You are on page 1of 29

The Welfare Of the People Shall Be The Supreme

Law

a repository of my notes from law school

Case Brief: Disini vs. Secretary of Justice


(Cybercrime Law)

JANUARY 3, 2020 ⁄ JEFF REY


PDF Version (https://jeffsarabusing.files.wordpress.com/2020/01/case-brief-disini-vs-secretary-of-
justice.pdf)

See full text of RA 10175 or the Cybercrime Prevention Act of 2012 in


https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
(https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/)

For academic purposes, see concurring and dissenting opinions of the other justices. 

The author encourages the reader to read the full text of the jurisprudence due to the significance and timeliness of
the topics discussed therein.

EN BANC

G.R. No. 203335, February 18, 2014 ]

JOSE JESUS M. DISINI, JR., et. al., PETITIONERS,

vs.

THE SECRETARY OF JUSTICE, THE SECRETARY OF THE DEPARTMENT OF THE INTERIOR


AND LOCAL GOVERNMENT, THE EXECUTIVE DIRECTOR OF THE INFORMATION AND
COMMUNICATIONS TECHNOLOGY OFFICE, THE CHIEF OF THE PHILIPPINE NATIONAL
POLICE AND THE DIRECTOR OF THE NATIONAL BUREAU OF INVESTIGATION,
RESPONDENTS.

Ponente:  ABAD, J.:


 

Facts:

These consolidated petitions seek to declare several provisions of Republic Act (R.A.) 10175, the
Cybercrime Prevention Act of 2012, unconstitutional and void.

The cybercrime law aims to regulate access to and use of the cyberspace. Using his laptop or computer, a
person can connect to the internet, a system that links him to other computers and enable him, among
other things, to:

1. Access virtual libraries and encyclopedias for all kinds of information that he needs for research,
study, amusement, upliftment, or pure curiosity;

2. Post billboard-like notices or messages, including pictures and videos, for the general public or for
special audiences like associates, classmates, or friends and read postings from them;

3. Advertise and promote goods or services and make purchases and payments;

4. Inquire and do business with institutional entities like government agencies, banks, stock exchanges,
trade houses, credit card companies, public utilities, hospitals, and schools; and

5. Communicate in writing or by voice with any person through his e-mail address or telephone.

This is cyberspace, a system that accommodates millions and billions of simultaneous and ongoing
individual accesses to and uses of the internet. The cyberspace is a boon to the need of the current
generation for greater information and facility of communication. But all is not well with the system
since it could not filter out a number of persons of ill will who would want to use cyberspace technology
for mischiefs and crimes. One of them can, for instance, avail himself of the system to unjustly ruin the
reputation of another or bully the latter by posting defamatory statements against him that people can
read.

And because linking with the internet opens up a user to communications from others, the ill-motivated
can use the cyberspace for committing theft by hacking into or surreptitiously accessing his bank
account or credit card or defrauding him through false representations. The wicked can use the
cyberspace, too, for illicit trafficking in sex or for exposing to pornography guileless children who have
access to the internet. For this reason, the government has a legitimate right to regulate the use of
cyberspace and contain and punish wrongdoings.

Notably, there are also those who would want, like vandals, to wreak or cause havoc to the computer
systems and networks of indispensable or highly useful institutions as well as to the laptop or computer
programs and memories of innocent individuals. They accomplish this by sending electronic viruses or
virtual dynamites that destroy those computer systems, networks, programs, and memories. The
government certainly has the duty and the right to prevent these tomfooleries from happening and
punish their perpetrators, hence the Cybercrime Prevention Act.

But petitioners claim that the means adopted by the cybercrime law for regulating undesirable
cyberspace activities violate certain of their constitutional rights. The government of course asserts that
the law merely seeks to reasonably put order into cyberspace activities, punish wrongdoings, and
prevent hurtful attacks on the system.
Issues:

Petitioners challenge the constitutionality of the following provisions of the cybercrime law that regard
certain acts as crimes and impose penalties for their commission as well as provisions that would enable
the government to track down and penalize violators. These provisions are:

1. Section 4(a)(1) on Illegal Access;


2. Section 4(a)(3) on Data Interference;
3. Section 4(a)(6) on Cyber-squatting;
4. Section 4(b)(3) on Identity Theft;
5. Section 4(c)(1) on Cybersex;
6. Section 4(c)(2) on Child Pornography;
7. Section 4(c)(3) on Unsolicited Commercial Communications;
8. Section 4(c)(4) on Libel;
9. Section 5 on Aiding or Abetting and Attempt in the Commission of Cybercrimes;
10. Section 6 on the Penalty of One Degree Higher;
11. Section 7 on the Prosecution under both the Revised Penal Code (RPC) and R.A. 10175;
12. Section 8 on Penalties;
13. Section 12 on Real-Time Collection of Traffic Data;
14. Section 13 on Preservation of Computer Data;
15. Section 14 on Disclosure of Computer Data;
16. Section 15 on Search, Seizure and Examination of Computer Data;
17. Section 17 on Destruction of Computer Data;
18. Section 19 on Restricting or Blocking Access to Computer Data;
19. Section 20 on Obstruction of Justice;
20. Section 24 on Cybercrime Investigation and Coordinating Center (CICC); and
21. Section 26(a) on CICC’s Powers and Functions.

Some petitioners also raise the constitutionality of related Articles 353, 354, 361, and 362 of the RPC on
the crime of libel.

Held: 

Section Legal Provision Petitioner’s SC’s Ruling


Contention
Sec. 4(a)(1) – Section 4. Cybercrime Fails to meet the strict Constitutional.
Illegal Access Offenses. – The following scrutiny standard
acts constitute the offense of required of laws that The Court finds nothing in
cybercrime punishable interfere with the Section 4(a)(1) that calls
under this Act: fundamental rights for the application of the
strict scrutiny standard
(a) Offenses against the since no fundamental
confidentiality, integrity freedom, like speech, is
and availability of involved in punishing
computer data and systems: what is essentially a
condemnable act –
(1) Illegal Access. – The accessing the computer
access to the whole or any system of another without
part of a computer system right. It is a universally
without right. condemned conduct.

   

Sidenote:  Ethical hackers


are not covered by the
provision, and thus, are
not punishable.

Sec. 4(a)(3) – (3) Data Interference. – The Suffers from Constitutional.


Data intentional or reckless overbreadth as it
Interference alteration, damaging, intrudes into the area But Section 4(a)(3) does
deletion or deterioration of of protected speech not encroach on these
computer data, electronic and expression freedoms at all. It simply
document, or electronic punishes what essentially
data message, without is a form of vandalism, the
right, including the act of willfully destroying
introduction or without right the things
transmission of viruses. that belong to others, in
this case their computer
data, electronic document,
or electronic data
message. Such act has no
connection to guaranteed
freedoms. There is no
freedom to destroy other
people’s computer
systems and private
documents.
Sec. 4(a)(6) – Section 4(a)(6) provides: Violates equal Constitutional.
Cybersquatting protection clause in
Section 4. Cybercrime that, not being The law is reasonable in
Offenses. – The following narrowly tailored, it penalizing <the person>
acts constitute the offense of will cause a user using for acquiring the domain
cybercrime punishable his real name to suffer name in bad faith to
under this Act: the same fate as those profit, mislead, destroy
who use aliases or reputation, or deprive
(a) Offenses against the take the name of others who are not ill-
confidentiality, integrity another in satire, motivated of the rightful
and availability of opportunity of registering
parody, or any other
computer data and systems: literary device. the same. The challenge to
the constitutionality of
xxx Section 4(a)(6) on ground
(6) Cyber-squatting. – The of denial of equal
protection is baseless.
acquisition of domain name
over the internet in bad
faith to profit, mislead,
destroy the reputation, and
deprive others from
registering the same, if such
a domain name is:

(i) Similar, identical, or


confusingly similar to an
existing trademark
registered with the
appropriate government
agency at the time of the
domain name registration;

(ii) Identical or in any way


similar with the name of a
person other than the
registrant, in case of a
personal name; and

(iii) Acquired without right


or with intellectual
property interests in it.

Sec.4(b)(3) – Section 4(b)(3) provides: Violates the Constitutional.


Computer- constitutional rights to
related Identity Section 4. Cybercrime due process and to The law punishes those
Theft Offenses. – The following privacy and who acquire or use such
acts constitute the offense of correspondence, and identifying information
cybercrime punishable transgresses the without right, implicitly to
under this Act: freedom of the press. cause damage. Petitioners
simply fail to show how
xxxx government effort to curb
computer-related identity
b) Computer-related theft violates the right to
Offenses: privacy and
correspondence as well as
xxxx the right to due process of
(3) Computer-related law.
Identity Theft. – The Also, the charge of
intentional acquisition, use, invalidity of this section
misuse, transfer,
based on the overbreadth
possession, alteration, or doctrine will not hold
deletion of identifying water since the specific
information belonging to
conducts proscribed do
another, whether natural or not intrude into
juridical, without guaranteed freedoms like
right: Provided: that if no
speech. Clearly, what this
damage has yet been section regulates are
caused, the penalty specific actions: the
imposable shall be one (1)
acquisition, use, misuse or
degree lower. deletion of personal
identifying data of
another. There is no
fundamental right to
acquire another’s
personal data.

Further, petitioners fear


that Section 4(b)(3)
violates the freedom of the
press in that journalists
would be hindered from
accessing the unrestricted
user account of a person
in the news to secure
information about him
that could be published.
But this is not the essence
of identity theft that the
law seeks to prohibit and
punish. Evidently, the
theft of identity
information must be
intended for an
illegitimate purpose.
Moreover, acquiring and
disseminating information
made public by the user
himself cannot be
regarded as a form of
theft.

Sec.4(c)(1) – (c) Content-related Violates freedom of Constitutional.


Cybersex Offenses: expression insofar as
between husband and The understanding of
(1) Cybersex.– The willful wife or consenting those who drew up the
engagement, maintenance, adults. cybercrime law is that the
control, or operation, element of “engaging in a
directly or indirectly, of any business” is necessary to
lascivious exhibition of constitute the illegal
sexual organs or sexual cybersex. The Act actually
activity, with the aid of a seeks to punish cyber
computer system, for favor prostitution, white slave
or consideration. trade, and pornography
for favor and
consideration. This
includes interactive
prostitution and
pornography, i.e., by
webcam.
Sec 4(c)(2) – (2) Child Pornography. — Petitioners point out Constitutional.
Child The unlawful or prohibited that the provision of
Pornography acts defined and punishable ACPA that makes it  
by Republic Act No. 9775 or unlawful for any
It seems that the above
the Anti-Child person to “produce,
Pornography Act of 2009, direct, manufacture or merely expands the scope
of the Anti-Child
committed through a create any form of
Pornography Act of 2009.
computer system: Provided, child
That the penalty to be pornography” clearly
 
imposed shall be (1) one relates to the
degree higher than that prosecution of persons The question of aiding
provided for in Republic who aid and abet the and abetting the offense
Act No. 9775. core offenses that by simply commenting on
ACPA seeks to it will be discussed
punish. Petitioners are elsewhere below. For now
wary that a person the Court must hold that
who merely doodles the constitutionality of
on paper and Section 4(c)(2) is not
imagines a sexual successfully challenged.
abuse of a 16-year-old
is not criminally liable
for producing child
pornography but one
who formulates the
idea on his laptop
would be. Further, if
the author bounces off
his ideas on Twitter,
anyone who replies to
the tweet could be
considered aiding and
abetting a cybercrime.
Sec.4(c)(3) – (3) Unsolicited Commercial   Unconstitutional.
Unsolicited Communications. – The
Commercial transmission of commercial  
Communications electronic communication
But, firstly, the
with the use of computer
government presents no
system which seeks to
advertise, sell, or offer for basis for holding that
unsolicited electronic ads
sale products and services
reduce the “efficiency of
are prohibited unless:
computers.” Secondly,
(i) There is prior affirmative people, before the arrival
consent from the recipient; of the age of computers,
or have already been
receiving such unsolicited
ads by mail. These have
never been outlawed as
(ii) The primary intent of nuisance since people
the communication is for might have interest in
service and/or such ads. What matters is
administrative that the recipient has the
announcements from the option of not opening or
sender to its existing users, reading these mail ads.
subscribers or customers; or That is true with spams.
Their recipients always
(iii) The following have the option to delete
conditions are present: or not to read them.

  To prohibit the
transmission of
(aa)   The commercial unsolicited ads would
electronic communication
deny a person the right to
contains a simple, valid,
read his emails, even
and reliable way for the unsolicited commercial
recipient to reject receipt of
ads addressed to him.
further commercial
Commercial speech is a
electronic messages (opt- separate category of
out) from the same source;
speech which is not
accorded the same level of
(bb)   The commercial
protection as that given to
electronic communication
does not purposely disguise other constitutionally
guaranteed forms of
the source of the electronic
expression but is
message; and
nonetheless entitled to
(cc)   The commercial protection. The State
electronic communication cannot rob him of this
does not purposely include right without violating the
misleading information in constitutionally
any part of the message in guaranteed freedom of
order to induce the expression. Unsolicited
recipients to read the advertisements are
message. legitimate forms of
expression.
 

The above penalizes the


transmission of unsolicited
commercial communications,
also known as “spam.”

Art. 353, 354, Art. 353 – Definition of The libel provisions of Constitutional.
and 355 of Libel the cybercrime law
Revised Penal carry with them the  
Code Art. 354 – Requirement for requirement of
Publicity See SC’s discussion on the
“presumed malice”
  even when the latest Fermin case.
Sec.4(c)(4) of Art. 355 – Libel means by jurisprudence already  
Cybercrime Law writings or similar means replaces it with the
– Libel higher standard of As to the ICCPR, General
Note:  RPC Libel requires “actual malice” as a Comment 34 does not say
existence of malice.  Where basis for conviction.  that the truth of the
the offended party is a Petitioners argue that defamatory statement
public individual, actual inferring “presumed should constitute an all-
malice is required to be malice” from the encompassing defense. As
proven.  If the offended accused’s defamatory it happens, Article 361
party is a private statement by virtue of recognizes truth as a
individual, malice is Article 354 of the defense but under the
presumed. penal code infringes condition that the accused
on his constitutionally has been prompted in
Sec.4(c)(4) Libel. — The making the statement by
guaranteed freedom
unlawful or prohibited acts of expression. good motives and for
of libel as defined in Article justifiable ends.  Besides,
355 of the Revised Penal   the UNHRC did not
Code, as amended, actually enjoin the
committed through a Petitioners would go Philippines, as petitioners
computer system or any further. They contend urge, to decriminalize
other similar means which that the laws on libel libel. It simply suggested
may be devised in the should be stricken that defamation laws be
future. down as crafted with care to ensure
unconstitutional for that they do not stifle
  otherwise good freedom of expression.
jurisprudence
 
requiring “actual  
malice” could easily
  The Court agrees with the
be overturned as the
Court has done in Solicitor General that libel
Fermin v. People even is not a constitutionally
where the offended protected speech and that
parties happened to be the government has an
public figures. obligation to protect
private individuals from
  defamation.

Also, petitioners  
contend that the laws
violate the The internet is
International characterized as
Covenant of Civil and encouraging a
Political Rights to the freewheeling, anything-
effect that penal goes writing style.  In a
defamation laws sense, they are a world
should include apart in terms of
defense of truth. quickness of the reader’s
reaction to defamatory
statements posted in
cyberspace, facilitated by
one-click reply options
offered by the networking
site as well as by the
speed with which such
reactions are disseminated
down the line to other
internet users. Whether
these reactions to
defamatory statement
posted on the internet
constitute aiding and
abetting libel, acts that
Section 5 of the
cybercrime law punishes,
is another matter that the
Court will deal with next
in relation to Section 5 of
the law.

Sec. 5 – Other Sec. 5. Other Offenses. — The Petitioners assail the Unconstitutional as to
Offenses following acts shall also constitutionality of Aiding or Abetting in
constitute an offense: Section 5 that renders Sec.4c4 (Libel), 4c3
  criminally liable any (Unsolicited Commercial
(a) Aiding or Abetting in person who willfully Communications), and
(a) Aiding or the Commission of abets or aids in the 4c2 (Child Pornography).
Abetting in the Cybercrime. – Any person commission or
Commission of who willfully abets or aids attempts to commit  
Cybercrime in the commission of any of any of the offenses
the offenses enumerated in Constitutional as to
enumerated as
  this Act shall be held liable. Aiding or Abetting in
cybercrimes. It suffers
Sec.4a1 (Illegal Access),
(b) Attempt in from overbreadth,
(b) Attempt in the 4a2 (Illegal Interception),
the Commission creating a chilling and
Commission of Cybercrime. deterrent effect on 4a3 (Data Interference),
of Cybercrime
— Any person who 4a4 (System Interference),
protected expression.
willfully attempts to 4a5 (Misuse of Devices,
commit any of the offenses 4a6 (Cyber-squatting),
enumerated in this Act shall 4b1 (Forgery), 4b2
be held liable. (Fraud), 4b3 (Identity
Theft), and 4c1
  (Cybersex).

Constitutional as to
Attempting to commit
any of these offenses.

 
The question is: are online
postings such as “Liking”
an openly defamatory
statement, “Commenting”
on it, or “Sharing” it with
others, to be regarded as
“aiding or abetting?”  –
NO.

The old parameters for


enforcing the traditional
form of libel would be a
square peg in a round
hole when applied to
cyberspace libel. Unless
the legislature crafts a
cyber libel law that takes
into account its unique
circumstances and
culture, such law will tend
to create a chilling effect
on the millions that use
this new medium of
communication in
violation of their
constitutionally-
guaranteed right to
freedom of expression.
Vague and overbroad.  The
severity of criminal
sanctions may well cause
speakers to remain silent
rather than communicate
even arguably unlawful
words, ideas, and images.

The terms “aiding or


abetting” constitute broad
sweep that generates
chilling effect on those
who express themselves
through cyberspace posts,
comments, and other
messages. Hence, Section
5 of the cybercrime law
that punishes “aiding or
abetting” libel on the
cyberspace is a nullity.

Section 5 with respect to


Section 4(c)(4) Libel is
unconstitutional. Its
vagueness raises
apprehension on the part
of internet users because
of its obvious chilling
effect on the freedom of
expression, especially
since the crime of aiding
or abetting ensnares all
the actors in the
cyberspace front in a
fuzzy way.  In the
absence of legislation
tracing the interaction of
netizens and their level
of responsibility such as
in other countries,
Section 5, in relation to
Section 4(c)(4) on Libel,
Section 4(c)(3) on
Unsolicited Commercial
Communications, and
Section 4(c)(2) on Child
Pornography, cannot
stand scrutiny.

But the crime of aiding or


abetting the commission
of cybercrimes under
Section 5 should be
permitted to apply to
Section 4(a)(1) on Illegal
Access, Section 4(a)(2) on
Illegal Interception,
Section 4(a)(3) on Data
Interference, Section 4(a)
(4) on System
Interference, Section 4(a)
(5) on Misuse of Devices,
Section 4(a)(6) on Cyber-
squatting, Section 4(b)(1)
on Computer-related
Forgery, Section 4(b)(2)
on Computer-related
Fraud, Section 4(b)(3) on
Computer-related
Identity Theft, and
Section 4(c)(1) on
Cybersex. None of these
offenses borders on the
exercise of the freedom of
expression.

The crime of willfully


attempting to commit any
of these offenses is for the
same reason not
objectionable.  A hacker
may for instance have
done all that is necessary
to illegally access another
party’s computer system
but the security employed
by the system’s lawful
owner could frustrate his
effort. Another hacker
may have gained access to
usernames and passwords
of others but fail to use
these because the system
supervisor is alerted. If
Section 5 that punishes
any person who willfully
attempts to commit this
specific offense is not
upheld, the owner of the
username and password
could not file a complaint
against him for attempted
hacking. But this is not
right. The hacker should
not be freed from liability
simply because of the
vigilance of a lawful
owner or his supervisor.

 
Petitioners of course claim
that Section 5 lacks
positive limits and could
cover the innocent. While
this may be true with
respect to cybercrimes
that tend to sneak past the
area of free expression,
any attempt to commit the
other acts specified in
Section 4(a)(1), Section
4(a)(2), Section 4(a)(3),
Section 4(a)(4), Section
4(a)(5), Section 4(a)(6),
Section 4(b)(1), Section
4(b)(2), Section 4(b)(3),
and Section 4(c)(1) as well
as the actors aiding and
abetting the commission
of such acts can be
identified with some
reasonable certainty
through adroit tracking of
their works. Absent
concrete proof of the
same, the innocent will of
course be spared.

 
Sec.6 Sec. 6. All crimes defined   Constitutional.
and penalized by the
Revised Penal Code, as  
amended, and special laws,
Section 6 merely makes
if committed by, through
commission of existing
and with the use of
crimes through the
information and
internet a qualifying
communications
circumstance. As the
technologies shall be
Solicitor General points
covered by the relevant
out, there exists a
provisions of this
substantial distinction
Act: Provided, That the
between crimes
penalty to be imposed shall
committed through the
be one (1) degree higher
use of information and
than that provided for by
communications
the Revised Penal Code, as
technology and similar
amended, and special laws,
crimes committed using
as the case may be.
other means. In using the
technology in question,
the offender often evades
identification and is able
to reach far more victims
or cause greater harm. The
distinction, therefore,
creates a basis for higher
penalties for cybercrimes.

Sec.7 Sec. 7. Liability under Other Violation of the right Unconstitutional as to


Laws. — A prosecution against double online libel and online
under this Act shall be jeopardy child pornography.
without prejudice to any
liability for violation of any For the others, to be
provision of the Revised determined by courts.
Penal Code, as amended, or
 
special laws.
When two different laws
define two crimes, prior
jeopardy as to one does
not bar prosecution of the
other although both
offenses arise from the
same fact, if each crime
involves some important
act which is not an
essential element of the
other.  With the exception
of the crimes of online
libel and online child
pornography, the Court
would rather leave the
determination of the
correct application of
Section 7 to actual cases.

Online libel is different.


There should be no
question that if the
published material on
print, said to be libelous,
is again posted online or
vice versa, that identical
material cannot be the
subject of two separate
libels. The two offenses,
one a violation of Article
353 of the Revised Penal
Code and the other a
violation of Section 4(c)(4)
of R.A. 10175 involve
essentially the same
elements and are in fact
one and the same offense.
Indeed, the OSG itself
claims that online libel
under Section 4(c)(4) is not
a new crime but is one
already punished under
Article 353. Section 4(c)(4)
merely establishes the
computer system as
another means of
publication. Charging the
offender under both laws
would be a blatant
violation of the
proscription against
double jeopardy.

The same is true with


child pornography
committed online. Section
4(c)(2) merely expands the
ACPA’s scope so as to
include identical activities
in cyberspace. As
previously discussed,
ACPA’s definition of child
pornography in fact
already covers the use of
“electronic, mechanical,
digital, optical, magnetic
or any other means.”
Thus, charging the
offender under both
Section 4(c)(2) and ACPA
would likewise be
tantamount to a violation
of the constitutional
prohibition against double
jeopardy.

Sec.8 Section 8 provides for the Penalties are too Constitutional.


penalties for the following severe.
crimes: Sections 4(a) on  
Offenses Against the
The matter of fixing
Confidentiality, Integrity
penalties for the
and Availability of
commission of crimes is as
Computer Data and
a rule a legislative
Systems; 4(b) on Computer-
prerogative. Here the
related Offenses; 4(a)(5) on
legislature prescribed a
Misuse of Devices; when
measure of severe
the crime punishable under
penalties for what it
4(a) is committed against
regards as deleterious
critical infrastructure; 4(c)
cybercrimes. They appear
(1) on Cybersex; 4(c)(2) on
proportionate to the evil
Child Pornography; 4(c)(3)
sought to be punished.
on Unsolicited Commercial
xxx Judges and
Communications; and
magistrates can only
Section 5 on Aiding or
interpret and apply them
Abetting, and Attempt in
and have no authority to
the Commission of
modify or revise their
Cybercrime.
range as determined by
the legislative department.
The courts should not
encroach on this
prerogative of the
lawmaking body.

Sec.12 Sec. 12. Real-Time Petitioners assail the Unconstitutional.


Collection of Traffic Data. grant to law
— Law enforcement enforcement agencies  
authorities, with due cause, of the power to collect
shall be authorized to or record traffic data
collect or record by in real time as tending See full text for the
technical or electronic to curtail civil liberties discussion regarding the
means traffic data in real- or provide right to privacy, touching
time associated with opportunities for the topics of informational
specified communications official abuse. They privacy and the
transmitted by means of a claim that data technicalities of traffic
computer system. showing where digital data and computer data
messages come from, transferred through the
Traffic data refer only to the what kind they are, internet.
communication’s origin, and where they are
destination, route, time, destined need not be  
date, size, duration, or type incriminating to their
of underlying service, but In much the same way,
senders or recipients
not content, nor identities. ICT users must know
before they are to be
that they cannot
protected. Petitioners
All other data to be communicate or exchange
invoke the right of
collected or seized or data with one another
every individual to
disclosed will require a over cyberspace except
privacy and to be
court warrant. through some service
protected from
providers to whom they
Service providers are government snooping
must submit certain
into the messages or
required to cooperate and traffic data that are
information that they
assist law enforcement needed for a successful
authorities in the collection send to one another.
cyberspace
or recording of the above- communication. The
stated information. conveyance of this data
takes them out of the
 
private sphere, making
the expectation to privacy
The court warrant required
in regard to them an
under this section shall only
expectation that society is
be issued or granted upon
not prepared to recognize
written application and the
as reasonable.
examination under oath or
affirmation of the applicant
 
and the witnesses he may
produce and the showing: The Court, however,
(1) that there are reasonable agrees with Justices
grounds to believe that any Carpio and Brion that
of the crimes enumerated when seemingly random
hereinabove has been bits of traffic data are
committed, or is being gathered in bulk, pooled
committed, or is about to be together, and analyzed,
committed; (2) that there they reveal patterns of
are reasonable grounds to activities which can then
believe that evidence that be used to create profiles
will be obtained is essential of the persons under
to the conviction of any surveillance. With
person for, or to the enough traffic data,
solution of, or to the
prevention of, any such analysts may be able to
crimes; and (3) that there determine a person’s
are no other means readily close associations,
available for obtaining such religious views, political
evidence. affiliations, even sexual
preferences. Such
information is likely
beyond what the public
may expect to be
disclosed, and clearly
falls within matters
protected by the right to
privacy.

However, SC struck down


the provision as
unconstitutional because
of the vagueness of the
provision.  What
constitutes “due cause”? 
The authority that Section
12 gives law enforcement
agencies is too sweeping
and lacks restraint. While
it says that traffic data
collection should not
disclose identities or
content data, such
restraint is but an illusion.
Admittedly, nothing can
prevent law enforcement
agencies holding these
data in their hands from
looking into the identity
of their sender or receiver
and what the data
contains. This will
unnecessarily expose the
citizenry to leaked
information or, worse, to
extortion from certain bad
elements in these
agencies.
Sec.13 Sec. 13. Preservation of Section 13 constitutes Constitutional.
Computer Data. — The an undue deprivation
integrity of traffic data and of the right to  
subscriber information property. They liken
relating to communication the data preservation The data that service
providers preserve on
services provided by a order that law
orders of law enforcement
service provider shall be enforcement
preserved for a minimum authorities are to issue authorities are not made
inaccessible to users by
period of six (6) months as a form of
reason of the issuance of
from the date of the garnishment of
transaction. Content data personal property in such orders. The process
of preserving data will not
shall be similarly preserved civil forfeiture
unduly hamper the
for six (6) months from the proceedings. Such
date of receipt of the order order prevents normal transmission or
use of the same.
from law enforcement internet users from
authorities requiring its accessing and
preservation. disposing of traffic
data that essentially
Law enforcement belong to them.
authorities may order a
one-time extension for
another six (6) months:
Provided, That once
computer data preserved,
transmitted or stored by a
service provider is used as
evidence in a case, the mere
furnishing to such service
provider of the transmittal
document to the Office of
the Prosecutor shall be
deemed a notification to
preserve the computer data
until the termination of the
case.

The service provider


ordered to preserve
computer data shall keep
confidential the order and
its compliance.

 
Sec.14 Sec. 14. Disclosure of The process Constitutional.
Computer Data. — Law envisioned in Section
enforcement authorities, 14 is being likened to  
upon securing a court the issuance of a
it is well-settled that the
warrant, shall issue an subpoena. Petitioners’
power to issue subpoenas
order requiring any person objection is that the
is not exclusively a
or service provider to issuance of subpoenas
judicial function.
disclose or submit is a judicial function.
Executive agencies have
subscriber’s information,
the power to issue
traffic data or relevant data
subpoena as an adjunct of
in his/its possession or
their investigatory
control within seventy-two
powers.
(72) hours from receipt of
the order in relation to a
valid complaint officially
docketed and assigned for
investigation and the
disclosure is necessary and
relevant for the purpose of
investigation.

Sec.15 Sec. 15. Search, Seizure and Petitioners challenge Constitutional.


Examination of Computer Section 15 on the
Data. — Where a search and assumption that it will  
seizure warrant is properly supplant established
On its face, however,
issued, the law enforcement search and seizure
authorities shall likewise procedures. Section 15 merely
enumerates the duties of
have the following powers
law enforcement
and duties.
authorities that would
Within the time period ensure the proper
specified in the warrant, to collection, preservation,
conduct interception, as and use of computer
defined in this Act, and: system or data that have
been seized by virtue of a
(a) To secure a computer court warrant. The
system or a computer data exercise of these duties do
storage medium; not pose any threat on the
rights of the person from
(b) To make and retain a whom they were taken.
copy of those computer Section 15 does not appear
data secured; to supersede existing
search and seizure rules
(c) To maintain the integrity
but merely supplements
of the relevant stored
them.
computer data;
(d) To conduct forensic
analysis or examination of
the computer data storage
medium; and

(e) To render inaccessible or


remove those computer
data in the accessed
computer or computer and
communications network.
Pursuant thereof, the law
enforcement authorities
may order any person who
has knowledge about the
functioning of the computer
system and the measures to
protect and preserve the
computer data therein to
provide, as is reasonable,
the necessary information,
to enable the undertaking
of the search, seizure and
examination.

Law enforcement
authorities may request for
an extension of time to
complete the examination
of the computer data
storage medium and to
make a return thereon but
in no case for a period
longer than thirty (30) days
from date of approval by
the court.

 
Sec.17 Sec. 17. Destruction of Petitioners claim that Constitutional.
Computer Data. — Upon such destruction of
expiration of the periods as computer data subject  
provided in Sections 13 and of previous
15, service providers and preservation or But, as already stated, it is
unclear that the user has a
law enforcement examination violates
demandable right to
authorities, as the case may the user’s right against
be, shall immediately and deprivation of require the service
provider to have that copy
completely destroy the property without due
of the data saved
computer data subject of a process of law.
preservation and indefinitely for him in its
storage system. If he
examination.
wanted them preserved,
he should have saved
them in his computer
when he generated the
data or received it. He
could also request the
service provider for a
copy before it is deleted.

Sec.19 Sec. 19. Restricting or Petitioners contest Unconstitutional.


Blocking Access to Computer Section 19 in that it
Data.— When a computer stifles freedom of  
data is prima facie found to expression and
Violative of the
be in violation of the violates the right
provisions of this Act, the against unreasonable constitutional guarantees
to freedom of expression
DOJ shall issue an order to searches and seizures.
and against unreasonable
restrict or block access to
such computer data. searches and seizures.

Computer data may


constitute personal
property, and thus, are
protected from
unreasonable searches
and seizures whether
while stored in their
personal computers or in
the service provider’s
systems.

The content of the


computer data can also
constitute speech. In such
a case, Section 19 operates
as a restriction on the
freedom of expression
over cyberspace. Certainly
not all forms of speech are
protected. Legislature
may, within constitutional
bounds, declare certain
kinds of expression as
illegal. But for an
executive officer to seize
content alleged to be
unprotected without any
judicial warrant, it is not
enough for him to be of
the opinion that such
content violates some law,
for to do so would make
him judge, jury, and
executioner all rolled into
one.

Not only does Section 19


preclude any judicial
intervention, but it also
disregards jurisprudential
guidelines established to
determine the validity of
restrictions on speech. 
Section 19, however,
merely requires that the
data to be blocked be
found prima facie in
violation of any provision
of the cybercrime law.
Taking Section 6 into
consideration, this can
actually be made to apply
in relation to any penal
provision. It does not take
into consideration any of
the dangerous tendency
test, balancing of interest
test, and clear and present
danger test.
Sec.20 Sec. 20. Noncompliance. — Petitioners challenge Constitutional.
Failure to comply with the Section 20, alleging
provisions of Chapter IV that it is a bill of  
hereof specifically the attainder. The
But since the non-
orders from law argument is that the
compliance would be
enforcement authorities mere failure to comply
punished as a violation of
shall be punished as a constitutes a
Presidential Decree (P.D.)
violation of Presidential legislative finding of
1829, Section 20
Decree No. 1829 with guilt, without regard
necessarily incorporates
imprisonment of prision to situations where
elements of the offense
correctional in its maximum non-compliance
which are defined therein.
period or a fine of One would be reasonable
xxx Thus, the act of non-
hundred thousand pesos or valid.
compliance, for it to be
(Php100,000.00) or both, for
punishable, must still be
each and every
done “knowingly or
noncompliance with an
willfully.” There must still
order issued by law
be a judicial
enforcement authorities.
determination of guilt,
during which, as the
Solicitor General assumes,
defense and justifications
for non-compliance may
be raised. Thus, Section 20
is valid insofar as it
applies to the provisions
of Chapter IV which are
not struck down by the
Court.
Sec.24 and 26a Sec. 24. Cybercrime Petitioners mainly Constitutional.
Investigation and contend that Congress
Coordinating Center.– There invalidly delegated its  
is hereby created, within power when it gave
It passes the completeness
thirty (30) days from the the Cybercrime
test and sufficient
effectivity of this Act, an Investigation and
standard test.
inter-agency body to be Coordinating Center
known as the Cybercrime (CICC) the power to
Investigation and formulate a national
Coordinating Center cybersecurity plan
(CICC), under the without any sufficient
administrative supervision standards or
of the Office of the parameters for it to
President, for policy follow.
coordination among
concerned agencies and for
the formulation and
enforcement of the national
cybersecurity plan.

Sec. 26. Powers and


Functions.– The CICC shall
have the following powers
and functions:

(a) To formulate a national


cybersecurity plan and
extend immediate
assistance of real time
commission of cybercrime
offenses through a
computer emergency
response team (CERT); x x
x.

Hence,

VOID for being UNCONSTITUTIONAL:

1. Section 4(c)(3) of Republic Act 10175 that penalizes posting of unsolicited commercial
communications;
2. Section 12 that authorizes the collection or recording of traffic data in real-time; and
3. Section 19 of the same Act that authorizes the Department of Justice to restrict or block access to
suspected Computer Data.

VALID and CONSTITUTIONAL:

1. Section 4(a)(1) that penalizes accessing a computer system without right;


2. Section 4(a)(3) that penalizes data interference, including transmission of viruses;
3. Section 4(a)(6) that penalizes cyber-squatting or acquiring domain name over the internet in bad faith
to the prejudice of others;
4. Section 4(b)(3) that penalizes identity theft or the use or misuse of identifying information belonging
to another;
5. Section 4(c)(1) that penalizes cybersex or the lascivious exhibition of sexual organs or sexual activity
for favor or consideration;
6. Section 4(c)(2) that penalizes the production of child pornography;
7. Section 6 that imposes penalties one degree higher when crimes defined under the Revised Penal
Code are committed with the use of information and communications technologies;
8. Section 8 that prescribes the penalties for cybercrimes;
9. Section 13 that permits law enforcement authorities to require service providers to preserve traffic
data and subscriber information as well as specified content data for six months;
10. Section 14 that authorizes the disclosure of computer data under a court-issued warrant;
11. Section 15 that authorizes the search, seizure, and examination of computer data under a court-
issued warrant;
12. Section 17 that authorizes the destruction of previously preserved computer data after the expiration
of the prescribed holding periods;
13. Section 20 that penalizes obstruction of justice in relation to cybercrime investigations;
14. Section 24 that establishes a Cybercrime Investigation and Coordinating Center (CICC);
15. Section 26(a) that defines the CICC’s Powers and Functions; and
16. Articles 353, 354, 361, and 362 of the Revised Penal Code that penalizes libel.

Further, the Court DECLARES:

1. Section 4(c)(4) that penalizes online libel as VALID and CONSTITUTIONALwith respect to the
original author of the post; but VOID and UNCONSTITUTIONAL with respect to others who simply
receive the post and react to it; and

2. Section 5 that penalizes aiding or abetting and attempt in the commission of cybercrimes
as VALID and CONSTITUTIONAL only in relation to Section 4(a)(1) on Illegal Access, Section 4(a)(2)
on Illegal Interception, Section 4(a)(3) on Data Interference, Section 4(a)(4) on System Interference,
Section 4(a)(5) on Misuse of Devices, Section 4(a)(6) on Cyber-squatting, Section 4(b)(1) on Computer-
related Forgery, Section 4(b)(2) on Computer-related Fraud, Section 4(b)(3) on Computer-related Identity
Theft, and Section 4(c)(1) on Cybersex; but VOID and UNCONSTITUTIONAL with respect to Sections
4(c)(2) on Child Pornography, 4(c)(3) on Unsolicited Commercial Communications, and 4(c)(4) on online
Libel.

Lastly, the Court RESOLVES to LEAVE THE DETERMINATION of the correct application of Section 7


that authorizes prosecution of the offender under both the Revised Penal Code and Republic Act 10175
to actual cases, WITH THE EXCEPTION of the crimes of:

1. Online libel as to which, charging the offender under both Section 4(c)(4) of Republic Act 10175 and
Article 353 of the Revised Penal Code constitutes a violation of the proscription against double
jeopardy; as well as
2. Child pornography committed online as to which, charging the offender under both Section 4(c)(2) of
Republic Act 10175 and Republic Act 9775 or the Anti-Child Pornography Act of 2009 also constitutes
a violation of the same proscription,

and, in respect to these, is VOID and UNCONSTITUTIONAL.


SO ORDERED.

Leonardo-De Castro, Peralta, Bersamin, Del Castillo, Villarama, Jr., Perez, and Reyes, JJ., concur.

Sereno, C.J., Carpio, and Leonen, JJ., see concurring and dissenting opinion.

Velasco, J., no part due to prior case.

Brion, J., see separate concurring opinion.

Mendoza, J., join Justice Brion in all his positions.

Perlas-Bernabe, J., no part.

Categories: Case Digests, Criminal Law, Lectures and Notes, Political Law Tags: 203335, aiding or
abetting, anti-child pornography act, bill of attainder, child pornography, cicc, comment,
communications, computer data, constitutionality, cyber-squatting, cybercrime, cybercrime investigation
and coordinating center, cybercrime law, cybercrime prevention act of 2012, cybersex, cyberspace, data,
data interference, defamation, department of interior and local government, dilg, disclosure, disini,
double jeopardy, due cause, equal protection clause, ethical hackers, facebook, fundamental freedom,
iccpr, identity theft, illegal access, information and communications technology office, informational
privacy, internet, legal technology, legtech, libel, like, national bureau of investigation, obstruction of
justice, overbreadth, packets, personal data, philippine national police, preservation of computer data, ra
10175, real-time collection of traffic data, search and seizure, secretary of justice, share, soj, spam, speech,
strict scrutiny, subpoena, technology, traffic data, twitter, unhrc, unsolicited commercial
communications, warrant, wordpress

CREATE A FREE WEBSITE OR BLOG AT WORDPRESS.COM.

You might also like