Professional Documents
Culture Documents
1
Sec. 3(b), Rule 112 of the Rules of Court
2
Sec. 4(c), Rule II of the Rules of Procedure of the Office of the Ombudsman (b) After such affidavits have been secured, the investigating officer shall issue an order,
3
Further to quote the rule in furnishing copies of affidavits to parties under the Rules of attaching thereto a copy of the affidavits and other supporting documents, directing the
Procedure of the Office of the Ombudsman (Sec. 4 of Rule II of the Administrative Order No. respondents to submit, within ten (10) days from receipt thereof, his counter-affidavits and
7 issued on 10 Apr 1990): controverting evidence with proof of service thereof on the complainant. The complainant
(a) If the complaint is not under oath or is based only on official reports, the investigating may file reply affidavits within ten (10) days after service of the counter-affidavits.
officer shall require the complainant or supporting witnesses to execute affidavits to
substantiate the complaints
Although Sec 4(c), Rule II of RPOO provides that a respondent “shall have
ISSUES: access to the evidence on record,” this provision should be construed in
1. WON Sen. Estrada’s right to due process was violated when the relation to Sec 4(a) and (b) of the same Rule, as well as to the Rules of
Ombudsman denied to furnish him a copy of the counter-affidavits Criminal Procedure.
of his co-respondents 1. The term “Supporting witnesses” found in Sec 4(a) refers to the
2. WON Sen. Estrada has the right to cross-examine witnesses witnesses of the complainant, not the co-respondents
3. WON Sen. Estrada’s Petition for Certiorari is premature 2. The affidavits referred to in Sec 4(b) are the affidavits mentioned in
4. WON Sen. Estrada’s Petition for Certiorari constitutes forum 4(a). Clearly, the affidavits to be furnished to the respondent are the
shopping affidavits of the complainant and his supporting witnesses. The
provision in the immediately succeeding Sec 4(c) of the same rule
RULING: does not stand alone, but should be read in relation to the provisions
WON SEN. ESTRADA’S RIGHT TO DUE PROCESS WAS VIOLATED WHEN of Sec 4 (a and b) of the same Rule requiring the investigating officer
THE OMBUDSMAN DENIED TO FURNISH HIM A COPY OF THE COUNTER- to furnish the respondent with the “affidavits and other supporting
AFFIDAVITS OF HIS CO-RESPONDENTS documents” submitted by “the complaint or supporting witnesses.”
Thus, a respondent’s “access to evidence on record” in Sec 4(c) refers
NO, Sen. Estrada’s right to due process was not violated. to the affidavits and supporting documents of “the complainant or
supporting witnesses” in Sec 4(a) of the same Rule.
First. There is no law or rule which requires the Ombudsman to furnish a 3. Sec 3(b) Rule 112 of RRCP provides that a respondent’s right to
respondent with copies of the counter-affidavits of his co-respondents. examine refers only to “the evidence submitted by the
complainant”.
What the Rules of Procedure of the Office of the Ombudsman require is for
the Ombudsman to furnish the respondent with a copy of the complaint and Thus, whether under Rule 112 RRCP or under Rule II of RPOO, there is no
the supporting affidavits and documents at the time the order to submit the requirement whatsoever that the affidavits executed by the co-respondents
counter-affidavit is issued to the respondent. 4 At this point, there is still no should be furnished to a respondent.
counter-affidavit submitted by any respondent. Clearly, what Sec 4(b) refers
to are affidavits of the complainant and his witnesses, not the affidavits of Second. A different set of rules of procedure and standards apply in
the co-respondents. Obviously, the counter-affidavits of the co-respondents administrative cases and criminal cases. Rule III of the RPOO applies in
are not part of the supporting affidavits of the complainant. No grave abuse administrative cases, while Rule II of the RPOO applies in Sen. Estrada’s
of discretion can thus be attributed to the Ombudsman for the issuance of petition (which is classified as a criminal case). For both cases, the ROC apply
the 27 Mar 2014 Order which denied Sen. Estrada’s Requet. in a suppletory character or by analogy.
4
This is clear from Sec. 4(b), Rule II of the Rules of Procedure of the Office of the of the affidavits and other supporting documents, directing the respondent to submit,
Ombudsman when it states, “[a]fter such affidavits (of the complainant and his witnesses) within 10 days from receipt thereof, his counter-affidavtis.”
have been secured, the investigating officer shall issue an order, attaching thereto a copy
Justice Velasco’s dissent lies on the ruling in Office of the Ombudsman vs Sec 3, Rule 122 of the ROC expressly provides that the respondent shall only
Reyes. In the said case, failure to furnish a copy of the counter-affidavits have the right to submit a counter-affidavit, to examine all other evidence
happened in the administrative proceedings on the merits, which resulted submitted by the complainant and, where the fiscal sets a hearing to
in Reyes’ dismissal from the service. propound clarificatory questions to the parties or their witnesses, to be
afforded an opportunity to be present but without the right to examine or
In Sen. Estrada’s Petition, the denial of his Request happened during the cross-examine.
preliminary investigation where the only issue is the existence of probable
cause for the purpose of determining whether an information should be Furthermore, the technical rules on evidence are not binding on the fiscal
filed, and does not prevent Sen. Estrada from requesting a copy of the who has jurisdiction and control over the conduct of a preliminary
counter-affidavits of his co-correspondents during the pre-trial or even investigation. If by its very nature a preliminary investigation could be
during the trial. waived by the accused, the Court finds no compelling justification for a strict
application of the evidentiary rules.
It should be underscored that the conduct of a preliminary investigation is
only for the determination of probable cause. It is not a part of the trial, and In addition, Sec 8 Rule 112 of the ROC provides that the record of the
it is only in a trial where an accused can demand the full exercise of his preliminary investigation does not form part of the record of the case in the
rights, such as the right to confront and cross-examine his accusers to RTC. This rule applies to the petitioner’s argument that the testimonies of
establish his innocence. Thus, the rights of a respondent in a preliminary Galarion and Hanopol are inadmissible as to him since he was not granted
investigation are limited to those granted by procedural law.5 the opportunity of cross-examination. Said testimonies may not be admitted
byt the trial court if not presented in evidence by the prosecuting fiscal. And
In the case at bar, there exists prima facie evidence of petitioner’s even if the prosecution does present such testimonies, petitioner can always
involvement in the commission of the crime, it being sufficiently supported object thereto and the trial court can rule on the admissibility therof; or the
by the evidence presented and the facts obtained therein. petitioner can, during the trial, petition said court to compel the
presentation of Galarion and Hanopol for purposes of cross-examination.
WON SEN. ESTRADA HAS THE RIGHT TO CROSS-EXAMINE WITNESSES AS
PART OF HIS RIGHT TO DUE PROCESS Furthermore, admissions made by a person in a sworn statement are only
binding to him. Res inter alias acta lteri nocere non debet. The rights of a
NO, Sen. Estrada doesn’t have the right to cross-examine witnesses. It is a party cannot be prejudiced by an act, declaration or omission of another.
fundamental principle that the accused in a preliminary investigation has no Hence, the admissions of Sen. Estrada’s co-respondents cannot prejudice
right to cross-examine the witness which the complainant may present. him.
5
Preliminary investigation — an inquiry or proceeding for the purpose of determining of the commission of a crime and the respondent’s probable guilt thereof. A preliminary
whether there is sufficient ground to engender a well-founded belief that a crime investigation is not the occasion for the full and exhaustive display of the parties’ evidence;
cognizable by the RTC has been committed and that the respondent is probably guilty it is for the presentation of such evidence only as may engender a well-grounded belief that
thereof, and should be held for trial. The quantum of evidence now required in preliminary an offense has been committed and that the accused is probably guilty thereof.
investigation is such evidence sufficient to “engender a well founded belief” as to the fact
The Court takes exception to Justice Brion’s assertion6. The Ang Tibay investigation, after conducting its own fact-finding investigation, is to
guidelines for administrative cases cannot apply to preliminary determine probable cause for filing an information, and not to make a final
investigations in criminal cases because it would lead to absurd and adjudication of the rights and obligations of the parties under the law.
disastrous consequences.
The purpose in determining probable cause is to make sure that the courts
Ang Tibay enumerated the constitutional requirements of due process, are not clogged with weak cases that will only be dismissed, as well as to
which Ang Tibay described as the “fundamental and essential requirements spare a person from the travails of a needless prosecution. The
of due process in trials and investigations of an administrative character.” requirements mandated in Ang Tibay, as amplified in GSIS, apply only to the
These requirements are “fundamental and essential” because without law enforcement process leading to a trial, part of which is the procedures
these, there is no due process as mandated by the Constitution. These are: undertaken under an executive function.
1. Right to hearing, which includes the right of the party interested or
affected to present his own case and submit evidence in support Moreover, a person under preliminary investigation, as Sen Estrada in this
thereof present case, is not yet an accused person, and hence cannot demand the
2. The tribunal, before which the party presents his case, must consider full exercise of the rights of an accused person. Probable cause merely
the evidence present implies probability of guilt and should be determined in a summary manner.
3. The decision should be supported by evidence Preliminary investigation is not part of trial and it is only in a trial where an
4. Evidence must be substantial7 accused can demand the full exercise of his rights, such as the right to
5. Decision must be rendered on the evidence presented at the hearing confront and cross-examine his accusers to establish his innocence.
6. The Court must act on its own independent consideration of the law
and facts of the controversy In short, the rights of a respondent in a preliminary investigation are merely
7. The Court should render its decision in such a manner that the statutory rights, not constitutional due process rights. An investigation to
parties to the proceedings can know the various issues involved, and determine probable cause for the filing of an information does not initiate a
the reasons for the decisions rendered criminal action as to trigger into operation Sex 14(2), Art III of the
Constitution. It is the filing of a complaint or information in court that
These guidelines were further clarified in GSIS vs CA. The requirement of an initiates the criminal action.
impartial tribunal which, needless to say, dictates that one called upon to
resolve a dispute may not sit as judge and jury simultaneously, neither may The rights to due process in administrative cases are granted by the
he review his decision on appeal. It affirms the non-applicability of the Ang Constitution; hence, these rights cannot be taken away by mere legislation.
Tibay guidelines to preliminary investigations in criminal cases: The On the other hand, the right to a preliminary investigation is merely a
investigating officer, which is the role that the Office of the Ombudsman statutory right, not part of the fundamental and essential requirements of
plays in the investigation and prosecution of government personnel, will due process. Thus, a preliminary investigation can be taken away by
never be the impartial tribunal required in Ang Tibay, as amplified in GSIS. legislation.
The purpose of the Office of the Ombudsman in conducting a preliminary
6 7
“the due process standards that at the very least should be considered in the conduct fo It means such a relevant evidence as a reasonable mind might accept as adequate to
a preliminary investigation are those that this Court first articulated in Ang Tibay vs CIR” support a conclusion
The application of Ang Tibay, as amplified in GSIS, is not limited to those with Ombudsman stated that “the law can no longer help one who had been
pending preliminary investigations but even to those convicted by final given ample opportunity to be heard but who did not take full advantage of
judgment and already serving their sentences. the proffered chance.” The ruling emphasizes that an exhaustion of
administrative remedies is a requisite for the filing of a petition for certiorari.
WON SEN. ESTRADA’S PRESENT PETITION FOR CERTIORARI IS Other than this legal significance, however, the ruling necessarily carries the
PREMATURE direct and immediate implication that the petitioner has been granted the
opportunity to be heard and has refused to avail of this opportunity. If such
YES, Sen. Estrada’s petition for certiorari is premature. process was ignored, petitioner cannot claim denial of due process.
The Court underscores Sen. Estrada’s procedural omission. Sen. Estrada did For a fuller appreciation of our above conclusion, we clarify that although
not file any pleading, much less a motion for reconsideration, to the 27 they are separate and distinct concepts, exhaustion of administrative
March Order. Sen. Estrada immediately proceeded to file this petition for remedies and due process embody linked and related principles. The
certiorari before the Court. Sen. Estrada’s resort to a petition for certiorari “exhaustion” principle applies when the ruling court or tribunal is not given
before this Court stands in stark contrast to his filing of his 7 April Motion the opportunity to re-examine its findings and conclusions because of
for Reconsideration of the Joint Resolution finding probable cause. The an available opportunity that a party seeking recourse against the court or
Court has reiterated in numerous decisions that a motion for the tribunal’s ruling omitted to take. Under the concept of “due process,”
reconsideration8 is mandatory before the filing of a petition for certiorari. on the other hand, a violation occurs when a court or tribunal rules against a
Sen. Estrada failed to present a compelling reason that the present Petition party without giving him or her the opportunity to be heard. Thus, the
falls under the exceptions9 to the general rule that the filing of a motion for exhaustion principle is based on the perspective of the ruling court or
reconsideration is required prior to the filing of a petition for certiorari. tribunal, while due process is considered from the point of view of the
litigating party against whom a ruling was made.
The insistence of Justice Velasco that “this Court cannot neglect to
emphasize that, despite the variance in the quanta of evidence required, a Sen. Estrada’s failure cannot in any way be construed as violation of due
uniform observance of the singular concept of due process in indispensable process by the Ombudsman, much less of grave abuse of discretion. Sen.
in all proceedings” cannot stand. The ruling in Ruivivar vs. Office of the Estrada has not filed any comment, and still chooses not to.
8
A motion for reconsideration allows the public respondent the opportunity to correct its (d) where, under the circumstances, a motion for reconsideration would be
factual and legal errors. useless;
9
As enumerated in Tan v. CA, 341 Phil. 570, 576-578 (1997), the exceptions are: (e) where petitioner was deprived of due process and there is extreme urgency for
(a) where the order is a patent nullity, as where the Court a quo had no relief;
jurisdiction; (f) where, in a criminal case, relief from an order of arrest is urgent and the
(b) where the questions raised in the certiorari proceeding have been duly raised granting of such relief by the trial Court is improbable;
and passed upon by the lower court, or are the same as those raised and passed (g) where the proceedings in the lower court are a nullity for lack of due process;
upon in the lower court; (h) where the proceedings was ex parte or in which the petitioner had no
(c) where there is an urgent necessity for the resolution of the question and any opportunity to object; and (i) where the issue raised is one purely of law or where
further delay would prejudice the interests of the Government or of the petitioner public interest is involved. (Citations omitted)
or the subject matter of the action is perishable;
SUMMARY OF RULING:
WON SEN. ESTRADA’S PETITION FOR CERTIORARI CONSTITUTES FORUM
SHOPPING Both the Revised Rules of Criminal Procedure and the Rules of Procedure of
the Office of the Ombudsman require the investigating officer to furnish the
YES, Sen. Estrada’s petition constitutes forum shopping and as such, should respondent with copies of the affidavits of the complainant and affidavits of
be summarily dismissed. his supporting witnesses. Neither of these Rules require the investigating
officer to furnish the respondent with copies of the affidavits of his co-
His claim that the finding of probable cause was the “sole issue” he raised respondents. The right of the respondent is only “to examine the
before the Ombudsman in his Motion for Reconsideration dated 7 April evidence submitted by the complainant,”
2014 is obviously false.
Moreover, Section 4 (a, b and c) of Rule II of the Ombudsman’s Rule of
The rule against forum shopping is not limited to the fulfillment of the Procedure, read together, only require the investigating officer to furnish
requisites of litis pendentia. To determine whether a party violated the rule the respondent with copies of the affidavits of the complainant and his
against forum shopping, the most important factor to ask is whether the supporting witnesses. There is no law or rule requiring the investigating
elements of litis pendentia are present, or whether a final judgment in one officer to furnish the respondent with copies of the affidavits of his co-
case will amount to res judicata in another. respondents.
Undergirding the principle of litis pendentia is the theory that a party is not The Ombudsman faithfully complied with the existing Rules on preliminary
allowed to vex another more than once regarding the same subject matter investigation and even accommodated Sen. Estrada beyond what the Rules
and for the same cause of action. The exception from the forum shopping required. Thus, the Ombudsman could not be faulted with grave abuse of
rule, however, is true only where a petition for certiorari is properly or discretion. Since this is a Petition for Certiorari under Rule 65, the Petition
regularly invoked in the usual course; the exception does not apply when fails in the absence of grave abuse of discretion on the part of the
the relief sought, through a petition for certiorari, is still pending with or has Ombudsman.
as yet to be decided by the respondent court, tribunal or body exercising
judicial or quasi-judicial body. A law can abolish preliminary investigations without running afoul with the
constitutional requirements of due process as prescribed in Ang Tibay, as
The simultaneous remedies the petitioners sought could result in possible amplified in GSIS. Ang Tibay, as amplified in GSIS, requires substantial
conflicting rulings, or at the very least, to complicated situations. In every evidence for a decision against the respondent in the administrative case. In
case, our justice system suffers as this kind of sharp practice opens the preliminary investigations, only likelihood or probability of guilt is required.
system to the possibility of manipulation; to uncertainties when conflict of
rulings arise; and at least to vexation for complications other than conflict
of rulings. What the rule on forum shopping addresses are the possibility
and the actuality of its harmful effects on our judicial system.
ESTRADA vs OMBUDSMAN i. Similar, identical, or confusingly similar to an existing trademark
registered with the appropriate government agency at the time of the
These consolidated petitions seek to declare several provisions of RA 10175, domain name registration;
the Cybercrime Prevention Act of 2012, unconstitutional and void. ii. Identical or in any way similar with the name of a person other than
the registrant, in case of a personal name; and
Petitioners claim that the means adopted by the cybercrime law for iii. Acquired without right or with intellectual property interests in it.
regulating undesirable cyberspace activities violate certain of their 4. SEC. 4 (b)(3)
constitutional rights. The government of course asserts that the law merely b. Computer-related Offenses:
seeks to reasonably put order into cyberspace activities, punish 3. Computer-related Identity Theft. – The international
wrongdoings, and prevent hurtful attacks on the system. acquisition, use, misuse, transfer, possession, alteration, or
IMPORTANT PROVISIONS: deletion of identifying information belonging to another,
1. SEC. 4 (a)(1) whatever natural or juridical, without right: Provided: that if
Cybercrime Offenses. - The following acts constitute the offense of no damage has yet been caused, the penalty imposable shall
cybercrime punishable under this Act: be on (1) degree lower.
a. Offenses against the confidentiality, integrity and availability 5. SEC. 4 (c)(1)
of computer data and systems: c. Content-related Offenses:
1. Illegal Access. - The access to the whole or any part 1. Cybersex.- The willful engagement, maintenance control,
of a computer system without right. or operation, directly or indirectly, of any lascivious
2. SEC. 4 (a)(3) exhibition of sexual organs or sexual activity, with the aid of
a. Offenses against the confidentiality, integrity and availability a computer system, for favor or consideration.
of computer data and systems: 6. SEC. 4 (c)(2)
3. Data Interference. - The intentional or reckless c. Content-related Offenses:
alteration, damaging, deletion or deterioration of 2. Child Pornography. – the unlawful or prohibited acts
computer data, electronic document, or electronic defined and punishable by RA No. 9775 or the Anti-Child
data message, without right, including the Pornography Act of 2009, committed through a computer
introduction or transmission of viruses. system: Provided, That the penalty to be imposed shall be (1)
3. SEC. 4 (a)(6) one degree higher than that provided for in RA No. 9775.
Offenses against the confidentiality, integrity and availability of 7. SEC. 4 (c)(3)
computer data and systems: c. Content-related Offenses:
6. Cyber-squatting. - The acquisition of domain name over 3. Unsolicited Commercial Communications. – The
the internet in bad faith to profit, mislead, destroy the transmission of commercial electronic communication with
reputation, and deprive others from registering the same, if the use of computer system which seeks to advertise, sell, or
such a domain name is: offer for sale products and services are prohibited unless:
(i) There is prior affirmative consent from the
recipient; or
(ii) The primary intent of the communication is for 1. A private communication made by any person to another
service and/or administrative announcements from in the performance of any legal, moral, or social duty; and
the sender to its existing users, subscribers or 2. A fair and true report, made in good faith, without any
customers; or comments or remarks of any judicial, legislative or other
(iii) The following conditions are present: official proceedings which are not of confidential nature, or
(aa) The commercial electronic of any statement, report or speech delivered in said
communication contains a simple, valid, and proceedings, or of any other act performed by public officers
reliable way for the recipient to reject receipt in the exercise of their functions.
of further commercial electronic messages 11. Art. 355
(opt-out) from the same source; Libel means by writings or similar means— A libel committed by
(bb) The commercial electronic means of writing, printing, lithography, engraving, radio,
communication does not purposely disguise phonograph, painting, theatrical exhibition, cinematograpic
the source of electronic message; and exhibition, or any similar means, shall be punished by prision
(cc) The commercial electronic correccional in its minimum and medium periods or a fine ranging
communication does not purposely include from 200 to 6,000 pesos or both, in addition to the civil action which
misleading information in any part of the may be brought by the offended party.
message in order to induce the recipients to 12. SEC. 5
read the message Sec. 5. Other Offenses. — The following acts shall also constitute an
8. SEC. 4 (c)(4) offense:
4. Libel.- the unlawful or prohibited acts of libel is defined in (a) Aiding or Abetting in the Commission of Cybercrime. – Any
Art. 355 of the RPC, as amended, committed through a person who willfully abets or aids in the commission of any
computer system or any other similar means which may be of the offenses enumerated in this Act shall be held liable
devised in the future (b) Attempt in the Commission of Cybercrime. – Any person
9. Art. 353 who willfully attempts to commit any of the offenses
Definition of libel.— A libel is public and malicious imputation of a enumerated in this Act shall be held liable.
crime, or of a vice or defect, real or imaginary, or any act, omission, 13. SEC. 6
condition, status, or circumstance tending to cause the dishonor, Sec. 6. All crimes defined and penalized by the RPC, as amended, and
discredit, or contempt of a natural or juridical person, or to blacken special laws, if committed by, through and with the use of
the memory of one who is dead. information and communications technologies shall be covered by
10. Art. 354 the relevant provisions of this communications technologies shall be
Requirement of publicity.— Every defamatory imputation is covered by the relevant provisions of this Act: Provided, That the
presumed to be malicious, even if it be true, if no good intention and penalty to be imposed shall be one (1) degree higher than that
justifiable motive for making it is shown, except in the following provided for by the Revised Penal Code, as amended, and special
cases: laws, as the case may be.
14. SEC. 7
Sec. 7. Liability under Other Laws. – A prosecution under this Act shall
be without prejudice to any liability for violation of any provision of Any person found guilty of any of the punishable acts enumerated in
the Revised Penal Code, as amended, or special laws. Section 5 shall be punished with imprisonment one degree lower
15. SEC. 8 than that of the prescribed penalty for the offense or a fine of at least
Sec. 8. Penalties. – Any person found guilty of any of the punishable One hundred thousand pesos P100,000 but not exceeding Five
acts enumerated in Sections 4(a) and 4(b) of this Act shall be hundred thousand pesos P500,000 or both.
punished with imprisonment of prision mayor or a fine of at least 16. SEC. 12
P200,000 up to a maximum amount commensurate to the damage Sec. 12. Real-Time Collection of Traffic Data. — Law enforcement
incurred or both. authorities, with due cause, shall be authorized to collect or record
by technical or electronic means traffic data in real-time associated
Any person found guilty of the punishable act under Sec. 4(a)(5) shall with specified communications transmitted by means of a computer
be punished with imprisonment of prision mayor or a fine of not system.
more than P500,000 or both.
Traffic data refer only to the communication’s origin, destination,
If punishable acts in Sec. 4(a) are committed against critical route, time, date, size, duration, or type of underlying service, but
infrastructure, the penalty of reclusion perpetua or a fine of at least not content, nor identities.
P500,000 up to maximum amount commensurate to the damage
incurred or both, shall be imposed. All other data to be collected or seized or disclosed will require a
court warrant.
Any person found guilty of any of the punishable acts enumerated in
Sec. 4(c)(1) of this Act shall be punished with imprisonment of prision Service providers are required to cooperate and assist law
mayor or a fine of at least P200,000 but not exceeding P1,000,000 or enforcement authorities in the collection or recording of the above-
both. stated information.
17. SEC. 13
Any person found guilty of any of the punishable acts enumerated in Sec. 13. Preservation of Computer Data. — The integrity of traffic
Section 4(c)(2) of this Act shall be punished with the penalties as data and subscriber information relating to communication services
enumerated in Republic Act No. 9775 or the “Anti-Child Pornography provided by a service provider shall be preserved for a minimum
Act of 2009:” Provided, That the penalty to be imposed shall be one period of 6 months from the date of the transaction. Content data
degree higher than that provided for in Republic Act No. 9775, if shall be similarly preserved for 6 months from the date of receipt of
committed through a computer system. the order from law enforcement authorities requiring its
preservation.
Any person found guilty of any of the punishable acts enumerated in
Section 4(c)(3) shall be punished with imprisonment of arresto Law enforcement authorities may order a one-time extension for
mayor or a fine of at least P50,000 but not exceeding P250,000 or another 6 months: Provided, That once computer data preserved,
both. transmitted or stored by a service provider is used as evidence in a
case, the mere furnishing to such service provider of the transmittal system and the measures to protect and preserve the computer data
document to the Office of the Prosecutor shall be deemed a therein to provide, as is reasonable, the necessary information, to
notification to preserve the computer data until the termination of enable the undertaking of the search, seizure and examination.
the case.
Law enforcement authorities may request for an extension of time
The service provider ordered to preserve computer data shall keep to complete the examination of the computer data storage medium
confidential the order and its compliance. and to make a return thereon but in no case for a period longer than
18. SEC. 14 thirty (30) days from date of approval by the court.
Sec. 14. Disclosure of Computer Data. — Law enforcement 20. SEC. 17
authorities, upon securing a court warrant, shall issue an order Sec. 17. Destruction of Computer Data. — Upon expiration of the
requiring any person or service provider to disclose or submit periods as provided in Sections 13 and 15, service providers and law
subscriber’s information, traffic data or relevant data in his/its enforcement authorities, as the case may be, shall immediately and
possession or control within seventy-two (72) hours from receipt of completely destroy the computer data subject of a preservation and
the order in relation to a valid complaint officially docketed and examination.
assigned for investigation and the disclosure is necessary and 21. SEC. 19
relevant for the purpose of investigation. Sec. 19. Restricting or Blocking Access to Computer Data. – When a
19. SEC. 15 computer data is prima facie found to be in violation of the
Sec. 15. Search, Seizure and Examination of Computer Data. — provisions of this Act, the DOJ shall issue an order to restrict or block
Where a search and seizure warrant is properly issued, the law access to such computer data
enforcement authorities shall likewise have the following powers 22. SEC. 20
and duties. Sec. 20. Noncompliance.– Failure to comply with the provisions of
Chapter IV hereof specifically the orders from law enforcement
Within the time period specified in the warrant, to conduct authorities shall be punished as a violation of Presidential Decree No.
interception, as defined in this Act, and: 1829 with imprisonment of prision correctional its maximum period
(a) To secure a computer system or a computer data storage or a fine of P100,000 or both, for each and every noncompliance with
medium; an order issued by law enforcement authorities.
(b) To make and retain a copy of those computer data secured; 23. SEC. 24
(c) To maintain the integrity of the relevant stored computer data; Sec. 24. Cybercrime Investigation and Coordinating Center. There is
(d) To conduct forensic analysis or examination of the computer data hereby created within 30 days from the effectivity of this Act, an
storage medium; and inter-agency body to be known as the Cybercrime Investigation and
(e) To render inaccessible or remove those computer data in the Coordinating Center (CICC), under the administrative supervision of
accessed computer or computer and communications network. the Office of the President, for policy coordination among concerned
agencies and for the formulation and enforcement of the national
Pursuant thereof, the law enforcement authorities may order any cybersecurity plan.
person who has knowledge about the functioning of the computer
24. SEC. 26 10. WON Section 6 on the Penalty of One Degree Higher is valid for
Sec. 26. Powers and Functions– The CICC shall have the following imposing a higher degree of penalty
powers and functions: 11. WON Section 7 on the Prosecution under both the Revised Penal
(a) To formulate a national cybersecurity plan and extend immediate Code (RPC) and R.A. 10175 is violative of the prohibition against
assistance of real time commission of cybercrime offenses through a double jeopardy
computer emergency response team 12. WON the fixing of penalties in Section 8 on Penalties is within the
ISSUES: powers of the legislative
13. WON Section 12 on Real-Time Collection of Traffic Data is violative
1. WON Section 4(a)(1) on Illegal Access is unconstitutional for failing of the right of every individual to privacy
to meet the strict scrutiny standard required of laws that interfere 14. WON Section 13 on Preservation of Computer Data constitutes an
with the fundamental rights of the people undue deprivation of the right to property
2. WON Section 4(a)(3) on Data Interference suffers from overbreadth 15. WON Section 14 on Disclosure of Computer Data is unconstitutional
in that it intrudes into the area of protected speech and expression, for envisioning a process that is similar to the issuance of subpoenas,
creating a chilling and deterrent effect of these guaranteed which is an exclusive judicial function
freedoms 16. WON Section 15 on Search, Seizure and Examination of Computer
3. WON Section 4(a)(6) on Cyber-squatting violates the equal Data supplant established search and seizure procedures
protection clause in that, not being narrowly tailored, it will cause a 17. WON Section 17 on Destruction of Computer Data the destruction of
user using his real name to suffer the same fate as those who use computer data subject of previous preservation or examination
aliases or take the name of another in satire, parody, or any other violates the user’s right against deprivation of property without due
literary device process of law
4. WON Section 4(b)(3) on Identity Theft violates the constitutional 18. WON Section 19 on Restricting or Blocking Access to Computer Data
rights to due process and to privacy and correspondence, and stifles freedom of expression and violates the right against
transgress the freedom of the press
unreasonable searches and seizures
5. WON Section 4(c)(1) on Cybersex violates the freedom of expression 19. WON Section 20 on Obstruction of Justice is a bill of attainder
clause of the Constitution 20. WON Section 24 on Cybercrime Investigation and Coordinating
6. WON Section 4(c)(2) on Child Pornography distinguishes between a Center (CICC) and Section 26(a) on CICC’s Powers and Functions
person who merely imagines child pornography and does it on pen constitutes an invalid delegation of power
and paper, and a person who formulates such idea on his laptop
7. WON the prohibition of [Section 4(c)(3) on ] Unsolicited Commercial RULING:
Communications violates the freedom of expression
WON SECTION 4(A)(1) ON ILLEGAL ACCESS IS UNCONSTITUTIONAL FOR
8. WON Section 4(c)(4) on Libel, in connection with Arts. 353, 354, and FAILING TO MEET THE STRICT SCRUTINY STANDARD REQUIRED OF LAWS
355, are unconstitutional for inferring “presumed malice”
THAT INTERFERE WITH THE FUNDAMENTAL RIGHTS OF THE PEOPLE
9. WON Section 5 on Aiding or Abetting and Attempt in the Commission
of Cybercrimes suffer from overbreadth, creating a chilling and NO, Sec. 4(a)(1) is valid and constitutional.
deterrent effect on protected expression
The Court uses the strict scrutiny standard in determining the All penal laws, like the cybercrime law, have of course an inherent chilling
constitutionality of laws that tend to target a class of things or persons. effect, an in terrorem effect or the fear of possible prosecution that hangs
According to this standard, a legislative classification that impermissibly on the heads of citizens who are minded to step beyond the boundaries of
interferes with the exercise of fundamental right or operates to the peculiar what is proper. But to prevent the state from legislating criminal laws
class disadvantage of a suspect class is presumed constitutional. The burden because they instill such kind of fear is to render the state powerless in
is to prove that the classification is necessary to achieve a compelling state addressing and penalizing socially harmful conduct. Here, the chilling effect
interest and that it is the least restrictive means to protect such interest. It is merely an illusion because the provision clearly describes the evil it seeks
is also used to assess the validity of laws dealing with the regulation of to punish and creates no tendency to intimidate the free exercise of one’s
speech, gender, or race as well as other fundamental rights, as expansion constitutional rights. Petitioners also failed to discharge their burden of
from its earlier applications to equal protection. proving that under no set of circumstance with the said provision be valid.
There is nothing in the said provision that calls for the application of the WON SECTION 4(A)(6) ON CYBER-SQUATTING VIOLATES THE EQUAL
strict scrutiny standard since no fundamental freedom is involved in PROTECTION CLAUSE IN THAT, NOT BEING NARROWLY TAILORED, IT WILL
punishing what is essentially a condemnable act. As for the alleged legal risk CAUSE A USER USING HIS REAL NAME TO SUFFER THE SAME FATE AS
to ethical hackers, the Court stated that they are not covered by the THOSE WHO USE ALIASES OR TAKE THE NAME OF ANOTHER IN SATIRE,
provision because ethical hackers are the equivalent of independent PARODY, OR ANY OTHER LITERARY DEVICE
auditors who come into an organization to verify its bookkeeping records.
Since the ethical hacker does his job with prior permission from the client, NO, Sec.4(a)(6) does not violate the equal protection clause.
such permission would insulate him from the coverage of this provision.
The law is reasonable in that it penalizes a person who acquires a domain
WON SECTION 4(A)(3) ON DATA INTERFERENCE SUFFERS FROM name in bad faith to profit, mislead, destroy reputation, or deprive others
OVERBREADTH IN THAT IT INTRUDES INTO THE AREA OF PROTECTED who are not ill-motivated of the rightful opportunity of registering the same.
SPEECH AND EXPRESSION, CREATING A CHILLING AND DETERRENT The allegations of the petitioners that the law does not recognize the
EFFECT OF THESE GUARANTEED FREEDOMS substantial difference between a person who registers a particular name
because it is his pseudonym, and a person who registers same name
NO, Sec. 4(a)(3) does not suffer from overbreadth. because it is his real name, does not stand. Hence, the constitutional
challenge on this provision is baseless.
Under the overbreadth doctrine, a proper governmental purpose,
constitutionally subject to state regulation, may not be achieved by means WON SECTION 4(B)(3) ON IDENTITY THEFT VIOLATES THE
that unnecessarily sweep its subject broadly, thereby invading the area of CONSTITUTIONAL RIGHTS TO DUE PROCESS AND TO PRIVACY AND
protected freedoms. But the said provision does not encroach on these CORRESPONDENCE, AND TRANSGRESS THE FREEDOM OF THE PRESS
freedoms at all. It simply punishes what is a form of vandalism. Such act has
no connection to guaranteed freedoms. NO, Sec. 4(b)(3) does not violate constitutional rights to due process and
privacy and correspondence, nor does it transgress the freedom of the
press.
WON SECTION 4(C)(1) ON CYBERSEX VIOLATES THE FREEDOM OF
The right to privacy, or the right to be let alone, was institutionalized in the EXPRESSION CLAUSE OF THE CONSTITUTION
1987 Constitution as a facet of the right protected by the guarantee against
unreasonable searches and seizures. The right to privacy exists NO, Sec 4(c)(1) does not violate the freedom of expression clause of the
independently of its identification with liberty; it is in itself fully deserving of Constitution.
constitutional protection.
The fear of the petitioners that private communications of sexual character
Relevant to any discussion of the right to privacy is the concept known as between husband and wife or consenting adults, which are not regarded as
the zones of privacy10. Two constitutional guarantees create these zones of crimes under the penal code, would now be regarded as crimes when done
privacy: (a) the right against unreasonable searches and seizures, which is ”for favour” in cyberspace. In common usage, the term “favour” embraces
the basis of the right to be let alone, and (b) the right to privacy of socially tolerated trysts. The law as written would invite law enforcement
communication and correspondence. agenciet into the bedrooms of married couples or consenting individuals.
A Court must determine whether a person has exhibited a reasonable However, the deliberations f the Bicameral Committee of Congress show a
expectation of privacy and, if so, whether that expectation has been violated lack of intent to penalize a “private showing x x x between and among two
by unreasonable government intrusion. private persons x x x although that may be a form of obscenity to some.”
The element of “engaging in a business” is necessary to constitute the illegal
The law punishes those who acquire or use such identifying information cybersex. The Act actually seeks to punish cyber prostitution, white slave
without right, implicitly to cause damage. Petitioners simply fail to show trade, and pornography for favour and consideration. This includes
how government effort to curb computer-related identity theft violates the interactive prostitution and pornography, i.e. by webcam.
right to privacy and correspondence as well as the right to due process of
law. The subject of the provision is not novel. Art. 201 of the RPC and the Anti-
Trafficking in Persons Act of 2003 punishes similar actions. The case of
Also, the charge of invalidity of this section based on the overbreadth Nogales vs People shows the extent to which the State can regulate
doctrine will not hold water since the specific conducts proscribed do not materials that serve no other purpose than satisfy the market for violence,
intrude into guaranteed freedoms like speech. As for the identity theft that lust, or pornography. he Court weighed the property rights of individuals
will allegedly hinder journalists from accessing the unrestricted user account against the public welfare. Private property, if containing pornographic
of a person in the news to secure information about him that could be materials, may be forfeited and destroyed. Likewise, engaging in sexual acts
punished. Evidently, the theft of identity information must be intended for privately through internet connection, perceived by some as a right, has to
an illegitimate purpose. Moreover, acquiring and disseminating information be balanced with the mandate of the State to eradicate white slavery and
made public by the user himself cannot be regarded as a form of theft. the exploitation of women.
10
Are recognized and protected in our laws. Within these zones, any form of intrusion is
impermissible unless excused by law and in accordance with customary legal process.
WON SECTION 4(C)(2) ON CHILD PORNOGRAPHY DISTINGUISHES wastes the storage and network capacities of internet service providers,
BETWEEN A PERSON WHO MERELY IMAGINES CHILD PORNOGRAPHY reduces the efficiency of commerce and technology, and interferes with the
AND DOES IT ON PEN AND PAPER, AND A PERSON WHO FORMULATES owner’s peaceful enjoyment of his property. Transmitting spams amounts
SUCH IDEA ON HIS LAPTOP
to trespass to one’s privacy since the person sending out spams enters the
recipient’s domain without prior permission. The OSG contends that
NO, Sec 4(c)(2) remains unconstitutional. commercial speech enjoys less protection in law.
The provision merely expands the scope of the Anti-Child Pornography Act To prohibit the transmission of unsolicited ads would deny a person the right
of 2009 to cover identical activities in cyberspace. n theory, nothing to read his emails, even unsolicited commercial ads addressed to him.
prevents the government from invoking the ACPA when prosecuting Commercial speech is a separate category of speech which is not accorded
persons who commit child pornography using a computer system. Actually, the same level of protection as that given to other constitutionally
ACPA’s definition of child pornography already embraces the use of guaranteed forms of expression but is nonetheless entitled to
“electronic, mechanical, digital, optical, magnetic or any other means.” protection.36 The State cannot rob him of this right without violating the
Notably, no one has questioned this ACPA provision. constitutionally guaranteed freedom of expression. Unsolicited
advertisements are legitimate forms of expression.
Of course, the law makes the penalty higher by one degree when the crime WON SECTION 4(C)(4) ON LIBEL, IN CONNECTION WITH ARTS. 353, 354,
is committed in cyberspace. But no one can complain since the intensity or AND 355, ARE UNCONSTITUTIONAL FOR INFERRING “PRESUMED
duration of penalty is a legislative prerogative and there is rational basis for MALICE”
such higher penalty. The potential for uncontrolled proliferation of a
particular piece of child pornography when uploaded in the cyberspace is Sec. 4(c)(4) that penalizes online libel as valid and constitutional with
incalculable. respect to the original author of the post;but void and unconstitutional with
respect to others who simply receive the post and react to it.
WON THE PROHIBITION OF [SECTION 4(C)(3) ON ] UNSOLICITED
COMMERCIAL COMMUNICATIONS VIOLATES THE FREEDOM OF Petitioners lament that libel provisions of the penal code37 and, in effect, the
EXPRESSION
libel provisions of the cybercrime law carry with them the requirement of
“presumed malice” even when the latest jurisprudence already replaces it
YES, Sec. 4(c)(3) violates the freedom of expression and as such, must be with the higher standard of “actual malice” as a basis for
struck down for being unconstitutional. conviction.38 Petitioners argue that inferring “presumed malice” from the
accused’s defamatory statement by virtue of Article 354 of the penal code
The above penalizes the transmission of unsolicited commercial infringes on his constitutionally guaranteed freedom of expression.
communications, also known as “spam.” The term “spam” surfaced in early
internet chat rooms and interactive fantasy games. They also contend that the laws on libel should be stricken down as
unconstitutional for otherwise good jurisprudence requiring “actual malice”
The Government, represented by the Solicitor General, points out that could easily be overturned as the Court has done in Fermin v. People39 even
unsolicited commercial communications or spams are a nuisance that where the offended parties happened to be public figures.
Covenant of Civil and Political Rights (ICCPR). They point out that in Adonis
The elements of libel are: (a) the allegation of a discreditable act or condition v. Republic of the Philippines,47 the United Nations Human Rights Committee
concerning another; (b) publication of the charge; (c) identity of the person (UNHRC) cited its General Comment 34 to the effect that penal defamation
defamed; and (d) existence of malice.40crallawlibrary laws should include the defense of truth
There is “actual malice” or malice in fact41 when the offender makes the But General Comment 34 does not say that the truth of the defamatory
defamatory statement with the knowledge that it is false or with reckless statement should constitute an all-encompassing defense. As it happens,
disregard of whether it was false or not.42 The reckless disregard standard Article 361 recognizes truth as a defense but under the condition that the
used here requires a high degree of awareness of probable falsity. There accused has been prompted in making the statement by good motives and
must be sufficient evidence to permit the conclusion that the accused in fact for justifiable ends.
entertained serious doubts as to the truth of the statement he published.
Gross or even extreme negligence is not sufficient to establish actual Proof of the truth of an imputation of an act or omission not constituting a
malice.43crallawlibrary crime shall not be admitted, unless the imputation shall have been made
against Government employees with respect to facts related to the
The prosecution bears the burden of proving the presence of actual malice discharge of their official duties.
in instances where such element is required to establish guilt. The defense
of absence of actual malice, even when the statement turns out to be false, Besides, the UNHRC did not actually enjoin the Philippines, as petitioners
is available where the offended party is a public official or a public figure. urge, to decriminalize libel. It simply suggested that defamation laws be
crafted with care to ensure that they do not stifle freedom of expression.
Since the penal code and implicitly, the cybercrime law, mainly target libel Free speech is not absolute. It is subject to certain restrictions, as may be
against private persons, the Court recognizes that these laws imply a stricter necessary and as may be provided by law.
standard of “malice” to convict the author of a defamatory statement where
the offended party is a public figure. Society’s interest and the maintenance The Court agrees with the Solicitor General that libel is not a constitutionally
of good government demand a full discussion of public affairs. The law protected speech and that the government has an obligation to protect
identifies not only the presence of malice in law (the article being malicious private individuals from defamation.
in itself) but also malice in fact.
But the Court’s acquiescence goes only insofar as the cybercrime law
But, where the offended party is a private individual, the prosecution need penalizes the author of the libelous statement or article. The culture
not prove the presence of malice. The law explicitly presumes its existence associated with internet media is distinct from that of print. The internet is
(malice in law) from the defamatory character of the assailed statement. For characterized as encouraging a freewheeling, anything-goes, writing style.
his defense, the accused must show that he has a justifiable reason for the
defamatory statement even if it was in fact true. WON SECTION 5 ON AIDING OR ABETTING AND ATTEMPT IN THE
COMMISSION OF CYBERCRIMES SUFFER FROM OVERBREADTH, CREATING
Petitioners peddle the view that both the penal code and the Cybercrime A CHILLING AND DETERRENT EFFECT ON PROTECTED EXPRESSION
Prevention Act violate the country’s obligations under the International
Section 5 that penalizes aiding or abetting and attempt in the commission like this!,” that could not be libel since he did not author the poster. If
of cybercrimes as VALID and CONSTITUTIONAL only in relation to Section Arthur, passing by and noticing the poster, writes on it, “Correct!,” would
4(a)(1) on Illegal Access, Section 4(a)(2) on Illegal Interception, Section that be libel? No, for he merely expresses agreement with the statement on
4(a)(3) on Data Interference, Section 4(a)(4) on System Interference, Section the poster. He still is not its author. Besides, it is not clear if aiding or abetting
4(a)(5) on Misuse of Devices, Section 4(a)(6) on Cyber-squatting, Section libel in the physical world is a crime.
4(b)(1) on Computer-related Forgery, Section 4(b)(2) on Computer-related
Fraud, Section 4(b)(3) on Computer-related Identity Theft, and Section Except for the original author of the assailed statement, the rest (those who
4(c)(1) on Cybersex; but VOID and UNCONSTITUTIONAL with respect to pressed Like, Comment and Share) are essentially knee-jerk sentiments of
Sections 4(c)(2) on Child Pornography, 4(c)(3) on Unsolicited Commercial readers who may think little or haphazardly of their response to the original
Communications, and 4(c)(4) on online Libel. posting.
Petitioners assail the constitutionality of Section 5 that renders criminally The old parameters for enforcing the traditional form of libel would be a
liable any person who willfully abets or aids in the commission or attempts square peg in a round hole when applied to cyberspace libel. Unless the
to commit any of the offenses enumerated as cybercrimes. It suffers from legislature crafts a cyber libel law that takes into account its unique
overbreadth, creating a chilling and deterrent effect on protected circumstances and culture, such law will tend to create a chilling effect on
expression. the millions that use this new medium of communication in violation of their
constitutionally-guaranteed right to freedom of expression.
Aiding or abetting has of course well-defined meaning and application in
existing laws. When a person aids or abets another his action is essentially Those who challenged the Act claim that the law violated the First
physical and so is susceptible to easy assessment as criminal in character. Amendment’s guarantee of freedom of speech for being overbroad. The
These forms of aiding or abetting lend themselves to the tests of common U.S. Supreme Court agreed and ruled: The vagueness of such a regulation
sense and human experience. raises concerns because of its obvious chilling effect on free speech. The
severity of criminal sanctions may well cause speakers to remain silent
But, when it comes to certain cybercrimes, the waters are muddier and the rather than communicate even arguably unlawful words, ideas, and images.
line of sight is somewhat blurred. The idea of “aiding or abetting”
wrongdoings online threatens the heretofore popular and unchallenged Xxx
dogmas of cyberspace use. The Communications Decency Act of 1996 (CDA), 47 U.S.C.S. § 223, presents
a great threat of censoring speech that, in fact, falls outside the statute’s
Social networking sites build social relations among people who, for scope. Given the vague contours of the coverage of the statute, it
example, share interests, activities, backgrounds, or real-life connections. unquestionably silences some speakers whose messages would be
The question is: are online postings such as “Liking” an openly defamatory entitled to constitutional protection. That danger provides further reason
statement, “Commenting” on it, or “Sharing” it with others, to be regarded for insisting that the statute not be overly broad. The CDA’s burden on
as “aiding or abetting?” In libel in the physical world, if Nestor places on the protected speech cannot be justified if it could be avoided by a more
office bulletin board a small poster that says, “Armand is a thief!,” he could carefully drafted statute.
certainly be charged with libel. If Roger, seeing the poster, writes on it, “I
Libel in the cyberspace can of course stain a person’s image with just one But this rule admits of exceptions. A petitioner may for instance mount a
click of the mouse. Moreover, cyberlibel often goes hand in hand with “facial” challenge to the constitutionality of a statute even if he claims no
cyberbullying that oppresses the victim, his relatives, and friends, evoking violation of his own rights under the assailed statute where it involves free
from mild to disastrous reactions. Still, a governmental purpose, which speech on grounds of overbreadth or vagueness of the statute. The rationale
seeks to regulate the use of this cyberspace communication technology to for this exception is to counter the “chilling effect” on protected speech that
protect a person’s reputation and peace of mind, cannot adopt means that comes from statutes violating free speech. A person who does not know
will unnecessarily and broadly sweep, invading the area of protected whether his speech constitutes a crime under an overbroad or vague law
freedoms. may simply restrain himself from speaking in order to avoid being charged
of a crime. The overbroad or vague law thus chills him into silence.
Penal laws should provide reasonably clear guidelines for law enforcement
officials and triers of facts to prevent arbitrary and discriminatory Of course, if the “comment” does not merely react to the original posting
enforcement.63 The terms “aiding or abetting” constitute broad sweep that but creates an altogether new defamatory story then that should be
generates chilling effect on those who express themselves through considered an original posting published on the internet.
cyberspace posts, comments, and other messages.64 Hence, Section 5 of the
cybercrime law that punishes “aiding or abetting” libel on the cyberspace is Section 5 with respect to Section 4(c)(4) is unconstitutional. Its vagueness
a nullity. raises apprehension on the part of internet users because of its obvious
chilling effect on the freedom of expression, especially since the crime of
When a penal statue encroaches upon the freedom of speech, a facial aiding or abetting ensnares all the actors in the cyberspace front in a fuzzy
challenge grounded on the void-for-vagueness doctrine is acceptable. way. What is more, as the petitioners point out, formal crimes such as libel
Romualdez v. Commission on Elections,65 “we must view these statements are not punishable unless consummated.71 In the absence of legislation
of the Court on the inapplicability of the overbreadth and vagueness tracing the interaction of netizens and their level of responsibility such as in
doctrines to penal statutes as appropriate only insofar as these doctrines other countries, Section 5, in relation to Section 4(c)(4) on Libel, Section
are used to mount ‘facial’ challenges to penal statutes not involving free 4(c)(3) on Unsolicited Commercial Communications, and Section 4(c)(2) on
speech.” Child Pornography, cannot stand scrutiny.
In an “as applied” challenge, the petitioner who claims a violation of his But the crime of aiding or abetting the commission of cybercrimes under
constitutional right can raise any constitutional ground - absence of due Section 5 should be permitted to apply to Section 4(a)(1) on Illegal Access,
process, lack of fair notice, lack of ascertainable standards, overbreadth, or Section 4(a)(2) on Illegal Interception, Section 4(a)(3) on Data Interference,
vagueness. Here, one can challenge the constitutionality of a statute only if Section 4(a)(4) on System Interference, Section 4(a)(5) on Misuse of Devices,
he asserts a violation of his own rights. It prohibits one from assailing the Section 4(a)(6) on Cyber-squatting, Section 4(b)(1) on Computer-related
constitutionality of the statute based solely on the violation of the rights of Forgery, Section 4(b)(2) on Computer-related Fraud, Section 4(b)(3) on
third persons not before the court. This rule is also known as the prohibition Computer-related Identity Theft, and Section 4(c)(1) on Cybersex. None of
against third-party standing. these offenses borders on the exercise of the freedom of expression.
WON SECTION 6 ON THE PENALTY OF ONE DEGREE HIGHER DEFINES A not bar prosecution of the other although both offenses arise from the same
CRIME IS VALID FOR IMPOSING A HIGHER DEGREE OF PENALTY
fact, if each crime involves some important act which is not an essential
element of the other. With the exception of the crimes of online libel and
YES, Sec. 6 is a valid and constitutional provision. online child pornography, the Court would rather leave the determination
of the correct application of Section 7 to actual cases.
Sec. 6 merely makes commission of existing crimes through the internet a
qualifying circumstance. As the Solicitor General points out, there exists a The two offenses, one a violation of Article 353 of the Revised Penal Code
substantial distinction between crimes committed through the use of and the other a violation of Section 4(c)(4) of R.A. 10175 involve essentially
information and communications technology and similar crimes committed the same elements and are in fact one and the same offense. Indeed, the
using other means. In using the technology in question, the offender often OSG itself claims that online libel under Section 4(c)(4) is not a new crime
evades identification and is able to reach far more victims or cause greater but is one already punished under Article 353. Section 4(c)(4) merely
harm. The distinction, therefore, creates a basis for higher penalties for establishes the computer system as another means of publication. Charging
cybercrimes. the offender under both laws would be a blatant violation of the
proscription against double jeopardy.
WON SECTION 7 ON THE PROSECUTION UNDER BOTH THE REVISED
PENAL CODE (RPC) AND R.A. 10175 IS VIOLATIVE OF THE PROHIBITION The same is true with child pornography committed online. Section 4(c)(2)
AGAINST DOUBLE JEOPARDY
merely expands the ACPA’s scope so as to include identical activities in
The Court resolves to leave the determination of the correct application of cyberspace. Thus, charging the offender under both Section 4(c)(2) and
Section 7 that authorizes prosecution of the offender under both the ACPA would likewise be tantamount to a violation of the constitutional
Revised Penal Code and Republic Act 10175 to actual cases, WITH THE prohibition against double jeopardy.
EXCEPTION of the crimes of:
1. Online libel as to which, charging the offender under both Section WON THE FIXING OF PENALTIES IN SECTION 8 ON PENALTIES IS WITHIN
4(c)(4) of Republic Act 10175 and Article 353 of the Revised Penal THE POWERS OF THE LEGISLATIVE
Code constitutes a violation of the proscription against double
jeopardy; YES, the manner of fixing penalties for the commission of crimes is as a ruke
2. Child pornography committed online as to which, charging the a legislative prerogative. Here the legislature prescribed a measure of severe
offender under both Section 4(c)(2) of Republic Act 10175 and penalties for what it regards as deleterious cybercrimes. They appear
Republic Act 9775 or the Anti-Child Pornography Act of 2009 also proportionate to the evil sought to be punished. The power to determine
constitutes a violation of the same proscription, and, in respect to penalties for offenses is not diluted or improperly wielded simply because
these, is void and unconstitutional.
at some prior time the act or omission was but an element of another
offense or might just have been connected with another crime.77 Judges and
The Solicitor General points out that Section 7 merely expresses the settled magistrates can only interpret and apply them and have no authority to
doctrine that a single set of acts may be prosecuted and penalized modify or revise their range as determined by the legislative department.
simultaneously under two laws, a special law and the Revised Penal Code. The courts should not encroach on this prerogative of the law-making body.
When two different laws define two crimes, prior jeopardy as to one does
WON SECTION 12 ON REAL-TIME COLLECTION OF TRAFFIC DATA IS
VIOLATIVE OF THE RIGHT OF EVERY INDIVIDUAL TO PRIVACY But that right is not unqualified. In Whalen v. Roe, the United States
Supreme Court classified privacy into two categories: decisional privacy and
YES, Sec. 12 is violative of the constitution in so far as it authorizes the informational privacy. Decisional privacy involves the right to independence
collection or recording of traffic data in real time. in making certain important decisions, while informational privacy refers to
the interest in avoiding disclosure of personal matters. It is the latter right—
Petitioners assail the grant to law enforcement agencies of the power to the right to informational privacy—that those who oppose government
collect or record traffic data in real time as tending to curtail civil liberties or collection or recording of traffic data in real-time seek to protect.
provide opportunities for official abuse. Petitioners invoke the right of every
individual to privacy and to be protected from government snooping into Informational privacy has two aspects: the right not to have private
the messages or information that they send to one another. information disclosed, and the right to live freely without surveillance and
intrusion. In determining whether or not a matter is entitled to the right to
The first question is whether or not Section 12 has a proper governmental privacy, this Court has laid down a two-fold test. The first is a subjective test,
purpose since a law may require the disclosure of matters normally where one claiming the right must have an actual or legitimate expectation
considered private but then only upon showing that such requirement has of privacy over a certain matter. The second is an objective test, where his
a rational relation to the purpose of the law,79 that there is a compelling or her expectation of privacy must be one society is prepared to accept as
State interest behind the law, and that the provision itself is narrowly drawn. objectively reasonable.
Undoubtedly, the State has a compelling interest in enacting the cybercrime Consequently, the expectation of privacy is to be measured from the general
law for there is a need to put order to the tremendous activities in public’s point of view. Without reasonable expectation of privacy, the right
cyberspace for public good.82 To do this, it is within the realm of reason that to it would have no basis in fact. Transmitting communications is akin to
the government should be able to monitor traffic data to enhance its ability putting a letter in an envelope properly addressed, sealing it closed, and
to combat all sorts of cybercrimes. sending it through the postal service. Those who post letters have no
expectations that no one will read the information appearing outside the
There are many ways the cyber criminals can quickly erase their tracks. envelope. The difference is that traffic data sent through the internet at
Evidently, it is only real-time traffic data collection or recording and a times across the ocean do not disclose the actual names and addresses
subsequent recourse to court-issued search and seizure warrant that can (residential or office) of the sender and the recipient, only their coded
succeed in ferreting them out. internet protocol (IP) addresses. The packets travel from one computer
system to another where their contents are pieced back together. Section
Petitioners of course point out that the provisions of Sec. 12 are too broad 12 does not permit law enforcement authorities to look into the contents of
and do not provide ample safeguards against crossing legal boundaries and the messages and uncover the identities of the sender and the recipient.
invading the people’s right to privacy. In Morfe vs Mutuc, the Court
recognized that certain constitutional guarantees work together to create That Court ruled that even if there is an expectation that phone numbers
zones of privacy wherein governmental powers may not intrude, and that one dials should remain private, such expectation is not one that society is
there exists an independent constitutional right of privacy. Such right to be prepared to recognize as reasonable.
left alone has been regarded as the beginning of all freedoms.
In much the same way, ICT users must know that they cannot communicate data in their hands from looking into the identity of their sender or receiver
or exchange data with one another over cyberspace except through some and what the data contains. This will unnecessarily expose the citizenry to
service providers to whom they must submit certain traffic data that are leaked information or, worse, to extortion from certain bad elements in
needed for a successful cyberspace communication. The conveyance of this these agencies.
data takes them out of the private sphere, making the expectation to privacy
in regard to them an expectation that society is not prepared to recognize Section 12, of course, limits the collection of traffic data to those “associated
as reasonable. with specified communications.” But this supposed limitation is no
limitation at all since, evidently, it is the law enforcement agencies that
The Court, however, agrees with Justices Carpio and Brion that when would specify the target communications. The power is virtually limitless,
seemingly random bits of traffic data are gathered in bulk, pooled together, enabling law enforcement authorities to engage in “fishing expedition,”
and analyzed, they reveal patterns of activities which can then be used to choosing whatever specified communication they want. This evidently
create profiles of the persons under surveillance. Such information is likely threatens the right of individuals to privacy.
beyond what the public may expect to be disclosed, and clearly falls within
matters protected by the right to privacy. But has the procedure that Section But warrantless search is associated with a police officer’s determination of
12 of the law provides been drawn narrowly enough to protect individual probable cause that a crime has been committed, that there is no
rights? opportunity for getting a warrant, and that unless the search is immediately
carried out, the thing to be searched stands to be removed. These
Petitioners point out that the phrase “due cause” has no precedent in law preconditions are not provided in Section 12.
or jurisprudence and that whether there is due cause or not is left to the
discretion of the police. Bare assurance that law enforcement authorities will not abuse the
provisions of Section 12 is of course not enough. The grant of the power to
Indeed, courts are able to save vague provisions of law through statutory track cyberspace communications in real time and determine their sources
construction. But the cybercrime law, dealing with a novel situation, fails to and destinations must be narrowly drawn to preclude abuses.
hint at the meaning it intends for the phrase “due cause.” The Solicitor Petitioners also ask that the Court strike down Section 12 for being violative
General suggests that “due cause” should mean “just reason or motive” and of the void-for-vagueness doctrine and the overbreadth doctrine. These
“adherence to a lawful procedure.” But the Court cannot draw this meaning doctrines however, have been consistently held by this Court to apply only
since Section 12 does not even bother to relate the collection of data to the to free speech cases. But Section 12 on its own neither regulates nor
probable commission of a particular crime. It just says, “with due cause,” punishes any type of speech. Therefore, such analysis is unnecessary.
thus justifying a general gathering of data. It is akin to the use of a general
search warrant that the Constitution prohibits. The Court must ensure that laws seeking to take advantage of these
technologies be written with specificity and definiteness as to ensure
The authority that Section 12 gives law enforcement agencies is too respect for the rights that the Constitution guarantees.
sweeping and lacks restraint. While it says that traffic data collection should
not disclose identities or content data, such restraint is but an illusion. WON SECTION 13 ON PRESERVATION OF COMPUTER DATA CONSTITUTES
Admittedly, nothing can prevent law enforcement agencies holding these AN UNDUE DEPRIVATION OF THE RIGHT TO PROPERTY
disclosure would not constitute an unlawful search or seizure nor would it
NO, Sec. 13 does not constitute an undue deprivation of the right to violate the privacy of communications and correspondence. Disclosure can
property. be made only after judicial intervention.
Petitioners’ claim that there is an undue deprivation of the right to property WON SECTION 15 ON SEARCH, SEIZURE AND EXAMINATION OF
is based on their belief that the data preservation order that law COMPUTER DATA SUPPLANT ESTABLISHED SEARCH AND SEIZURE
enforcement authorities are to issue as a form of garnishment of personal PROCEDURES
property in civil forfeiture proceedings. Such order prevents internet users
from accessing and disposing of traffic data that essentially belong to them. No, Sec. 15 does not supplant established search and seizure procedures
and as such, remains valid and constitutional.
The contents of materials sent or received through the internet belong to
their authors or recipients and are to be considered private On its face, however, Section 15 merely enumerates the duties of law
communications. But it is not clear that a service provider has an obligation enforcement authorities that would ensure the proper collection,
to indefinitely keep a copy of the same as they pass its system for the benefit preservation, and use of computer system or data that have been seized by
of users. The data that service providers preserve on orders of law virtue of a court warrant. The exercise of these duties do not pose any threat
enforcement authorities are not made inaccessible to users by reason of the on the rights of the person from whom they were taken. Section 15 does
issuance of such orders. The process of preserving data will not unduly not appear to supersede existing search and seizure rules but merely
hamper the normal transmission or use of the same. supplements them.
WON SECTION 14 ON DISCLOSURE OF COMPUTER DATA IS WON SECTION 17 ON DESTRUCTION OF COMPUTER DATA THE
UNCONSTITUTIONAL FOR ENVISIONING A PROCESS THAT IS SIMILAR TO DESTRUCTION OF COMPUTER DATA SUBJECT OF PREVIOUS
THE ISSUANCE OF SUBPOENAS, WHICH IS AN EXCLUSIVE JUDICIAL PRESERVATION OR EXAMINATION VIOLATES THE USER’S RIGHT AGAINST
FUNCTION DEPRIVATION OF PROPERTY WITHOUT DUE PROCESS OF LAW
NO, the constitutional challenge to Sec. 14 is unmeritorious.
NO, Sec. 17 is constitutional and valid in that as already stated, it is unclear
The process envisioned in Sec. 14 is being likened to the issuance of a that the user has a demandable right to require the service provider to have
subpoena. Petitioner’s objection is that the issuance of subpoenas is a that copy of the data saved indefinitely for him in its storage system. If he
judicial function. But it is well-settled that the power to issue subpoenas is wanted them preserved, he should have saved them in his computer when
not exclusively a judicial function. Executive agencies have the power to he generated the data or received it. He could also request the service
issue subpoena to issue subpoena as an adjunct of their investigatory provider for a copy before it is deleted.
power.
WON SECTION 19 ON RESTRICTING OR BLOCKING ACCESS TO COMPUTER
What Section 14 envisions is merely the enforcement of a duly issued court DATA STIFLES FREEDOM OF EXPRESSION AND VIOLATES THE RIGHT
warrant, a function usually lodged in the hands of law enforcers to enable AGAINST UNREASONABLE SEARCHES AND SEIZURES
them to carry out their executive functions. The prescribed procedure for
YES, Section 19 authorizes the Department of Justice to restrict or block found prima facie in violation of any provision of the cybercrime law. Taking
access to suspected Computer Data which stifles freedom of expression and Section 6 into consideration, this can actually be made to apply in relation
violates the right against unreasonable searches and seizures. to any penal provision. It does not take into consideration any of the three
tests mentioned above.
Computer data99 may refer to entire programs or lines of code, including
malware, as well as files that contain texts, images, audio, or video WON SECTION 20 ON OBSTRUCTION OF JUSTICE IS A BILL OF
recordings. It is indisputable that computer data, produced or created by ATTAINDER
their writers or authors may constitute personal property. Consequently,
they are protected from unreasonable searches and seizures, whether while NO, Sec. 20 is not a bill of attainder and thus, remains valid and
stored in their personal computers or in the service provider’s systems. constitutional.
Section 2, Article III of the 1987 Constitution provides that the right to be Petitioners challenge Sec. 20, alleging that it is a bill of attainder. The
secure in one’s papers and effects against unreasonable searches and argument is that the mere failure to comply constitutes a legislative finding
seizures of whatever nature and for any purpose shall be inviolable. Further, of guilt, without regard to situations where non-compliance would be
it states that no search warrant shall issue except upon probable cause to reasonable or valid.
be determined personally by the judge. Here, the Government, in effect,
seizes and places the computer data under its control and disposition But since the non-compliance would be punished as a violation of PD 1829,
without a warrant. The Department of Justice order cannot substitute for Sec. 20 necessarily incorporates elements of the offense which are defined
judicial search warrant. therein. If Congress had intended for Sec. 20 to constitute an offense in and
of itself, it would not have had to make reference to any other statue or
The content of the computer data can also constitute speech. In such a case, provision.
Section 19 operates as a restriction on the freedom of expression over
cyberspace. Certainly not all forms of speech are protected. Legislature may, Thus, the act of non-compliance, for it to be punishable, must still be done
within constitutional bounds, declare certain kinds of expression as illegal. “knowingly or wilfully.” There must still be a judicial determination of guilt.
But for an executive officer to seize content alleged to be unprotected
without any judicial warrant, it is not enough for him to be of the opinion WON SECTION 24 ON CYBERCRIME INVESTIGATION AND COORDINATING
that such content violates some law, for to do so would make him judge, CENTER (CICC) AND SECTION 26(A) ON CICC’S POWERS AND FUNCTIONS
jury, and executioner all rolled into one.100crallawlibrary CONSTITUTES AN INVALID DELEGATION OF POWER
Not only does Section 19 preclude any judicial intervention, but it also NO, both sections are valid and constitutional.
disregards jurisprudential guidelines established to determine the validity of
restrictions on speech. Restraints on free speech are generally evaluated on Petitioners mainly contend that Congress invalidly delegated its power
one of or a combination of three tests: the dangerous tendency doctrine, when it gave the Cybercrime Investigation and Coordinating Center (CICC)
the balancing of interest test, and the clear and present danger the power to formulate a national cybersecurity plan without any sufficient
rule.101 Section 19, however, merely requires that the data to be blocked be standards or parameters for it to follow.
PESTILOS vs GENEROSO
In order to determine whether there is undue delegation of legislative
power, the Court has adopted two tests: the completeness test and the The case at bar is a petition for review on certiorari under Rule 45 of the ROC
sufficient standard test. Here, the cybercrime law is complete in itself when challenging the decision date 21 January 2008 and the resolution dater 17
it directed the CIC to formulate and implement a national cybersecurity April 2008 of the Court of Appeals.
plan. Also, contrary to the position of the petitioners, the law gave sufficient
standards for the CICC to follow when it provided a definition of The appealed decision affirmed the order of the RTC denying Joey Pestilos
cybersecurity. et. Al’s Urgent Motion for Regular Preliminary Investigation, as well as their
subsequent motion for reconsideration.
Cybersecurity refers to the collection of tools, policies, risk management
approaches, actions, training, best practices, assurance and technologies IMPORTANT RULE:
that can be used to protect cyber environment and organization and user’s
assets. This definition serves as the parameters within which CICC should Sec. 5(b), Rule 112 of the 1985 Rules of Criminal Procedure was further
work in formulating the cybersecurity plan. amended with the incorporation of the word “probable cause” as the basis
of the arresting officer’s determination on whether the person to be
This policy is clearly adopted in the interest of law and order, which has been arrested has committed the crime.
considered as sufficient standard. Hence, Secs. 24 and 26(a) are likewise
valid. As presently worded, said rule provides: When an offense has just been
committed, and he has probable cause to believe based on personal
knowledge of facts or circumstances that the person to be arrested has
committed it.
It is clear that the present rules have objectified the previously subjective
determination of the arresting officer as to the:
1. Commission of the crime; and
2. Whether the person sought to be arrested committed the crime.
According to Feria, these changes were adopted to minimize arrests based
on mere suspicion or hearsay.
Petitioners filed an Urgent Motion for Regular Preliminary Investigation on From a review of the records, the Court concludes that the police officers
the ground that they had not been lawfully arrested. They alleged that no had personal knowledge of facts or circumstances upon which they had
valid warrantless arrest took place since the police officers had no personal properly determined probable cause in effecting a warrantless arrest against
knowledge that they were the perpetrators of the crime. They also claimed the petitioners. The Court notes, however, that the determination of the
that they were just “invited” to the police station. Thus, the inquest facts in the present case is purely limited to the resolution of the issue on
proceeding was improper, and a regular procedure for preliminary the validity of the warrantless arrests of the petitioners.
investigation should have been performed pursuant to Rule 112 of the ROC.
The fact and circumstances show that the police officers gathered and which
On 16 March 2005, the RTC issued its order denying the petitioners’ Urgent they have personally observed less than one hour from the time that they
Motion for Regular Preliminary Investigation. The court likewise denied the have arrived at the scene of the crime until the time of the arrest of the
petitioners’ motion for reconsideration. petitioners, the Court deems it reasonable to conclude that the police
The petitioners challenged the lower court’s ruling before the CA on Rule 65 officers had personal knowledge of facts or circumstances justifying the
petition for certiorari. They attributed grave abuse of discretion, amounting petitioners’ warrantless arrests. These circumstances qualify as the police
to lack or excess of jurisdiction, on the RTC for the denial of their motion for officers’ personal observation, which are within their personal knowledge,
preliminary investigation. prompting them to make the warrantless arrests.
The CA also recognized that the arrest was pursuant to a valid warrantless In determining the reasonableness of the warrantless arrests, it is
arrest so that an inquest proceeding was called for a consequence. The CA incumbent upon the courts to consider if the police officers have complied
saw no merit in the petitioners’ argument that the order denying the Urgent with the requirements set under Sec. S (b), Rule 113 of the RRC Procedure,
Motion for Regular Preliminary Investigation is void for failure to clearly specifically, the requirement of immediacy; the police officer’s personal
state the facts and the law upon which it was based, pursuant to Rule 16, knowledge of facts or circumstances; and lastly, the propriety of the
Sec 3 of the RRC. The CA found that the RTC had sufficiently explained the determination of probable cause that the person sought to be arrested
grounds for the denial of the motion. committed the crime.
ISSUES: To reiterate, personal knowledge of a crime just committed under the terms
1. WON the warrantless arrest is not valid of the above-cited provision, does not require actual presence at the scene
2. WON petitioners were unlawfully arrested while a crime was being committed; it is enough that evidence of the recent
3. WON the RTC’s Order denying the Urgent Motion for Regular commission of the crime is patent (as in the case) and the police officer has
Preliminary Investigation is void because it was not properly issued probable cause to believe based on personal knowledge of facts or
circumstances, that the person to be arrested has recently committed the clearly and distinctly the reasons therefor. A contrary system would only
crime. prolog the proceedings, which was precisely what happened to this case.
Hence, we uphold the validity of the RTC’s order as it correctly stated the
WON PETITIONERS WERE UNLAWFULLY ARRESTED reason for its denial of the petitioners’ Urgent Motion for Regular
Preliminary Investigation.
NO, the arrest was lawful.
NO, the RTC Order does not exhibit any taint of impropriety or grave abuse
of discretion in this Order. The RTC, in resolving the motion, is not required
to state all the facts found in the record of the case. Detailed evidentiary
matters, as the RTC decreed, is best reserved for the full-blown trial of the
case, not in the preliminary incidents leading up to the trial.
FACTS:
Accused-appellant was charged with violation of Sec.11, Art. II of RA No.
9165, otherwise known as the Comprehensive Dangerous Drugs Act of 2002.
The RTC ruled that mere possession of the illegal substance already
consummated the crime and good faith was not even a defense.
ISSUES:
1. WON the accused-appellant’s arrest was valid
2. WON the seized items are admissible in evidence
3. WON the accused-appellant is guilty of the crime charged