstances are present:
the Department shall determine.
(a) the offense in which his testimony will be used is a
(c) In no case shall the Witness be removed from or grave felony as defined under the Revised Penal Code or
demoted in work because or on account of his absences its equivalent under special laws;
due to his attendance before any judicial or quasi-judicial
body or investigating authority, including legislative (b) there is absolute necessity for his testimony;
investigations in aid of legislation, in going thereto and in
coming therefrom: Provided, That his employer is
notified through a certification issued by the Department, (c) there is no other direct evidence available for the
within a period of thirty (30) days from the date when the proper prosecution of the offense committed:
Witness last reported for work: Provided, further, That in
the case of prolonged transfer or permanent relocation, (d) his testimony can be substantially corroborated on its
the employer shall have the option to remove the Witness material points;
from employment after securing clearance from the
Department upon the recommendation of the Department (e) he does not appear to be most guilty; and
of Labor and Employment.

(f) he has not at any time been convicted of any crime


Any Witness who failed to report for work because of involving moral turpitude.
witness duty shall be paid his equivalent salaries or wages
corresponding to the number of days of absence
occasioned by the Program. For purposes of this Act, any An accused discharged from an information or criminal complaint
fraction of a day shall constitute a full day salary or wage. by the court in order that he may be a State Witness pursuant to
This provision shall be applicable to both government Section 9 and 10 of Rule 119 of the Revised Rules of Court may
and private employees. upon his petition be admitted to the Program if he complies with
the other requirements of this Act. Nothing in this Act shall prevent
the discharge of an accused, so that he can be used as a State
(d) To be provided with reasonable travelling expenses Witness under Rule 119 of the Revised Rules of Court.
and subsistence allowance by the Program in such
amount as the Department may determine for his
attendance in the court, body or authority where his Section 11. Sworn Statement. - Before any person is admitted into
testimony is required, as well as conferences and the Program pursuant to the next preceding Section he shall execute
interviews with prosecutors or investigating officers. a sworn statement describing in detail the manner in which the
offense was committed and his participation therein. If after said
examination of said person, his sworn statement and other relevant
(e) To be provided with free medical treatment, facts, the Department is satisfied that the requirements of this Act
hospitalization and medicines for any injury or illness and its implementing rules are complied with, it may admit such
incurred or suffered by him because of witness duty in person into the Program and issue the corresponding certification.
any private or public hospital, clinic, or at any such
institution at the expense of the Program.
If his application for admission is denied, said sworn statement and
any other testimony given in support of said application shall not be
(f) If a Witness is killed, because of his participation in admissible in evidence, except for impeachment purposes.
the Program, his heirs shall be entitled to a burial benefit
of not less than Ten thousand pesos (P10,000.00) from
the Program exclusive of any other similar benefits he Section 12. Effect of Admission of a State Witness into the
may be entitled to under other existing laws. Program. - The certification of admission into the Program by the
Department shall be given full faith and credit by the provincial or
city prosecutor who is required not to include the Witness in the
(g) In case of death or permanent incapacity, his minor or criminal complaint or information and if included therein, to
dependent children shall be entitled to free education, petition the court for his discharge in order that he can utilized as a
from primary to college level in any state, or private State Witness. The Court shall order the discharge and exclusion of
school, college or university as may be determined by the the said accused from the information.
Department, as long as they shall have qualified thereto.

Admission into the Program shall entitle such State Witness to


Section 9. Speedy Hearing or Trial. - In any case where a Witness immunity from criminal prosecution for the offense or offenses in
admitted into the Program shall testify, the judicial or quasi-judicial which his testimony will be given or used and all the rights and
body, or investigating authority shall assure a speedy hearing or benefits provided under Section 8 hereof.
trial and shall endeavor to finish said proceeding within three (3)
months from the filing of the case.
Section 13. Failure or Refusal of the Witness to Testify. - Any
Witness registered in the Program who fails or refuses to testify or
to continue to testify without just cause when lawfully obliged to do
15 | E V I D E N C E S P E C I A L LAWS
so, shall be prosecuted for contempt. If he testifies falsely or (b) reporting to a law enforcement officer or judge the
evasively, he shall be liable to prosecution for perjury. If a State commission or possible commission of an offense, or a
Witness fails or refuses to testify, or testifies falsely or evasively, or violation of conditions or probation, parole, or release
violates any condition accompanying such immunity without just pending judicial proceedings;
cause, as determined in a hearing by the proper court, his immunity
shall be removed and he shall be subject to contempt or criminal (c) seeking the arrest of another person in connection
prosecution. Moreover, the enjoyment of all rights and benefits with the offense;
under this Act shall be deemed terminated.
(d) causing a criminal prosecution, or a proceeding for
The Witness may, however, purge himself of the contumacious acts the revocation of a parole or probation; or
by testifying at any appropriate stage of the proceedings.
(e) performing and enjoying the rights and benefits under
Section 14. Compelled Testimony. - Any Witness admitted into the this Act or attempts to do so, shall be fined not more than
Program pursuant to Sections 3 and 10 of this Act cannot refuse to Three thousand pesos (P3,000.00) or suffer imprisonment
testify or give evidence or produce books, documents, records or of not less than six (6) months but not more than one (1)
writings necessary for the prosecution of the offense or offenses for year, or both, and he shall also suffer the penalty of
which he has been admitted into the Program on the ground of the perpetual disqualification from holding public office in
constitutional right against self-incrimination but he shall enjoy case of a public officer.
immunity from criminal prosecution and cannot be subjected to any
penalty or forfeiture for any transaction, matter or thing concerning
his compelled testimony or books, documents, records and writings Section 18. Rules and Regulations. - The Department shall
produced. promulgate such rules and regulations as may be necessary to
implement the intent and purposes of this Act. Said rules and
regulations shall be published in two (2) newspapers of general
In case of refusal of said Witness to testify or give evidence or circulation.
produce books, documents, records, or writings, on the ground of
the right against self-incrimination, and the state prosecutor or
investigator believes that such evidence is absolutely necessary for Section 19. Repealing Clause. - All laws, decrees, executive
a successful prosecution of the offense or offenses charged or under issuances, rules and regulations inconsistent with this Act are
investigation, he, with the prior approval of the department, shall hereby repealed or modified accordingly.
file a petition with the appropriate court for the issuance of an order
requiring said Witness to testify, give evidence or produce the Section 20. Funding. - The amount of Ten million pesos
books, documents, records, and writings described, and the court (P10,000,000.00) is hereby authorized to be appropriated out of any
shall issue the proper order. funds in the National Treasury not otherwise appropriated to carry
into effect the purpose of this Act.
The court, upon motion of the state prosecutor or investigator, shall
order the arrest and detention of the Witness in any jail contiguous Expenses incurred in the implementation of the Program may be
to the place of trial or investigation until such time that the Witness recovered as part of the cost or indemnity imposed upon the
is willing to give such testimony or produce such documentary accused.
evidence.
Furthermore, other funding schemes or sources, subject to the
Section 15. Perjury or Contempt. - No Witness shall be exempt limitations of the law, shall be allowed in furtherance hereof.
from prosecution for perjury or contempt committed while giving
testimony or producing evidence under compulsion pursuant to this Section 21. Separability Clause. - The declaration of
Act. The penalty next higher in degree shall be imposed in case of unconstitutionality or invalidity of any provision of this Act shall
conviction for perjury. The procedure prescribed under Rule 71 of not affect the other provisions hereof.
the Rules of Court shall be followed in contempt proceedings but
the penalty to be imposed shall not be less than one (1) month but
not more than one (1) year imprisonment. Section 22. Effectivity. - This Act shall take effect after fifteen (15)
days following its publication in two (2) newspapers of general
circulation.
Section 16. Credibility of Witness. - In all criminal cases, the fact
of the entitlement of the Witness to the protection and benefits
provided for in this Act shall not be admissible in evidence to ADMINISTRATIVE CIRCULAR NO. 37 – 2020
diminish or affect his credibility.
2. The hearings through videoconferencing shall cover all PDLs
and may apply to all stages of trial of newly-filed and pending
Section 17. Penalty for Harassment of Witness. - Any person who criminal cases, including but not limited to, arraignment, pre-trial,
harasses a Witness and thereby hinders, delays, prevents or
bail hearings, trial proper, and promulgation of judgment.
dissuades a Witness from:
3. The courts shall ensure at all times that all the constitutional
(a) attending or testifying before any judicial or quasi- rights of the accused are protected and observed, including “[t]he
judicial body or investigating authority; rights of the accused to be present and defend in person at every
stage of the proceedings, to testify as a witness in his or her own
behalf, and to confront and cross-examine the witnesses against
16 | E V I D E N C E S P E C I A L LAWS
him or her at trial,” which the Court en banc, in its Resolution in
A.M. No. 19-05-05-SC, dated 25 June 2019, said “are deemed A.M. No. 03-1-09-SC
satisfied when such appearance and testimony are made remotely
through videoconferencing…” RE: PROPOSED RULE ON GUIDELINES TO BE
OBSERVED BY TRIAL COURT JUDGES AND CLERKS
4. Considering that the remote locations of the participants are OF COURT IN THE CONDUCT OF PRE-TRIAL AND
extensions of the court, the in-person appearances, testimonies and USE OF DEPOSITION-DISCOVERY MEASURES
experiences of the litigants and parties in courts shall always be
closely resembled in the remote appearances and testimonies of the I. PRE-TRIAL
litigants and parties in the videoconference proceedings. In the
same manner, the dignity and solemnity of in-court proceedings A. Civil Cases
shall at all times be mirrored in videoconference proceedings.
1. Within one day from receipt of the complaint:
6. It is clearly understood that these hearings in criminal cases
through videoconferencing are only for pilot testing, and shall 1.1 Summons shall be prepared and shall contain a reminder to
apply only during this public health emergency period. defendant to observe restraint in filing a motion to dismiss and
instead allege the grounds thereof as defenses in the Answer, in
conformity with IBP-OCA Memorandum on Policy Guidelines
dated March 12, 2002. A copy of the summons is hereto attached as
Annex "A;" and

1.2 The court shall issue an order requiring the parties to avail of
interrogatories to parties under Rule 25 and request for admission
by adverse party under Rule 26 or at their discretion make use of
dispositions under Rule 23 or other measures under Rules 27 and
28 within five days from the filing of the answer. 1 A copy of the
order shall be served upon the defendant together with the
summons and upon the plaintiff.

Within five (5) days from date of filing of the reply, 2 the plaintiff
must promptly move ex parte that the case be set for pre-trial
conference. 3 If the plaintiff fails to file said motion within the
given period, the Branch COC shall issue a notice of pre-trial.

17 | E V I D E N C E S P E C I A L LAWS

You might also like