You are on page 1of 27

Zones of Privacy: How Private?

______

By: Llewellyn L. Llanillo and Khersien Y. Baustista

Llewellyn L. Llanillo is a Senior Partner at the Philippine


law firm of Salvador Llanillo Bernardo Attorneys-at-Law
in Metro Manila, and is a member of the Philippine bar
and the New York Bar. He has been in law practice for
more than 40 years, advising on corporate and
commercial law, intellectual property law, advertising,
media and entertainment, e-commerce and technology, personal data
protection, franchising and distribution, and investments, mergers and
acquisitions. In 2010 he was appointed as a Bar Examiner in Commercial
Law. He has a BA in Social Sciences (Ateneo de Davao University), LLB
(University of the Philippines), LLM in U.S. and Global Business Law
(Suffolk University Law School), and LLM in Transnational Commercial
Practice (Lazarski University).

Khersien Y. Bautista is an associate of Salvador Llanillo


Bernardo Attorneys-at-Law, and assists in tax advisory
and litigation, corporate services, and special projects.
She earned her J.D. from the University of the
Philippines (UP) in 2015 and was admitted to the
Philippine Bar in 2016. Prior to joining SLB, she was a
research assistant with the UP Law Center and an
editorial assistant with the UP Third World Studies Center.

“All the forces of a technological age…operate to narrow the area of


privacy and facilitate intrusions into it. In modern terms, the
capacity to maintain and support this enclave of private life marks
the difference between a democratic and a totalitarian society.”1

1Disini v. Secretary of Justice, G.R. No. 203335, February 11, 2014, citing Morfe v. Mutuc, G.R.
NO. L-20387, January 31, 1968, citing Thomas I. Emerson, Nine Justices in Search of a Doctrine,
64 MICH. LAW REV. 219, 229 (1965).
2 DEFENSE COUNSEL JOURNAL | JANUARY 2017

L
AW as a normative tool was privacy and the exercise of the
invented to maintain order in state’s police power pursuant to the
society; laws, however, demands of public interest and state
continually evolve to accommodate security under Philippine law. We
changing times and respond to touch on the tension between
society’s needs. In the information privacy rights and public interest
age, ideas and news become embedded in the various laws
accessible in an instant.2 Along with enacted to meet new threats, and
the ease of the flow of information, elaborates on this tension as the
the system of connections and the courts balance competing interests
collection of data have greatly in the following legislation: (a)
improved, benefiting not only Human Security Act of 2007, 3 (b)
human relations, but the Anti-Money Laundering Act of
development of the economy as well. 2001, 4 (c) Terrorism Financing
Along with the upside, however, Prevention and Suppression Act of
is the downside of these new 2012, 5 (d) Cybercrime Prevention
technological advances – from the Act of 2012,6 (e) Data Privacy Act of
inconvenience caused by prank calls, 2012, 7 (f) the proposed national
to the more serious problems of centralized identification system,
harassment, scams, and acts of and (g) the proposed registration of
terror. Society must respond with prepaid mobile phones.
measures deemed appropriate,
reasonable, and efficacious, to keep I. Right to Privacy Under
abreast of technological progress. Philippine Law: A Survey of
This article discusses the Jurisprudence
constitutional and legal implications
engendered by the collision The right to privacy means the
between the right to individual “right to be let alone” 8 and is the

2 History World, History of Communication. 3 Rep. Act No. 9372 (2007).


[online] available at: http://www. 4 Rep. Act No. 9160 (2001), as amended by
historyworld.net/wrldhis/PlainTextHistori Rep. Act No. 9194 (2003); Rep. Act No.
es.asp?historyid=aa93 [last accessed June 1, 10167 (2012); and Rep. Act No. 10365
2017]. Long ago, Native Americans used (2013).
smoke signals for long distance 5 Rep. Act No. 10168 (2012).

communication to convey a limited number 6 Rep. Act No. 10175 (2012).

of messages such as “danger” or “victory.” By 7 Rep. Act No. 10173 (2012).

the 11th century, the “pigeon post” was 8 Samuel Warren and Louis Brandeis, The

developed in ancient Egypt. Right to Privacy, 4 HARV. L. REV. (1890).


For this generation, one would most available at: http://groups.csail.mit.edu/
likely use e-mail or a mobile device for long mac/classes/6.805/articles/privacy/Privac
distance communication, and additionally, y_brand_warr2.html. (last accessed June 6
post or share events on an almost daily basis, 2017).
on social media pages.
Zones of Privacy: How Private? 3

“beginning of all freedoms.” 9 the different zones of privacy


Discussing the origin of the right to protected under Philippine law. This
privacy, Pavesich v. New England Life right could also be derived from the
Insurance Co. held that the right to Universal Declaration of Human
privacy has its foundation in natural Rights, which mandates that “no one
law and the instinct of nature.10 In shall be subjected to arbitrary
Philippine law, the concept of interference with his privacy” and
privacy is enshrined in the “everyone has the right to the
Constitution and is regarded as the protection of the law against such
right to be free from unwarranted interference or attacks.”16
exploitation of one’s person or from The Philippine Constitution
intrusion into one’s private guarantees the right against
activities in such a way as to cause unreasonable searches and seizure,
humiliation to a person’s ordinary as well as the right to privacy of
sensibilities.11 It has been described communication and corres-
as the most comprehensive of rights pondence.17 It expressly guarantees
and the right most valued by the right against self-
civilized men.12 incrimination, 18 liberty of abode, 19
right to due process,20 and the right
A. Privacy – an Independent to and freedom of association.21
Right
1. Situational, Informational,
In Morfe v. Mutuc, the Philippine and Decisional Privacy
Supreme Court affirmed that the
right to privacy exists The concept of privacy has,
independently of its identification through time, greatly evolved, with
with liberty, and in itself fully technological advancements playing
deserving of constitutional an influential role. This evolution
protection. 13 Disini v. Secretary of was briefly recounted in former
Justice, 14 citing Sabio v. Gordon, 15 Chief Justice Reynato S. Puno’s
also recognized the importance of speech, The Common Right to

9 Morfe v. Mutuc, G.R. No. L-20387, January 15 In the Matter of the Petition for Issuance
31, 1968. of Writ of Habeas Corpus of Sabio v. Sen.
10 Pavesich v. New England Life Ins. Co., 122 Gordon, G.R. No. 174340, October 17,
Ga. 190 (Ga. 1905). 2006.
11 Hing v. Choachuy, Sr., G.R. No. 179736, 16 Id.

June 26, 2013. 17 CONST. art. III, §§ 2-3.


12 Morfe v. Mutuc, G.R. No. L-20387, supra 18 CONST. art. III.

note 1. 19 Id.
13 Id. 20 Id. at § 1.
14 Disini v. Secretary of Justice, G.R. No. 21 Id. at § 6.

203335, February 11, 2014.


4 DEFENSE COUNSEL JOURNAL | July 2017

Privacy, where he explained the system. Critics questioned whether


three strands of the right to privacy: this provision has a proper
(1) locational or situational privacy; governmental purpose, since a law
(2) informational privacy; and (3) may require the disclosure of
decisional privacy.22 matters normally considered
Applying the United States case private only upon showing that such
of Whalen v. Roe, 23 the Philippine requirement has a rational relation
Supreme Court explained to the purpose of the law, that there
“decisional privacy” and “inform- is a compelling State interest, and
ational privacy.” 24 “Decisional that the provision itself is narrowly
privacy” involves the right to drawn.28
independence in making important In discussing the collection of
decisions, while “informational traffic data, the Philippine Supreme
privacy” refers to the interest in Court held that “when seemingly
avoiding disclosure of personal random bits of traffic data are
matters. “Informational privacy” has gathered in bulk, pooled together,
two aspects: the right not to have and analyzed,” these would lead to
private information disclosed, and the creation of “profiles of the
the right to live freely without persons under surveillance. With
surveillance and intrusion.25 This is enough traffic data, analysts may be
the right of an individual to control able to determine a person's close
information about oneself, 26 and associations, religious views,
those who oppose government political affiliations, even sexual
collection or recording of traffic data preferences.” 29 These clearly fall
in real time seek to protect this within matters protected by the
aspect of the right to privacy.27 right to privacy. 30 Because of a
On September 12, 2012, failure to provide safeguards
Republic Act (RA) No. 10175, sufficient to protect constitutional
otherwise known as the Cybercrime guarantees and the vague purpose
Prevention Act of 2012, was signed offered in the provision for
into law. A contentious provision collection, the provision was
was Section 12, on real-time declared unconstitutional. Chief
collection of traffic data associated Justice Ma. Lourdes Sereno in a
with specified communications separate opinion31 clarified that
transmitted by means of a computer real-time collection of traffic data is

22 Vivares v. St. Theresa’s College, G.R. No. 27 Disini, G.R. No. 203335, supra note 1.
202666, September 29, 2014. 28 Disini, G.R. No. 203335, supra note 1.
23 429 U.S. 589 (1977). 29 Id.
24 Disini, G.R. No. 203335, supra note 1. 30 Id.
25 Id. 31 Separate Opinion in Disini, G.R. No.
26 Vivares v. St. Theresa’s College, G.R. No. 203335, supra note 1.
202666, supra note 22.
Zones of Privacy: How Private? 5

not invalid per se. However, there searches in the workplace.” 37


must be “robust safeguards” and an “Reasonableness” is the touchstone
explanation for the need and nature of the validity of a government
of the traffic data for warrantless search or intrusion.38
real-time collection. Pollo stressed the relevance of
the surrounding circumstances:
2. Privacy in the Workplace whether a particular act of the
employer impinges on an
Two significant cases in employee’s right to privacy; the
Philippine jurisprudence on privacy employee's relationship to the item
in the workplace are the cases of seized; whether the item was in the
Pollo v. Constantino-David, 32 immediate control of the employee
involving the search of a when it was seized; and whether the
government employee’s computer employee took actions to maintain
data files, and Social Justice Security his privacy in the item. 39 It is
(SJS) v. Dangerous Drugs Board, 33 important to note that the Supreme
dealing with the mandatory drug Court added that reasonable
testing of, among others, officers expectation of privacy is negated by
and employees of public and private the presence of a policy that puts its
offices. 34 In Pollo, the Philippine employees on notice that they have
Supreme Court held that a search by no expectation of privacy in
a government employer of an anything they create, store, send, or
employee’s office is justified when receive on office computers. 40
there are reasonable grounds for Based on the foregoing, privacy in
suspecting that it will turn up an office is circumscribed by the
evidence that the employee is guilty company's work policies, the
of work-related misconduct. 35 The collective bargaining agreement, if
concept of “workplace privacy any, and the inherent right of the
policy,” as discussed in the United employer to maintain discipline and
States case of O’Connor v. Ortega 36 efficiency in the workplace. Their
played a central role in the decision. expectation of privacy in a regulated
In determining whether privacy office environment is reduced, and a
rights would be violated, searches degree of impingement upon such
must pass the test of privacy has been upheld.41
“reasonableness for warrantless

32 G.R. No. 181881, October 18, 2011. 36 480 U.S. 709, 715-716 (1987).
33 G.R. No. 157870, November 3, 2008. 37 Pollo, G.R. No. 181881, supra note 32.
34 Rep. Act No. 9165 (2002), § 36 (d). 38 SJS, G.R. No. 157870, supra note 33.

Comprehensive Dangerous Drugs Act of 39 Pollo, G.R. No. 181881, supra note 32.

2002. 40 Id.
35 Pollo, G.R. No. 181881, supra note 32. 41 SJS, G.R. No. 157870, supra note 33.
6 DEFENSE COUNSEL JOURNAL | July 2017

In SJS, the Philippine Supreme eminent domain and taxation, with


Court found the mandatory testing respect to interfering with private
requirement for officers and rights. Police power regulates not
employees of public and private only property but, more importantly,
offices 42 reasonable and valid. the liberty of virtually all individuals.
Reasonableness is the touchstone of In this sense, it is infinitely more
the validity of a government search important than eminent domain and
or intrusion. Whether a search at taxation.46
issue complies with the Because of its function, police
reasonableness standard is judged power is described as the most
by the balancing of the government- pervasive, the least limitable, and
mandated intrusion on the the most demanding of the three
individual's privacy interest against inherent powers of the state.47 Here,
the promotion of some compelling the individual is compelled to
state interest. 43 Authorities have surrender to society rights and
agreed that the right to privacy privileges which he would
yields to certain rights of the public otherwise be free to exercise in a
and defers to police power. 44 Also, state of nature, in exchange for the
for a law touching on the privacy benefits which he receives as a
rights of employees to be valid, member of society.48 The individual,
there must be well-defined limits to as a member of society, is restrained
properly guide authorities.45 by police power, which affects him
even before he is born and follows
B. The State’s Police Power him after he is dead. It is a
and Its Limits ubiquitous and often unwelcome
intrusion. Still, as long as the activity
A counterweight to protected or the property has some relevance
privacy is the state’s police power: to the public welfare, its regulation
the power to restrain and regulate under police power is not only
the use of liberty and property to proper but necessary. 49
promote the public welfare. This Police power is lodged primarily
power outpaces easily the other two in the national legislature, and its
inherent powers of government, exercise lies primarily in the

42 Rep. Act No. 9165 (2002), § 36 (d). 48 Pavesich, 122 Ga. 190, supra note 10.
Comprehensive Dangerous Drugs Act of 49 CRUZ, supra note 46, citing Ynot v. IAC, G.R.
2002. No. 74457, March 20, 1987. As the Latin
43 SJS, G.R. No. 157870, supra note 33. maxims go, salus populi est suprema
44 Id. lex and sic utere tuo ut alienum non
45 Id. laedas, which call for the subordination of
46 ISAGANI A. CRUZ, CONSTITUTIONAL LAW (2007 individual interests to the benefit of the
ed). greater number.
47 Id.
Zones of Privacy: How Private? 7

discretion of the legislative to be regulated has no bearing


department. If the legislature does whatever upon the public welfare.52
decide to act, the choice of measures The means employed for the
or remedies, provided only that accomplishment of the police
these conform to the requisites, lies objective must also be reasonable.
also within its exclusive jurisdiction. Failing this, the law will be annulled
Once determined, the remedy for violation of the second
chosen cannot be attacked on the requirement.53
ground that it is not the best of the The lawful exercise of police
suggested solutions, or that it is power in constitutionally protected
unwise, or impractical or zones of privacy is illustrated by the
inefficacious, or even immoral.50 enactment of the Human Security
The tests to determine the Act of 2007, Anti-Money Laundering
validity of a police measure are: first, Act of 2001, and the Terrorism
it must appear that the interests of Financing Prevention and
the public generally, as Suppression Act of 2012.
distinguished from those of a
particular class, require such C. Human Security Act of
interference; and second, the means 2007
are reasonably necessary for the
accomplishment of the purpose, and Under the Human Security Act of
not unduly oppressive upon 2007 (otherwise known as Anti-
individuals. 51 As ubiquitous as Terrorism Law or “HSA”), any
police power may be, it is fortunate person who commits an act of
for individual liberty that there are terrorism as defined under the Act,54
still some areas of human activity “thereby sowing and creating a
that are not within its reach. This condition of widespread and
will be so where the subject sought extraordinary fear and panic among
the populace, in order to coerce the

50 CRUZ, supra note 46. Involving Destruction); or under Pres. Dec.


51 Ynot v. IAC, G.R. No. 74457, March 20, No. 1613 (The Law on Arson); Rep. Act No.
1987 citing U.S. v. Toribio, G.R. No. L-5060, 6969 (Toxic Substances and Hazardous and
January 26, 1910. Nuclear Waste Control Act of 1990); Rep. Act
52 CRUZ, supra note 46. No. 5207 (Atomic Energy Regulatory and
53 Id. Liability Act of 1968); RA No. 6235 (Anti-
54 The following are the predicate criminal Hijacking Law); Pres. Dec. No. 532 (Anti-
acts: REV. PEN. CODE art. 122 (Piracy in Piracy and Anti-Highway Robbery Law of
General and Mutiny in the High Seas or in 1974;) and Pres. Dec. No. 1866, as amended
Philippine Waters); art. 134 (Rebellion or (Decree codifying the Laws on Illegal and
Insurrection); art. 134a (Coup d’Etat), Unlawful Possession, Manufacture, Dealing in,
including acts committed by private persons; Acquisition or Disposition of Firearms,
art. 248 (Murder); art. 267 (Kidnapping and Ammunitions or Explosives).
Serious Illegal Detention); art. 324 (Crimes
8 DEFENSE COUNSEL JOURNAL | July 2017

government to give in to an unlawful charged with or suspected of the


demand, shall be guilty of the crime crime of terrorism of conspiracy to
of terrorism and shall suffer the commit terrorism.56
penalty of forty (40) years of Privacy is still paramount,
imprisonment, without the benefit despite this broad grant of police
of parole as provided for under Act. power. The law requires an order
4103, otherwise known as the from the Court of Appeals, and
Indeterminate Sentence Law as prohibits the surveillance,
amended.” interception, and recording of
The HSA intrudes into privacy communications between lawyers
by permitting surveillance of and clients, doctors and patients,
suspects and interception and journalists and their sources and of
recording of communications. confidential business corres-
Notwithstanding the injunction pondence. 57

under the Anti-Wire Tapping Law55


against surveillance, a police or law D. Anti-Money
enforcement official and the Laundering Act of 2001
members of his team may, upon a and
written order of the Court of Terrorism Financing
Appeals, listen to, intercept, and Prevention and
record, with the use of any mode, Suppression Act of
form, kind or type of electronic or 2012
other surveillance equipment or
intercepting and tracking devices, or The Anti-Money Laundering Act
with the use of any other suitable of 2001, as amended (“AMLA”),
ways and means for that purpose, enacted to penalize money
any communication, message, laundering also has safeguards to
conversation, discussion, or spoken protect privacy. The AMLA created
or written words between members the Anti-Money Laundering Council
of a judicially declared and outlawed (“AMLC”), which is mandated along
terrorist organization, association, with other concerned agencies, to
or group of persons or of any person implement its provision.58

55 Rep. Act No. 4200 (1965). series of 2011, the Updated Anti-Money
56 Rep. Act No. 9372 (2007), § 7. Human Laundering Rules and Regulations for banks,
Security Act of 2007. trust entities, and other institutions under
57 Id. its supervisory authority. The Supreme
58 The Bangko Sentral ng Pilipinas (BSP), the Court also promulgated Administrative
Insurance Commission (IC) and the Matter (AM) No. 05-11-04, or the Rule of
Securities and Exchange Commission (SEC) Procedure in Cases of Civil Forfeiture, Asset
promulgated the Revised Implementing Preservation, and Freezing of Monetary
Rules and Regulations (RIRR) of Rep. Act No. Instrument, Property or Proceeds
9160. The BSP also issued Circular No. 706, Representing, Involving, or Relating to an
Zones of Privacy: How Private? 9

The AMLA provides the


different court remedies available to a. Bank Inquiry with
the AMLC, like freeze orders, Court Order. 65 – The
authorization to inquire into bank AMLC may inquire into
deposits and forfeiture; 59 and or examine any
further prescribes preventive particular deposit or
measures, including customer investment account,
identification, record keeping, and including related
reporting of covered and suspicious accounts, with any
transactions by covered persons.60 banking institution or
Covered persons are required to non-bank financial
maintain and safely store records of institution, upon order
all transactions for five years from by the Court of Appeals
the dates of transactions. These based on an ex parte
records must contain the full and application in cases of
true identity of the owners or violation of the AMLA
holders of the accounts and all other when it has been
customer identification documents. established that
To ensure privacy, all records must probable cause exists
be kept confidential.61 that the deposits or
Pursuant to bank secrecy laws,62 investments involved,
all deposits in Philippine or foreign including related
currency of whatever nature are accounts, are in any
confidential. Banks are prohibited way related to an
from disclosing any information unlawful activity or a
related to these deposits. Pursuant money laundering
to the AMLA, however, the reporting offense.
of covered and suspicious
transactions to the AMLC is an 1. Inquiry Into or
exception to bank secrecy laws, and Examination of
such transactions must be reported Related Accounts. 66 A
to the AMLC.63 court order ex parte
The rules applicable to bank must be obtained
inquiries are as follows:64 before the AMLC can

Unlawful Activity or Money Laundering 62 Rep. Act No. 1405 (1955) Law on Secrecy
Offence under Rep. Act No. 9160, as of Bank Deposits, as amended; and Rep. Act
amended. No. 6426 (1974), Foreign Currency Deposit
59 Rep. Act No. 9160 (2001), §§ 10-12. Anti- Act of the Philippines, as amended.
Money Laundering Act of 2001. 63 Rep. Act No. 9160 (2001), § 9.
60 § 9. 64 RIRR, Rule XI.
61 § 9(b); RIRR, Rule 9.2. 65 RIRR, Rule 11.1.
66 Rep. Act No. 9160 (2001), § 11.
10 DEFENSE COUNSEL JOURNAL | July 2017

inquire into related to inquire into or


accounts. The pro- examine any particular
cedure for the ex parte deposit or investment
application for an account, including
order of inquiry into related accounts, with
the principal account any banking institution
shall be the same for or non-bank financial
that of the related institution and their
accounts. subsidiaries and
2. Compliance with affiliates when
Article III, Section 2 probable cause exists
and 3 of the that the deposits or
Constitution. 67 The investments involved,
authority to inquire including related
into or examine the accounts, are in any
main account and the way related to any of
related accounts shall the following unlawful
comply with the activities:
requirements of
Article III, Sections 2 1. Kidnapping for
and 3 of the 1987 ransom;70
Constitution.68 2. Drug-related offenses;71
3. Hijacking and other
b. Bank Inquiry without violations and
Court Order. 69 The destructive arson and
AMLC shall issue a murder;72
resolution authorizing 4. Felonies or offenses of
the AMLC Secretariat a nature similar to the

67 Id. Section 3. (1) The privacy of communication


68 CONST.art. III, § 2. The right of the people and correspondence shall be inviolable
to be secure in their persons, houses, papers, except upon lawful order of the court or
and effect against unreasonable searches when public safety or order requires
and seizures of whatever nature and for any otherwise, as prescribed by law. (2) Any
purpose shall be inviolable, and no search evidence obtained in violation of this or the
warrant or warrant of arrest shall issue preceding section shall be inadmissible for
except upon probable cause to be any purpose in any proceedings.
determined personally by the judge after 69 RIRR, Rule 11.2.

examination under oath or affirmation of the 70 REV. PEN. CODE, art. 267.

complainant and the witnesses he may 71 Rep. Act No. 9165 (2002), §§ 4-6, 8-16.

produce, and particularly describing the 72 Rep. Act No. 6235 (1971) An Act

place to be searched and the persons or Prohibiting Certain Acts Inimical to Civil
things to be seized. Aviation, and for Other Purposes; and REV.
PEN. CODE.
Zones of Privacy: How Private? 11

above which are from disclosing any information


punishable under the known to them by reason of their
penal laws of other office.
countries;
5. Terrorism and E. Cybercrime Prevention
conspiracy to commit Act of 2012
terrorism;73 and
6. Financing of terrorism Advances in tele-
and related offenses.74 communications technology today
have resulted in the pervasive and
To ensure confidentiality, easy collection and transmission of
covered persons, their officers and information through cyberspace.
employees, are prohibited from Mobile and wireless broadband
communicating, directly or have propelled widespread use of a
indirectly, in any manner to any variety of information technology
person or entity, including the devices such that individuals are not
media, that a report on covered and limited to for example just a desktop
suspicious transactions was made, but to a combination of desktop, a
the contents of such transactions or mobile laptop, a tablet, several
other related information. These smart mobile phones, a smart
reports may not be published or television, etc. It is common to find
aired in any manner, including by homes with Wi-Fi routers and
mass media, in electronic mail or broadband connection to the
similar devices. 75 The members of internet.76
the AMLC, the executive director, The pervasive use of the
and all members of the secretariat, internet has produced heightened
whether permanent, on detail or on dangers to data privacy. Two pieces
secondment, are also prohibited of legislation were enacted in 2012

73 As defined and penalized under Rep. Act the internet (“inter-networking” –


No. 9372 (2007). combination of networks that communicate
74 Punishable under Rep. Act No. 10168 between themselves via an agreed protocol
(2012) §§ 5-8. The Terrorism Financing (TCP/IP).) In 1962, the pioneering head of
Prevention and Suppression Act of 2012. the Advance Research Projects Agency
75 Rep. Act No. 9160 (2001), § 9; RIRR, Rule (ARPA) of the US Department of Defense,
XIV (E). JCR Licklider discussed his concept of
76 In a recent decision (Disini, supra note 1), “Galactic Network.” In 1989, Tim Berners-
the Philippine Supreme Court provided a Lee of the European Organization for
succinct sketch of internet and cyberspace Nuclear Research (CERN) developed the
to clarify legal questions raised concerning World Wide Web (www), which allowed
the constitutionality of the Cybercrime documents, images and videos to be linked
Prevention Act of 2012. One might imagine and stored through browsers. The driving
cyberspace as a system that accommodates force of the internet is email and the World
billions of simultaneous accesses and uses of Wide Web.
12 DEFENSE COUNSEL JOURNAL | July 2017

to respond to the emerging threats: computer-related forgery; 88

The Cybercrime Prevention Act of computer-related fraud; 89 and


2012 and the Data Privacy Act of computer-related identity theft. 90
2012. Under (c) are: cybersex; 91 child
The Cybercrime Prevention Act pornography; 92 unsolicited comm-
does not define the term ercial communications;93 and libel.94
“cybercrime,” but simply lists the Interestingly, the provision
acts penalized under the law as penalizing unsolicited commercial
falling under the broad umbrella of communications was declared
“cybercrime.” The Comprehensive unconstitutional in Disini v.
Study on Cybercrime prepared by Secretary of Justice for violating the
the United Nations Office of Drugs constitutionally guaranteed right of
and Crime for the Inter- freedom of expression. A divided
Governmental Expert Group on court held that unsolicited
Cybercrime 77 suggests that advertisements are “legitimate
cybercrime is best considered as a forms of expression.” The provision
collection of acts or conduct. In the in question reads:
Philippines, the Cybercrime
Prevention Act adopts this approach. (3) Unsolicited Comm-
The acts that constitute the offense ercial Communications.
of cybercrime are grouped into 78 – – The transmission of
(a) offenses against confidentiality, commercial electronic
integrity and availability of communication with
computer data and systems, 79 (b) the use of computer
computer-related offenses,80 and (c) systems which seek to
content-related offenses.81 advertise, sell, or offer
Under (a) are: illegal access; 82 for sale products and
illegal interception; 83 data inter- services are prohibited
ference; 84 system interference; 85 unless:
misuse of devices; 86 and cyber-
squatting. 87 Under (b) are:

77 Dated February 20, 2013. 87 § 4(a)(6). Cyber-squatting. The


78 Rep. Act No. 10175 (2012), § 4. acquisition of a domain name over the
Cybercrime Prevention Act of 2012. internet in bad faith to profit, mislead,
79 § 4(a). destroy reputation, and deprive others from
80 § 4(b). registering the same.
81 § 4(c). 88 § 4(b)(1).
82 § 4(a)(1). 89 § 4(b)(2).
83 § 4(a)(2). 90 § 4(b)(3).
84 § 4(a)(3). 91 § 4(c)(1).
85 § 4(a)(4). 92 § 4(c)(2).
86 § 4(a)(5). 93 § 4(c)(3).
94 § 4(c)(4).
Zones of Privacy: How Private? 13

(i) there is prior disguise the


affirmative source of the
consent from the electronic
recipient; or messages; and

(ii) the primary intent (cc) the commercial


of the electronic
communication is communication
for service and/or does not purposely
administrative include misleading
announcements information in any
from the sender to part of the message
its existing users, in order to induce
subscribers or the recipients to
customers; or read the message.

(ii) the following The penalty for these offenses


conditions are may be a fine ranging from
present: P200,000 to P5M or imprisonment
of up to 12 years or more, or both.
(aa) the The Philippine Supreme Court
commercial also held the following provision
electronic unconstitutional:
communication
contains a simple, Sec. 12. Real-Time
valid, and reliable Collection of Traffic Data –
way for the Law enforcement
recipient to reject authorities, with due cause,
receipt of further shall be authorized to
commercial collect or record by
electronic technical or electronic
messages (opt out) means traffic data in real-
from the same time associated with the
source; specified communications
transmitted by means of a
(bb) the computer system.
commercial
electronic Traffic data refer only to
communication the communication’s
does not origin, destination, route,
purposely time, date, size, duration,
14 DEFENSE COUNSEL JOURNAL | July 2017

or type of underlying grounds to believe that any


service, but not content, of the crimes enumerated
nor identities…. hereinabove has been
committed, or is being
The above-quoted portion committed, or is about to
of Section 12 was deemed be committed: (2) that
overly broad and lacking in there are reasonable
safeguards if exercised by grounds to believe that
law enforcement evidence that will be
authorities without court obtained is essential to the
intervention. The rest of conviction of any person
Section 12 which covers for, or to the solution of, or
content and identities, to the prevention of, any
quoted below, requires a such crimes; and (3) that
court order and remains there are no other means
valid: readily available for
obtaining such evidence.
Section 12. … All other data
to be collected or seized or F. Data Privacy Act of 2012
disclosed will require a and its Implementing
court warrant. Rules and Regulations
(IRR)
Service providers are
required to cooperate and In the private zone of personal
assist law enforcement information, the legislature has
authorities in the ensured that personal data privacy
collection or recording of trumps police power by providing
the above-stated all the measures and safeguards it
information. deemed reasonable.

The court warrant 1. Coverage


required under this
section shall only be issued The Data Privacy Act of 2012
or granted upon written applies to “the processing of all
application and the types of personal information and to
examination under oath or any natural or juridical person
affirmation of the involved in personal information
applicant and the
witnesses he may produce
and the showing: (1) that
there are reasonable
Zones of Privacy: How Private? 15

processing” 95 except for specified


instances such as information about 2. Data Privacy Principles
an individual who is or was an
officer or employee of a government The processing of personal data
institution that relates to the must comply with the requirements
position or functions, 96 information of the Data Privacy Act of 2012 and
processed for journalistic, artistic, other laws. It must adhere to the
literary or research purposes, 97 principles of transparency,
information necessary for banks legitimate purpose, and
and financial institutions, 98 and proportionality, 103 and the
personal information originally collection must be for a declared,
collected from residents of foreign specified, and legitimate purpose.104
jurisdictions in accordance with the Personal data must be processed
laws of those foreign jurisdictions.99 fairly and lawfully, and the
For purposes of this law, processing thereof should ensure
“personal information” means “any data quality.105 Personal data should
information whether recorded in not be retained longer than
material form or not, from which the necessary, and any authorized
identity of an individual is apparent further processing must have
or can be reasonably and directly adequate safeguards.106
ascertained by the entity holding the
information, or when put together 3. Processing of Sensitive
with other information would Personal Information and
directly and certainly identify an Privileged Information
individual.”100 Personal information
can be processed by either a Any and all forms of data which
personal information controller 101 under the Rules of Court and
or a personal information pertinent laws are considered
processor.102 privileged communication are
considered privileged information.
Sensitive personal information

95 Rep. Act No. 10173 (2012), § 4. Data transfer or disclose personal information on
Privacy Act of 2012. his or her behalf.
96 § 4(a). 102 Any person qualified as such and to
97 § 4(d). whom a personal information controller
98 § 4(f). may outsource the processing of personal
99 § 4(g). data pertaining to a data subject.
100 § 3(g). 103 IRR of the Data Privacy Act of 2012, § 17,
101 A person or organization who controls Rule IV.
the collection, holding, processing or use of 104 § 19, Rule IV.

personal information, including a person or 105 Id.

organization who instructs another person 106 Id.

or organization to collect, hold, process, use,


16 DEFENSE COUNSEL JOURNAL | July 2017

pertains to personal information (i) and processing concerns such


about an individual’s race, ethnic personal information as is necessary
origin, marital status, age, color, and for the protection of lawful rights
religious, philosophical, or political and interests.113
affiliations; 107 (ii) about an indi-
vidual’s health, education, genetic 4. Security Requirements
make-up, or sexual life, or to any
proceeding for an offense The Data Privacy Act of 2012
committed or alleged to have been requires personal information
committed by such person, the controllers and personal
disposal of such proceedings, or the information processors to
sentence of any court in such implement reasonable and
proceedings; 108 (iii) issued by appropriate security measures for
government agencies peculiar to an the protection of personal data. 114
individual including social security They must take steps to ensure that
numbers, previous or current health any person who has access to
records, licenses or their denials, personal data and under their
suspensions or revocations, and tax authority only processes the data
returns; 109 and (iv) specifically upon their instructions or as
established by an executive order or required by law. 115 The security
an act of Congress to be kept measures should maintain the
classified.110 availability, integrity, and
Processing of privileged confidentiality of the personal data
information and sensitive personal and these measures are intended to
information is allowed in specific protect the personal data against
instances, such as when the data any accidental or unlawful
subject has given his or her specific destruction, alteration, and
consent prior to processing, or in the disclosure, as well as any other
case of privileged information, all unlawful processing.116
parties to the exchange have given Personal information con-
their consent prior to processing;111 trollers are required to comply with
processing is necessary to protect various safeguards including
the life and health of the data subject registering personal data
or another person and the data processing systems operating in the
subject is not able to express country that involves accessing or
consent prior to the processing; 112 requiring sensitive personal

107 § 3(l)(1). 112 § 13(c).


108 § 3(l)(2). 113 § 13(f).
109 § 3(l)(3). 114 IRR, § 25, Rule VI.
110 § 3(l)(4). 115 Id.
111 § 13(a). 116 Id.
Zones of Privacy: How Private? 17

information of at least 1,000 Information and


individuals, including the personal Sensitive Personal
data processing system of Information;120
contractors, and their personnel, 2. Accessing Personal
entering into contracts with Information and
government agencies and Sensitive Personal
submitting an annual report of the Information Due to
summary of documented security Negligence;121
incidents and personal data 3. Improper Disposal of
breaches.117 Personal Information
The personal data controller is and Sensitive Personal
given great responsibility and Information;122
accountability, including being 4. Processing of Personal
responsible for any personal data Information and
under its control or custody 118 and Sensitive Personal
for complying with the Information for
requirements of the Data Privacy Unauthorized
Act of 2012 and its IRR and other Purposes;123
issuances of the National Privacy 5. Unauthorized Access
Commission. 119 The personal data or Intentional
controller carries a huge Breach;124
responsibility and is essential in a 6. Concealment of
subject entity’s compliance with the Security Breaches
Data Privacy Act of 2012 and related Involving Sensitive
governmental issuances. Personal
Information;125
5. Acts Penalized by the Data 7. Malicious
Privacy Act of 2012 Disclosure;126
8. Unauthorized
The following are the acts Disclosure;127 and
penalized by the Data Privacy Act of 9. Combination or Series
2012: of Acts.128

1. Unauthorized The penalties for the


Processing of Personal commission of the foregoing

117 § 46, Rule XI. 123 § 28.


118 § 50, Rule XII. 124 § 29.
119 Id. 125 § 30.
120 Rep. Act No. 10173 (2012), § 25. 126 § 31.
121 § 26. 127 § 32.
122 § 27. 128 § 33.
18 DEFENSE COUNSEL JOURNAL | July 2017

offenses ranges from Php100,000 to 6. Date of birth;


Php5,000,000 and imprisonment of 7. Place of birth;
at least six months. Furthermore, 8. Marital status;
the Data Privacy Act of 2012 also 9. Names of parents;
imposes stiffer penalties when the 10. Height;
information involved is sensitive 11. Weight;
personal information. 12. Two index fingers and
two thumb marks;
G. National Centralized 13. Any prominent
Identification System distinguishing features
like moles and others;
A national identification (ID) and
system is a governmental tool for 14. Tax Identification
order and efficiency. Specifically, it Number (TIN).
is used to assist public agencies to
identify and verify citizens availing The Supreme Court ruled that
of government services. 129 For this EO No. 420 “narrowly limit[ed] the
purpose, then Philippine President, data that can be collected, recorded,
Gloria Macapagal-Arroyo, issued and shown,” and it “provide[d] strict
Executive Order (EO) No. 420, which safeguards to protect the
directed all government agencies, confidentiality of the data
including government-owned and collected.”131
controlled corporations, which issue We contrast this with the case of
ID cards to their members or Ople v. Torres, 132 involving
constituents, to adopt a unified Administrative Order (AO) No. 308
multi-purpose ID system.130 Section entitled “Adoption of a National
3 of EO 420 limited the data to be Computerized Identification
collected and recorded, thus: Reference System” issued by then
President Fidel V. Ramos. AO No.
1. Name; 308 sought to establish a
2. Home address; decentralized national com-
3. Sex; puterized ID reference system
4. Picture; among the key basic services and
5. Signature;

129Senate Economic Planning Office Policy 130 Exec. Order No. 420 (2005), §§ 1-2. This
Insights, National Identification System: Do required all government agencies and
We Need One? (2005), available at government-owned and controlled
https://www.senate.gov.ph/publications/P corporations to streamline and harmonize
I%202005-12%20-%20National%20 their identification (ID) systems.
Identification%20System%20-%20Do%20 131 Kilusang Mayo Uno v. Director General,

We%20Need%20One.pdf (last accessed G.R. No. 167798, April 19, 2006.


June 6, 2017). 132 G.R. No. 127685, July 23, 1998.
Zones of Privacy: How Private? 19

social security providers. 133 government agencies adopting an ID


However, there is no limitation or system that is reasonable and
enumeration of data to be collected, constitutionally compliant. A
nor was there a provision on number of countries have already
safeguards. This was struck down implemented compulsory national
by the Supreme Court for being ID systems, thus: 136
unconstitutional for its broadness,
vagueness, and overbreadth, “which Some one hundred
if implemented, will put [the] countries have compulsory
people’s right to privacy in clear and national ID systems,
present danger.” 134 The Supreme including democracies
Court clarified that it “is not per se such as Spain, France,
against the use of computers to Germany, Belgium, Greece,
accumulate, store, process, retrieve Luxembourg, and Portugal.
and transmit data” so long as this is Other countries which do
exercised within the limits set by the not have national ID
Constitution. It warned, however, systems like the United
that, “[g]iven the record-keeping States, Canada, Australia,
power of the computer, only the New Zealand, Ireland, the
indifferent will fail to perceive the Nordic Countries and
danger that A. O. No. 308 gives the Sweden, have sectoral
government the power to compile a cards for health, social or
devastating dossier against other public services.
unsuspecting citizens.”
While the establishment of a Without a reliable ID system,
national ID system is proposed to government agencies like those
help fight terrorism and prevent involved in social security 137 and
crimes and improve the delivery of vehicular licensing 138 cannot
government services, various perform their functions and even
groups continue to oppose it stand to suffer substantial losses
invoking privacy concerns, as well from false names and identities.
as administrative and financial
arguments. 135 However, the
Supreme Court has already held that
privacy rights would not be a bar to

133 Adm. Order No. 308 (1996), § 1. This 135 Senate Economic Planning Office Policy
adopts a National ID System. Insights, supra note 129.
134 Kilusang Mayo Uno, G.R. No. 167798, 136 Ople, G.R. No. 127685, supra note 132.

supra note 130. The Supreme Court also 137 Government Insurance Security System

held that the adoption of a national ID and Social Security System.


system should be by legislation, not 138 Land Transportation Office.

executive order.
20 DEFENSE COUNSEL JOURNAL | July 2017

H. Registration of Prepaid the state’s police power in its aim to


Phones protect national security.
However, for the reasons cited
While there has been some below, we argue that legislation
legislative action 139 to register the should be enacted to require
use of prepaid mobile devices for registration of prepaid mobile
security purposes, this has been met phones.
with serious opposition in the
Philippines, where 96 percent are 1. Mobile Subscription in the
subscribers of prepaid plans, on the Philippines
basis that it is an intrusion into their
private lives. Registration of prepaid mobile
Additionally, there are phone subscriber identity module
arguments against the proposal to (SIM) has been objected to as an
store personal identification data of unconstitutional intrusion into
all citizens related to the security of one’s privacy. With the enactment
the storage of data, the economic of the Data Privacy Act of 2012, and
burden, and the ineffectiveness of all the safeguards it offers, it is now
this as a solution for the problem submitted that registration of
sought to be addressed. These are prepaid SIMs constitutes a
arguments against the exercise of

139H. No. 2328, 17th Congress (2016). An Act Subscriber SIM Cards; S. No. 252, 17th
Requiring the Registration of All Users of Congress (2016). An Act Regulating the Sale
Pre-Paid Subscriber Identity Module (SIM) of Prepaid SIM Cards, Providing Penalties for
Cards and Providing Penalties Therefor; H. Violation Thereof, and for Other Purposes; S.
No. 2588, 16th Congress (2013). An Act No. 1202, 17th Congress (2016). An Act
Requiring the Registration of Buyers of Prohibiting Text Scams, Misleading
Prepaid SIM Cards and Providing Penalties Advertisements, and Fraudulent Sales
Therefor; H. No. 2648, 17th Congress (2016). Promotions, Mandating for this Purpose the
An Act Mandating the Registration of All Registration of All Users of SIM Cards, and
Prepaid and Postpaid SIM Cards and Providing Penalties for the Violations
Requiring the Telecommunication Thereof; S. No. 2911, 16th Congress (2015).
Companies to Keep a Registry of these An Act Requiring the Registration of All
Subscribers and Providing for the Penalties Users of Pre-paid SIM Cards; S. No. 2644,
for Violation Thereof; H. No. 2809, 17th 15th Congress (2011). An Act Requiring the
Congress (2016). An Act Requiring the Registration of the Buyers of Prepaid SIM
Recording of the Identity of All Buyers of Cards, and Providing Penalties for the
Prepaid SIM Cards for Cellular Phone Units Violations Thereof; S. No. 2771, 15th
and for Other Purposes; H. No. 3649, 17th Congress (2011). An Act Regulation the Sale
Congress (2016). An Act Requiring the of Pre-paid SIM Cards, Providing Penalty for
Recording of the Identity of All Buyers of Violation Thereof and for Other Purposes; S.
Prepaid SIM Cards for Cellular Telephone No. 2911, 16th Congress (2015). An Act
Units and for Other Purposes; H. No. 3661, Requiring the Registration of All Users of
17th Congress (2016). An Act Requiring the Pre-paid SIM Cards.
Registration of All Users of Prepaid
Zones of Privacy: How Private? 21

legitimate exercise of the state’s 2. Prepaid Phones as


police power. Instruments of
Prepaid customers buy SIM Criminality
cards for their phones that they
register with the cellular network. Although there are many
When the chip runs out of credit, legitimate users of prepaid cell
they can buy a card with a new code phones, they have become the
allowing them to replenish their communication device of choice for
credit. 140 To illustrate the state of criminals, including terrorists, drug
phone registration in the lords and gangs intent on masking
Philippines, in 2011, there were their identities. Since prepaid
around 101 mobile cellular phones can be purchased and
subscriptions per 100 people, a activated without signing a contract
jump from 41 per 100 people in or any other means of tracing the
2005. In 2011, 96 percent of the identity of the user, prepaid cell
total subscriptions in the phones provide virtual
Philippines were prepaid. anonymity.142
In 2010, 99 percent of the Terrorists use prepaid cell
population was covered by a cellular phone cards purchased
network and 80 percent of anonymously to keep their
households reported usage of a communications secure. 143 A
mobile telephone.141 terrorist cell needs reliable channels
of communication for its members,
including highly secret channels to
its leadership.144 The 9/11 hijackers

140 Shyam Tekwani, THE LOW END OF HI-TECH: Companies to Keep Records of Buyers'
NEW MEDIA AND COMMUNICATION TECHNOLOGIES Identities, (2010) available at:
AND TERRORISM IN ASIA (2004). Paper https://votesmart.org/public-statement
presented at the annual meeting of the /511650/schumer-cornyn-prepaid-cell-
International Communication Association, phones-help-terrorists-like-times-square-
New Orleans. Available at http://www. bomber-evade-detection-senators-propose-
allacademic.com/meta/p113115_index.htm first-ever-federal-law-to-require-phone-
l (last accessed June 6, 2017). companies-to-keep-records-of-buyers-
141 World Bank, Information and identities#.WMJaFYGGOM8 (last accessed
Communications for Development 2012: June 6, 2017).
Maximizing Mobile, WORLD BANK WEBSITE 143 Michelle Zanini and Sean J.A. Edwards,

available at: http://documents.worldbank. “The Networking of Terror in the


org/curated/en/727791468337814878/pd Information Age,” in: J. Arquilla and D.
f/722360PUB0EPI00367926B9780821389 Ronfeldt, eds. NETWORKS AND NETWARS: THE
911.pdf (last accessed June 6, 2017). FUTURE OF TERROR, CRIME, AND MILITANCY.
142 Chuck Schumer and John Cornyn, Prepaid (Rand, 2001).
Cell Phones Help Terrorists like Times Square 144 Juan Miguel del Cid Gómez, A Financial

Bomber Evade Detection; Senators Propose Profile of the Terrorism of Al-Qaeda and its
First-Ever Federal Law to Require Phone Affiliates. PERSPECTIVES ON TERRORISM, [e-
22 DEFENSE COUNSEL JOURNAL | July 2017

used prepaid phones to relatives of their kidnap victims in


communicate in the months prior to Manila.148
their attack. United States Federal Aside from communication
Bureau of Investigation Director purposes, prepaid cell phones have
Robert Mueller cited the plotters’ been used as detonation devices for
use of the devices to show that they bombs, as was the case in the attack
“managed to exploit loopholes and on a Madrid train that killed 191
vulnerabilities in our systems, to people in Spain in 2004. 149 In the
stay out of sight, and to not let Philippines in 2011, a bomb inside a
anyone know what they were up to bus along EDSA, a major
beyond a very closed circle.” 145 In thoroughfare in Metro Manila, was
2004, law enforcement authorities detonated by a cellphone, killing five
intercepted an Al-Qaeda terrorist and leaving more than a dozen
cell using prepaid mobile phones people injured. In 2013, an attack in
issued by a Swiss mobile a crowded bar in Cagayan de Oro,
operator.146 In 2007, three members that killed eight and wounded more
of a terrorist cell that planned to than 40, was carried out by a bomb
carry out attacks in the US, Europe, triggered by a cell phone.150
and the Middle East used several Further, prepaid phones have
stolen credit cards to buy items such long been used by other types of
as GPS systems, night vision goggles, criminals, like drug sellers, mob
sleeping bags, and hundreds of pre- figures, and gang leaders. In 2009,
paid mobile telephones from these were used by hedge fund
hundreds of websites, which were managers and Wall Street
meant to be sent to jihadists in executives who were implicated in
Iraq. 147 In the Philippines, the Abu the largest insider trading bust in US
Sayyaf are as “hi-tech” as they come, history. Traders from the Galleon
utilizing mobile phones to contact Group hedge fund communicated
relatives and negotiators and are with other executives through
also sending text messages to the prepaid phones to try to evade
wiretaps. 151 In the United States,

journal] 4(4). Available at http://www. 148 Tekwani, supra note 140.


terrorismanalysts.com/pt/index.php/pot/a 149 Schumer and Cornyn, supra note 142.
rticle/view/113/html (last accessed June 6, 150 Dexter San Pedro. Register prepaid SIM

2017). cards? Palace wants more time to study


145 Schumer and Cornyn, supra note 142. proposal. INTERAKYON, [online] (Last updated
146 swissinfo.ch, Swiss phone cards help trace 1:54 p.m. July 30, 2013) available at
al-Qaeda. [online] Available at http://www.interaksyon.com/article/6753
http://www.swissinfo.ch/eng/swiss- 5/register-prepaid-sim-cards-palace-
phone-cards-help-trace-al-qaeda/3799084 wants-more-time-to-study-proposal (last
(last accessed June 6, 2017). accessed June 6, 2017)
147 del Cid Gómez, supra note 144. 151 Schumer and Cornyn, supra note 142.
Zones of Privacy: How Private? 23

Texas police receive more than


5,000 fraud complaints a year which The scammers also
use prepaid phones and report that require their victims to
there is little they can do because send prepaid load to the
the trails end at the store, leaving scammers’ prepaid
the victims with nothing.152 mobile phone numbers.
In the Philippines, one of the
many scams perpetrated with the Once the scammers
use of prepaid phones is committed receive the money and
as follows: prepaid load, the victims
would no longer be able to
Text scammers use get in touch with them
fictitious names or pose again.153
as government officials,
send fraudulent text Another example is when a
messages to their defrauder dupes a subscriber into
victims saying that their sending his own prepaid load via
mobile phone numbers text message. This happens when a
won in a raffle allegedly subscriber is deceived into sending
sponsored by the a text message, the result of which is
Bangko Sentral ng that the subscriber unwittingly does
Pilipinas or other a “sharing” transaction with the
institutions. defrauder.154

The scammers tell their 3. Registration of Prepaid


victims that to be able to Phones in Other
claim their alleged prize, Jurisdictions
they should first send
money to the scammers Prepaid subscriptions represent
thru a designated a significant share of the global
account in a bank or mobile phone market, although this
remittance company. varies widely from country to

152 Angel Rodriguez-Miranda, A case for a SENTRAL NG PILIPINAS WEBSITE (2008),


national prepaid cellphone registry. THE HILL available at: http://www.bsp.gov.hp/
(2013) (Last updated 3:00 pm on September publications/media.asp?id=1742 (last
28, 2013) available at http://thehill. accessed June 6, 2017).
hill.com/blogs/congress-blog/technology/ 154 Globe Telecom. Globe Public Advisory on

325219-a-case-for-a-national-prepaid- New Modus Operandi, Facebook update,


cellphone-registry (last accessed June 6, September 19, 2012, https://www.face
2017). book.com/globeph/posts/1015108754115
153 Bangko Sentral ng Pilipinas. Warning: Do 9748 (Accessed 21 February 2017).
not be fooled by text scammers!, BANGKO
24 DEFENSE COUNSEL JOURNAL | July 2017

country. In the Organization for information for prepaid service. 161


Economic Co-operation and The rationale for such a policy is for
Development (OECD) region, security concerns:
prepaid service accounted for about
40 percent of the mobile phone In all cases, the rationale was
market in 2006. 155 In Mexico, over to improve efficiency of law
90 percent of the mobile phone enforcement and national
market is prepaid. South Korea security activities. In some
reported almost no prepaid service countries, the rationale is
in the country.156 In the EU, Italy has extended to include support
over 90 percent prepaid subscribers for emergency services
and Portugal has almost 80 response and the
percent.157 Finland has less than five commercial provision of
percent of its population choosing public directory services. In
prepaid subscription. 158 In the a few cases, the requirement
United States, prepaid is less than was raised in conjunction
ten percent, and Canada has just with specialized valued-
over 20 percent.159 As of July 2013, added services (e.g., adult
at least 80 countries, including 37 in content, child minding); in
Africa, have mandated, or at the certain cases, prepaid phone
least considered, requiring the regulations are part of a
registration of prepaid mobile wider legislative mandate
subscriptions.160 that requires registration of
In the regulation of prepaid all telephone services. 162
services, countries like the members
of the OECD—Australia, France, Malaysia, Singapore, and
Germany, Hungary, Japan, Norway, Thailand require registration of
Slovak Republic, South Africa, and prepaid cell phone users due mainly
Switzerland—require mobile to their use by terrorists. 163 Other
operators to collect customer countries that have already

155 Centre for Policy Research on Science 159 Id.


and Technology. Privacy Rights and Prepaid 160 Groupe Speciale Mobile Association, The
Communication Services: A Survey of prepaid Mandatory Registration of Prepaid SIM Card
mobile phone regulation and registration Users: A White Paper (2013), available at:
policies among OECD member states. http://www.gsma.com/publicpolicy/wp-
Research Report for the Office of the Privacy content/uploads/2013/11/GSMA_White-
Commissioner of Canada (2006). Available Paper_Mandatory-Registration-of-Prepaid-
at http://www.sfu.ca/sfublogs-archive/ SIM-Users_32pgWEBv3.pdf (last accessed
departments/cprost/uploads/2012/06/06 June 6, 2017).
01.pdf (last accessed June 6, 2017). 161 Centre for Policy Research on Science
156 Id. and Technology, supra note 155.
157 Id. 162 Id.
158 Id. 163 Schumer and Cornyn, supra note 142.
Zones of Privacy: How Private? 25

implemented the registration of compelling state interests. Rights of


prepaid mobile users include: privacy are not absolute and must
Algeria, Bolivia, Botswana, Brazil, be balanced with the notion that
Cameroon, Central African Republic, public safety and welfare is
Chad, Cote d’Ivoire, Denmark, paramount.
Democratic Republic of the Congo, As criminals adopt new
Ecuador, Egypt, El Salvador, Eritrea, technology, the law must also adapt
Ethiopia, Gabon, Ghana, Greece, to ensure continued order in society.
Honduras, India, Italy, Kenya, While most states in the
Liberia, Madagascar, Morocco, international community already
Mozambique, The Netherlands, have some form of regulation to
Niger, Nigeria, Papua New Guinea, register even prepaid SIM cards, it is
Peru, Republic of Congo, Russia, somewhat disappointing that the
Senegal, Sierra Leone, Spain, Sudan, Philippine government has lagged
Tanzania, Togo, Turkey, Vietnam, behind.
Zambia, and Zimbabwe.164 The Philippines has passed the
Telephone companies have Cybercrime Prevention Act of 2012,
prevented the enactment of the law. which is patterned after the
Citing privacy issues, the major Budapest Convention on
wireless carriers, T-Mobile, AT&T, Cybercrime. This Convention is the
and Sprint, filed an injunction in first and only multinational
Puerto Rico arguing that to require a agreement on cybercrime, “which
formal Identification Card violated a the Philippine Government
person’s right to privacy and requested to be invited to accede to
security concerns such as those of in 2007.”167 It is unfortunate that the
battered women and crime section in the Cybercrime
victims. 165 In the United States, a Prevention Act of 2012 that defines
proposed federal law, Senate Bill the term “traffic data” lacks the
3472, regarding the registration of requisite safeguards to uphold its
prepaid phones died in 2010.166 validity. However, we note that the
Cybercrime Prevention Act of 2012
II. Conclusion improves on the Budapest
Convention “by clearly restricting
Regulation is a justified exercise traffic data to those that are non-
of police power by reason of content in nature.” 168 Furthermore,

164 For a complete list, see Groupe Speciale https://www.govtrack.us/congress/bills/1


Mobile Association, supra note 160. 11/s3427 (last accessed June 6, 2017)
165 Groupe Speciale Mobile Association, 167 Sereno, J. Separate Opinion in Disini, G.R.

supra note 160. No. 203335, supra note 14.


166 GovTrack.us. n.d. S. 3427 (111th): Pre-Paid 168 Id.

Mobile Device Identification Act. Available at


26 DEFENSE COUNSEL JOURNAL | July 2017

the section “restricts traffic data to and leaves society and victims with
exclude those that refer to the serious injustice.
identity of persons.” 169 Thus, the Much of the international
Philippines’ goal is to enhance the community has already adapted
protection of cyberspace users with the times and developed a
against crime, while ensuring the system of registration. There is
privacy of individuals and the more reason to do so in the
security of user data. Coupled with Philippines where almost all, about
the Data Privacy Act of 2012, the 96% as of 2011, of mobile phone
Cybercrime Prevention Act of 2012 users are prepaid subscribers.
ensures the protection of the To belong to a society is to
privacy of users of electronic sacrifice some measure of individual
communication. liberty.171 As long as the legislature
The political system of each remains content with the laws that
society is a fundamental force in this country already has, offenses
shaping the legal contours of furthered through the use of prepaid
protected privacy, since certain mobile phones will continue to
patterns of privacy, disclosure, and proliferate. Passing a law to register
surveillance are functional these devices is an important
necessities for particular kinds of measure to deter and expose
political regimes. In the Philippines, criminals hiding behind the
a compelling state interest must be anonymity afforded by prepaid
shown to allow even the slightest mobile phones.
intrusion into an individual’s right Finally, the legislative branch
to privacy. should not focus solely on the
Of course, reports of numerous requirement of registration.
offenses 170 can be regarded as Regulatory measures must be put in
enough reason to assert a place to ensure safety and
compelling state interest. Law confidentiality in the storage of
enforcement’s need for prepaid information. Increase in police
phone registration outweighs power necessitates a proportional
perceived challenges to individual increase in privacy protection
privacy. The anonymity accorded by measures for individuals. With the
prepaid mobile phones presents a passage of the Data Privacy Act of
massive obstacle to proper 2012 and the promulgation of its
investigation of crimes and offenses IRR, custodians of personal data are

169Id. 171Morfe v. Mutuc, G.R. No. L-20387, supra


170H. No. 525, 16th Congress (2013). An Act note 1, citing RALPH LINTON, “The Individual,
Requiring the Registration of the Pre-Paid Culture, and Society” in THE CULTURAL
SIM Card Users and Mobile Phone Units and BACKGROUND OF PERSONALITY, 1 (1945).
for Other Purposes.
Zones of Privacy: How Private? 27

now made responsible and


accountable for the safekeeping of
personal and sensitive information.

You might also like