Professional Documents
Culture Documents
Be it enacted by the Senate and House of Representatives of “(b) The term asset distribution plan refers to the
the Philippines in Congress assembled: plan of distribution of the assets of a closed bank
to its creditors, based on its estimated realizable
SECTION 1. Section 1 of Republic Act No. 3591, as value as of a certain cut-off date, prepared in
amended, is hereby amended to read as follows: accordance with the Rules on Concurrence and
Preference of Credits under the Civil Code or other
“THE CREATION OF THE PHILIPPINE DEPOSIT laws.
INSURANCE CORPORATION
“An asset distribution plan may be partial when it
“SECTION 1. — There is hereby created a Philippine pertains to the distribution of a portion or some of
Deposit Insurance Corporation hereinafter referred to as the assets of the closed bank, or final when it
the ‘Corporation’ which shall insure as herein provided, pertains to the distribution of all the assets of the
the deposits of all banks which are entitled to the benefits closed bank.
of insurance under this Act, and which shall have the
powers hereinafter granted. “(c) The term Board of Directors means the Board
of Directors of the Corporation.
“The Corporation shall, as a basic policy, promote and
safeguard the interests of the depositing public by “(d) The term bank and banking institution shall
providing insurance coverage on all insured deposits and be synonymous and interchangeable and shall
helping maintain a sound and stable banking system.” include banks, commercial banks, savings banks,
mortgage banks, rural banks, development banks,
SECTION 2. A new section entitled Section 2 of the same cooperative banks, stock savings and loan
Act shall be inserted between Sections 1 and 3 which shall associations and branches and agencies in the
read as follows: Philippines of foreign banks and all other
corporations authorized to perform banking
“STATE POLICY functions in the Philippines.
“SEC. 2. — It is hereby declared to be the policy of the “(e) The term closed bank refers to a bank placed
State to strengthen the mandatory deposit insurance under liquidation by the Monetary Board.
coverage system to generate, preserve, maintain faith and
confidence in the country’s banking system, and protect it “(f) The term creditor refers to any individual or
from illegal schemes and machinations. entity with a valid claim against the assets of the
closed bank.
“Towards this end, the government must extend all means
and mechanisms necessary for the Corporation to “(g) The term deposit means the unpaid balance of
effectively fulfill its vital task of promoting and money or its equivalent received by a bank in the
safeguarding the interests of the depositing public by way usual course of business and for which it has given
of providing insurance coverage on bank deposits and in or is obliged to give credit to a commercial,
helping develop a sound and stable banking system. checking, savings, time or thrift account,
evidenced by a passbook, certificate of deposit, or
“In view of the crucial role and the nature of its functions other evidence of deposit issued in accordance
and responsibilities, the Corporation, while being a with Bangko Sentral ng Pilipinas rules and
government instrumentality with corporate powers, shall regulations and other applicable laws, together
enjoy fiscal and administrative autonomy.” with such other obligations of a bank, which,
consistent with banking usage and practices, the unliquidated, fixed or contingent, matured or
Board of Directors shall determine and prescribe current, denied by the receiver.
by regulations to be deposit liabilities of the bank:
Provided, That any obligation of a bank which is “(i) The term insured bank means any bank the
payable at the office of the bank located outside of deposits of which are insured in accordance with
the Philippines shall not be a deposit for any of the the provisions of this Act.
purposes of this Act or included as part of the total
deposits or of insured deposit: Provided, further, “(j) The term insured deposit means the amount
That subject to the approval of the Board of due to any bonafide depositor for legitimate
Directors, any insured bank which is incorporated deposits in an insured bank as of the date of
under the laws of the Philippines which maintains closure but not to exceed Five hundred thousand
a branch outside the Philippines may elect to pesos (P500,000.00). Such amount shall be
include for insurance its deposit obligations determined according to such regulations as the
payable only at such branch. Board of Directors may prescribe. In determining
such amount due to any depositor, there shall be
“The Corporation shall not pay deposit insurance added together all deposits in the bank
for the following accounts or transactions: maintained in the same right and capacity for his
or her benefit either in his or her own name or in
“(1) Investment products such as bonds the name of others. A joint account regardless of
and securities, trust accounts, and other whether the conjunction ‘and’, ‘or’, ‘and/or’ is
similar instruments; used, shall be insured separately from any
individually-owned deposit account: Provided,
“(2) Deposit accounts or transactions That (1) if the account is held jointly by two or
which are fictitious or fraudulent as more natural persons, or by two or more juridical
determined by the Corporation; persons or entities, the maximum insured deposit
shall be divided into as many equal shares as there
“(3) Deposit accounts or transactions are individuals, juridical persons or entities,
constituting, and/or emanating from, unless a different sharing is stipulated in the
unsafe and unsound banking practice/s, document of deposit, and (2) if the account is held
as determined by the Corporation, in by a juridical person or entity jointly with one or
consultation with the Bangko Sentral ng more natural persons, the maximum insured
Pilipinas, after due notice and hearing, deposit shall be presumed to belong entirely to
and publication of a directive to cease and such juridical person or entity: Provided, further,
desist issued by the Corporation against That the aggregate of the interest of each co-
such deposit accounts, transactions or owner over several joint accounts, whether owned
practices; and by the same or different combinations of
individuals, juridical persons or entities, shall
likewise be subject to the maximum insured
“(4) Deposits that are determined to be deposit of Five hundred thousand pesos
the proceeds of an unlawful activity as (P500,000.00): Provided, furthermore, That the
defined under Republic Act No. 9160, as provisions of any law to the contrary
amended. notwithstanding, no owner/holder of any
passbook, certificate of deposit, or other evidence
“The actions of the Corporation taken under of deposit shall be recognized as a depositor
Section 5(g) shall be final and executory, and may entitled to the rights provided in this Act unless
only be restrained or set aside by the Court of the passbook, certificate of deposit, or other
Appeals, upon appropriate petition for certiorari evidence of deposit is determined by the
on the ground that the action was taken in excess Corporation to be an authentic document or
of jurisdiction or with such grave abuse of record of the issuing bank: Provided, finally, That
discretion as to amount to a lack or excess of in case of a condition that threatens the monetary
jurisdiction. The petition for certiorari may only and financial stability of the banking system that
be filed within thirty (30) days from notice of may have systemic consequences, as defined in
denial of claim for deposit insurance. Section 22 hereof, as determined by the Monetary
Board, the maximum deposit insurance cover may
“(h) The term disputed claim refers to a claim or be adjusted in such amount, for such a period,
suit against the assets of a closed bank, or for and/or for such deposit products, as may be
specific performance, or breach of contract, or determined by a unanimous vote of the Board of
damages, of whatever nature or character, Directors in a meeting called for the purpose and
whether for money or otherwise, liquidated or chaired by the Secretary of Finance, subject to the
approval of the President of the Philippines.
“(k) The term liquidation refers to the proceedings will incur a loss with respect to the bank, and the
under Sections 12 to 16 of this Act. likely amount of any such loss, based on its risk
rating that takes into consideration the following:
“(1) The term liquidation court refers to the
Regional Trial Court (RTC) of general jurisdiction “(1) Quality and concentration of assets;
where the petition for assistance in the liquidation
of a closed bank is filed and given due course. “(2) Categories and concentration of
liabilities, both insured and uninsured,
“(m) The term payout refers to the payment of contingent and noncontingent;
insured deposits.
“(3) Capital position;
“(n) The term petition for assistance in the
liquidation of a closed bank refers to the petition “(4) Liquidity position;
filed by the receiver with the RTC in accordance
with Section 16 of this Act. “(5) Management and governance; and
“(o) The term purchase of assets and assumption “(6) Other factors relevant to assessing
of liabilities refers to a transaction where an such probability, as may be determined
insured bank purchases any or all assets and by the Corporation:
assumes any or all liabilities of another bank
under resolution or liquidation, as provided in this
“(u) The term statement of affairs refers to a
Act.
report of financial condition of the closed bank at
a given date, showing the: (1) estimated realizable
“(p) The term receiver refers to the Corporation or value of assets; (2) classification of credits; and (3)
any of its duly authorized agents acting as receiver estimated liabilities to be settled.
of a closed bank.
“(v) The term surplus dividends refers to the
“(q) The term records include all documents, remaining assets of the closed bank after
titles, papers and electronic data of the closed satisfaction in full of all the liquidation costs, fees
bank, including those pertaining to deposit and expenses, and valid claims. The surplus
accounts of and with the closed bank, its assets, dividends shall be computed at the legal rate of
transactions and corporate affairs. interest from the date of takeover to cut-off date of
the distribution plan, and shall be paid, in cash or
“(r) The term residual assets refer to assets, in in kind, to creditors of the closed bank in
cash or in kind, to be turned over to the closed accordance with the Rules on Concurrence and
bank’s stockholders of record, in proportion to Preference of Credits under the Civil Code or other
their interest in the closed bank as of date of laws.
closure, after payment in full of liquidation costs,
fees and expenses, and the valid claims and “(w) The term takeover refers to the act of
surplus dividends to all the creditors. physically taking possession and control of the
premises, assets and affairs of a closed bank for
“(s) The term resolution refers to the actions the purpose of liquidating the bank.
undertaken by the Corporation under Section 11
of this Act to: “(x) The term transfer deposit means, a deposit in
an insured bank made available to a depositor by
“(1) Protect depositors, creditors and the the Corporation as payment of insured deposit of
DIF; such depositor in a closed bank and assumed by
another insured bank.
“(2) Safeguard the continuity of essential
banking services or maintain financial “(y) The term trust funds means funds held by an
stability; and insured bank in a fiduciary capacity and includes
without being limited to, funds held as trustee,
“(3) Prevent deterioration or dissipation executor, administrator, guardian or agent.
of bank assets.
“(z) The term valid claim refers to the claim
“(t) The term risk-based assessment system recognized by the receiver or allowed by the
pertains to a method for calculating an insured liquidation court.
bank’s assessment on the probability that the DIF
“(aa) The term winding up period refers to the “(b) In addition to the powers of a receiver provided under
period provided in Section 16 of this Act.” existing laws, the Corporation, as receiver of a closed bank,
is empowered to:
SECTION 8. Section 5 of the same Act is accordingly
renumbered as Section 6, and is hereby amended to read “(1) Represent and act for and on behalf of the
as follows: closed bank;
“DEPOSIT INSURANCE COVERAGE “(2) Gather and take charge of all the assets,
records and affairs of the closed bank, and
“SEC. 6. The deposit liabilities of any bank which is administer the same for the benefit of its
engaged in the business of receiving deposits as herein creditors;
defined on the effective date of this Act, or which
thereafter may engage in the business of receiving “(3) Convert the assets of the closed bank to cash
deposits, shall be insured with the Corporation. or other forms of liquid assets, as far as
practicable;
“Whenever a bank is determined by the Bangko Sentral ng
Pilipinas to be capital deficient, the Corporation may “(4) Bring suits to enforce liabilities of the
conduct an insurance risk evaluation on the bank to enable directors, officers, employees, agents of the closed
it to assess the risks to the DIF. Such evaluation may bank and other entities related or connected to the
include the determination of: (i) the fair market value of closed bank or to collect, recover, and preserve all
the assets and liabilities of a bank; or (ii) the risk assets, including assets over which the bank has
classification of a bank; or (iii) possible resolution modes equitable interest;
under Section 11 of this Act, subject to such terms and
conditions as the PDIC Board may prescribe.” “(5) Appoint or hire persons or entities of
recognized competence in banking, finance, asset
SECTION 25. A new section entitled Section 12 of the same management or remedial management, as its
Act is hereby inserted between Sections 11 and 13 which deputies, assistants or agents, to perform such
shall read as follows: powers and functions of the Corporation as
receiver of the closed bank, or assist in the
“LIQUIDATION OF A CLOSED BANK performance thereof;
“SEC. 12. (a) Whenever a bank is ordered closed by the “(6) Appoint or hire persons or entities of
Monetary Board, the Corporation shall be designated as recognized competence in forensic and fraud
receiver and it shall proceed with the takeover and investigations;
liquidation of the closed bank in accordance with this Act.
For this purpose, banks closed by the Monetary Board “(7) Pay accrued utilities, rentals and salaries of
shall no longer be rehabilitated.” personnel of the closed bank for a period not
exceeding three (3) months, from available funds
SECTION 26. A new section entitled Section 13 of the same of the closed bank;
Act is hereby inserted between Sections 12 and 14 which
shall read as follows: “(8) Collect loans and other claims of the closed
bank and for this purpose, modify, compromise or
“AUTHORITIES OF A RECEIVER AND EFFECTS OF restructure the terms and conditions of such loans
PLACEMENT OF A BANK UNDER LIQUIDATION or claims as may be deemed advantageous to the
interests of the creditors of the closed bank;
“SEC. 13. (a) The receiver is authorized to adopt and
implement, without need of consent of the stockholders, “(9) Hire or retain private counsel as may be
board of directors, creditors or depositors of the closed necessary;
bank, any or a combination of the following modes of
liquidation: “(10) Borrow or obtain a loan, or mortgage, pledge
or encumber any asset of the closed bank, when
“(1) Conventional liquidation; and necessary to preserve or prevent dissipation of
the assets, or to redeem foreclosed assets of the
“(2) Purchase of assets and/or assumption of closed bank, or to minimize losses to its
liabilities. depositors and creditors;
“NOTICE OF CLOSURE AND TAKEOVER ACTIVITIES “(b) Such action of the receiver to determine whether a
bank may be the subject of a purchase of assets and
“SEC. 14. (a) Upon the designation of the Corporation as assumption of liabilities transaction shall be final and
receiver of a closed bank, it shall serve a notice of closure executory, and may not be set aside by any court.”
to the highest-ranking officer of the bank present in the
bank premises, or in the absence of such officer, post the SECTION 29. A new section entitled Section 16 of the same
notice of closure in the bank premises or on its main Act is hereby inserted between Sections 15 and 17 which
entrance. The closure of the bank shall be deemed effective shall read as follows:
upon the service of the notice of closure. Thereafter, the
receiver shall takeover the bank and exercise the powers “CONVENTIONAL LIQUIDATION
of the receiver as provided in this Act.
“A. ASSET MANAGEMENT AND CONVERSION
“(b) The receiver shall have authority to use reasonable
force, including the authority to force open the premises of “SEC. 16. (a) The assets gathered by the receiver shall be
the bank, and exercise such acts necessary to take actual evaluated and verified as to their existence, ownership,
physical possession and custody of the bank and all its condition, and other factors to determine their realizable
assets, records, documents, and take charge of its affairs value. In the management, preservation and disposition of
upon the service of the notice of closure. assets, the receiver shall be guided by cost-benefit
considerations, resources of the closed bank, and potential
“(c) Directors, officers, employees or agents of a bank hold asset recovery.
money and other assets of the bank in trust or under
administration or management by them for the bank in “(b) The conversion of the assets of the closed bank shall
their fiduciary capacity. be carried out in a fair and transparent manner in
accordance with the rules and procedures as may be
Upon service of the notice of closure to the bank, all determined by the receiver.
directors, officers, employees or agents of the closed bank
shall have the duty to immediately account for, surrender “(c) In the management and/or conversion of the assets of
and turn over to the receiver, and provide information the closed bank, the receiver shall have the authority to:
relative to, the assets, records, and affairs of the closed
bank in their possession, custody, administration or
“(1) Represent the closed bank before the Land
management.
Registration Authority (LRA), the Bureau of Lands,
the Register of Deeds, the Land Transportation
“(d) When the circumstances so warrant, the local Office (LTO), the Assessor’s Office or other
government unit and law enforcement agencies concerned appropriate office of the local government unit,
shall, upon request, immediately provide assistance to the the Securities and Exchange Commission (SEC), or
receiver during the service of notice of closure and actual such other similar government agencies or private
takeover operations to ensure the orderly conduct thereof entities in:
and the security and safety of the personnel of the receiver
and the employees of the closed bank.”
“(i) Verifying the authenticity of
ownership documents;
SECTION 28. A new section entitled Section 15 of the same
Act is hereby inserted between Sections 14 and 16 which
“(ii) Registering the interest of the closed
shall read as follows:
bank on a specific property;
“PURCHASE OF ASSETS AND ASSUMPTION OF
“(iii) Consolidating ownership over an
LIABILITIES
asset of the closed bank;
“SEC. 15. (a) The receiver shall have the authority to
“(iv) Securing certified true copies of
facilitate and implement the purchase of the assets of the
documents held by the foregoing
closed bank and the assumption of its liabilities by another
agencies/entities in relation to an asset of
insured bank, without need for approval of the liquidation
the closed bank;
court. The exercise of this authority shall be in accordance
with the Rules on Concurrence and Preference of Credits
under the Civil Code or other laws, subject to such terms “(v) Securing the appropriate certification
and conditions as the Corporation may prescribe. The from the foregoing agencies/entities in
relation to an asset of the closed bank; or cause the withdrawal, transfer, disposition,
and removal, conversion, concealment, or other
transaction involving or relating to the subject
“(vi) Performing other related activities; asset, unless otherwise directed by the receiver.
“(2) Conduct a physical or ocular inspection of the “(e) The receiver shall have the authority to invest funds
properties owned by, or mortgaged to, the closed received from the conversion of the assets of the closed
bank, to determine their existence and present bank in government securities, other government-
condition; guaranteed marketable securities or investment-grade
debt instruments.
“(3) Determine the disposal price of assets in
accordance with generally accepted valuation “(f) The proceeds of the sale of the bank and branch
principles, standards and practices, subject to licenses shall be for the benefit of the creditors of the
such guidelines as the receiver may determine; closed bank which shall be distributed in accordance with
this Act and the Rules on Concurrence and Preference of
“(4) Dispose real or personal properties of the Credits under the Civil Code or other laws.
closed bank through bidding, negotiated sale or
any other mode including lease with option to “B. PETITION FOR ASSISTANCE IN THE LIQUIDATION
purchase, whether by piece or by lot, as may be OF A CLOSED BANK
reasonably determined by the receiver based on
cost-benefit considerations and to allow efficient “(g) A petition for assistance in the liquidation is a special
distribution of assets to creditors; and proceeding for the liquidation of a closed bank, and
includes the declaration of the concomitant right of its
“(5) Engage third parties to assist in the creditors and the order of payment of their valid claims in
liquidation, manage and/or dispose the assets, the disposition of its assets.
handle cases filed against or by the closed bank,
subject to such guidelines as determined by the “Any proceeding initiated under this section shall be
receiver. considered in rem. Jurisdiction over all persons affected by
the proceeding shall be considered as acquired upon
“(d) Notwithstanding any provision of law to the contrary, publication of the order setting the case for initial hearing
the following rules shall apply to the management and/or in any newspaper of general circulation in the Philippines.
conversion by the receiver of the assets of the closed bank:
“(h) The liquidation court shall have exclusive jurisdiction
“(1) Upon notification of the closure of a bank, the to adjudicate disputed claims against the closed banks,
LRA, the Bureau of Lands, the Register of Deeds, assist in the enforcement of individual liabilities of the
the LTO, the assessor’s office or other appropriate stockholders, directors and officers and decide on all other
office of the local government unit, or such other issues as may be material to implement the distribution
similar government agencies shall not allow any plan adopted by the Corporation for general application to
transaction affecting the assets of the closed bank all closed banks.
without the consent of the receiver.
“(i) The provisions of Republic Act No. 8799, otherwise
“(2) Upon issuance by the Monetary Board of the known as ‘The Securities Regulation Code’, and Supreme
resolution ordering the closure of a bank, any Court Administrative Matter No. 00-8-10-SC, entitled, ‘The
person or entity in custody or possession of assets Rules of Procedure on Corporate Rehabilitation’, shall not
or records of the closed bank, including, but not be applicable to the petition for assistance in the
limited to, the closed bank’s deposit accounts, liquidation of the closed bank.
titles to real property, collaterals, promissory
notes, evidence of indebtedness or investments “(j) The petition shall be filed in the RTC which has
shall immediately turn over custody of said assets jurisdiction over the principal office of the closed bank or
and records to the receiver. Such obligation shall the principal office of the receiver, at the option of the
cover evidences of deposit such as passbooks or latter.
certificates of deposit issued by the bank to its
depositors. Pending turnover, all persons or “(k) The petition shall be filed ex parte within a reasonable
entities in custody or possession of any asset or period from receipt of the Monetary Board Resolution
record of the closed bank shall hold the said assets placing the bank under liquidation.
or records in trust for the receiver.
“(1) All persons or entities with claims against the
“(3) The persons or entities in custody or assets of the closed bank shall file their claims
possession of such asset shall not allow, authorize with the receiver within sixty (60) days from the
date of publication of the notice of closure. Claims “Failure by the individual stockholders of record or their
filed outside the foregoing prescribed period shall duly-authorized representative or the court-appointed
be disallowed. stockholders’ representative to comply with the
documentary requirements within the prescribed period
“Claims denied by the receiver shall be filed with the and/or refusal to accept the residual assets in kind shall be
liquidation court within sixty (60) days from receipt of the deemed as abandonment or waiver of right to receive the
final notice of denial of claim. residual assets.
“(m) A claim whose validity has not yet been determined “(s) After the lapse of the six-month period provided in
with finality at the time of the submission of the final asset paragraphs (q) and (r) of this section, all assets which
distribution plan, either by reason of a pending suit or for remain unclaimed by the creditors and/or stockholders of
whatever reason, shall be considered as contingent claim record shall be turned over to the Bureau of Treasury.
and shall not be paid under the proposed final asset
distribution plan. “(t) The receiver shall continue to keep all the pertinent
records of the closed bank for a period of six (6) months
“(n) Upon finality of the order approving the final asset from the date of publication of the approval of the final
distribution plan, the petition for assistance in the asset distribution plan.
liquidation of a closed bank shall henceforth be, for all
intents and purposes, considered closed and terminated After the lapse of this period, the receiver is authorized to
and the receiver, its officers, employees or agents, are dispose of the same in accordance with the rules and
forever discharged from any and all claims and/or liability regulations to be prescribed by the receiver.”
arising from or in connection with the liquidation of the
closed bank. SECTION 32. Section 14 of the same Act is accordingly
renumbered as Section 19 and is hereby amended to read
“(o) The receiver shall submit a final report on the as follows:
implementation of the approved final asset distribution
plan to the Monetary Board and the SEC after the “PAYMENT OF INSURED DEPOSITS
expiration of the winding-up period provided in this Act.
“SEC. 19. Whenever an insured bank shall have been closed
“(p) The Supreme Court shall promulgate the appropriate by the Monetary Board pursuant to Section 30 of Republic
procedural rules to implement this section. Act No. 7653, or upon expiration or revocation of a bank’s
corporate term, payment of the insured deposits on such
“C. WINDING-UP closed bank shall be made by the Corporation as soon as
possible either (1) by cash or (2) by making available to
“(q) The creditors shall have a period of six (6) months each depositor a transferred deposit in another insured
from the date of publication of notice of the approval by bank in an amount equal to insured deposit of such
the court of the final asset distribution plan of the closed depositor: Provided, however, That the Corporation, in its
bank within which to claim payment of the principal discretion, may require proof of claims to be filed before
obligations and surplus dividends. During this six-month paying the insured deposits, and that in any case where the
period, the receiver shall hold as trustee the assets Corporation is not satisfied as to the validity of a claim for
allocated in the final asset distribution plan for said an insured deposit, it may require final determination of a
creditors. court of competent jurisdiction before paying such claim:
Provided, further, That failure to settle the claim, within six
“Failure by the creditor to comply with the documentary (6) months from the date of filing of claim for insured
requirements within the prescribed period and/or refusal deposit, where such failure was due to grave abuse of
to accept the asset as payment shall be deemed as discretion, gross negligence, bad faith, or malice, shall,
abandonment or waiver of his or her right to payment. upon conviction, subject the directors, officers or
employees of the Corporation responsible for the delay, to
imprisonment from six (6) months to one (1) year:
“(r) The individual stockholders of record or their duly- Provided, furthermore, That the period shall not apply if
authorized representative or the court-appointed the validity of the claim requires the resolution of issues of
stockholders’ representative shall have a period of six (6) facts and or law by another office, body or agency
months from publication of notice of the approval by the including the case mentioned in the first proviso or by the
court of the final asset distribution plan of the closed bank Corporation together with such other office, body or
within which to claim the residual assets. During this six- agency.”
month period, the receiver shall hold as trustee the assets
allocated in the final asset distribution plan for said
stockholders of record.
in order to avoid being the subject of reporting
requirements under the Act;
“(b) ‘Covered transaction’ is a transaction in cash or “(4) Plunder under Republic Act No. 7080, as
other equivalent monetary instrument involving a amended;
total amount in excess of Five hundred thousand pesos
(P500,000.00) within one (1) banking day.” “(5) Robbery and extortion under Articles 294, 295,
296, 299, 300, 301 and 302 of the Revised Penal Code,
SECTION 2. Section 3 of the same Act is further amended as amended;
by inserting between paragraphs (b) and (c) a new
paragraph designated as (b-1) to read as follows: “(6) Jueteng and Masiao punished as illegal gambling
under Presidential Decree No. 1602;
“(b-1) ‘Suspicious transaction’ are transactions with
covered institutions, regardless of the amounts “(7) Piracy on the high seas under the Revised Penal
involved, where any of the following circumstances Code, as amended and Presidential Decree No. 532;
exist:
“(8) Qualified theft under Article 310 of the Revised
“1. there is no underlying legal or trade obligation, Penal Code, as amended;
purpose or economic justification;
“(9) Swindling under Article 315 of the Revised Penal
“2. the client is not properly identified; Code, as amended;
“3. the amount involved is not commensurate with the “(10) Smuggling under Republic Act Nos. 455 and
business or financial capacity of the client; 1937; SEIDAC
“SEC. 4. Money Laundering Offense. — Money “(5) to investigate suspicious transactions and covered
laundering is a crime whereby the proceeds of an transactions deemed suspicious after an investigation
unlawful activity as herein defined are transacted, by AMLC, money laundering activities, and other
thereby making them appear to have originated from violations of this Act;
legitimate sources. It is committed by the following:
“(6) to apply before the Court of Appeals, ex parte, for
“(a) Any person knowing that any monetary the freezing of any monetary instrument or property
instrument or property represents, involves, or relates alleged to be the proceeds of any unlawful activity as
to, the proceeds of any unlawful activity, transacts or defined in Section 3(i) hereof;
attempts to transact said monetary instrument or
property. “(7) to implement such measures as may be necessary
and justified under this Act to counteract money
“(b) Any person knowing that any monetary laundering;
instrument or property involves the proceeds of any
unlawful activity, performs or fails to perform any act “(8) to receive and take action in respect of, any
as a result of which he facilitates the offense of money request from foreign states for assistance in their own
laundering referred to in paragraph (a) above. anti-money laundering operations provided in this
Act;
“(c) Any person knowing that any monetary
instrument or property is required under this Act to be “(9) to develop educational programs on the
disclosed and filed with the Anti-Money Laundering pernicious effects of money laundering, the methods
Council (AMLC), fails to do so.” and techniques used in money laundering, the viable
means of preventing money laundering and the
SECTION 5. Section 7 of the same Act is hereby amended as effective ways of prosecuting and punishing offenders;
follows:
“(10) to enlist the assistance of any branch,
“SEC. 7. Creation of Anti-Money Laundering Council department, bureau, office, agency or instrumentality
(AMLC). — The Anti-Money Laundering Council is of the government, including government-owned and -
hereby created and shall be composed of the Governor controlled corporations, in undertaking any and all
of the Bangko Sentral ng Pilipinas as chairman, the anti-money laundering operations, which may include
Commissioner of the Insurance Commission and the the use of its personnel, facilities and resources for the
Chairman of the Securities and Exchange Commission more resolute prevention, detection and investigation
as members. The AMLC shall act unanimously in the of money laundering offenses and prosecution of
discharge of its functions as defined hereunder: offenders; and
“(1) to require and receive covered or suspicious “(11) to impose administrative sanctions for the
transaction reports from covered institutions; violation of laws, rules, regulations and orders and
resolutions issued pursuant thereto.”
SECTION 6. Section 9(c) of the same Act is hereby
amended to read as follows:
“When reporting covered or suspicious transactions to Be it enacted by the Senate and House of Representatives
the AMLC, covered institutions and their officers and of the Philippines in Congress assembled:
employees are prohibited from communicating
directly or indirectly, in any manner or by any means, SECTION 1. Section 10 of Republic Act No. 9160, as
to any person or entity, the media, the fact that a amended, is hereby amended to read as follows:
covered or suspicious transaction report was made,
the contents thereof, or any other information in “SEC. 10. Freezing of Monetary Instrument or
relation thereto. Neither may such reporting be Property. – Upon verified ex parte petition by the
published or aired in any manner or form by the mass AMLC and after determination that probable cause
media, electronic mail, or other similar devices. In case exists that any monetary instrument or property is in
of violation thereof, the concerned officer and any way related to an unlawful activity as defined in
employee of the covered institution and media shall be Section 3(i) hereof, the Court of Appeals may issue a
held criminally liable.” freeze order, which shall be effective immediately. The
freeze order shall be for a period of twenty (20) days
unless extended by the court. In any case, the court
should act on the petition to freeze within twenty-four
(24) hours from filing of the petition. If the application
is filed a day before a nonworking day, the
computation of the twenty-four (24)-hour period shall
exclude the nonworking days.”
AN ACT PROVIDING FOR THE RECOGNITION AND USE (a) “Addressee” refers to a person who is intended by the
OF ELECTRONIC COMMERCIAL AND NON-COMMERCIAL originator to receive the electronic data message or
TRANSACTIONS, PENALTIES FOR UNLAWFUL USE electronic document, but does not include a person acting
THEREOF, AND OTHER PURPOSES as an intermediary with respect to that electronic data
message or electronic document.
PART I Short Title and Declaration of Policy
(b) “Computer” refers to any device or apparatus singly or
SECTION 1. Short Title. — This Act shall be known and interconnected which, by electronic, electro-mechanical,
cited as the “Electronic Commerce Act.” optical and/or magnetic impulse, or other means with the
same function, can receive, record, transmit, store, process,
correlate, analyze, project, retrieve and/or produce
SECTION 2(2). Declaration of Policy. — The State
information, data, text, graphics, figures, voice, video,
recognizes the vital role of information and
symbols or other modes of expression or perform any one
communications technology (ICT) in nation-building; the
or more of these functions.
need to create an information-friendly environment which
supports and ensures the availability, diversity and
affordability of ICT products and services; the primary (c) “Electronic data message” refers to information
responsibility of the private sector in contributing generated, sent, received or stored by electronic, optical or
investments and services in ICT; the need to develop, with similar means.
appropriate training programs and institutional policy
changes, human resources for the information age, a labor (d) “Information and Communication System” refers to a
force skilled in the use of ICT and a population capable of system for generating, sending, receiving, storing or
operating and utilizing electronic appliances and otherwise processing electronic data messages or
computers; its obligation to facilitate the transfer and electronic documents and includes the computer system or
promotion of technology; to ensure network security, other similar device by or in which data is recorded or
connectivity and neutrality of technology for the national stored and any procedures related to the recording or
benefit; and the need to marshal, organize and deploy storage of electronic data message or electronic document.
national information infrastructures, comprising in both
communications network and strategic information
(e) “Electronic signature” refers to any distinctive mark, SECTION 6(6). Legal Recognition of Electronic Data
characteristic and/or sound in electronic form, Message. — Information shall not be denied validity or
representing the identity of a person and attached to or enforceability solely on the ground that it is in the form of
logically associated with the electronic data message or an electronic data message purporting to give rise to such
electronic document or any methodology or procedures legal effect, or that it is merely incorporated by reference
employed or adopted by a person and executed or adopted in that electronic data message.
by such person with the intention of authenticating or
approving an electronic data message or electronic SECTION 7(7). Legal Recognition of Electronic
document. Documents. — Electronic documents shall have the legal
effect, validity or enforceability as any other document or
(f) “Electronic document” refers to information or the legal writing, and —
representation of information, data, figures, symbols or
other modes of written expression, described or however (a) Where the law requires a document to be in writing,
represented, by which a right is established or an that requirement is met by an electronic document if the
obligation extinguished, or by which a fact may be proved said electronic document maintains its integrity and
and affirmed, which is received, recorded, transmitted, reliability and can be authenticated so as to be usable for
stored, processed, retrieved or produced electronically. subsequent reference, in that —
(g) “Electronic key” refers to a secret code which secures (i) The electronic document has remained complete and
and defends sensitive information that crosses over public unaltered, apart from the addition of any endorsement and
channels into a form decipherable only with a matching any authorized change, or any change which arises in the
electronic key. normal course of communication, storage and display; and
(h) “Intermediary” refers to a person who in behalf of (ii) The electronic document is reliable in the light of the
another person and with respect to a particular electronic purpose for which it was generated and in the light of all
data message or electronic document sends, receives relevant circumstances.
and/or stores or provides other services in respect of that
electronic data message or electronic document. (b) Paragraph (a) applies whether the requirement therein
is in the form of an obligation or whether the law simply
(i) “Originator” refers to a person by whom, or on whose provides consequences for the document not being
behalf, the electronic document purports to have been presented or retained in its original form.
created, generated and/or sent. The term does not include
a person acting as an intermediary with respect to that (c) Where the law requires that a document be presented
electronic document. or retained in its original form, that requirement is met by
an electronic document if —
(j) “Service provider” refers to a provider of —
i) There exist a reliable assurance as to the integrity of the
i) Online services or network access, or the operator of document from the time when it was first generated in its
facilities therefor, including entities offering the final form; and
transmission, routing, or providing of connections for
online communications, digital or otherwise, between or ii) That document is capable of being displayed to the
among points specified by a user, of electronic documents person to whom it is to be presented: Provided, That no
of the user’s choosing; or provision of this Act shall apply to vary any and all
requirements of existing laws on formalities required in
ii) The necessary technical means by which electronic the execution of documents for their validity.
documents of an originator may be stored and made
accessible to a designated or undesignated third party. For evidentiary purposes, an electronic document shall be
the functional equivalent of a written document under
Such service providers shall have no authority to modify or existing laws.
alter the content of the electronic document received or to
make any entry therein on behalf of the originator, This Act does not modify any statutory rule relating to the
addressee or any third party unless specifically authorized admissibility of electronic data messages or electronic
to do so, and who shall retain the electronic document in documents, except the rules relating to authentication and
accordance with the specific request or as necessary for best evidence.
the purpose of performing the services it was engaged to
perform.
SECTION 8(8). Legal Recognition of Electronic
Signatures. — An electronic signature on the electronic
CHAPTER II Legal Recognition of Electronic Data document shall be equivalent to the signature of a person
Messages and Electronic Documents on a written document if the signature is an electronic
signature and proved by showing that a prescribed (a) the criteria for assessing integrity shall be whether the
procedure, not alterable by the parties interested in the information has remained complete and unaltered, apart
electronic document, existed under which — from the addition of any endorsement and any change
which arises in the normal course of communication,
a.) A method is used to identify the party sought to be storage and display; and
bound and to indicate said party’s access to the electronic
document necessary for his consent or approval through (b) the standard of reliability required shall be assessed in
the electronic signature; the light of the purpose for which the information was
generated and in the light of all the relevant circumstances.
b.) Said method is reliable and appropriate for the purpose
for which the electronic document was generated or SECTION 11(11). Authentication of Electronic Data
communicated, in the light of all circumstances, including Messages and Electronic Documents. — Until the Supreme
any relevant agreement; Court by appropriate rules shall have so provided,
electronic documents, electronic data messages and
c.) It is necessary for the party sought to be bound, in order electronic signatures, shall be authenticated by
to proceed further with the transaction, to have executed demonstrating, substantiating and validating a claimed
or provided the electronic signature; and identity of a user, device, or another entity in an
information or communication system, among other ways,
d.) The other party is authorized and enabled to verify the as follows:
electronic signature and to make the decision to proceed
with the transaction authenticated by the same. (a) The electronic signature shall be authenticated by
proof that a letter, character, number or other symbol in
SECTION 9(9). Presumption Relating to Electronic electronic form representing the persons named in and
Signatures. — In any proceedings involving an electronic attached to or logically associated with an electronic data
signature, it shall be presumed that, message, electronic document, or that the appropriate
methodology or security procedures, when applicable,
were employed or adopted by a person and executed or
a.) The electronic signature is the signature of the person adopted by such person, with the intention of
to whom it correlates; and authenticating or approving an electronic data message or
electronic document;
b.) The electronic signature was affixed by that person
with the intention of signing or approving the electronic (b) The electronic data message or electronic document
document unless the person relying on the electronically shall be authenticated by proof that an appropriate
signed electronic document knows or has notice of defects security procedure, when applicable was adopted and
in or unreliability of the signature or reliance on the employed for the purpose of verifying the originator of an
electronic signature is not reasonable under the electronic data message or electronic document, or
circumstances. detecting error or alteration in the communication,
content or storage of an electronic document or electronic
SECTION 10(10). Original Documents. — (1) Where the law data message from a specific point, which, using algorithm
requires information to be presented or retained in its or codes, identifying words or numbers, encryptions,
original form, that requirement is met by an electronic answers back or acknowledgment procedures, or similar
data message or electronic document if: security devices.
(a) the integrity of the information from the time when it The Supreme Court may adopt such other authentication
was first generated in its final form, as an electronic data procedures, including the use of electronic notarization
message or electronic document is shown by systems as necessary and advisable, as well as the
evidence aliunde or otherwise; and certificate of authentication on printed or hard copies of
the electronic documents or electronic data messages by
(b) where it is required that information be presented, that electronic notaries, service providers and other duly
the information is capable of being displayed to the person recognized or appointed certification authorities.
to whom it is to be presented.
The person seeking to introduce an electronic data
(2) Paragraph (1) applies whether the requirement therein message or electronic document in any legal proceeding
is in the form of an obligation or whether the law simply has the burden of proving its authenticity by evidence
provides consequences for the information not being capable of supporting a finding that the electronic data
presented or retained in its original form. message or electronic document is what the person claims
it to be.
(3) For the purposes of subparagraph (a) of paragraph (1):
In the absence of evidence to the contrary, the integrity of ii. Is retained in the format in which it was generated, sent
the information and communication system in which an or received, or in a format which can be demonstrated to
electronic data message or electronic document is accurately represent the electronic data message or
recorded or stored may be established in any legal electronic document generated, sent or received;
proceeding —
iii. Enables the identification of its originator and
(a) By evidence that at all material times the information addressee, as well as the determination of the date and the
and communication system or other similar device was time it was sent or received.
operating in a manner that did not affect the integrity of
the electronic data message or electronic document, and (b) The requirement referred to in paragraph (a) is
there are no other reasonable grounds to doubt the satisfied by using the services of a third party, provided
integrity of the information and communication system; that the conditions set forth in subparagraphs (i), (ii) and
(iii) of paragraph (a) are met.
(b) By showing that the electronic data message or
electronic document was recorded or stored by a party to SECTION 14(14). Proof by Affidavit. — The matters
the proceedings who is adverse in interest to the party referred to in Section 12, on admissibility and Section 9, on
using it; or the presumption of integrity, may be presumed to have
been established by an affidavit given to the best of the
(c) By showing that the electronic data message or deponent’s knowledge subject to the rights of parties in
electronic document was recorded or stored in the usual interest as defined in the following section.
and ordinary course of business by a person who is not a
party to the proceedings and who did not act under the SECTION 15(15). Cross-Examination. — (1) A deponent of
control of the party using the record. an affidavit referred to in Section 14 that has been
introduced in evidence may be cross-examined as of right
SECTION 12(12). Admissibility and Evidential Weight of by a party to the proceedings who is adverse in interest to
Electronic Data Messages or Electronic Documents. — In the party who has introduced the affidavit or has caused
any legal proceedings, nothing in the application of the the affidavit to be introduced.
rules on evidence shall deny the admissibility of an
electronic data message or electronic document in (2) Any party to the proceedings has the right to cross-
evidence — examine a person referred to in Section 11, paragraph 4,
sub-paragraph c.
a. On the sole ground that it is in electronic form; or
CHAPTER III Communication of Electronic Data
b. On the ground that it is not in the standard written form, Messages or Electronic Documents
and the electronic data message or electronic document
meeting, and complying with the requirements under SECTION 16(16). Formation and Validity of Electronic
Sections 6 or 7 hereof shall be the best evidence of the Contracts. — (1) Except as otherwise agreed by the parties,
agreement and transaction contained therein. an offer, the acceptance of an offer and such other
elements required under existing laws for the formation of
In assessing the evidential weight of an electronic data contracts may be expressed in, demonstrated and proved
message or electronic document, the reliability of the by means of electronic data messages or electronic
manner in which it was generated, stored or documents and no contract shall be denied validity or
communicated, the reliability of the manner in which its enforceability on the sole ground that it is in the form of an
originator was identified, and other relevant factor shall be electronic data message or electronic document, or that
given due regard. any or all of the elements required under existing laws for
the formation of the contracts is expressed, demonstrated
SECTION 13(13). Retention of Electronic Data Message or and proved by means of electronic data messages or
Electronic Document. — Notwithstanding any provision of electronic documents.
law, rule or regulation to the contrary —
(2) Electronic transactions made through networking
(a) The requirement in any provision of law that certain among banks, or linkages thereof with other entities or
documents be retained in their original form is satisfied by networks, and vice versa, shall be deemed consummated
retaining them in the form of an electronic data message or upon the actual dispensing of cash or the debit of one
electronic document which — account and the corresponding credit to another, whether
such transaction is initiated by the depositor or by an
i. Remains accessible so as to be usable for subsequent authorized collecting party: Provided, That the obligation
reference; of one bank, entity, or person similarly situated to another
arising therefrom shall be considered absolute and shall
not be subjected to the process of preference of credits.
SECTION 17(17). Recognition by Parties of Electronic Data electronic data message or electronic document as
Message or Electronic Document. — As between the received as being what the originator intended to send,
originator and the addressee of an electronic data message and to act on that assumption. The addressee is not so
or electronic document, a declaration of will or other entitled when it knew or should have known, had it
statement shall not be denied legal effect, validity or exercised reasonable care or used any agreed procedure,
enforceability solely on the ground that it is in the form of that the transmission resulted in any error in the
an electronic data message or electronic document. electronic data message or electronic document as
received.
SECTION 18(18). Attribution of Electronic Data Message.
— (1) An electronic data message or electronic document (6) The addressee is entitled to regard each electronic data
is that of the originator if it was sent by the originator message or electronic document received as a separate
himself. electronic data message or electronic document and to act
on that assumption, except to the extent that it duplicates
(2) As between the originator and the addressee, an another electronic data message or electronic document
electronic data message or electronic document is deemed and the addressee knew or should have known, had it
to be that of the originator if it was sent: exercised reasonable care or used any agreed procedure,
that the electronic data message or electronic document
(a) by a person who had the authority to act on behalf of was a duplicate.
the originator with respect to that electronic data message
or electronic document; or SECTION 19(19). Error on Electronic Data Message or
Electronic Document. — The addressee is entitled to regard
(b) by an information system programmed by, or on behalf the electronic data message or electronic document
of the originator to operate automatically. received as that which the originator intended to send, and
to act on that assumption, unless the addressee knew or
should have known, had the addressee exercised
(3) As between the originator and the addressee, an reasonable care or used the appropriate procedure —
addressee is entitled to regard an electronic data message
or electronic document as being that of the originator, and
to act on that assumption, if: (a) That the transmission resulted in any error therein or
in the electronic data message or electronic document
when the electronic data message or electronic document
(a) in order to ascertain whether the electronic data enters the designated information system, or
message or electronic document was that of the originator,
the addressee properly applied a procedure previously
agreed to by the originator for that purpose; or (b) That electronic data message or electronic document is
sent to an information system which is not so designated
by the addressee for the purpose.
(b) the electronic data message or electronic document as
received by the addressee resulted from the actions of a
person whose relationship with the originator or with any SECTION 20. Agreement on Acknowledgment of Receipt of
agent of the originator enabled that person to gain access Electronic Data Messages or Electronic Documents. — The
to a method used by the originator to identify electronic following rules shall apply where, on or before sending an
data messages or electronic documents as his own. electronic data message or electronic document, the
originator and the addressee have agreed, or in that
electronic document or electronic data message, the
(4) Paragraph (3) does not apply: originator has requested, that receipt of the electronic
document or electronic data message be acknowledged:
(a) as of the time when the addressee has both received
notice from the originator that the electronic data message a.) Where the originator has not agreed with the addressee
or electronic document is not that of the originator, and that the acknowledgment be given in a particular form or
has reasonable time to act accordingly; or by a particular method, an acknowledgment may be given
by or through any communication by the addressee,
(b) in a case within paragraph (3) sub-paragraph (b), at automated or otherwise, or any conduct of the addressee,
any time when the addressee knew or should have known, sufficient to indicate to the originator that the electronic
had it exercised reasonable care or used any agreed data message or electronic document has been received.
procedure, that the electronic data message or electronic
document was not that of the originator. b.) Where the originator has stated that the effect or
significance of the electronic data message or electronic
(5) Where an electronic data message or electronic document is conditional on receipt of the acknowledgment
document is that of the originator or is deemed to be that thereof, the electronic data message or electronic
of the originator, or the addressee is entitled to act on that document is treated as though it has never been sent, until
assumption, then, as between the originator and the the acknowledgment is received.
addressee, the addressee is entitled to regard the
c.) Where the originator has not stated that the effect or addressee, an electronic data message or electronic
significance of the electronic data message or electronic document is deemed to be dispatched at the place where
document is conditional on receipt of the acknowledgment, the originator has its place of business and received at the
and the acknowledgment has not been received by the place where the addressee has its place of business. This
originator within the time specified or agreed or, if no time rule shall apply even if the originator or addressee had
has been specified or agreed, within a reasonable time, the used a laptop other portable device to transmit or receive
originator may give notice to the addressee stating that no his electronic data message or electronic document. This
acknowledgment has been received and specifying a rule shall also apply to determine the tax situs of such
reasonable time by which the acknowledgment must be transaction.
received; and if the acknowledgment is not received within
the time specified in subparagraph (c), the originator may, For the purpose hereof —
upon notice to the addressee, treat the electronic data
message or electronic document as though it had never a. If the originator or the addressee has more than one
been sent, or exercise any other rights it may have. place of business, the place of business is that which has
the closest relationship to the underlying transaction or,
SECTION 21(20). Time of Dispatch of Electronic Data where there is no underlying transaction, the principal
Messages or Electronic Documents. — Unless otherwise place of business.
agreed between the originator and the addressee, the
dispatch of an electronic data message or electronic b. If the originator or the addressee does not have a place
document occurs when it enters an information system of business, reference is to be made to its habitual
outside the control of the originator or of the person who residence; or
sent the electronic data message or electronic document
on behalf of the originator.
c. The “usual place of residence” in relation to a body
corporate, means the place where it is incorporated or
SECTION 22(21). Time of Receipt of Electronic Data otherwise legally constituted.
Messages or Electronic Documents. — Unless otherwise
agreed between the originator and the addressee, the time
SECTION 24(23). Choice of Security Methods. — Subject to
of receipt of an electronic data message or electronic
applicable laws and/or rules and guidelines promulgated
document is as follows:
by the Department of Trade and Industry with other
appropriate government agencies, parties to any electronic
(a.) If the addressee has designated an information system transaction shall be free to determine the type and level of
for the purpose of receiving electronic data messages or electronic data message or electronic document security
electronic documents, receipt occurs at the time when the needed, and to select and use or implement appropriate
electronic data message or electronic document enters the technological methods that suit their needs.
designated information system: Provided, however, That if
the originator and the addressee are both participants in
PART V Final Provisions
the designated information system, receipt occurs at the
time when the electronic data message or electronic
document is retrieved by the addressee. SECTION 30(29). Extent of Liability of a Service Provider. —
Except as otherwise provided in this Section, no person or
party shall be subject to any civil or criminal liability in
(b.) If the electronic data message or electronic document
respect of the electronic data message or electronic
is sent to an information system of the addressee that is
document for which the person or party acting as a service
not the designated information system, receipt occurs at
provider as defined in Section 5, merely provides access if
the time when the electronic data message or electronic
such liability is founded on —
document is retrieved by the addressee;
(1) A person or organization who performs such functions This Act does not apply to the following:
as instructed by another person or organization; and
(a) Information about any individual who is or was an
(2) An individual who collects, holds, processes or uses officer or employee of a government institution that
personal information in connection with the individual’s relates to the position or functions of the individual,
personal, family or household affairs. including:
(i) Personal information processor refers to any natural or (1) The fact that the individual is or was an officer or
juridical person qualified to act as such under this Act to employee of the government institution;
whom a personal information controller may outsource
the processing of personal data pertaining to a data (2) The title, business address and office telephone
subject. number of the individual;
(j) Processing refers to any operation or any set of (3) The classification, salary range and responsibilities of
operations performed upon personal information the position held by the individual; and
including, but not limited to, the collection, recording,
organization, storage, updating or modification, retrieval, (4) The name of the individual on a document prepared by
consultation, use, consolidation, blocking, erasure or the individual in the course of employment with the
destruction of data. government;
(k) Privileged information refers to any and all forms of (b) Information about an individual who is or was
data which under the Rules of Court and other pertinent performing service under contract for a government
laws constitute privileged communication. institution that relates to the services performed, including
the terms of the contract, and the name of the individual
(l) Sensitive personal information refers to personal given in the course of the performance of those services;
information:
(c) Information relating to any discretionary benefit of a
(1) About an individual’s race, ethnic origin, marital status, financial nature such as the granting of a license or permit
age, color, and religious, philosophical or political given by the government to an individual, including the
affiliations; name of the individual and the exact nature of the benefit;
(2) About an individual’s health, education, genetic or (d) Personal information processed for journalistic,
sexual life of a person, or to any proceeding for any offense artistic, literary or research purposes;
committed or alleged to have been committed by such
person, the disposal of such proceedings, or the sentence (e) Information necessary in order to carry out the
of any court in such proceedings; functions of public authority which includes the processing
of personal data for the performance by the independent,
(3) Issued by government agencies peculiar to an central monetary authority and law enforcement and
individual which includes, but not limited to, social regulatory agencies of their constitutionally and statutorily
security numbers, previous or current health records, mandated functions. Nothing in this Act shall be construed
licenses or its denials, suspension or revocation, and tax as to have amended or repealed Republic Act No. 1405,
returns; and otherwise known as the Secrecy of Bank Deposits Act;
Republic Act No. 6426, otherwise known as the Foreign
(4) Specifically established by an executive order or an act Currency Deposit Act; and Republic Act No. 9510,
of Congress to be kept classified. otherwise known as the Credit Information System Act
(CISA);
(f) Information necessary for banks and other financial SEC. 11. General Data Privacy Principles. – The processing
institutions under the jurisdiction of the independent, of personal information shall be allowed, subject to
central monetary authority or Bangko Sentral ng Pilipinas compliance with the requirements of this Act and other
to comply with Republic Act No. 9510, and Republic Act laws allowing disclosure of information to the public and
No. 9160, as amended, otherwise known as the Anti- adherence to the principles of transparency, legitimate
Money Laundering Act and other applicable laws; and purpose and proportionality.
(g) Personal information originally collected from Personal information must, be:,
residents of foreign jurisdictions in accordance with the
laws of those foreign jurisdictions, including any applicable (a) Collected for specified and legitimate purposes
data privacy laws, which is being processed in the determined and declared before, or as soon as
Philippines. reasonably practicable after collection, and later
processed in a way compatible with such
SEC. 5. Protection Afforded to Journalists and Their Sources. declared, specified and legitimate purposes only;
– Nothing in this Act shall be construed as to have (b) Processed fairly and lawfully;
amended or repealed the provisions of Republic Act No. (c) Accurate, relevant and, where necessary for
53, which affords the publishers, editors or duly accredited purposes for which it is to be used the processing
reporters of any newspaper, magazine or periodical of of personal information, kept up to date;
general circulation protection from being compelled to inaccurate or incomplete data must be rectified,
reveal the source of any news report or information supplemented, destroyed or their further
appearing in said publication which was related in any processing restricted;
confidence to such publisher, editor, or reporter. (d) Adequate and not excessive in relation to the
purposes for which they are collected and
SEC. 6. Extraterritorial Application. – This Act applies to an processed;
act done or practice engaged in and outside of the (e) Retained only for as long as necessary for the
Philippines by an entity if: fulfillment of the purposes for which the data was
obtained or for the establishment, exercise or
(a) The act, practice or processing relates to personal defense of legal claims, or for legitimate business
information about a Philippine citizen or a resident; purposes, or as provided by law; and
(f) Kept in a form which permits identification of
data subjects for no longer than is necessary for
(b) The entity has a link with the Philippines, and the the purposes for which the data were collected
entity is processing personal information in the and processed: Provided, That personal
Philippines or even if the processing is outside the information collected for other purposes may lie
Philippines as long as it is about Philippine citizens or processed for historical, statistical or scientific
residents such as, but not limited to, the following: purposes, and in cases laid down in law may be
stored for longer periods: Provided, further,That
(1) A contract is entered in the Philippines; adequate safeguards are guaranteed by said laws
authorizing their processing.
(2) A juridical entity unincorporated in the Philippines but
has central management and control in the country; and The personal information controller must ensure
implementation of personal information processing
(3) An entity that has a branch, agency, office or subsidiary principles set out herein.
in the Philippines and the parent or affiliate of the
Philippine entity has access to personal information; and SEC. 12. Criteria for Lawful Processing of Personal
Information. – The processing of personal information
(c) The entity has other links in the Philippines such as, but shall be permitted only if not otherwise prohibited by law,
not limited to: and when at least one of the following conditions exists:
(1) The entity carries on business in the Philippines; and (a) The data subject has given his or her consent;
(b) The processing of personal information is
(2) The personal information was collected or held by an necessary and is related to the fulfillment of a
entity in the Philippines. contract with the data subject or in order to take
steps at the request of the data subject prior to
entering into a contract;
(c) The processing is necessary for compliance with a
legal obligation to which the personal information
CHAPTER III PROCESSING OF PERSONAL controller is subject;
INFORMATION
(d) The processing is necessary to protect vitally establishment, exercise or defense of legal claims,
important interests of the data subject, including or when provided to government or public
life and health; authority.
(e) The processing is necessary in order to respond to
national emergency, to comply with the SEC. 14. Subcontract of Personal Information. – A personal
requirements of public order and safety, or to information controller may subcontract the processing of
fulfill functions of public authority which personal information: Provided, That the personal
necessarily includes the processing of personal information controller shall be responsible for ensuring
data for the fulfillment of its mandate; or that proper safeguards are in place to ensure the
(f) The processing is necessary for the purposes of confidentiality of the personal information processed,
the legitimate interests pursued by the personal prevent its use for unauthorized purposes, and generally,
information controller or by a third party or comply with the requirements of this Act and other laws
parties to whom the data is disclosed, except for processing of personal information. The personal
where such interests are overridden by information processor shall comply with all the
fundamental rights and freedoms of the data requirements of this Act and other applicable laws.
subject which require protection under the
Philippine Constitution. SEC. 15. Extension of Privileged Communication. – Personal
information controllers may invoke the principle of
SEC. 13. Sensitive Personal Information and Privileged privileged communication over privileged information that
Information. – The processing of sensitive personal they lawfully control or process. Subject to existing laws
information and privileged information shall be and regulations, any evidence gathered on privileged
prohibited, except in the following cases: information is inadmissible.
(a) The data subject has given his or her consent, CHAPTER IV RIGHTS OF THE DATA SUBJECT
specific to the purpose prior to the processing, or
in the case of privileged information, all parties to SEC. 16. Rights of the Data Subject. – The data subject is
the exchange have given their consent prior to entitled to:
processing;
(b) The processing of the same is provided for by
(a) Be informed whether personal information pertaining
existing laws and regulations: Provided, That such
to him or her shall be, are being or have been processed;
regulatory enactments guarantee the protection of
the sensitive personal information and the
privileged information: Provided, further, That the (b) Be furnished the information indicated hereunder
consent of the data subjects are not required by before the entry of his or her personal information into the
law or regulation permitting the processing of the processing system of the personal information controller,
sensitive personal information or the privileged or at the next practical opportunity:
information;
(c) The processing is necessary to protect the life and (1) Description of the personal information to
health of the data subject or another person, and be entered into the system;
the data subject is not legally or physically able to (2) Purposes for which they are being or are
express his or her consent prior to the processing; to be processed;
(d) The processing is necessary to achieve the lawful (3) Scope and method of the personal
and noncommercial objectives of public information processing;
organizations and their (4) The recipients or classes of recipients to
associations: Provided, That such processing is whom they are or may be disclosed;
only confined and related to the bona (5) Methods utilized for automated access, if
fide members of these organizations or their the same is allowed by the data subject,
associations: Provided, further, That the sensitive and the extent to which such access is
personal information are not transferred to third authorized;
parties: Provided, finally, That consent of the data (6) The identity and contact details of the
subject was obtained prior to processing; personal information controller or its
(e) The processing is necessary for purposes of representative;
medical treatment, is carried out by a medical (7) The period for which the information will
practitioner or a medical treatment institution, be stored; and
and an adequate level of protection of personal (8) The existence of their rights, i.e., to access,
information is ensured; or correction, as well as the right to lodge a
(f) The processing concerns such personal complaint before the Commission.
information as is necessary for the protection of
lawful rights and interests of natural or legal Any information supplied or declaration made to the data
persons in court proceedings, or the subject on these matters shall not be amended without
prior notification of data subject: Provided, That the SEC. 17. Transmissibility of Rights of the Data Subject. – The
notification under subsection (b) shall not apply should lawful heirs and assigns of the data subject may invoke the
the personal information be needed pursuant to rights of the data subject for, which he or she is an heir or
a subpoena or when the collection and processing are for assignee at any time after the death of the data subject or
obvious purposes, including when it is necessary for the when the data subject is incapacitated or incapable of
performance of or in relation to a contract or service or exercising the rights as enumerated in the immediately
when necessary or desirable in the context of an employer- preceding section.
employee relationship, between the collector and the data
subject, or when the information is being collected and SEC. 18. Right to Data Portability. – The data subject shall
processed as a result of legal obligation; have the right, where personal information is processed by
electronic means and in a structured and commonly used
(c) Reasonable access to, upon demand, the following: format, to obtain from the personal information controller
a copy of data undergoing processing in an electronic or
(1) Contents of his or her personal information that structured format, which is commonly used and allows for
were processed; further use by the data subject. The Commission may
(2) Sources from which personal information were specify the electronic format referred to above, as well as
obtained; the technical standards, modalities and procedures for
(3) Names and addresses of recipients of the personal their transfer.
information;
(4) Manner by which such data were processed; SEC. 19. Non-Applicability. – The immediately preceding
(5) Reasons for the disclosure of the personal sections are not applicable if the processed personal
information to recipients; information are used only for the needs of scientific and
(6) Information on automated processes where the statistical research and, on the basis of such, no activities
data will or likely to be made as the sole basis for are carried out and no decisions are taken regarding the
any decision significantly affecting or will affect data subject: Provided, That the personal information shall
the data subject; be held under strict confidentiality and shall be used only
(7) Date when his or her personal information for the declared purpose. Likewise, the immediately
concerning the data subject were last accessed preceding sections are not applicable to processing of
and modified; and personal information gathered for the purpose of
(8) The designation, or name or identity and address investigations in relation to any criminal, administrative or
of the personal information controller; tax liabilities of a data subject.
(d) Dispute the inaccuracy or error in the personal CHAPTER V SECURITY OF PERSONAL INFORMATION
information and have the personal information controller
correct it immediately and accordingly, unless the request SEC. 20. Security of Personal Information. –
is vexatious or otherwise unreasonable. If the personal
information have been corrected, the personal information (a) The personal information controller must implement
controller shall ensure the accessibility of both the new reasonable and appropriate organizational, physical and
and the retracted information and the simultaneous technical measures intended for the protection of personal
receipt of the new and the retracted information by information against any accidental or unlawful
recipients thereof: Provided, That the third parties who destruction, alteration and disclosure, as well as against
have previously received such processed personal any other unlawful processing.
information shall he informed of its inaccuracy and its
rectification upon reasonable request of the data subject;
(b) The personal information controller shall implement
reasonable and appropriate measures to protect personal
(e) Suspend, withdraw or order the blocking, removal or information against natural dangers such as accidental loss
destruction of his or her personal information from the or destruction, and human dangers such as unlawful
personal information controller’s filing system upon access, fraudulent misuse, unlawful destruction, alteration
discovery and substantial proof that the personal and contamination.
information are incomplete, outdated, false, unlawfully
obtained, used for unauthorized purposes or are no longer
(c) The determination of the appropriate level of security
necessary for the purposes for which they were collected.
under this section must take into account the nature of the
In this case, the personal information controller may notify
personal information to be protected, the risks
third parties who have previously received such processed
represented by the processing, the size of the organization
personal information; and
and complexity of its operations, current data privacy best
practices and the cost of security implementation. Subject
(f) Be indemnified for any damages sustained due to such to guidelines as the Commission may issue from time to
inaccurate, incomplete, outdated, false, unlawfully time, the measures implemented must include:
obtained or unauthorized use of personal information.
(1) Safeguards to protect its computer network CHAPTER VI ACCOUNTABILITY FOR TRANSFER OF
against accidental, unlawful or unauthorized PERSONAL INFORMATION
usage or interference with or hindering of their
functioning or availability; SEC. 21. Principle of Accountability. – Each personal
(2) A security policy with respect to the processing of information controller is responsible for personal
personal information; information under its control or custody, including
(3) A process for identifying and accessing reasonably information that have been transferred to a third party for
foreseeable vulnerabilities in its computer processing, whether domestically or internationally,
networks, and for taking preventive, corrective subject to cross-border arrangement and cooperation.
and mitigating action against security incidents
that can lead to a security breach; and (a) The personal information controller is accountable for
(4) Regular monitoring for security breaches and a complying with the requirements of this Act and shall use
process for taking preventive, corrective and contractual or other reasonable means to provide a
mitigating action against security incidents that comparable level of protection while the information are
can lead to a security breach. being processed by a third party.
(d) The personal information controller must further (b) The personal information controller shall designate an
ensure that third parties processing personal information individual or individuals who are accountable for the
on its behalf shall implement the security measures organization’s compliance with this Act. The identity of the
required by this provision. individual(s) so designated shall be made known to any
data subject upon request.
(e) The employees, agents or representatives of a personal
information controller who are involved in the processing CHAPTER VII SECURITY OF SENSITIVE PERSONAL
of personal information shall operate and hold personal INFORMATION IN GOVERNMENT
information under strict confidentiality if the personal
information are not intended for public disclosure. This
SEC. 22. Responsibility of Heads of Agencies. – All sensitive
obligation shall continue even after leaving the public
personal information maintained by the government, its
service, transfer to another position or upon termination
agencies and instrumentalities shall be secured, as far as
of employment or contractual relations.
practicable, with the use of the most appropriate standard
recognized by the information and communications
(f) The personal information controller shall promptly technology industry, and as recommended by the
notify the Commission and affected data subjects when Commission. The head of each government agency or
sensitive personal information or other information that instrumentality shall be responsible for complying with
may, under the circumstances, be used to enable identity the security requirements mentioned herein while the
fraud are reasonably believed to have been acquired by an Commission shall monitor the compliance and may
unauthorized person, and the personal information recommend the necessary action in order to satisfy the
controller or the Commission believes (bat such minimum standards.
unauthorized acquisition is likely to give rise to a real risk
of serious harm to any affected data subject. The
SEC. 23. Requirements Relating to Access by Agency
notification shall at least describe the nature of the breach,
Personnel to Sensitive Personal Information. – (a) On-site
the sensitive personal information possibly involved, and
and Online Access – Except as may be allowed through
the measures taken by the entity to address the breach.
guidelines to be issued by the Commission, no employee of
Notification may be delayed only to the extent necessary to
the government shall have access to sensitive personal
determine the scope of the breach, to prevent further
information on government property or through online
disclosures, or to restore reasonable integrity to the
facilities unless the employee has received a security
information and communications system.
clearance from the head of the source agency.
(1) In evaluating if notification is unwarranted, the
(b) Off-site Access – Unless otherwise provided in
Commission may take into account compliance by
guidelines to be issued by the Commission, sensitive
the personal information controller with this
personal information maintained by an agency may not be
section and existence of good faith in the
transported or accessed from a location off government
acquisition of personal information.
property unless a request for such transportation or access
(2) The Commission may exempt a personal
is submitted and approved by the head of the agency in
information controller from notification where, in
accordance with the following guidelines:
its reasonable judgment, such notification would
not be in the public interest or in the interests of
the affected data subjects. (1) Deadline for Approval or Disapproval – In the case
(3) The Commission may authorize postponement of of any request submitted to the head of an agency,
notification where it may hinder the progress of a such head of the agency shall approve or
criminal investigation related to a serious breach. disapprove the request within two (2) business
days after the date of submission of the request. In
case there is no action by the head of the agency,
then such request is considered disapproved; ❺ Implementing Rules and Regulations of Data
(2) Limitation to One thousand (1,000) Records – If a Privacy Act
request is approved, the head of the agency shall Sections 1-7, 17-29,34-41, 50
limit the access to not more than one thousand
(1,000) records at a time; and Pursuant to the mandate of the National Privacy
(3) Encryption – Any technology used to store, Commission to administer and implement the provisions
transport or access sensitive personal information of the Data Privacy Act of 2012, and to monitor and ensure
for purposes of off-site access approved under this compliance of the country with international standards set
subsection shall be secured by the use of the most for data protection, the following rules and regulations are
secure encryption standard recognized by the hereby promulgated to effectively implement the
Commission. provisions of the Act:
g. “Direct marketing” refers to communication by whatever o. “Processing” refers to any operation or any set of
means of any advertising or marketing material which is operations performed upon personal data including, but
directed to particular individuals; not limited to, the collection, recording, organization,
storage, updating or modification, retrieval, consultation,
h. “Filing system” refers to any set of information relating use, consolidation, blocking, erasure or destruction of data.
to natural or juridical persons to the extent that, although Processing may be performed through automated means,
the information is not processed by equipment operating or manual processing, if the personal data are contained or
automatically in response to instructions given for that are intended to be contained in a filing system;
purpose, the set is structured, either by reference to
individuals or by reference to criteria relating to p. “Profiling” refers to any form of automated processing of
individuals, in such a way that specific information relating personal data consisting of the use of personal data to
to a particular individual is readily accessible; evaluate certain personal aspects relating to a natural
person, in particular to analyze or predict aspects
i. “Information and communications system” refers to a concerning that natural person’s performance at work,
system for generating, sending, receiving, storing, or economic situation, health, personal preferences, interests,
otherwise processing electronic data messages or reliability, behavior, location or movements;
electronic documents, and includes the computer system
or other similar device by which data is recorded, q. “Privileged information” refers to any and all forms of
transmitted, or stored, and any procedure related to the data, which, under the Rules of Court and other pertinent
recording, transmission, or storage of electronic data, laws constitute privileged communication;
electronic message, or electronic document;
r. “Public authority” refers to any government entity
j. “Personal data” refers to all types of personal created by the Constitution or law, and vested with law
information; enforcement or regulatory authority and functions;
k. “Personal data breach” refers to a breach of security s. “Security incident” is an event or occurrence that affects
leading to the accidental or unlawful destruction, loss, or tends to affect data protection, or may compromise the
alteration, unauthorized disclosure of, or access to, availability, integrity and confidentiality of personal data.
personal data transmitted, stored, or otherwise processed; It includes incidents that would result to a personal data
breach, if not for safeguards that have been put in place;
l. “Personal information” refers to any information,
whether recorded in a material form or not, from which t. Sensitive personal information refers to personal
the identity of an individual is apparent or can be information:
reasonably and directly ascertained by the entity holding
the information, or when put together with other 1. About an individual’s race, ethnic origin, marital status,
information would directly and certainly identify an age, color, and religious, philosophical or political
individual; affiliations;
m. “Personal information controller” refers to a natural or 2. About an individual’s health, education, genetic or sexual
juridical person, or any other body who controls the life of a person, or to any proceeding for any offense
processing of personal data, or instructs another to committed or alleged to have been committed by such
process personal data on its behalf. The term excludes: individual, the disposal of such proceedings, or the
sentence of any court in such proceedings;
1. A natural or juridical person, or any other body, who
performs such functions as instructed by another person 3. Issued by government agencies peculiar to an individual
or organization; or which includes, but is not limited to, social security
numbers, previous or current health records, licenses or its 1. Information about any individual who is or was an
denials, suspension or revocation, and tax returns; and officer or employee of government that relates to his or
her position or functions, including:
4. Specifically established by an executive order or an act
of Congress to be kept classified. (a) The fact that the individual is or was an officer or
employee of the government;
Rule II. Scope of Application
(b) The title, office address, and office telephone number of
Section 4. Scope. The Act and these Rules apply to the the individual;
processing of personal data by any natural and juridical
person in the government or private sector. They apply to (c) The classification, salary range, and responsibilities of
an act done or practice engaged in and outside of the the position held by the individual; and
Philippines if:
(d) The name of the individual on a document he or she
a. The natural or juridical person involved in the prepared in the course of his or her employment with the
processing of personal data is found or established in the government;
Philippines;
2. Information about an individual who is or was
b. The act, practice or processing relates to personal data performing a service under contract for a government
about a Philippine citizen or Philippine resident; institution, but only in so far as it relates to such service,
including the the name of the individual and the terms of
c. The processing of personal data is being done in the his or her contract;
Philippines; or
3. Information relating to a benefit of a financial nature
d. The act, practice or processing of personal data is done conferred on an individual upon the discretion of the
or engaged in by an entity with links to the Philippines, government, such as the granting of a license or permit,
with due consideration to international law and comity, including the name of the individual and the exact nature
such as, but not limited to, the following: of the benefit: Provided, that they do not include benefits
given in the course of an ordinary transaction or as a
1. Use of equipment located in the country, or maintains an matter of right;
office, branch or agency in the Philippines for processing of
personal data; b. Personal information processed for journalistic, artistic
or literary purpose, in order to uphold freedom of speech,
2. A contract is entered in the Philippines; of expression, or of the press, subject to requirements of
other applicable law or regulations;
3. A juridical entity unincorporated in the Philippines but
has central management and control in the country; c. Personal information that will be processed for research
purpose, intended for a public benefit, subject to the
requirements of applicable laws, regulations, or ethical
4. An entity that has a branch, agency, office or subsidiary standards;
in the Philippines and the parent or affiliate of the
Philippine entity has access to personal data;
d. Information necessary in order to carry out the
functions of public authority, in accordance with a
5. An entity that carries on business in the Philippines; constitutionally or statutorily mandated function
pertaining to law enforcement or regulatory function,
6. An entity that collects or holds personal data in the including the performance of the functions of the
Philippines. independent, central monetary authority, subject to
restrictions provided by law. Nothing in this Act shall be
Section 5. Special Cases. The Act and these Rules shall not construed as having amended or repealed Republic Act No.
apply to the following specified information, only to the 1405, otherwise known as the Secrecy of Bank Deposits
minimum extent of collection, access, use, disclosure or Act; Republic Act No. 6426, otherwise known as the
other processing necessary to the purpose, function, or Foreign Currency Deposit Act; and Republic Act No. 9510,
activity concerned: otherwise known as the Credit Information System Act
(CISA);
a. Information processed for purpose of allowing public
access to information that fall within matters of public e. Information necessary for banks, other financial
concern, pertaining to: institutions under the jurisdiction of the independent,
central monetary authority or Bangko Sentral ng Pilipinas,
and other bodies authorized by law, to the extent
necessary to comply with Republic Act No. 9510 (CISA), incompatible with the protection provided by Republic Act
Republic Act No. 9160, as amended, otherwise known as No. 53.
the Anti-Money Laundering Act, and other applicable laws;
Rule IV. Data Privacy Principles
f. Personal information originally collected from residents
of foreign jurisdictions in accordance with the laws of Section 17. General Data Privacy Principles. The processing
those foreign jurisdictions, including any applicable data of personal data shall be allowed, subject to compliance
privacy laws, which is being processed in the Philippines. with the requirements of the Act and other laws allowing
The burden of proving the law of the foreign jurisdiction disclosure of information to the public, and adherence to
falls on the person or body seeking exemption. In the the principles of transparency, legitimate purpose, and
absence of proof, the applicable law shall be presumed to proportionality.
be the Act and these Rules:
Section 18. Principles of Transparency, Legitimate Purpose
Provided, that the non-applicability of the Act or these and Proportionality. The processing of personal data shall
Rules do not extend to personal information controllers or be allowed subject to adherence to the principles of
personal information processors, who remain subject to transparency, legitimate purpose, and proportionality.
the requirements of implementing security measures for
personal data protection: Provided further, that the a. Transparency. The data subject must be aware of the
processing of the information provided in the preceding nature, purpose, and extent of the processing of his or her
paragraphs shall be exempted from the requirements of personal data, including the risks and safeguards involved,
the Act only to the minimum extent necessary to achieve the identity of personal information controller, his or her
the specific purpose, function, or activity. rights as a data subject, and how these can be exercised.
Section 6. Protection afforded to Data Subjects. Any information and communication relating to the
processing of personal data should be easy to access and
a. Unless directly incompatible or inconsistent with the understand, using clear and plain language.
preceding sections in relation to the purpose, function, or
activities the non-applicability concerns, the personal b. Legitimate purpose. The processing of information shall
information controller or personal information processor be compatible with a declared and specified purpose
shall uphold the rights of data subjects, and adhere to which must not be contrary to law, morals, or public
general data privacy principles and the requirements of policy.
lawful processing.
c. Proportionality. The processing of information shall be
b. The burden of proving that the Act and these Rules are adequate, relevant, suitable, necessary, and not excessive
not applicable to a particular information falls on those in relation to a declared and specified purpose. Personal
involved in the processing of personal data or the party data shall be processed only if the purpose of the
claiming the non-applicability. processing could not reasonably be fulfilled by other
means.
c. In all cases, the determination of any exemption shall be
liberally interpreted in favor of the rights and interests of Section 19. General principles in collection, processing and
the data subject. retention. The processing of personal data shall adhere to
the following general principles in the collection,
Section 7. Protection Afforded to Journalists and their processing, and retention of personal data:
Sources.
a. Collection must be for a declared, specified, and
a. Publishers, editors, or duly accredited reporters of any legitimate purpose.
newspaper, magazine or periodical of general circulation
shall not be compelled to reveal the source of any news 1. Consent is required prior to the collection and
report or information appearing in said publication if it processing of personal data, subject to exemptions
was related in any confidence to such publisher, editor, or provided by the Act and other applicable laws and
reporter. regulations. When consent is required, it must be time-
bound in relation to the declared, specified and legitimate
b. Publishers, editors, or duly accredited reporters who are purpose. Consent given may be withdrawn.
likewise personal information controllers or personal
information processors within the meaning of the law are 2. The data subject must be provided specific information
still bound to follow the Data Privacy Act and related regarding the purpose and extent of processing, including,
issuances with regard to the processing of personal data, where applicable, the automated processing of his or her
upholding rights of their data subjects and maintaining personal data for profiling, or processing for direct
compliance with other provisions that are not marketing, and data sharing.
3. Purpose should be determined and declared before, or 3. Personal data shall be disposed or discarded in a secure
as soon as reasonably practicable, after collection. manner that would prevent further processing,
unauthorized access, or disclosure to any other party or
4. Only personal data that is necessary and compatible the public, or prejudice the interests of the data subjects.
with declared, specified, and legitimate purpose shall be
collected. e. Any authorized further processing shall have adequate
safeguards.
b. Personal data shall be processed fairly and lawfully.
1. Personal data originally collected for a declared,
1. Processing shall uphold the rights of the data subject, specified, or legitimate purpose may be processed further
including the right to refuse, withdraw consent, or object. for historical, statistical, or scientific purposes, and, in
It shall likewise be transparent, and allow the data subject cases laid down in law, may be stored for longer periods,
sufficient information to know the nature and extent of subject to implementation of the appropriate
processing. organizational, physical, and technical security measures
required by the Act in order to safeguard the rights and
2. Information provided to a data subject must always be freedoms of the data subject.
in clear and plain language to ensure that they are easy to
understand and access. 2. Personal data which is aggregated or kept in a form
which does not permit identification of data subjects may
3. Processing must be in a manner compatible with be kept longer than necessary for the declared, specified,
declared, specified, and legitimate purpose. and legitimate purpose.
4. Processed personal data should be adequate, relevant, 3. Personal data shall not be retained in perpetuity in
and limited to what is necessary in relation to the purposes contemplation of a possible future use yet to be
for which they are processed. determined.
5. Processing shall be undertaken in a manner that ensures Section 20. General Principles for Data Sharing. Further
appropriate privacy and security safeguards. Processing of Personal Data collected from a party other
than the Data Subject shall be allowed under any of the
following conditions:
c. Processing should ensure data quality.
a. Data sharing shall be allowed when it is expressly
1. Personal data should be accurate and where necessary authorized by law: Provided, that there are adequate
for declared, specified and legitimate purpose, kept up to safeguards for data privacy and security, and processing
date. adheres to principle of transparency, legitimate purpose
and proportionality.
2. Inaccurate or incomplete data must be rectified,
supplemented, destroyed or their further processing b. Data Sharing shall be allowed in the private sector if the
restricted. data subject consents to data sharing, and the following
conditions are complied with:
d. Personal Data shall not be retained longer than
necessary. 1. Consent for data sharing shall be required even when
the data is to be shared with an affiliate or mother
1. Retention of personal data shall only for as long as company, or similar relationships;
necessary:
2. Data sharing for commercial purposes, including direct
(a) for the fulfillment of the declared, specified, and marketing, shall be covered by a data sharing agreement.
legitimate purpose, or when the processing relevant to the
purpose has been terminated; (a) The data sharing agreement shall establish adequate
safeguards for data privacy and security, and uphold rights
(b) for the establishment, exercise or defense of legal of data subjects.
claims; or
(b) The data sharing agreement shall be subject to review
(c) for legitimate business purposes, which must be by the Commission, on its own initiative or upon complaint
consistent with standards followed by the applicable of data subject;
industry or approved by appropriate government agency.
3. The data subject shall be provided with the following
2. Retention of personal data shall be allowed in cases information prior to collection or before data is shared:
provided by law.
(a) Identity of the personal information controllers or steps at the request of the data subject prior to entering
personal information processors that will be given access the said agreement;
to the personal data;
c. The processing is necessary for compliance with a legal
(b) Purpose of data sharing; obligation to which the personal information controller is
subject;
(c) Categories of personal data concerned;
d. The processing is necessary to protect vitally important
(d) Intended recipients or categories of recipients of the interests of the data subject, including his or her life and
personal data; health;
(e) Existence of the rights of data subjects, including the e. The processing of personal information is necessary to
right to access and correction, and the right to object; respond to national emergency or to comply with the
requirements of public order and safety, as prescribed by
(f) Other information that would sufficiently notify the law;
data subject of the nature and extent of data sharing and
the manner of processing. f. The processing of personal information is necessary for
the fulfillment of the constitutional or statutory mandate of
4. Further processing of shared data shall adhere to the a public authority; or
data privacy principles laid down in the Act, these Rules,
and other issuances of the Commission. g. The processing is necessary to pursue the legitimate
interests of the personal information controller, or by a
c. Data collected from parties other than the data subject third party or parties to whom the data is disclosed, except
for purpose of research shall be allowed when the personal where such interests are overridden by fundamental rights
data is publicly available, or has the consent of the data and freedoms of the data subject, which require protection
subject for purpose of research: Provided, that adequate under the Philippine Constitution.
safeguards are in place, and no decision directly affecting
the data subject shall be made on the basis of the data Section 22. Sensitive Personal Information and Privileged
collected or processed. The rights of the data subject shall Information. The processing of sensitive personal and
be upheld without compromising research integrity. privileged information is prohibited, except in any of the
following cases:
d. Data sharing between government agencies for the
purpose of a public function or provision of a public a. Consent is given by data subject, or by the parties to the
service shall be covered a data sharing agreement. exchange of privileged information, prior to the processing
of the sensitive personal information or privileged
1. Any or all government agencies party to the agreement information, which shall be undertaken pursuant to a
shall comply with the Act, these Rules, and all other declared, specified, and legitimate purpose;
issuances of the Commission, including putting in place
adequate safeguards for data privacy and security. b. The processing of the sensitive personal information or
privileged information is provided for by existing laws and
2. The data sharing agreement shall be subject to review of regulations: Provided, that said laws and regulations do
the Commission, on its own initiative or upon complaint of not require the consent of the data subject for the
data subject. processing, and guarantee the protection of personal data;
Rule V. Lawful Processing of Personal Data c. The processing is necessary to protect the life and health
of the data subject or another person, and the data subject
is not legally or physically able to express his or her
Section 21. Criteria for Lawful Processing of Personal consent prior to the processing;
Information. Processing of personal information is allowed,
unless prohibited by law. For processing to be lawful, any
of the following conditions must be complied with: d. The processing is necessary to achieve the lawful and
noncommercial objectives of public organizations and
their associations provided that:
a. The data subject must have given his or her consent
prior to the collection, or as soon as practicable and
reasonable; 1. Processing is confined and related to the bona fide
members of these organizations or their associations;
b. The processing involves the personal information of a
data subject who is a party to a contractual agreement, in 2. The sensitive personal information are not transferred
order to fulfill obligations under the contract or to take to third parties; and
3. Consent of the data subject was obtained prior to access to personal data, does not process them except
processing; upon their instructions, or as required by law.
e. The processing is necessary for the purpose of medical The security measures shall aim to maintain the
treatment: Provided, that it is carried out by a medical availability, integrity, and confidentiality of personal data
practitioner or a medical treatment institution, and an and are intended for the protection of personal data
adequate level of protection of personal data is ensured; or against any accidental or unlawful destruction, alteration,
and disclosure, as well as against any other unlawful
f. The processing concerns sensitive personal information processing. These measures shall be implemented to
or privileged information necessary for the protection of protect personal data against natural dangers such as
lawful rights and interests of natural or legal persons in accidental loss or destruction, and human dangers such as
court proceedings, or the establishment, exercise, or unlawful access, fraudulent misuse, unlawful destruction,
defense of legal claims, or when provided to government alteration and contamination.
or public authority pursuant to a constitutional or
statutory mandate. Section 26. Organizational Security Measures. Where
appropriate, personal information controllers and
Section 23. Extension of Privileged Communication. personal information processors shall comply with the
Personal information controllers may invoke the principle following guidelines for organizational security:
of privileged communication over privileged information
that they lawfully control or process. Subject to existing a. Compliance Officers. Any natural or juridical person or
laws and regulations, any evidence gathered from other body involved in the processing of personal data
privileged information is inadmissible. shall designate an individual or individuals who shall
function as data protection officer, compliance officer or
When the Commission inquires upon communication otherwise be accountable for ensuring compliance with
claimed to be privileged, the personal information applicable laws and regulations for the protection of data
controller concerned shall prove the nature of the privacy and security.
communication in an executive session. Should the
communication be determined as privileged, it shall be b. Data Protection Policies. Any natural or juridical person
excluded from evidence, and the contents thereof shall not or other body involved in the processing of personal data
form part of the records of the case: Provided, that where shall implement appropriate data protection policies that
the privileged communication itself is the subject of a provide for organization, physical, and technical security
breach, or a privacy concern or investigation, it may be measures, and, for such purpose, take into account the
disclosed to the Commission but only to the extent nature, scope, context and purposes of the processing, as
necessary for the purpose of investigation, without well as the risks posed to the rights and freedoms of data
including the contents thereof in the records. subjects.
Section 24. Surveillance of Suspects and Interception of 1. The policies shall implement data protection principles
Recording of Communications. Section 7 of Republic Act No. both at the time of the determination of the means for
9372, otherwise known as the “Human Security Act of processing and at the time of the processing itself.
2007”, is hereby amended to include the condition that the
processing of personal data for the purpose of surveillance, 2. The policies shall implement appropriate security
interception, or recording of communications shall comply measures that, by default, ensure only personal data which
with the Data Privacy Act, including adherence to the is necessary for the specified purpose of the processing are
principles of transparency, proportionality, and legitimate processed. They shall determine the amount of personal
purpose. data collected, including the extent of processing involved,
the period of their storage, and their accessibility.
Rule VI. Security Measures for the Protection of
Personal Data 3. The polices shall provide for documentation, regular
review, evaluation, and updating of the privacy and
Section 25. Data Privacy and Security. Personal information security policies and practices.
controllers and personal information processors shall
implement reasonable and appropriate organizational, c. Records of Processing Activities. Any natural or juridical
physical, and technical security measures for the person or other body involved in the processing of
protection of personal data. personal data shall maintain records that sufficiently
describe its data processing system, and identify the duties
The personal information controller and personal and responsibilities of those individuals who will have
information processor shall take steps to ensure that any access to personal data. Records should include:
natural person acting under their authority and who has
1. Information about the purpose of the processing of 5. Data retention schedule, including timeline or conditions
personal data, including any intended future processing or for erasure or disposal of records.
data sharing;
f. Contracts with Personal Information Processors. The
2. A description of all categories of data subjects, personal personal information controller, through appropriate
data, and recipients of such personal data that will be contractual agreements, shall ensure that its personal
involved in the processing; information processors, where applicable, shall also
implement the security measures required by the Act and
3. General information about the data flow within the these Rules. It shall only engage those personal
organization, from the time of collection, processing, and information processors that provide sufficient guarantees
retention, including the time limits for disposal or erasure to implement appropriate security measures specified in
of personal data; the Act and these Rules, and ensure the protection of the
rights of the data subject.
4. A general description of the organizational, physical, and
technical security measures in place; Section 27. Physical Security Measures. Where appropriate,
personal information controllers and personal information
5. The name and contact details of the personal processors shall comply with the following guidelines for
information controller and, where applicable, the joint physical security:
controller, the its representative, and the compliance
officer or Data Protection Officer, or any other individual a. Policies and procedures shall be implemented to
or individuals accountable for ensuring compliance with monitor and limit access to and activities in the room,
the applicable laws and regulations for the protection of workstation or facility, including guidelines that specify
data privacy and security. the proper use of and access to electronic media;
d. Management of Human Resources. Any natural or b. Design of office space and work stations, including the
juridical person or other entity involved in the processing physical arrangement of furniture and equipment, shall
of personal data shall be responsible for selecting and provide privacy to anyone processing personal data, taking
supervising its employees, agents, or representatives, into consideration the environment and accessibility to the
particularly those who will have access to personal data. public;
The said employees, agents, or representatives shall c. The duties, responsibilities and schedule of individuals
operate and hold personal data under strict confidentiality involved in the processing of personal data shall be clearly
if the personal data are not intended for public disclosure. defined to ensure that only the individuals actually
This obligation shall continue even after leaving the public performing official duties shall be in the room or work
service, transferring to another position, or upon station, at any given time;
terminating their employment or contractual relations.
There shall be capacity building, orientation or training d. Any natural or juridical person or other body involved in
programs for such employees, agents or representatives, the processing of personal data shall implement Policies
regarding privacy or security policies. and procedures regarding the transfer, removal, disposal,
and re-use of electronic media, to ensure appropriate
e. Processing of Personal Data. Any natural or juridical protection of personal data;
person or other body involved in the processing of
personal data shall develop, implement and review: e. Policies and procedures that prevent the mechanical
destruction of files and equipment shall be established.
1. A procedure for the collection of personal data, including The room and workstation used in the processing of
procedures for obtaining consent, when applicable; personal data shall, as far as practicable, be secured
against natural disasters, power disturbances, external
2. Procedures that limit the processing of data, to ensure access, and other similar threats.
that it is only to the extent necessary for the declared,
specified, and legitimate purpose; Section 28. Guidelines for Technical Security
Measures. Where appropriate, personal information
3. Policies for access management, system monitoring, and controllers and personal information processors shall
protocols to follow during security incidents or technical adopt and establish the following technical security
problems; measures:
4. Policies and procedures for data subjects to exercise a. A security policy with respect to the processing of
their rights under the Act; personal data;
b. Safeguards to protect their computer network against 2. The data subject shall be notified and furnished with
accidental, unlawful or unauthorized usage, any information indicated hereunder before the entry of his or
interference which will affect data integrity or hinder the her personal data into the processing system of the
functioning or availability of the system, and unauthorized personal information controller, or at the next practical
access through an electronic network; opportunity:
c. The ability to ensure and maintain the confidentiality, (a) Description of the personal data to be entered into the
integrity, availability, and resilience of their processing system;
systems and services;
(b) Purposes for which they are being or will be processed,
d. Regular monitoring for security breaches, and a process including processing for direct marketing, profiling or
both for identifying and accessing reasonably foreseeable historical, statistical or scientific purpose;
vulnerabilities in their computer networks, and for taking
preventive, corrective, and mitigating action against (c) Basis of processing, when processing is not based on
security incidents that can lead to a personal data breach; the consent of the data subject;
e. The ability to restore the availability and access to (d) Scope and method of the personal data processing;
personal data in a timely manner in the event of a physical
or technical incident; (e) The recipients or classes of recipients to whom the
personal data are or may be disclosed;
f. A process for regularly testing, assessing, and evaluating
the effectiveness of security measures; (f) Methods utilized for automated access, if the same is
allowed by the data subject, and the extent to which such
g. Encryption of personal data during storage and while in access is authorized, including meaningful information
transit, authentication process, and other technical about the logic involved, as well as the significance and the
security measures that control and limit access. envisaged consequences of such processing for the data
subject;
Section 29. Appropriate Level of Security. The Commission
shall monitor the compliance of natural or juridical person (g) The identity and contact details of the personal data
or other body involved in the processing of personal data, controller or its representative;
specifically their security measures, with the guidelines
provided in these Rules and subsequent issuances of the (h) The period for which the information will be stored;
Commission. In determining the level of security and
appropriate for a particular personal information
controller or personal information processor, the
(i) The existence of their rights as data subjects, including
Commission shall take into account the nature of the
the right to access, correction, and object to the processing,
personal data that requires protection, the risks posed by
as well as the right to lodge a complaint before the
the processing, the size of the organization and complexity
Commission.
of its operations, current data privacy best practices, and
the cost of security implementation. The security measures
provided herein shall be subject to regular review and b. Right to object. The data subject shall have the right to
evaluation, and may be updated as necessary by the object to the processing of his or her personal data,
Commission in separate issuances, taking into account the including processing for direct marketing, automated
most appropriate standard recognized by the information processing or profiling. The data subject shall also be
and communications technology industry and data privacy notified and given an opportunity to withhold consent to
best practices. the processing in case of changes or any amendment to the
information supplied or declared to the data subject in the
preceding paragraph.
Rule VIII. Rights of Data Subjects
3. The information is being collected and processed as a (c) The personal data is no longer necessary for the
result of a legal obligation. purposes for which they were collected;
c. Right to Access. The data subject has the right to (d) The data subject withdraws consent or objects to the
reasonable access to, upon demand, the following: processing, and there is no other legal ground or
overriding legitimate interest for the processing;
1. Contents of his or her personal data that were
processed; (e) The personal data concerns private information that is
prejudicial to data subject, unless justified by freedom of
2. Sources from which personal data were obtained; speech, of expression, or of the press or otherwise
authorized;
3. Names and addresses of recipients of the personal data;
(f) The processing is unlawful;
4. Manner by which such data were processed;
(g) The personal information controller or personal
5. Reasons for the disclosure of the personal data to information processor violated the rights of the data
recipients, if any; subject.
6. Information on automated processes where the data 2. The personal information controller may notify third
will, or is likely to, be made as the sole basis for any parties who have previously received such processed
decision that significantly affects or will affect the data personal information.
subject;
f. Right to damages. The data subject shall be indemnified
7. Date when his or her personal data concerning the data for any damages sustained due to such inaccurate,
subject were last accessed and modified; and incomplete, outdated, false, unlawfully obtained or
unauthorized use of personal data, taking into account any
violation of his or her rights and freedoms as data subject.
8. The designation, name or identity, and address of the
personal information controller.
Section 35. Transmissibility of Rights of the Data Subject.
The lawful heirs and assigns of the data subject may invoke
d. Right to rectification. The data subject has the right to the rights of the data subject to which he or she is an heir
dispute the inaccuracy or error in the personal data and or an assignee, at any time after the death of the data
have the personal information controller correct it subject, or when the data subject is incapacitated or
immediately and accordingly, unless the request is incapable of exercising the rights as enumerated in the
vexatious or otherwise unreasonable. If the personal data immediately preceding section.
has been corrected, the personal information controller
shall ensure the accessibility of both the new and the
retracted information and the simultaneous receipt of the Section 36. Right to Data Portability. Where his or her
new and the retracted information by the intended personal data is processed by electronic means and in a
recipients thereof: Provided, That recipients or third structured and commonly used format, the data subject
parties who have previously received such processed shall have the right to obtain from the personal
personal data shall be informed of its inaccuracy and its information controller a copy of such data in an electronic
rectification, upon reasonable request of the data subject. or structured format that is commonly used and allows for
further use by the data subject. The exercise of this right
shall primarily take into account the right of data subject to
e. Right to Erasure or Blocking. The data subject shall have have control over his or her personal data being processed
the right to suspend, withdraw or order the blocking, based on consent or contract, for commercial purpose, or
removal or destruction of his or her personal data from the through automated means. The Commission may specify
personal information controller’s filing system. the electronic format referred to above, as well as the
technical standards, modalities, procedures and other
1. This right may be exercised upon discovery and rules for their transfer.
substantial proof of any of the following:
Section 37. Limitation on Rights. The immediately
(a) The personal data is incomplete, outdated, false, or preceding sections shall not be applicable if the processed
unlawfully obtained; personal data are used only for the needs of scientific and
statistical research and, on the basis of such, no activities
are carried out and no decisions are taken regarding the
data subject: Provided, that the personal data shall be held b. The Commission may exempt a personal information
under strict confidentiality and shall be used only for the controller from notification where, in its reasonable
declared purpose. The said sections are also not applicable judgment, such notification would not be in the public
to the processing of personal data gathered for the interest, or in the interest of the affected data subjects.
purpose of investigations in relation to any criminal,
administrative or tax liabilities of a data subject. Any c. The Commission may authorize postponement of
limitations on the rights of the data subject shall only be to notification where it may hinder the progress of a criminal
the minimum extent necessary to achieve the purpose of investigation related to a serious breach.
said research or investigation.
Section 41. Breach Report.
Rule IX. Data Breach Notification.
a. The personal information controller shall notify the
Section 38. Data Breach Notification. Commission by submitting a report, whether written or
electronic, containing the required contents of notification.
a. The Commission and affected data subjects shall be The report shall also include the name of a designated
notified by the personal information controller within representative of the personal information controller, and
seventy-two (72) hours upon knowledge of, or when there his or her contact details.
is reasonable belief by the personal information controller
or personal information processor that, a personal data b. All security incidents and personal data breaches shall
breach requiring notification has occurred. be documented through written reports, including those
not covered by the notification requirements. In the case of
b. Notification of personal data breach shall be required personal data breaches, a report shall include the facts
when sensitive personal information or any other surrounding an incident, the effects of such incident, and
information that may, under the circumstances, be used to the remedial actions taken by the personal information
enable identity fraud are reasonably believed to have been controller. In other security incidents not involving
acquired by an unauthorized person, and the personal personal data, a report containing aggregated data shall
information controller or the Commission believes that constitute sufficient documentation. These reports shall be
such unauthorized acquisition is likely to give rise to a real made available when requested by the Commission. A
risk of serious harm to any affected data subject. general summary of the reports shall be submitted to the
Commission annually.
c. Depending on the nature of the incident, or if there is
delay or failure to notify, the Commission may investigate Section 42. Procedure for Notification. The Procedure for
the circumstances surrounding the personal data breach. breach notification shall be in accordance with the Act,
Investigations may include on-site examination of systems these Rules, and any other issuance of the Commission.
and procedures.
Rule XII. Rules on Accountability
Section 39. Contents of Notification. The notification shall at
least describe the nature of the breach, the personal data Section 50. Accountability for Transfer of Personal Data. A
possibly involved, and the measures taken by the entity to personal information controller shall be responsible for
address the breach. The notification shall also include any personal data under its control or custody, including
measures taken to reduce the harm or negative information that have been outsourced or transferred to a
consequences of the breach, the representatives of the personal information processor or a third party for
personal information controller, including their contact processing, whether domestically or internationally,
details, from whom the data subject can obtain additional subject to cross-border arrangement and cooperation.
information about the breach, and any assistance to be
provided to the affected data subjects. a. A personal information controller shall be accountable
for complying with the requirements of the Act, these
Section 40. Delay of Notification. Notification may be Rules, and other issuances of the Commission. It shall use
delayed only to the extent necessary to determine the contractual or other reasonable means to provide a
scope of the breach, to prevent further disclosures, or to comparable level of protection to the personal data while it
restore reasonable integrity to the information and is being processed by a personal information processor or
communications system. third party.
(2) The relevant geographic market The Chairperson and the Commissioners shall enjoy
comprises the area in which the entity security of tenure and shall not be suspended or removed
concerned is involved in the supply and from office except for just cause as provided by law.
demand of goods and services, in which
the conditions of competition are Section 12. Powers and Functions. — The Commission
sufficiently homogenous and which can shall have original and primary jurisdiction over the
be distinguished from neighboring areas enforcement and implementation of the provisions of this
because the conditions of competition are Act, and its implementing rules and regulations. The
different in those areas. Commission shall exercise the following powers and
functions:
CHAPTER II PHILIPPINE COMPETITION
COMMISSION (a) Conduct inquiry, investigate, and hear and
decide on cases involving any violation of this Act
Section 5. Philippine Competition Commission. – To and other existing competition laws motu
implement the national competition policy and attain the proprio or upon receipt of a verified complaint
objectives and purposes of this Act, an independent quasi- from an interested party or upon referral by the
judicial body is hereby created, which shall be known as concerned regulatory agency, and institute the
the Philippine Competition Commission (PCC), hereinafter appropriate civil or criminal proceedings;
referred to as the Commission, and which shall be
organized within sixty (60) days after the effectivity of this (b) Review proposed mergers and acquisitions,
Act. Upon establishment of the Commission, Executive determine thresholds for notification, determine
Order No. 45 designating the Department of Justice as the the requirements and procedures for notification,
Competition Authority is hereby amended. The Office for and upon exercise of its powers to review,
Competition (OFC) under the Office of the Secretary of prohibit mergers and acquisitions that will
Justice shall however be retained, with its powers and substantially prevent, restrict, or lessen
functions modified pursuant to Section 13 of this Chapter. competition in the relevant market;
The Commission shall be an attached agency to the Office (c) Monitor and undertake consultation with
of the President. stakeholders and affected agencies for the
purpose of understanding market behavior;
Section 6. Composition of the Commission. – The
Commission shall be composed of a Chairperson and four (d) Upon finding, based on substantial evidence,
(4) Commissioners. The Chairperson and the that an entity has entered into an anti-competitive
Commissioners shall be citizens and residents of the agreement or has abused its dominant position
Philippines, of good moral character, of recognized probity after due notice and hearing, stop or redress the
and independence and must have distinguished same, by applying remedies, such as, but not
themselves professionally in public, civic or academic limited to, issuance of injunctions, requirement of
service in any of the following fields: economics, law, divestment, and disgorgement of excess profits
finance, commerce or engineering. They must have been in under such reasonable parameters that shall be
the active practice of their professions for at least ten (10) prescribed by the rules and regulations
years, and must not have been candidates for any elective implementing this Act;
national or local office in the immediately preceding
elections, whether regular or special: Provided, That at (e) Conduct administrative proceedings, impose
least one (1) shall be a member of the Philippine Bar with sanctions, fines or penalties for any
at least ten (10) years of experience in the active practice noncompliance with or breach of this Act and its
of law, and at least one (1) shall be an economist. The implementing rules and regulations (IRR) and
Chairperson and the Commissioners who shall have the punish for contempt;
rank equivalent of cabinet secretary and undersecretary,
respectively, shall be appointed by the President.
(f) Issue subpoena duces tecum and subpoena ad
testificandum to require the production of books,
Section 7. Term of Office. – The term of office of the records, or other documents or data which relate
Chairperson and the Commissioners shall be seven (7) to any matter relevant to the investigation and
years without reappointment. Of the first set of appointees, personal appearance before the Commission,
the Chairperson shall hold office for seven (7) years and of summon witnesses, administer oaths, and issue
the first four (4) Commissioners, two (2) shall hold office interim orders such as show cause orders and
for a term of seven (7) years and two (2) for a term of five
cease and desist orders after due notice and (m) Conduct, publish, and disseminate studies and
hearing in accordance with the rules and reports on anti-competitive conduct and
regulations implementing this Act; agreements to inform and guide the industry and
consumers;
(g) Upon order of the court, undertake inspections
of business premises and other offices, land and (n) Intervene or participate in administrative and
vehicles, as used by the entity, where it reasonably regulatory proceedings requiring consideration of
suspects that relevant books, tax records, or other the provisions of this Act that are initiated by
documents which relate to any matter relevant to government agencies such as the Securities and
the investigation are kept, in order to prevent the Exchange Commission, the Energy Regulatory
removal, concealment, tampering with, or Commission and the National
destruction of the books, records, or other Telecommunications Commission;
documents;
(o) Assist the National Economic and
(h) Issue adjustment or divestiture orders Development Authority, in consultation with
including orders for corporate reorganization or relevant agencies and sectors, in the preparation
divestment in the manner and under such terms and formulation of a national competition policy;
and conditions as may be prescribed in the rules
and regulations implementing this Act. (p) Act as the official representative of the
Adjustment or divestiture orders, which are Philippine government in international
structural remedies, should only be imposed: competition matters;
(1) Where there is no equally effective (q) Promote capacity building and the sharing of
behavioral remedy; or best practices with other competition-related
bodies;
(2) Where any equally effective
behavioral remedy would be more (r) Advocate pro-competitive policies of the
burdensome for the enterprise concerned government by:
than the structural remedy. Changes to
the structure of an enterprise as it existed (1) Reviewing economic and
before the infringement was committed administrative regulations, motu
would only be proportionate to the proprio or upon request, as to whether or
substantial risk of a lasting or repeated not they adversely affect relevant market
infringement that derives from the very competition, and advising the concerned
structure of the enterprise; agencies against such regulations; and
(i) Deputize any and all enforcement agencies of (2) Advising the Executive Branch on the
the government or enlist the aid and support of competitive implications of government
any private institution, corporation, entity or actions, policies and programs; and
association, in the implementation of its powers
and functions;
(s) Charging reasonable fees to defray the
administrative cost of the services rendered.
(j) Monitor compliance by the person or entities
concerned with the cease and desist order or
Section 13. Office for Competition (OFC), Powers and
consent judgment;
Functions. — The OFC under the Department of Justice
(DOJ-OFC) shall only conduct preliminary investigation
(k) Issue advisory opinions and guidelines on and undertake prosecution of all criminal offenses arising
competition matters for the effective enforcement under this Act and other competition-related laws in
of this Act and submit annual and special reports accordance with Section 31 of Chapter VI of this Act. The
to Congress, including proposed legislation for the OFC shall be reorganized and allocated resources as may
regulation of commerce, trade, or industry; be required therefor to effectively pursue such mandate.
(l) Monitor and analyze the practice of CHAPTER III PROHIBITED ACTS
competition in markets that affect the Philippine
economy; implement and oversee measures to
Section 14. Anti-Competitive Agreements. –
promote transparency and accountability; and
ensure that prohibitions and requirements of
competition laws are adhered to; (a) The following agreements, between or among
competitors, are per se prohibited:
(1) Restricting competition as to price, or those that develop in the market as a result of or
components thereof, or other terms of arising from a superior product or process,
trade; business acumen, or legal rights or laws;
(2) Fixing price at an auction or in any (c) Making a transaction subject to acceptance by
form of bidding including cover bidding, the other parties of other obligations which, by
bid suppression, bid rotation and market their nature or according to commercial usage,
allocation and other analogous practices have no connection with the transaction;
of bid manipulation;
(d) Setting prices or other terms or conditions that
(b) The following agreements, between or among discriminate unreasonably between customers or
competitors which have the object or effect of sellers of the same goods or services, where such
substantially preventing, restricting or lessening customers or sellers are contemporaneously
competition shall be prohibited: trading on similar terms and conditions, where
the effect may be to lessen competition
(1) Setting, Kmiting, or controlling substantially: Provided, That the following shall be
production, markets, technical considered permissible price differentials:
development, or investment;
(1) Socialized pricing for the less
(2) Dividing or sharing the market, fortunate sector of the economy;
whether by volume of sales or purchases,
territory, type of goods or services, (2) Price differential which reasonably or
buyers or sellers or any other means; approximately reflect differences in the
cost of manufacture, sale, or delivery
(c) Agreements other than those specified in (a) resulting from differing methods,
and (b) of this section which have the object or technical conditions, or quantities in
effect of substantially preventing, restricting or which the goods or services are sold or
lessening competition shall also be delivered to the buyers or sellers;
prohibited: Provided, Those which contribute to
improving the production or distribution of goods (3) Price differential or terms of sale
and services or to promoting technical or offered in response to the competitive
economic progress, while allowing consumers a price of payments, services or changes in
fair share of the resulting benefits, may not the facilities furnished by a competitor;
necessarily be deemed a violation of this Act. and
An entity that controls, is controlled by, or is under (4) Price changes in response to changing
common control with another entity or entities, have market conditions, marketability of goods
common economic interests, and are not otherwise able to or services, or volume;
decide or act independently of each other, shall not be
considered competitors for purposes of this section. (e) Imposing restrictions on the lease or contract
for sale or trade of goods or services concerning
Section 15. Abuse of Dominant Position. – It shall be where, to whom, or in what forms goods or
prohibited for one or more entities to abuse their services may be sold or traded, such as fixing
dominant position by engaging in conduct that would prices, giving preferential discounts or rebate
substantially prevent, restrict or lessen competition: upon such price, or imposing conditions not to
deal with competing entities, where the object or
(a) Selling goods or services below cost with the effect of the restrictions is to prevent, restrict or
object of driving competition out of the relevant lessen competition substantially: Provided, That
market: Provided, That in the Commission’s nothing contained in this Act shall prohibit or
evaluation of this fact, it shall consider whether render unlawful:
the entity or entities have no such object and the
price established was in good faith to meet or (1) Permissible franchising, licensing,
compete with the lower price of a competitor in exclusive merchandising or exclusive
the same market selling the same or comparable distributorship agreements such as those
product or service of like quality; which give each party the right to
unilaterally terminate the agreement; or
(b) Imposing barriers to entry or committing acts
that prevent competitors from growing within the
market in an anti-competitive manner except
(2) Agreements protecting intellectual preceding section wherein the value of the transaction
property rights, confidential information, exceeds one billion pesos (P1,000,000,000.00) are
or trade secrets; prohibited from consummating their agreement until
thirty (30) days after providing notification to the
(f) Making supply of particular goods or services Commission in the form and containing the information
dependent upon the purchase of other goods or specified in the regulations issued by the
services from the supplier which have no direct Commission: Provided, That the Commission shall
connection with the main goods or services to be promulgate other criteria, such as increased market share
supplied; in the relevant market in excess of minimum thresholds,
that may be applied specifically to a sector, or across some
(g) Directly or indirectly imposing unfairly low or all sectors, in determining whether parties to a merger
purchase prices for the goods or services of, or acquisition shall notify the Commission under this
among others, marginalized agricultural Chapter.
producers, fisherfolk, micro-, small-, medium-scale
enterprises, and other marginalized service An agreement consummated in violation of this
providers and producers; requirement to notify the Commission shall be considered
void and subject the parties to an administrative fine of
(h) Directly or indirectly imposing unfair purchase one percent (1%) to five percent (5%) of the value of the
or selling price on their competitors, customers, transaction.
suppliers or consumers, provided that prices that
develop in the market as a result of or due to a Should the Commission deem it necessary, it may request
superior product or process, business acumen or further information that are reasonably necessary and
legal rights or laws shall not be considered unfair directly relevant to the prohibition under Section 20
prices; and hereof from the parties to the agreement before the
expiration of the thirty (30)-day period referred. The
(i) Limiting production, markets or technical issuance of such a request has the effect of extending the
development to the prejudice of consumers, period within which the agreement may not be
provided that limitations that develop in the consummated for an additional sixty (60) days, beginning
market as a result of or due to a superior product on the day after the request for information is received by
or process, business acumen or legal rights or the parties: Provided, That, in no case shall the total period
laws shall not be a violation of this Act: for review by the Commission of the subject agreement
exceed ninety (90) days from initial notification by the
parties.
Provided, That nothing in this Act shall be construed or
interpreted as a prohibition on having a dominant position
in a relevant market or on acquiring, maintaining and When the above periods have expired and no decision has
increasing market share through legitimate means that do been promulgated for whatever reason, the merger or
not substantially prevent, restrict or lessen competition: acquisition shall be deemed approved and the parties may
proceed to implement or consummate it. All notices,
documents and information provided to or emanating
Provided, further, That any conduct which contributes to from the Commission under this section shall be subject to
improving production or distribution of goods or services confidentiality rule under Section 34 of this Act except
within the relevant market, or promoting technical and when the release of information contained therein is with
economic progress while allowing consumers a fair share the consent of the notifying entity or is mandatorily
of the resulting benefit may not necessarily be considered required to be disclosed by law or by a valid order of a
an abuse of dominant position: court of competent jurisdiction, or of a government or
regulatory agency, including an exchange.
Provided, finally, That the foregoing shall not constrain the
Commission or the relevant regulator from pursuing In the case of the merger or acquisition of banks, banking
measures that would promote fair competition or more institutions, building and loan associations, trust
competition as provided in this Act. companies, insurance companies, public utilities,
educational institutions and other special corporations
CHAPTER IV MERGERS AND ACQUISITIONS governed by special laws, a favorable or no-objection
ruling by the Commission shall not be construed as
Section 16. Review of Mergers and Acquisitions. — The dispensing of the requirement for a favorable
Commission shall have the power to review mergers and recommendation by the appropriate government agency
acquisitions based on factors deemed relevant by the under Section 79 of the Corporation Code of the
Commission. Philippines.
Section 18. Effect of Notification. — If within the relevant Provided, That an entity shall not be prohibited from
periods stipulated in the preceding section, the continuing to own and hold the stock or other share capital
Commission determines that such agreement is prohibited or assets of another corporation which it acquired prior to
under Section 20 and does not qualify for exemption under the approval of this Act or acquiring or maintaining its
Section 21 of this Chapter, the Commission may: market share in a relevant market through such means
without violating the provisions of this Act:
(a) Prohibit the implementation of the agreement;
Provided, further, That the acquisition of the stock or other
(b) Prohibit the implementation of the agreement share capital of one or more corporations solely for
unless and until it is modified by changes specified investment and not used for voting or exercising control
by the Commission. and not to otherwise bring about, or attempt to bring
about the prevention, restriction, or lessening of
(c) Prohibit the implementation of the agreement competition in the relevant market shall not be prohibited.
unless and until the pertinent party or parties
enter into legally enforceable agreements Section 22. Burden of Proof. – The burden of proof under
specified by the Commission. Section 21 lies with the parties seeking the exemption. A
party seeking to rely on the exemption specified in Section
Section 19. Notification Threshold. – The Commission 21(a) must demonstrate that if the agreement were not
shall, from time to time, adopt and publish regulations implemented, significant efficiency gains would not be
stipulating: realized.
(a) The transaction value threshold and such other Section 23. Finality of Ridings on Mergers and Acquisitions.
criteria subject to the notification requirement of – Merger or acquisition agreements that have received a
Section 17 of this Act; favorable ruling from the Commission, except when such
ruling was obtained on the basis of fraud or false material
information, may not be challenged under this Act.
(b) The information that must be supplied for
notified merger or acquisition;
CHAPTER V DISPOSITION OF CASES
(c) Exceptions or exemptions from the notification
requirement; and Section 24. Relevant Market. – For purposes of
determining the relevant market, the following factors,
among others, affecting the substitutability among goods
(d) Other rules relating to the notification or services constituting such market and the geographic
procedures. area delineating the boundaries of the market shall be
considered:
Section 20. Prohibited. Mergers and Acquisitions. – Merger
or acquisition agreements that substantially prevent, (a) The possibilities of substituting the goods or
restrict or lessen competition in the relevant market or in services in question, with others of domestic or
the market for goods or services as may be determined by foreign origin, considering the technological
the Commission shall be prohibited. possibilities, extent to which substitutes are
available to consumers and time required for such
Section 21. Exemptions from Prohibited. Mergers and substitution;
Acquisitions. – Merger or acquisition agreement prohibited
under Section 20 of this Chapter may, nonetheless, be (b) The cost of distribution of the good or service,
exempt from prohibition by the Commission when the its raw materials, its supplements and substitutes
parties establish either of the following: from other areas and abroad, considering freight,
insurance, import duties and non-tariff
(a) The concentration has brought about or is restrictions; the restrictions imposed by economic
likely to bring about gains in efficiencies that are agents or by their associations; and the time
greater than the effects of any limitation on required to supply the market from those areas;
competition that result or likely to result from the
merger or acquisition agreement; or (c) The cost and probability of users or consumers
seeking other markets; and
(b) A party to the merger or acquisition agreement
is faced with actual or imminent financial failure, (d) National, local or international restrictions
and the agreement represents the least anti- which limit access by users or consumers to
alternate sources of supply or the access of requirements of large investments in
suppliers to alternate consumers. infrastructure, the requirements of law, and the
need of our economy to respond to international
Section 25. Control of an Entity. – In determining the competition, but also taking account of past
control of an entity, the Commission may consider the behavior of the parties involved and prevailing
following: market conditions;
Control is presumed to exist when the parent owns (d) Balance the need to ensure that competition is
directly or indirectly, through subsidiaries, more than one not prevented or substantially restricted and the
half (1/2) of the voting power of an entity, unless in risk that competition efficiency, productivity,
exceptional circumstances, it can clearly be demonstrated innovation, or development of priority areas or
that such ownership does not constitute control. Control industries in the general interest of the country
also exists even when an entity owns one half (1/2) or less may be deterred by overzealous or undue
of the voting power of another entity when: intervention; and
(a) There is power over more than one half (1/2) (e) Assess the totality of evidence on whether it is
of the voting rights by virtue of an agreement with more likely than not that the entity has engaged in
investors; anti-competitive agreement or conduct including
whether the entity’s conduct was done with a
(b) There is power to direct or govern the reasonable commercial purpose such as but not
financial and operating policies of the entity under limited to phasing out of a product or closure of a
a statute or agreement; business, or as a reasonable commercial response
to the market entry or conduct of a competitor.
(c) There is power to appoint or remove the
majority of the members of the board of directors Section 27. Market Dominant Position. – In determining
or equivalent governing body; whether an entity has market dominant position for
purposes of this Act, the Commission shall consider the
following:
(d) There is power to cast the majority votes at
meetings of the board of directors or equivalent
governing body; (a) The share of the entity in the relevant market
and whether it is able to fix prices unilaterally or
to restrict supply in the relevant market;
(e) There exists ownership over or the right to use
all or a significant part of the assets of the entity;
(b) The existence of barriers to entry and the
elements which could foreseeably alter both said
(f) There exist rights or contracts which confer barriers and the supply from competitors;
decisive influence on the decisions of the entity.
(c) The existence and power of its competitors;
Section 26. Determination of Anti-Competitive Agreement
or Conduct. – In determining whether anti-competitive
agreement or conduct has been committed, the (d) The possibility of access by its competitors or
Commission shall: other entities to its sources of inputs;
(a) Define the relevant market allegedly affected (e) The power of its customers to switch to other
by the anti-competitive agreement or conduct, goods or services;
following the principles laid out in Section 24 of
this Chapter; (f) Its recent conducts; and
(b) Determine if there is actual or potential (g) Other criteria established by the regulations of
adverse impact on competition in the relevant this Act.
market caused by the alleged agreement or
conduct, and if such impact is substantial and There shall be a rebuttable presumption of market
outweighs the actual or potential efficiency gains dominant position if the market share of an entity in the
that result from the agreement or conduct; relevant market is at least fifty percent (50%), unless a
new market share threshold is determined by the
(c) Adopt a broad and forward-looking Commission for that particular sector.
perspective, recognizing future market
developments, any overriding need to make the The Commission shall from time to time determine and
goods or services available to consumers, the publish the threshold for dominant position or minimum
level of share in the relevant market that could give rise to
a presumption of dominant position. In such
determination, the Commission would consider the
structure of the relevant market, degree of integration,
access to end-users, technology and financial resources,
and other factors affecting the control of a market, as
provided in subsections (a) to (g) of this section.
A public hearing shall be held to assist the Commission in ❼ Implementing Rules and Regulations of Philippine
making this determination. Competition Act
Rules 1-4 (Sections1-3, 5-6, 9-13)
The Commission’s order exempting the relevant entity or
group of entities under this section shall be made public.
Conditions may be attached to the forbearance if the
Commission deems it appropriate to ensure the long-term
interest of consumers.
● BSP, through Monetary Board (MB), issued (d) x x x the Monetary Board may
Resolution prohibiting EIB from doing business in the PH summarily and without need for prior
and placing it under receivership of PDIC hearing forbid the institution from
doing business in the Philippines and
● PDIC submitted its initial receivership report to designate the Philippine Deposit
MB Insurance Corporation as receiver of
the banking institution. xxx xxx xxx
o That EIB can be rehabilitated or permitted to
The receiver shall immediately gather
resume business provided that a bidding for its and take charge of all the assets and
rehabilitation will be conducted and the following liabilities of the institution, administer
conditions are met: the same for the benefit of its
creditors, and exercise the general
▪ (a) there are qualified interested banks that will powers of a receiver under the Revised
comply with the parameters for rehabilitation of a closed Rules of Court x x x[.]
bank, capital strengthening, liquidity, sustainability and
viability of operations, and strengthening of bank If the receiver determines that the
governance; and institution cannot be rehabilitated or
permitted to resume business in
▪ (b) all parties (including creditors and accordance with the next preceding
stockholders) agree to the rehabilitation and the revised paragraph, the Monetary Board shall
payment terms and conditions of outstanding liabilities.|| notify in writing the board of directors
of its findings and direct the receiver
● During public bidding, no bid was submitted; re- to proceed with the liquidation of the
bidding was set but also did not materialize since there institution. The receiver shall:
was no bid
xxx xxx xxx
● PDIC informed BSP that EIB can hardly be
rehabilitated The actions of the Monetary Board
taken under this section or under
● MB issued Resolution directing PDIC to proceed Section 29 of this Act shall be final and
with liquidation of EIB executors, and may not be restrained
or set aside by the court except on
● Petitioners (SHs representing majority of EIB) petition for certiorari on the ground
filed petition for certiorari challenging said Resolution of that the action taken was in excess of
MB jurisdiction or with such grave abuse
of discretion as to amount to lack or
o Blamed PDIC for failure of rehabilitation excess of jurisdiction. The petition
for certiorari may only be filed by the
● PDIC countered that they are already estopped stockholders of record representing
from assailing placement of EIB under receivership and its the majority of the capital stock within
eventual liquidation since they had already surrendered ten (10) days from receipt by the
full control of the bank to BSP board of directors of the institution of
the order directing receivership,
● CA dismissed liquidation or conservatorship.
ISSUE:
● Power and authority of MB to close banks and WEEK 15 #02 So v. Philippine Deposit Insurance Corp.
liquidate them when public interest so requires is an G.R. No. 230020 | March 19, 2018
exercise of police power of the State
Topic: new amendment in PDIC's Charter under RA
● Police power is subject to judicial inquiry and may 10846, specifically Section 5(g)
Petitioner: PETER L. SO
not be exercised arbitrarily or unreasonably and could be
Respondent: PHILIPPINE DEPOSIT INSURANCE
set aside if it is capricious, discriminatory, whimsical, CORPORATION
arbitrary, unjust or is tantamount to a denial of due Ponente: TIJAM, J.
process and equal protection clauses of Constitution
● The conditions stated for the rehabilitation of EIB o On the same year, however, So learned that CRBB
was not met because the bidding and re-bidding were closed its operations and was placed under Philippine
aborted since none of the pre-qualified Strategic Third Deposit Insurance Corporation's (PDIC's) receivership.
Party Investors (STPI) submitted letter of interest to This prompted So, together with other depositors, to
participate in the bidding which resulted in PDIC’s finding file an insurance claim with the PDIC. Acting upon such
that EIB is already insolvent and must already be claim, PDIC sent a letter/notice requiring So to submit
additional documents, which So averred of having
liquidated
complied with. Upon investigation, the PDIC found that
So’s account originated from and was funded by the
● Once the receiver (PDIC) determines that proceeds of a terminated SISA (mother account),
rehabilitation is no longer feasible, MB is simply obligated jointly owned by a certain Reyes family.
to:
o Thus, based on the determination that So's
o Notify in writing the bank’s Board of Directors account was among the product of the splitting of the
said mother account which is prohibited by law, PDIC
o Direct PDIC to proceed with liquidation denied So's claim for payment of deposit insurance. So
then filed a Request for Reconsideration, which was
likewise denied by the PDIC.
● MB is not required by law to make a separate and
distinct factual determination before it can order the o Aggrieved, So filed a Petition for Certiorari under
liquidation of a bank or quasi-bank when PDIC has already Rule 65 before the RTC.
made such determination
o RTC upheld the factual findings and conclusions of
● BSP (umbrella agency of MB), in its capacity as the PDIC. According to the RTC, based on the records,
government regulator of banks, and PDIC as statutory the PDIC correctly denied So's claim for insurance on
receiver of banks are the principal agencies mandated by the ground of splitting of deposits which is prohibited
by law.
law to determine financial viability of banks and quasi-
banks and facilitate receivership and liquidation of closed o RTC also declared that, pursuant to its Charter (RA
financial institutions upon factual determination of latter’s 3591), PDIC is empowered to determine and pass
insolvency upon the validity of the insurance deposits claims, it
being the deposit insurer. As such, when it rules on jurisdiction or with such grave abuse of discretion as
such claims, it is exercising a quasi-judicial function. to amount to a lack or excess of jurisdiction. The
petition for certiorari may only be filed within thirty
o Thus, it was held that petitioner's remedy to the (30) days from notice of denial of claim for deposit
dismissal of his claim is to file a petition for certiorari insurance.
with the Court of Appeals under Section 4, Rule 65,
stating that if the petition involves the acts or o As it stands, the controversy as to which court has
omissions of a quasi-judicial agency, unless otherwise jurisdiction over a petition for certiorari filed to
provided by law or the rules, it shall be filed in and question the PDIC's action is already settled.
cognizable only by the Court of Appeals (CA).
ISSUE:
RULING:
FACTS:
2. Section 4 (f) of R.A. No. 3591, as amended by R.A. No.
● Petitioners then opened Time Deposit Accounts 9576 states that
with RBMI through inter-branch deposits to the accounts
deposit means the unpaid balance of money or its
of Rural Bank of Mawab (Davao), Inc., (RBMI) maintained equivalent received by
in Metrobank and China Bank-Tagum, Davao Branches.
bank in the usual course of business and for which it has
● Petitioners came to know that the Monetary Board given or is obliged to give credit to a commercial, checking,
of the BSP placed RBMI under receivership and thereafter savings, time or thrift account, or issued in accordance
closed the latter. with Bangko Sentral rules and regulations and other
applicable laws, together with such other obligations of a
● Petitioners, then filed claims for insurance of their bank, which, consistent with banking usage and practices.
time deposits with the PDIC, but said claims were denied
on the ground that the time deposits were not valid
obligations of RBMI. For deposit to be considered as legitimate, it should be (1)
received by a bank as a deposit in the usual course of
● Petitioners filed a Petition for Certiorari under business; (2) recorded in the books of the bank as such; (3)
Rule 65 with the RTC. RTC dismissed for lack of opened in accordance with established forms and
jurisdiction. CA affirmed the RTC. requirements of the BSP and/or the PDIC. In order for the
claim for deposit insurance with the PDIC may prosper, it
is necessary that the corresponding deposit must be placed
ISSUES:
in the insured bank.
1. Whether the RTC has jurisdiction over the Petitions for
Certiorari filed by the petitioners – NO (CA has jurisdiction,
not RTC, PDIC being a quasi-judicial agency)
IN THIS CASE, upon investigation by the PDIC, it was
discovered that (1) the money allegedly placed by the
2. Whether the PDIC committed grave abuse of discretion
petitioners in RBMI was in fact credited to the personal
in denying petitioners claim for deposit insurance - NO
account of Garan, the President of RBMI, hence, they could
not be construed as valid liabilities of RBMI to petitioners;
RULING:
(2) based on bank records and the certified list of the
bank's outstanding deposit liabilities, the alleged deposits
1. Based on its charter, the PDIC has the duty to grant or
of petitioners are not part of RBMI's outstanding liabilities;
deny claims for deposit insurance under Section 4 (f) of
and (3) the CTDs are not validly issued by RBMI, but were
R.A. No. 3591, as amended by R.A. No. 9576. The power of
mere replicas of the unissued and unused CTDs still
the PDIC as to whether it will deny or grant the claim for
included in the inventory of RBMI. Further, the act of
deposit insurance based on its rules and regulations
petitioners in opening Time Deposits and thereafter
partakes of a quasi-judicial function. In addition, decisions
depositing several amounts of money through inter-branch
of the PDIC as to deposit insurance shall be final and
deposits with Metrobank and China Bank for the account
executory, such that it can only be set aside by a petition
of RBMI can hardly be considered as in the ordinary course
for certiorari evinces the intention of the Congress to make
of business.
PDIC as a quasi-judicial agency. Consistent with Section 4,
Rule 65, the CA has the jurisdiction to rule on the
WEEK 15 #04 Ligot v. Republic
G.R. No. 176944; March 6, 2013 ● As a result of the Ombudsman’s complaint, the
Compliance and Investigation staff (CIS) of the AMLC
Topic: Additional Laws conducted a financial investigation, which revealed the
Petitioner: RET. LT. GEN. JACINTO C. LIGOT, ERLINDA existence of the Ligots’ various bank accounts with several
Y. LIGOT, PAULO Y. LIGOT, RIZA Y. LIGOT, and MIGUEL
financial institutions. On April 5, 2005, the Ombudsman
Y. LIGOT
Respondent: REPUBLIC OF THE PHILIPPINES, issued a resolution holding that probable cause exists that
represented by the ANTI-MONEY LAUNDERING Lt. Gen. Ligot violated Section 8, in relation to Section 11, of
COUNCIL RA No. 6713, as well as Article 183 of the Revised Penal
Ponente: Brion Code.
● Bearing in mind that Lt. Gen. Ligot’s main source ● On January 31, 2006, the Ligots filed a motion for
of income was his salary as an officer of the AFP, and given reconsideration of the CA’s January 4, 2006 resolution,
his wife and children’s lack of any other substantial insisting that the freeze order should be lifted considering:
sources of income, the Ombudsman declared the assets (a) no predicate crime has been proven to support the
registered in Lt. Gen. Ligot’s name, as well as those in his freeze order’s issuance; (b) the freeze order expired six
wife’s and children’s names, to be illegally obtained and months after it was issued on July 5, 2005; and (c) the
unexplained wealth, pursuant to the provisions of RA No. freeze order is provisional in character and not intended to
1379. supplant a case for money laundering. When the CA denied
this motion in its resolution dated January 12, 2007, the
● The Ombudsman’s investigation also looked into Ligots filed the present petition.
Mrs. Ligot’s younger brother, Edgardo Tecson Yambao.
Despite Yambao’s lack of substantial income, the records ISSUE:
show that he has real properties and vehicles registered in
his name, amounting to Eight Million Seven Hundred Sixty Whether or not a freeze order may be issued for an
Three Thousand Five Hundred Fifty Pesos indefinite period.
(₱8,763,550.00), which he acquired from 1993 onwards.
RULING: No.
The Office of the Ombudsman further observed that in the
documents it examined, Yambao declared three of the ● A freeze order is an extraordinary and interim
Ligots’ addresses as his own. relief issued by the CA to prevent the dissipation, removal,
or disposal of properties that are suspected to be the
proceeds of, or related to, unlawful activities as defined in freeze order, it should file the necessary motion before the
Section 3(i) of RA No. 9160, as amended. The primary expiration of the six-month period and explain the reason
objective of a freeze order is to temporarily preserve or reasons for its failure to file an appropriate case and
monetary instruments or property that are in any way justify the period of extension sought. The freeze order
related to an unlawful activity or money laundering, should remain effective prior to the resolution by the CA,
by preventing the owner from utilizing them during which is hereby directed to resolve this kind of motion for
the duration of the freeze order. The relief is pre- extension with reasonable dispatch.
emptive in character, meant to prevent the owner
from disposing his property and thwarting the State’s
effort in building its case and eventually filing civil
forfeiture proceedings and/or prosecuting the owner. WHEREFORE, premises considered, we GRANT the
petition and LIFT the freeze order issued by the Court of
Appeals. This lifting is without prejudice to, and shall not
● As correctly noted by the petitioners, a freeze affect, the preservation orders that the lower courts have
order is meant to have a temporary effect; it was never ordered on the same properties in the cases pending
intended to supplant or replace the actual forfeiture cases before them.
where the provisional remedy - which means, the remedy
is an adjunct of or an incident to the main action – of
asking for the issuance of an asset preservation order from
the court where the petition is filed is precisely available.
For emphasis, a freeze order is both a preservatory and
preemptive remedy.
o During this time, petitioner Republic of the o Among said accounts were the DBS Bank account
Philippines was presently defending itself in two of Alvarez and the Metrobank accounts of Cheng Yong.
international arbitration cases filed in relation to the NAIA
3 Project. ● January 25 2006: RTC Manila granted the ex
parte application.
● The CIS conducted an intelligence database search
on the financial transactions of certain individuals o Authority was thus granted to AMLC to inquire
involved in the award, including respondent Pantaleon into the bank accounts listed therein.
Alvarez (Alvarez) who had been the Chairman of the PBAC
Technical Committee, NAIA-IPT3 Project. ● Alvarez, through counsel, entered his appearance
before RTC Manila and filed an Urgent Motion to Stay
● By this time, Alvarez had already been charged by Enforcement of Order which granted the application.
the Ombudsman with violation of Section 3(j) of R.A. No.
3019. o Alvarez alleged that he fortuitously learned of the
bank inquiry order, which was issued following an ex parte
o It was found that Alvarez maintained eight (8) application, and he argued that nothing in R.A. No. 9160
bank accounts with six (6) different banks authorized the AMLC to seek the authority to inquire
into bank accounts ex parte
● AMLC filed an application to inquire into or
examine the deposits or investments of Alvarez, Trinidad, ● RTC Manila stayed the enforcement of its bank
Liongson and Cheng Yong before the RTC of Makati inquiry.
o AMLC sought to inquire into and/or examine the ● The Republic filed an MR and this was granted.
deposits or investments of Pantaleon Alvarez, Wilfredo
Trinidad, Alfredo Liongson, and Cheng Yong, and their ● Alvarez filed an Urgent Motion and Manifestation,
related web of accounts wherever these may be found, as
defined under Rule 10.4 of the Revised Implementing o Alvarez intended to appeal. And, on the premise
Rules and Regulations;" and to authorize the AMLC that only a final and executory judgment or order could be
Secretariat "to conduct an inquiry into subject accounts executed or implemented, Alvarez sought that the AMLC
once the Regional Trial Court grants the application to be immediately ordered to refrain from enforcing the
inquire into and/or examine the bank accounts" of those Manila RTC bank inquiry order.
four individuals.
● RTC Manila granted Alvarez’s motion.
● July 25 2006: RTC Manila issued an order
wherein it clarified that the January 25 2006 wherein it
clarified that "the Ex Parte Order of this Court dated Issue: Whether AMLC may inquire into bank accounts ex
January 12, 2006 can not be implemented against the parte.
deposits or accounts of any of the persons enumerated in
the AMLC Application until the appeal of movant Alvarez is
finally resolved, otherwise, the appeal would be rendered
moot and academic or even nugatory." Ruling: No. Even if the bank inquiry order may be availed
of without need of a pre-existing case under the AMLA, it
o It reasoned that the other persons mentioned in does not follow that such order may be availed of ex parte.
AMLC’s application were not served with the court’s 12 There are several reasons why the AMLA does not
January 2006 Order. This 25 July 2006 Manila RTC Order is generally sanction ex parte applications and issuances of
the first of the four rulings being assailed through this the bank inquiry order.
petition.
● It is evident that Section 11 does not
● The Republic filed an Urgent Omnibus Motion for specifically authorize, as a general rule, the issuance
Reconsideration dated 27 July 2006. ex parte of the bank inquiry order.
o It urged that it be allowed to immediately enforce SEC. 11. Authority to Inquire into Bank Deposits. ―
the bank inquiry order against Alvarez and that Alvarez’s Notwithstanding the provisions of Republic Act
notice of appeal be expunged from the records since No. 1405, as amended, Republic Act No. 6426, as
appeal from an order of inquiry is disallowed under the amended, Republic Act No. 8791, and other laws,
Anti Money Laundering Act (AMLA). the AMLC may inquire into or examine any
particular deposit or investment with any banking
● Respondent Lilia Cheng filed a Petition for institution or non bank financial institution upon
Certiorari, Prohibition and Mandamus with order of any competent court in cases of violation
Application for TRO and/or Writ of Preliminary of this Act, when it has been established that there
Injunction directed against AMLC, RTC Manila Judge is probable cause that the deposits or investments
Eugenio Jr, and RTC Makati Judge Marella Jr. are related to an unlawful activity as defined in
Section 3(i) hereof or a money laundering offense
o She identified herself as the wife of Cheng Yong under Section 4 hereof, except that no court order
with whom she jointly owns a conjugal bank account with shall be required in cases involving unlawful
Citibank that is covered by the Makati RTC bank inquiry activities defined in Sections 3(i)1, (2) and (12).
order, and two conjugal bank accounts with Metrobank
that are covered by the Manila RTC bank inquiry order. ● To ensure compliance with this Act, the Bangko
Lilia Cheng imputed grave abuse of discretion on the part Sentral ng Pilipinas (BSP) may inquire into or examine any
of the Makati and Manila RTCs in granting AMLC’s ex parte deposit of investment with any banking institution or non
applications for a bank inquiry order, arguing among bank financial institution when the examination is made in
others that the ex parte applications violated her the course of a periodic or special examination, in
constitutional right to due process, that the bank inquiry accordance with the rules of examination of the BSP.70
order under the AMLA can only be granted in connection (Emphasis supplied)
with violations of the AMLA and that the AMLA can not
apply to bank accounts opened and transactions entered ● Of course, Section 11 also allows the AMLC to
into prior to the effectivity of the AMLA or to bank inquire into bank accounts without having to obtain a
accounts located outside the Philippines. judicial order in cases where there is probable cause that
the deposits or investments are related to kidnapping for
● CA issued a TRO enjoining the Manila and ransom, certain violations of the Comprehensive
Makati Courts from implementing the bank inquiry Dangerous Drugs Act of 2002, hijacking and other
orders. violations under R.A. No. 6235, destructive arson and
murder. Such special circumstances do not apply in this
● Petitioner before the SC assailed the RTC case.
orders enjoining petitioner from the bank inquiry and also
sought the nullification of the order granting Lilia Cheng’s ● In the instances where a court order is
petition. required for the issuance of the bank inquiry order,
nothing in Section 11 specifically authorizes that such
● The Court initially granted a TRO in court order may be issued ex parte. It might be argued
petiitoner’s favor, enjoing the implementation of the RTC that this silence does not preclude the ex parte issuance of
orders. But, on respondents’ motion, the Court the bank inquiry order since the same is not prohibited
suspended the implementation of the TRO,. under Section 11. Yet this argument falls when the
immediately preceding provision, Section 10, is examined.
SEC. 10. Freezing of Monetary Instrument or could be issued ex parte similar to freeze orders, language
Property. ― The Court of Appeals, upon to that effect would have been incorporated in the said
application ex parte by the AMLC and after Rules. This is stressed not because the implementing rules
determination that probable cause exists that any could authorize ex parte applications for inquiry orders
monetary instrument or property is in any way despite the absence of statutory basis, but rather because
related to an unlawful activity as defined in the framers of the law had no intention to allow such ex
Section 3(i) hereof, may issue a freeze order which parte applications.
shall be effective immediately. The freeze order
shall be for a period of twenty (20) days unless o Even the Rules of Procedure adopted by this Court
extended by the court. in A.M. No. 05-11-04-SC to enforce the provisions of the
AMLA specifically authorize ex parte applications with
● Although oriented towards different purposes, the respect to freeze orders under Section 1079 but make no
freeze order under Section 10 and the bank inquiry order similar authorization with respect to bank inquiry orders
under Section 11 are similar in that they are extraordinary under Section 11.
provisional reliefs which the AMLC may avail of to
effectively combat and prosecute money laundering ● The necessary implication of this finding that
offenses. Section 11 of the AMLA does not generally authorize the
issuance ex parte of the bank inquiry order would be that
o Crucially, Section 10 uses specific language to such orders cannot be issued unless notice is given to the
authorize an ex parte application for the provisional relief owners of the account, allowing them the opportunity to
therein, a circumstance absent in Section 11. If indeed the contest the issuance of the order. Without such a
legislature had intended to authorize ex parte proceedings consequence, the legislated distinction between ex parte
for the issuance of the bank inquiry order, then it could proceedings under Section 10 and those which are not ex
have easily expressed such intent in the law, as it did with parte under Section 11 would be lost and rendered useless.
the freeze order under Section 10.
● There certainly is fertile ground to contest the
● Even more tellingly, the current language of issuance of an ex parte order.
Sections 10 and 11 of the AMLA was crafted at the same
time, through the passage of R.A. No. 9194. Prior to the o Section 11 itself requires that it be established
amendatory law, it was the AMLC, not the Court of Appeals, that "there is probable cause that the deposits or
which had authority to issue a freeze order, whereas a investments are related to unlawful activities," and it
bank inquiry order always then required, without obviously is the court which stands as arbiter whether
exception, an order from a competent court. there is indeed such probable cause. The process of
inquiring into the existence of probable cause would
o It was through the same enactment that ex parte involve the function of determination reposed on the trial
proceedings were introduced for the first time into the court. Determination clearly implies a function of
AMLA, in the case of the freeze order which now can only adjudication on the part of the trial court, and not a
be issued by the Court of Appeals. It certainly would have mechanical application of a standard pre-determination by
been convenient, through the same amendatory law, to some other body. The word "determination" implies
allow a similar ex parte procedure in the case of a bank deliberation and is, in normal legal contemplation,
inquiry order had Congress been so minded. Yet nothing in equivalent to "the decision of a court of justice."
the provision itself, or even the available legislative record,
explicitly points to an ex parte judicial procedure in the ● The court receiving the application for inquiry
application for a bank inquiry order, unlike in the case of order cannot simply take the AMLC’s word that probable
the freeze order. cause exists that the deposits or investments are related to
an unlawful activity.
● That the AMLA does not contemplate ex parte
proceedings in applications for bank inquiry orders is o It will have to exercise its own determinative
confirmed by the present implementing rules and function in order to be convinced of such fact. The account
regulations of the AMLA, promulgated upon the passage of holder would be certainly capable of contesting such
R.A. No. 9194. With respect to freeze orders under Section probable cause if given the opportunity to be apprised of
10, the implementing rules do expressly provide that the the pending application to inquire into his account; hence a
applications for freeze orders be filed ex parte, but no notice requirement would not be an empty spectacle. It
similar clearance is granted in the case of inquiry orders may be so that the process of obtaining the inquiry order
under Section 11. may become more cumbersome or prolonged because of
the notice requirement, yet we fail to see any unreasonable
o These implementing rules were promulgated by burden cast by such circumstance.
the Bangko Sentral ng Pilipinas, the Insurance Commission
and the Securities and Exchange Commission, and if it was o Requiring notice to the account holder should not,
the true belief of these institutions that inquiry orders in any way, compromise the integrity of the bank records
subject of the inquiry which remain in the possession and
control of the bank.
RULING:
FACTS:
1) No. We do not subscribe to SPCMB' s position.
● In 2015, a year before the 2016 presidential Succinctly, Section 11 of the AMLA providing for ex-parte
elections, reports abounded on the supposed application and inquiry by the AMLC into certain bank
disproportionate wealth of then Vice President Jejomar deposits and investments does not violate substantive due
Binay and the rest of his family, some of whom were process, there being no physical seizure of property
likewise elected public officers. The Office of the involved at that stage.
Ombudsman and the Senate conducted investigations and
inquiries thereon ostensibly based on their respective In fact, .Eugenio delineates a bank inquiry order
powers delineated in the Constitution. under Section 11 from a freeze order under
Section 10 on both remedies' effect on the direct
● From various news reports announcing the objects, i.e. the bank deposits and investments:
inquiry into then Vice President Binay's bank accounts,
including accounts of members of his family, petitioner On the other hand, a bank inquiry order under Section 11
Subido Pagente Certeza Mendoza & Binay Law Firm does not necessitate any form of physical seizure of
(SPCMB) was most concerned with the article published in property of the account holder. What the bank inquiry
the Manila Times on 25 February 2015 entitled "Inspect order
Binay Bank Accounts" which read, in pertinent part:
authorizes is the examination of the particular deposits or
● . . . The Anti-Money Laundering Council (AMLC) investments in banking institutions or non-bank financial
asked the Court of Appeals (CA) to allow the [C]ouncil to institutions. The monetary instruments or property
peek into the bank accounts of the Binays, their deposited with such banks or financial institutions are not
corporations, and a law office where a family member seized in a physical sense, but are examined on particular
was once a partner. details such as the account holder's record of deposits and
transactions. Unlike the assets subject of the freeze order,
● Also the bank accounts of the law office linked to the records to be inspected under a bank inquiry order
the family, the Subido Pagente Certeza Mendoza & cannot be physically seized or hidden by the account
Binay Law Firm, where the Vice President's daughter holder. Said records are in the possession of the bank and
Abigail was a former partner. therefore cannot be destroyed at the instance of the
account holder alone as that would require the
● Within twenty four (24) hours, Presiding Justice extraordinary cooperation and devotion of the bank.
Reyes wrote SPCMB denying its request
At the stage in which the petition was filed before us, the
● Subido Pagente Certeza Mendoza & Binay — inquiry into certain bank deposits and investments by
where Binay's daughter, Makati City (Metro Manila) Rep. the AMLC still does not contemplate any form of
Mar-len Abigail Binay was a partner, are also included in physical seizure of the targeted corporeal property.
the probe, the sources said.
2) No. The AMLC functions solely as an investigative body
● In their Comment, the AMLC, through the Office of in the instances mentioned in Rule 5.b.26 Thereafter, the
the Solicitor General (OSG), points out a supposed next step is for the AMLC to file a Complaint with either the
jurisdictional defect of the instant petition, i.e., SPCMB DOJ or the Ombudsman pursuant to Rule 6b. Even in the
case of Estrada v. Office of the Ombudsman, where the
conflict arose at the preliminary investigation stage by the 4. The authority to inquire into or examine the main
Ombudsman, we ruled that the Ombudsman's denial of or principal account and the related accounts shall comply
Senator Estrada's Request to be furnished copies of the with the requirements of Article III, Sections 2 and 3 of the
counter-affidavits of his co-respondents did not violate Constitution. The foregoing demonstrates that the inquiry
Estrada's constitutional right to due process where the and examination into the bank account are not undertaken
sole issue is the existence of probable cause for the whimsically and solely based on the investigative
purpose of determining whether an information should be discretion of the AMLC. In particular, the requirement of
filed and does not prevent Estrada from requesting a copy demonstration by the AMLC, and determination by the CA,
of the counter-affidavits of his co-respondents during the of probable cause emphasizes the limits of such
pre-trial or even during trial. governmental action. We will revert to these safeguards
under Section 11 as we specifically discuss the CA' s denial
Plainly, the AMLC's investigation of money laundering of SPCMB' s letter request for information concerning the
offenses and its determination of possible money purported issuance of a bank inquiry order involving its
laundering offenses, specifically its inquiry into certain accounts.
bank accounts allowed by court order, does not transform
it into an investigative body exercising quasi-judicial All told, we affirm the constitutionality of Section 11 of the
powers. Hence, Section 11 of the AMLA, authorizing a bank AMLA allowing the ex-parte application by the AMLC for
inquiry court order, cannot be said to violate SPCMB's authority to inquire into, and examine, certain bank
constitutional right to due process. deposits and investments.
3. No. We now come to a determination of whether Section WHEREFORE, the petition is DENIED. Section 11 of
11 is violative of the constitutional right to privacy Republic Act No. 9160, as amended, is declared VALID and
enshrined in Section 2, Article III of the Constitution. CONSTITUTIONAL.
SPCMB is adamant that the CA's denial of its request to be
furnished copies of AMLC's ex-parte application for a bank
inquiry order and all subsequent pleadings, documents
and orders filed and issued in relation thereto, constitutes
grave abuse of discretion where the purported blanket
authority under Section 11: ( 1) partakes of a general
warrant intended to aid a mere fishing expedition; (2)
violates the attorney-client privilege; (3) is not preceded
by predicate crime charging SPCMB of a money laundering
offense; and ( 4) is a form of political harassment [of
SPCMB' s] clientele.
● While "data message" has reference to ● NPC filed formal offer of evidence Exhibits A to V
information electronically sent, stored or transmitted, it
does not necessarily mean that it will give rise to a right or ● Bangpai and Wallem filed objections to NPC’s
extinguish an obligation, unlike an electronic document. formal offer of evidence
Evident from the law, however, is the legislative intent to
give the two terms the same construction. ● Judge Codilla denied admission and excluded from
records Exhibits A, C, D, E, H, and sub-markings I, J, K, L, M,
● The Rules on Electronic Evidence promulgated N, O, P, Q, R, S
by this Court defines the said terms in the following
manner: o Mere photocopies and even given opportunity to
present its originals, NPC did not present
o (g) "Electronic data message" refers to
information generated, sent, received or stored by o NPC attempted to justify the admission of the
electronic, optical or similar means. photocopies contending that photocopies offered are
equivalent to original of the document on the basis of the
o (h) "Electronic document" refers to information or Electronic Evidence
the representation of information, data, figures, symbols or
other modes of written expression, described or however o Judge Codilla ruled that information in the
represented, by which a right is established or an photocopies was not received, recorded, retrieved or
obligation extinguished, or by which a fact may be proved produced electronically and that such electronic evidence
and affirmed, which is received, recorded, transmitted, must be authenticated which NPC failed to do
stored, processed, retrieved or produced electronically. It
includes digitally signed documents and print-out or ● MR was denied
output, readable by sight or other means, which accurately
reflects the electronic data message or electronic ● NPC filed petition for certiorari
document. For purposes of these Rules, the term
● CA denied
"electronic document" may be used interchangeably with
"electronic data message."
ISSUE: W/N photocopies are electronic documents under
RA 8792 or IRR of Electronic Commerce Act as well as
. Rules on Electronic Evidence – NOT IN THIS CASE
WEEK 15 #8 National Power Corporation vs. Codilla, Jr.
G.R. No. 170491 | April 3, 2007
RULING:
Petitioner: National Power Corporation (NPC)
● Electronic document - information or the ● In addition, trial court was correct in rejecting
representation of information, data, figures, symbols these photocopies as they violate the best evidence rule
or other models of written expression, described or and are therefore of no probative value being incompetent
however represented, by which a right is established or pieces of evidence (Under Rule 130 Sec 2 of Rules on
an obligation extinguished, or by which a fact may be Evidence)
proved and affirmed, which is received, recorded,
transmitted, stored, processed, retrieved or produced ● When the original document has been lost or
electronically destroyed, or cannot be produced in court, the offeror,
upon proof of its execution or existence and the cause of its
unavailability without bad faith on his part, may prove its
o includes digitally signed documents and any
contents by a copy, or by a recital of its contents in some
printout, readable by sight or other means which
authentic document, or by the testimony of witnesses in
accurately reflects the electronic data message or
the order stated
electronic document
● Offeror of secondary evidence is burdened to
● The rules use the word "information" to define an
prove the predicates thereof:
electronic document received, recorded, transmitted,
stored, processed, retrieved or produced electronically
o (a) the loss or destruction of the original without
bad faith on the part of the proponent/offeror which can
● Electronic document is relevant only in terms of
be shown by circumstantial evidence of routine practices
the information contained therein, similar to any other
of destruction of documents;
document which is presented in evidence as proof of its
contents
o (b) the proponent must prove by a fair
● What differentiates an electronic document from a preponderance of evidence as to raise a reasonable
paper-based document is the manner by which the inference of the loss or destruction of the original copy;
information is processed and
o the information contained in an electronic o (c) it must be shown that a diligent and bona fide
document is received, recorded, transmitted, stored, but unsuccessful search has been made for the document
processed, retrieved or produced electronically in the proper place or places
● Information contained in the photocopies ● NPC failed to establish that such offer was made in
submitted by NPC will reveal that not all of the accordance with the exceptions as enumerated under the
contents therein, such as the signature of the persons said Rule
who purportedly signed the documents, may be
recorded or produced electronically
NOTES:
o By no stretch of the imagination can a person's
signature affixed manually be considered as information Details on Exhibits (just in case mag ask si Sir)
electronically received, recorded, transmitted, stored,
processed, retrieved or produced ● Exhibit "A" is a photocopy of a letter manually
signed by a certain Jose C. Troyo, with "RECEIVED"
● Argument of NPC that since these paper printouts stamped thereon, together with a handwritten date;
were produced through an electronic process, then these
photocopies are electronic documents as defined in ● Exhibit "C" is a photocopy of a list of estimated
the Rules on Electronic Evidence is obviously an cost of damages of petitioner's power barges 207 and 209
erroneous, if not preposterous, interpretation of the law prepared by Hopewell Mobile Power Systems Corporation
and manually signed by Messrs. Rex Malaluan and Virgilio
● Having declared that the offered photocopies are Asprer;
not tantamount to electronic documents, it is
consequential that the same may not be considered as the ● Exhibit "D" is a photocopy of a letter manually
functional equivalent of their original as decreed in the law signed by a certain Nestor G. Enriquez, Jr., with
"RECEIVED" stamped thereon, together with a
handwritten notation of the date it was received;
ISSUE: WON A.O. No. 308 is invalid as it violates the right ● A.O. No. 308 also does not state whether
to privacy and also suffers from vagueness and encoding of data is limited to biological information
overbreadth alone for identification purposes. In fact, the Solicitor
General claims that the adoption of the Identification
RULING: YES Reference System will contribute to the "generation of
population data for development planning." This is an
● Assuming, arguendo, that A.O. No. 308 need not be
admission that the PRN will not be used solely for
the subject of a law, still it cannot pass constitutional
identification but for the generation of other data with
muster as an administrative legislation because facially it
remote relation to the avowed purposes of A.O. No. 308.
violates the right to privacy.
The indefiniteness of A.O. 308 can give the government
● The right to privacy is a fundamental right the roving authority to store and retrieve information
guaranteed by the Constitution, hence, it is the burden of for a purpose other than the identification of the
government to show that A.O. No. 308 is justified by some individual through his PRN
compelling state interest and that it is narrowly drawn.
● Even the assumption that the computer data file
A.O. No. 308 is predicated on two considerations: (1) the
will be limited to the name, address and other basic
need to provide our citizens and foreigners with the
personal information about the individual will not save
facility to conveniently transact business with basic service
A.O. No. 308 from constitutional infirmity for again it does
and social security providers and other government
not tell us how these information gathered shall be
instrumentalities and (2) the need to reduce, if not totally
handled. It does not provide who shall control and
eradicate, fraudulent transactions and misrepresentations
access the data, under what circumstances and for
by persons seeking basic services. It is debatable whether
what purpose. These factors are essential to safeguard the
these interests are compelling enough to warrant the
privacy and guaranty the integrity of the information. The
computer linkage gives other government agencies access ● Nor do our present laws provide adequate
to the information. Yet, there are no controls to guard safeguards for a reasonable expectation of privacy.
against leakage of information. Commonwealth Act No. 591 penalizes the disclosure by
any person of data furnished by the individual to the NSO
with imprisonment and fine. Republic Act No. 1161
prohibits public disclosure of SSS employment records and
Reasonable expectation of privacy (Two-part test) reports. These laws, however, apply to records and data
with the NSO and the SSS. It is not clear whether they
● We reject the argument of the Solicitor General
may be applied to data with the other government
that an individual has a reasonable expectation of privacy
agencies forming part of the National ID System. The
with regard to the National ID and the use of biometrics
need to clarify the penal aspect of A.O. No. 308 is
technology as it stands on quicksand. The reasonableness
another reason why its enactment should be given to
of a person's expectation of privacy depends on a two-
Congress
part test:
● The factual circumstances of the case determines ● The Solicitor General urges us to validate A.O. No.
the reasonableness of the expectation. However, other 308's abridgment of the right of privacy by using the
factors, such as customs, physical surroundings and rational relationship test. He stressed that the purposes of
practices of a particular activity, may serve to create or A.O. No. 308 are: (1) to streamline and speed up the
diminish this expectation. implementation of basic government services, (2)
eradicate fraud by avoiding duplication of services, and (3)
generate population data for development planning. He
concludes that these purposes justify the incursions into
ISSUE: WON Use of biometrics and computer technology in the right to privacy for the means are rationally related to
A.O. No. 308 does assures the individual of a reasonable the end.
expectation of privacy
● We are not impressed by the argument. In Morfe v.
RULING: NO
Mutuc, we upheld the constitutionality of R.A. 3019, the
● The use of biometrics and computer technology Anti-Graft and Corrupt Practices Act, as a valid police
in A.O. No. 308 does not assure the individual of a power measure. We declared that the law, in compelling a
reasonable expectation of privacy. The measure of public officer to make an annual report disclosing his
protection granted by the reasonable expectation assets and liabilities, his sources of income and expenses,
diminishes as relevant technology becomes more widely did not infringe on the individual's right to privacy. The
accepted. The security of the computer data file depends law was enacted to promote morality in public
not only on the physical inaccessibility of the file but also administration by curtailing and minimizing the
on the advances in hardware and software computer opportunities for official corruption and maintaining a
technology. A.O. No. 308 is so widely drawn that a standard of honesty in the public service.
minimum standard for a reasonable expectation of
privacy, regardless of technology used, cannot be ● The same circumstances do not obtain in the case
inferred from its provisions at bar. For one, R.A. 3019 is a statute, not an
administrative order. Secondly, R.A. 3019 itself is
● The rules and regulations to be drawn by the sufficiently detailed. The law is clear on what practices
IACC cannot remedy this fatal defect. Rules and were prohibited and penalized, and it was narrowly drawn
regulations merely implement the policy of the law or to avoid abuses. In the case at bar, A.O. No. 308 may have
order. On its face, A.O. No. 308 gives the IACC virtually been impelled by a worthy purpose, but, it cannot pass
unfettered discretion to determine the metes and constitutional scrutiny for it is not narrowly drawn. And
bounds of the ID System. we now hold that when the integrity of a fundamental right
is at stake, this court will give the challenged law,
administrative order, rule or regulation a stricter scrutiny. or order that invades individual privacy will be
It will not do for the authorities to invoke the presumption subjected by this Court to strict scrutiny.
of regularity in the performance of official duties. Nor is it
enough for the authorities to prove that their act is not ● Morfe v. Mutuc: “The concept of limited
irrational for a basic right can be diminished, if not government has always included the idea that
defeated, even when the government does not act governmental powers stop short of certain intrusions into
irrationally. They must satisfactorily show the presence of the personal life of the citizen. This is indeed one of the
compelling state interests and that the law, rule, or basic distinctions between absolute and limited
regulation is narrowly drawn to preclude abuses. This government...a system of limited government safeguards a
approach is demanded by the 1987 Constitution whose private sector, which belongs to the individual, firmly
entire matrix is designed to protect human rights and to distinguishing it from the public sector, which the state can
prevent authoritarianism. In case of doubt, the least we can control...”
do is to lean towards the stance that will not put in danger
the rights protected by the Constitution.
● The case of Whalen v. Roe cited by the Solicitor (Opinions: Marami sila so I included short ones lang)
General is also off-line. In Whalen, the United States
PANGANIBAN, J., separate opinion;
Supreme Court was presented with the question of
whether the State of New York could keep a centralized ● I concur only in the result and only on the ground
computer record of the names and addresses of all persons that an executive issuance is not legally sufficient to
who obtained certain drugs pursuant to a doctor's establish an all-encompassing computerized system of
prescription. The U.S. Supreme Court held that while an identification in the country. The subject matter contained
individual's interest in avoiding disclosure of personal in AO 308 is beyond the powers of the President to
regulate without a legislative enactment.
matters is an aspect of the right to privacy, the statute did
not pose a grievous threat to establish a constitutional ● I reserve judgmeht on the issue of wherher a
violation. The patient-identification requirement was a national ID system is an infringement of the constitutional
product of an orderly and rational legislative decision right to privacy or the freedom of thought until after
made upon recommendation by a specially appointed Congress passes, if ever, a law to this effect. Only then, and
commission which held extensive hearings on the matter. upon the filing of a proper petition, may the provisions of
the statute be scrutinized by the judiciary to determine
Moreover, the statute was narrowly drawn and
their constitutional foundation. Until such time, the issue is
contained numerous safeguards against indiscriminate premature; and any decision thereon, speculative and
disclosure. The statute laid down the procedure and academic.
requirements for the gathering, storage and retrieval of the
information. It enumerated who were authorized to access ● Let it be noted that this Court, as shown by the
the data. It also prohibited public disclosure of the data by voting of the justices, has not definitively ruled on these
imposing penalties for its violation. In view of these points. The voting is decisive only on the need for the
appropriate legislation, and it is only on this ground that
safeguards, the infringement of the patients' right to
the petition is granted by this Court.
privacy was justified by a valid exercise of police power.
As we discussed above, A.O. No. 308 lacks these vital
safeguards.
KAPUNAN, J., dissenting opinion;
● The majority opinion has enumerated various ● More than this, the right to privacy is well-
forms and methods of Biometrics Technology which if esconced in and directly protected by various provisions of
adopted in the National Computaized Identification the Bill of Rights, the Civil Code, the RPC, and certain laws,
Reference System would seriously threaten the right to all so painstakingly and resourcefully catalogued in the
privacy. Among which are biocrypt retinal scan, artificial majority opinion. Many of these laws provide penalties for
nose and thermogram. The majority also points to certain their violation in the form of imprisonment, fines, or
alleged deficiencies of A O. No. 308. Thus: damages. These laws will serve as powerful deterrents not
only in the establishment of any administrative rule that
1) A.O. No. 308 does not specify the particular will violate the constitutionally protected right to privacy,
Biometrics Technology that shall be used for the but also to would-be transgressors of such right.
new identification system.
● In Whalen v. Roe, a New York statute was
2) The order dots not state whether encoding of challenged for requiring physicians to identify patients
data is limited to biological information alone for obtaining prescription drugs of the statute's "Schedule II"
identification purposes; category (a class of drugs having a potential for abuse and
a recognized medical use) so the names and addresses of
3) There is no provision as to who shall control the prescription drug patients can be recorded in a
and access the data, under what circumstances centralized computer file maintained by the New York
and for what purpose; and State Department of Health. Some patients regularly
receiving prescription for "Schedule II" drugs and doctors
4) There are no controls to guard against leakage who prescribed such drugs brought an action questioning
of information, thus heightening the potential for the validity of the statute on the ground that it violated the
misuse and abuse. rights of privacy.
● There is nothing in A.O. No. 308, as it is worded, to ● US SC sustained the validity of the statute on the
suggest that the advanced methods of the Biometrics ground that the patient identification requirement is a
Technology that may pose danger to the right of privacy reasonable exercise of the State's broad police powers. The
will be adopted. Court also held that there is no support in the record for an
assumption that the security provisions of the statute will
● The standards set in A.O. No. 308 for the adoption be adiministered improperly.
of the new system are spelled out in the "WHEREASES"
and body of the order, namely,