Professional Documents
Culture Documents
Merge SpecCom Notes
Merge SpecCom Notes
*Quoting the dissent of Justice Douglas in Public Utilities Commission v. Pollak, 343 U.S. 451, 467 (1952).
**Quoting the dissent of Justice Brandeis in Olmstead v. United States, 277 U.S. 438, 478 (1928).
THE RIGHT TO PRIVACY
The right of the people to be secure in their persons, houses, papers, and
effects against unreasonable searches and seizures of whatever nature and
for any purpose shall be inviolable, and no search warrant or warrant of
arrest shall issue except upon probable cause to be determined personally
by the judge after examination under oath or affirmation of the
complainant and the witnesses he may produce, and particularly describing
the place to be searched and the persons or things to be seized.
(Sec. 2)
THE BILL OF RIGHTS
The right of the people, including those employed in the public and
private sectors, to form unions, associations, or societies for purposes
not contrary to law shall not be abridged.
(Sec. 8)
THE BILL OF RIGHTS
Two-part test:
(1) whether, by his conduct, the individual has exhibited an expectation
of privacy (subjective); and
(2) this expectation is one that society recognizes as reasonable
(objective).
(Ople v. Torres, G.R. No. 127685, July 23, 1998)
Before one can have an expectation of privacy in his or her OSN activity, it is first
necessary that said user. . . manifest the intention to keep certain posts private, through
the employment of measures to prevent access thereto or to limit its visibility. And this
intention can materialize in cyberspace through the utilization of the OSN's privacy tools.
In other words, utilization of these privacy tools is the manifestation, in cyber world, of the
user's invocation of his or her right to informational privacy.
(Vivares v. St. Theresa's College, G.R. No. 202666, September 29, 2014)
PRIVACY TOOLS IN OSN
The intention to limit access to [a] particular post, instead of being broadcasted to the
public at large or all the user's friends en masse, [is] more manifest and palpable [by
the use of] the "Me Only" privacy setting, or the "Custom" setting [of Facebook or
Meta.]
(a restatement of Vivares v. St. Theresa's College, G.R. No. 202666, September 29, 2014)
THE RIGHT TO PRIVACY
• As for the exclusionary rule, the Bill of Rights was intended to protect
private individuals against government intrusions.
• Violation of the right to privacy between individuals is properly governed
by the provisions of the Civil Code, the Data Privacy Act, and other
pertinent laws. Admissibility shall be governed by the rules on relevance,
materiality, authentication of documents, and the exclusionary rules under
the Rules on Evidence.
(Cadajas y Cabias v. People, G.R. No. 247348, November 16, 2021)
CIVIL CODE PROVISIONS ON PRIVACY
...
(Art. 26, NCC)
CIVIL CODE PROVISIONS ON PRIVACY
(Vivares v. St. Theresa's College, G.R. No. 202666, [September 29, 2014])
Locational privacy, also known as situational privacy, pertains to privacy
that is felt in a physical space. It may be violated through an act of trespass
or through an unlawful search.
(Separate opinion of Justice Leonen* in Versoza v. People, G.R. No. 184535, September 3, 2019)
* Quoting Former Chief Justice Puno in his speech “The Common Right to Privacy.”
Decisional privacy involves the right to independence in making certain important
decisions, while informational privacy refers to the interest in avoiding disclosure of
personal matters.
(Disini, Jr. v. Secretary of Justice, G.R. Nos. 203335, etc., February 18, 2014)
- See also Vivares v. St. Theresa’s College, G.R. No. 202666, September 29, 2014; both cases cite Justice Puno’s speech, “The
Common Right to Privacy.”
THE DPA PROTECTS INFORMATIONAL PRIVACY
(Vivares v. St. Theresa's College, G.R. No. 202666, [September 29, 2014])
INFORMATIONAL PRIVACY HAS THE FOLLOWING
ASPECTS:
The . . . Data Privacy Act was based heavily [on] Directive 95/46/EC* of the
European Parliament and Council and is at par with the Asia Pacific Economic
Cooperation (APEC) Information Privacy Framework** standards.
(Senate of the Philippines, 19th Congress, Press Release, March 20, 2012)
The usual identifying information regarding a person includes his name, his
citizenship, his residence address, his contact number, his place and date of birth, the
name of his spouse if any, his occupation, and similar data.
(Disini, Jr. v. Secretary of Justice, G.R. Nos. 203335, etc., February 18, 2014)
WHAT IS PRIVILEGED INFORMATION?
Ethnic Marital
Race Age Color
origin status
a. Right to be informed
b. Right to object
c. Right to access
d. Right to rectification
e. Right to erasure or blocking
f. Right to Data Portability
g. Right to damages
h. Right to lodge a complaint before the commission
RIGHT TO DATA PORTABILITY
The lawful heirs and assigns of the data subject may invoke the
rights of the data subject to which he or she is an heir or an
assignee, at any time after the death of the data subject, or
when the data subject is incapacitated or incapable of exercising
the rights as enumerated in the immediately preceding section.
(Sec. 35, IRR)
LIMITATIONS OF RIGHTS
• for the needs of scientific and statistical research and, on the basis of
such, no activities are carried out and no decisions are taken regarding
the data subject;
• for the purpose of investigations in relation to any criminal, administrative
or tax liabilities of a data subject.
(Sec. 19, DPA)
Any limitations on the rights of the data subject shall only be to the
minimum extent necessary to achieve the purpose of said research or
investigation. (Sec. 37, IRR)
PROTECTION AFFORDED TO JOURNALISTS
AND THEIR SOURCES
• “Journalists” shall not be compelled to reveal their source if the information was related
in any confidence to such journalist.
• “Journalists” who are likewise personal information controllers or personal information
processors within the meaning of the law are still bound to follow the Data Privacy Act
and related issuances with regard to the processing of personal data, upholding rights of
their data subjects and maintaining compliance with other provisions that are not
incompatible with the protection provided by Republic Act No. 53.
(Sec. 7, IRR)
• The DPA did not repeal or amend Republic Act No. 53. (Sec. 5, DPA)
RECALL THAT THE LAW . . .
. . . which brings us to . . .
THE PERSONAL INFORMATION CONTROLLER
"Personal information controller" refers to a natural
or juridical person, or any other body who controls the
processing of personal data, or instructs another to
process personal data on its behalf. The term excludes:
(Sec. 3 [m])
A person who sets up CCTV for household purposes is not a PIC but if the
CCTV faces outward and captures images of individuals beyond the
boundaries of such property as where it monitors a public space, the
operator is deemed a PIC and subject to the obligations under the DPA.
(NPC Advisory 20-04)
The use of closed-circuit television (CCTV) is expressly allowed under the
Safe Space Act but subject to regulations implementing
the Data Privacy Act. Moreover, the use of CCTV by a private individual
on private property is subject to Art. 26 (1) of the Civil Code.
(Calleja v. Executive Secretary, G.R. Nos. 252578, etc., December 7, 2021)
PICs and PIPs shall provide CCTV notices which are readily visible and
prominent within their premises, such as at points of entry, or other
conspicuous areas. The CCTV notices shall provide information to the
public that there is a CCTV system in operation in clear, plain, and concise
language.
(Sec. 4[C], NPC Advisory 2020-04)
PRINCIPLE OF ACCOUNTABILITY
To fulfill functions of public authority which necessarily includes processing of personal data
Legitimate interests of the PIC or third parties, except if against Constitutional rights
The data subject must be aware of the nature, purpose, and extent
of the processing of his or her personal data, including the risks and
safeguards involved, the identity of personal information controller,
his or her rights as a data subject, and how these can be exercised.
Any information and communication relating to the processing of
personal data should be easy to access and understand, using clear
and plain language.
(Sec. 19 [a], IRR)
PRINCIPLE OF LEGITIMATE PURPOSE
SECTION 7. The right of the people to information on matters of public concern shall be
recognized. Access to official records, and to documents, and papers pertaining to official
acts, transactions, or decisions, as well as to government research data used as basis for
policy development, shall be afforded the citizen, subject to such limitations as may be
provided by law.
EXECUTIVE ORDER NO. 2, 2016
While providing access to information, public records, and official records, responsible officials shall afford
full protection to an individual's right to privacy as follows:
(a) Each government office per Section 2 hereof shall ensure that personal information in its custody or
under its control is disclosed or released only if it is material or relevant to the subject matter of the
request and its disclosure is permissible under this Order or existing laws, rules or regulations;
(b) Each government office must protect personal information in its custody or control by making
reasonable security arrangements against leaks or premature disclosure of personal information which
unduly exposes the individual whose personal information is requested to vilification, harassment, or
any other wrongful acts, and
(c) Any employee or official of a government office per Section 2 hereof who has access, authorized or
unauthorized, to personal information in the custody of the office must not disclose that information
except when authorized under this, Order or pursuant to existing laws, rules or regulations.
(Sec. 7, EO2)
HENCE, THE NEED FOR SECURITY MEASURES
TO PROTECT PERSONAL DATA
Also, to observe the criteria for lawful processing of personal and sensitive personal information.
THE NATIONAL PRIVACY COMMISSION
FUNCTIONS OF THE NPC
• Rule Making
• Advisory
• Public Education
• Compliance and Monitoring
• Complaints and Investigations
• Enforcement
• Other functions
(Sec. 9, IRR)
COMPLIANCE AND MONITORING
All security incidents and personal data breaches shall be documented through
written reports, including those not covered by the notification requirements. In the
case of personal data breaches, a report shall include the facts surrounding an
incident, the effects of such incident, and the remedial actions taken by the personal
information controller. In other security incidents not involving personal data, a
report containing aggregated data shall constitute sufficient documentation. These
reports shall be made available when requested by the Commission. A general
summary of the reports shall be submitted to the Commission annually.
(Sec. 41[b], IRR)
"Security incident" is an event or occurrence
that affects or tends to affect data protection,
or may compromise the availability, integrity
and confidentiality of personal data. It
includes incidents that would result to a
personal data breach, if not for safeguards
that have been put in place.
"Personal data breach" refers to a breach of
security leading to the accidental or unlawful
destruction, loss, alteration, unauthorized
disclosure of, or access to, personal data
transmitted, stored, or otherwise processed;
DATA BREACH NOTIFICATION
The personal information controller shall promptly notify the Commission and
affected data subjects when:
• sensitive personal information; or
• other information that may, under the circumstances, be used to enable identity
fraud
• are reasonably believed to have been acquired by an unauthorized person; and
• the personal information controller or the Commission believes that such
unauthorized acquisition is likely to give rise to a real risk of serious harm to any
affected data subject.
(Sec. 20[f], DPA)
DATA BREACH NOTIFICATION
Within 72 hours . . .
upon knowledge of, or when there is reasonable belief by the personal information controller
or personal information processor that, a personal data breach requiring notification has
occurred.
(Sec. 38[a], IRR)
CONTENT OF THE NOTICE
The notification shall at least describe the nature of the breach, the
sensitive personal information possibly involved, and the measures
taken by the entity to address the breach. Notification may be delayed
only to the extent necessary to determine the scope of the breach, to
prevent further disclosures, or to restore reasonable integrity to the
information and communications system.
(Sec. 20[f], DPA)
The content and information of the complete breach report is needed by
the Commission in order to determine whether [a PIC] has acted
adequately in order to protect the rights of the affected data subject and to
see if [it] has undertaken measures to avoid further damage and prevent
similar incidents from recurrence.
(In Re: Rokko & Associates, Inc., CID BN 19-034, 21 September 2020)
Notification of data subjects of a personal data breach is the general rule and exemptions
are allowed only under specific circumstances. The purpose of the requirement to notify
data subjects of a breach incident is to give them the opportunity to take the necessary
precautions or such other measures to protect themselves against possible effects of the
breach. PICs are likewise required to establish all reasonable mechanisms to ensure that
all affected data subjects are made aware of the breach. A delay in notification can cause
harm to affected data subjects as they cannot protect themselves from the consequences
of the breach.
(IN RE: BPI PHILAMLIFE ASSURANCE CORP., NPC BN No. 21-054, 15 April 2021)
COMPLIANCE WITH OTHER REQUIREMENTS
• Restitution for any aggrieved party shall be governed by the provisions of the New Civil
Code. (Sec. 37, DPA)
• Pursuant to the exercise of its quasi-judicial functions, the Commission shall award
indemnity to an aggrieved party on the basis of the provisions of the New Civil Code.
Any complaint filed by a data subject shall be subject to the payment of filing fees,
unless the data subject is an indigent.(Sec. 7[b], DPA; Sec. 64, IRR)
ADMINISTRATIVE SANCTIONS
CEO, CDO, BAN, FINE
Violations of the Act, these Rules, other issuances and orders of the
Commission, shall, upon notice and hearing, be subject to compliance and
enforcement orders, cease and desist orders, temporary or permanent ban
on the processing of personal data, or payment of fines, in accordance with
a schedule to be published by the Commission.
(Sec. 65. IRR)
LIST OF CASES
CASES
General Privacy Cases:
• Morfe v. Mutuc, G.R. No. L-20387, January 31, 1968
• Disini, Jr. v. Secretary of Justice, G.R. Nos. 203335, etc., February 18, 2014
• De Leon v. Duterte, G.R. No. 252118, May 8, 2020
• Kilusang Mayo Uno v. Director-General, G.R. Nos. 167798 & 167930, April 19, 2006
CASES
• In the Matter of the Petition for Writ of Habeas Corpus/Data v. De Lima, G.R. Nos. 215585 &
215768, [September 8, 2020])
• Hilado v. Reyes, G.R. No. 163155, July 21, 2006
• Zarate v. Aquino III, G.R. No. 220028 (Notice), November 10, 2015
CASES
General Privacy Cases:
• Re Request for Copy of 2008 SALN, A.M. Nos. 09-8-6-SC & 09-8-07-CA (Resolution), June 13,
2012
• Subido Pagente Certeza Mendoza and Binay Law Offices v. Court of Appeals, G.R. No. 216914,
December 6, 2016
• Re: Rolando Espinosa, Sr., A.M. Nos. RTJ-17-2494 & RTJ-19-2557, January 26, 2021
• Yonzon v. Coca-Cola Bottlers Philippines, Inc., G.R. No. 226244 , June 16, 2021
• Calleja v. Executive Secretary, G.R. Nos. 252578, etc., December 7, 2021
• Vivares v. St. Theresa's College, G.R. No. 202666, September 29, 2014
• Office of the Court Administrator v. Atillo, Jr., A.M. No. RTJ-21-018, September 29, 2021
• Gamboa v. Chan, G.R. No. 193636, July 24, 2012
Data Privacy Act cases:
• Cadajas v. People, G.R. No. 247348, November 16, 2021
• Philippine Stock Exchange v. Secretary of Finance, G.R. No. 213860, July 5, 2022
National Privacy Commission Decisions:
• principle of non-discrimination
• principle of technological neutrality
• principle of functional equivalence
Aside from the embodied principles . . ., [the Model Law] also provides rules
for the formation, validity, enforcement, and interpretation of electronic
contracts, and for admissibility and evidentiary weight. These rules help
facilitate international commerce by providing a common ground among the
states.
[https://uncitral.un.org/en/texts/ecommerce/modellaw/electronic_commerce
(last accessed 11/27/2023)]
The [Model Law] was the first legislative text to adopt the fundamental
principles of non-discrimination, technological neutrality and functional
equivalence that are widely regarded as the founding elements of modern
electronic commerce law.
[https://uncitral.un.org/en/texts/ecommerce/modellaw/electronic_commerce
(last accessed 11/27/2023)]
These principles are also embodied in the Electronic Commerce Act of 2000.
REPUBLIC ACT NO. 8792
THE E-COMMERCE ACT OF 2000
Article II, Section 24 of the 1987 Constitution recognizes the vital role of
communication and information in nation-building.
THE STATE ALSO RECOGNIZES . . .
1. the need to create an information-friendly environment which supports and ensures the availability,
diversity and affordability of ICT products and services;
2. the primary responsibility of the private sector in contributing investments and services in ICT;
3. the need to develop, with appropriate training programs and institutional policy changes, human
resources for the information age, a labor force skilled in the use of ICT and a population capable of
operating and utilizing electronic appliances and computers;
4. its obligation to facilitate the transfer and promotion of technology;
5. the need to ensure network security, connectivity and neutrality of technology for the national benefit;
and
6. the need to marshal, organize and deploy national information infrastructures, comprising in both
communications network and strategic information services, including their interconnection to the
global information networks, with the necessary and appropriate legal, financial, diplomatic and
technical framework, systems and facilities.
ROLE OF THE PRIVATE SECTOR
Unlike the UNCITRAL Model Laws, the ECommerce Act also applies to
electronic data messages or electronic documents used in non-commercial
activities.
(Disini, Jr.: Philippine Electronic Contracting)*
This is intended to reinforce party autonomy and to make it clear that the
law is not intended to impose electronic contracting upon those who insist
upon paperbased communications if they so stipulate.
(Disini, Jr.: Philippine Electronic Contracting)*
[T]here is a slight difference between the two terms [“Electronic Data Message” and
“Electronic Document”]. While "data message" has reference to information electronically
sent, stored or transmitted, it does not necessarily mean that it will give rise to a right or
extinguish an obligation, unlike an electronic document. Evident from the law, however, is
the legislative intent to give the two terms the same construction.
(MCC Industial Sales Corp. v. Ssangyong Corp., G.R. No. 170633, October 17, 2007)
ELECTRONIC SIGNATURE
• principle of non-discrimination
• principle of technological neutrality
• principle of functional equivalence
PRINCIPLE OF NON-DISCRIMINATION
The principle of non-discrimination ensures that a document would not be
denied legal effect, validity or enforceability solely on the grounds that it is
in electronic form.
[https://uncitral.un.org/en/texts/ecommerce/modellaw/electronic_commerce
(last accessed 11/27/2023)]
PROVISIONS IN THE ECA ON NON-DISCRIMINATION:
LEGAL RECOGNITION OF INFORMATION
Except as otherwise agreed by the parties, an offer, the acceptance of an offer and such
other elements required under existing laws for the formation of contracts may be
expressed in, demonstrated and proved by means of electronic data messages
or electronic documents and no contract shall be denied validity or enforceability on the
sole ground that it is in the form of an electronic data message or electronic document, or
that any or all of the elements required under existing laws for the formation of the
contracts is expressed, demonstrated and proved by means of electronic data messages
or electronic documents.
(Sec. 16[1]), ECA)
PROVISIONS IN THE ECA ON NON-
DISCRIMINATION: RECOGNITION BY PARTIES
As between the originator and the addressee of an electronic data
message or electronic document, a declaration of will or other statement
shall not be denied legal effect, validity or enforceability solely on the
ground that it is in the form of an electronic data message
or electronic document.
(Sec. 17, ECA)
THEREFORE . . .
a. A requirement under law that information is in writing is satisfied if the information is
in the form of an electronic data message or electronic document.
b. A requirement under law for a person to provide information in writing to another
person is satisfied by the provision of the information in an electronic data message
or electronic document.
c. A requirement under law for a person to provide information to another person in a
specified non-electronic form is satisfied by the provision of the information in
an electronic data message or electronic document if the information is provided in
the same or substantially the same form.
However, nothing limits the operation of any requirement under law for information to be
posted or displayed in specified manner, time or location; or for any information or
document to be communicated by a specified method unless and until a functional
equivalent shall have been developed, installed, and implemented.
(Sec. 7, IRR)
PRINCIPLE OF TECHNOLOGICAL NEUTRALITY
The principle of technological neutrality mandates the adoption of
provisions that are neutral with respect to technology used. In light of the
rapid technological advances, neutral rules aim at accommodating any
future development without further legislative work.
[https://uncitral.un.org/en/texts/ecommerce/modellaw/electronic_commerce
(last accessed 11/27/2023)]
None of the provisions of [the] Rules shall be applied so as to exclude,
restrict, or deprive of legal effect any method of electronic signature
that satisfies the requirements [on legal recognition of electronic
signatures] which is as reliable as was appropriate for the purpose for
which the data message was generated or communicated, in the light
of all the circumstances, including any relevant agreement.
(Rule 4, IRR ES)
PRINCIPLE OF FUNCTIONAL EQUIVALENCE
The functional equivalence principle lays out criteria under which
electronic communications may be considered equivalent to paper-based
communications.
[https://uncitral.un.org/en/texts/ecommerce/modellaw/electronic_commerce
(last accessed 11/27/2023)]
• The principle of “functional equivalence” is an approach used to deal
with impediments to the use of electronic commerce posed by such
requirements in national laws prescribing the use of traditional paper-
based documentation.
• It involves an analysis of the purposes and functions of the traditional
paper-based requirement with a view to determining how those purposes
or functions could be fulfilled through electronic-commerce techniques.
The “functional equivalence principle” sets out the specific requirements
that electronic communications need to meet in order to fulfill the same
purposes and functions that certain notions in the traditional paper-based
system - for example, "writing," "original," "signed," and "record"- seek to
achieve.
[https://uncitral.un.org/en/texts/ecommerce/modellaw/electronic_commerce
(last accessed 11/27/2023)]
IN OTHER WORDS . . .
No provision of the Act shall apply to vary any and all requirements of
existing laws and relevant judicial pronouncements respecting
formalities required in the execution of documents for their validity.
Hence, when the law requires that a contract be in some form in order
that it may be valid or enforceable, or that a contract is proved in a
certain way, that requirement is absolute and indispensable.
(Sec. 12, IRR)
Contracts shall be obligatory, in whatever form they may have been
entered into, provided all the essential requisites for their validity are
present.
(Civil Code, Art. 1356)
Forms of contracts serve any of the following ends:
a. for it to be valid;
b. for it to be enforceable or proved in a certain way; or
c. for the convenience of the parties or for the purpose of binding third
persons.
When the law requires that a contract be in some form for its validity or
enforceability, or it requires that it be proved in a certain way, that
requirement is absolute and indispensable.
(Civil Code, Art. 1356)
When the law prescribes a particular form for a contract for convenience or
for purposes of binding third persons, the contracting parties may compel
each other to observe that form, once the contract has been perfected.
This right may be exercised simultaneously with the action upon the
contract.
(Civil Code, Art. 1357)
The right to compel observance of the required form may also be
availed of by the parties when a public document is necessary for the
registration of the contract in the Registry of Deeds.
(Civil Code, Art. 1406)
EXAMPLES OF CONVENIENCE
When the sale is made through a public instrument, the execution thereof
shall be equivalent to the delivery of the thing which is the object of the
contract, if from the deed the contrary does not appear or cannot clearly be
inferred.
(Civil Code, Art. 1498)
FORM TO BIND THIRD PERSONS
a. An agreement that by its terms is not to be performed within a year from the making
thereof;
b. A special promise to answer for the debt, default, or miscarriage of another;
c. An agreement made in consideration of marriage, other than a mutual promise to marry;
d. An agreement for the sale of goods, chattels or things in action, at a price not less than five
hundred pesos, unless the buyer accept and receive part of such goods and chattels, or the
evidences, or some of them, of such things in action, or pay at the time some part of the
purchase money; but when a sale is made by auction and entry is made by the auctioneer
in his sales book, at the time of the sale, of the amount and kind of property sold, terms of
sale, price, names of the purchasers and person on whose account the sale is made, it is a
sufficient memorandum;
e. An agreement for the leasing for a longer period than one year, or for the sale of real
property or of an interest therein;
f. A representation as to the credit of a third person.
(Civil Code, Art. 1403[2])
STATUTE OF FRAUDS
Thus, even if the foregoing contracts have not been reduced into writing
but were fully or partially performed, the ratification or performance takes it
out of the Statute of Frauds and the same becomes enforceable.
FORM FOR VALIDITY
The following should be in a public instrument to be valid:
1. Donation of an immovable
ARTICLE 749. In order that the donation of an immovable may be valid, it must be made in a public document,
specifying therein the property donated and the value of the charges which the donee must satisfy.
The acceptance may be made in the same deed of donation or in a separate public document, but it shall not take
effect unless it is done during the lifetime of the donor.
If the acceptance is made in a separate instrument, the donor shall be notified thereof in an authentic form, and this
step shall be noted in both instruments.
•
2. Partnerships where immovables are contributed
ARTICLE 1771. A partnership may be constituted in any form, except where immovable property or real rights are
contributed thereto, in which case a public instrument shall be necessary. (1667a)
ARTICLE 1773. A contract of partnership is void, whenever immovable property is contributed thereto, if an inventory
of said property is not made, signed by the parties, and attached to the public instrument.
FORM FOR VALIDITY
3. Power of attorney to sell land or any interest therein (Art. 1874, Civil Code);
4. Stipulations limiting a common carrier’s liability to less than extraordinary
diligence (Art. 1744, Civil Code);
5. Marriage Settlements (Art. 77, Family Code);
•
RULES ON ELECTRONIC EVIDENCE
APPLICABILITY OF THE REE
When a document is in two or more copies executed at or about the same time with
identical contents, or is a counterpart produced by the same impression as the
original, or from the same matrix, or by mechanical or electronic re-recording, or by
chemical reproduction, or by other equivalent techniques which accurately
reproduces the original, such copies or duplicates shall be regarded as the
equivalent of the original.
Notwithstanding the foregoing, copies or duplicates shall not be admissible to the
same extent as the original if:
(a) a genuine question is raised as to the authenticity of the original; or
(b) in the circumstances it would be unjust or inequitable to admit the copy in
lieu of the original.
(Rule 4, Sec. 2, REE)
[T]o be admissible in evidence as an electronic data message or to be
considered as the functional equivalent of an original document under the Best
Evidence Rule, the writing must foremost be an "electronic data message" or
an "electronic document.“
(MCC Industial Sales Corp. v. Ssangyong Corp., G.R. No. 170633, October 17, 2007)
The terms "electronic data message" and "electronic document," as
defined under the Electronic Commerce Act of 2000, do not include
a facsimile transmission. Accordingly, a facsimile transmission cannot be
considered as electronic evidence. It is not the functional equivalent of an
original under the Best Evidence Rule and is not admissible as electronic
evidence.
(MCC Industial Sales Corp. v. Ssangyong Corp., G.R. No. 170633, October 17, 2007)
A facsimile is not a genuine and authentic pleading. It is, at best, an exact
copy preserving all the marks of an original. Without the original, there is
no way of determining on its face whether the facsimile pleading is genuine
and authentic and was originally signed by the party and his counsel. It
may, in fact, be a sham pleading.
(Garvida v. Sales, G.R. No. 124893, April 18, 1997)
AUTHENTICATION
Authentication is proving the “genuineness and due execution” or
“authenticity and due execution” of a document offered as authentic.
Before any private electronic document offered as authentic is received in evidence, its
authenticity must be proved by any of the following means:
a. by evidence that it had been digitally signed by the person purported to have
signed the same;
b. by evidence that other appropriate security procedures or devices as may be
authorized by the Supreme Court or by law for authentication
of electronic documents were applied to the document; or
c. by other evidence showing its integrity and reliability to the satisfaction of the
Judge.
(Rule 5, Sec. 2, REE)
CONTRAST WITH THE ARRE
Before any private document offered as authentic is received in evidence, its due
execution and authenticity must be proved by any of the following means:
a. By anyone who saw the document executed or written;
b. By evidence of the genuineness of the signature or handwriting of the maker;or
c. By other evidence showing its due execution and authenticity.
Any other private document need only be identified as that which it is claimed to be.
(Rules 132[B], Sec. 20)
AUTHENTICATION OF E-SIGNATURES
An electronic signature or a digital signature authenticated in the
manner prescribed [under the REE] is admissible in evidence as the
functional equivalent of the signature of a person on a written
document.
(Rule 6, Sec. 1, REE)
AUTHENTICATION OF E-SIGNATURES
• Authorship
• Integrity
• Non-repudiation
EVIDENTIARY WEIGHT
FACTORS FOR ASSESSING EVIDENTIARY
WEIGHT
In assessing the evidentiary weight of an electronic document, the following
factors may be considered:
a. The reliability of the manner or method in which it was generated,
stored or communicated [including but not limited to input and output procedures,
controls, tests and checks for accuracy and reliability of the electronic data message or
document, in the light of all the circumstances as well as any relevant agreement];
...
(Rule 7, Sec. 1, REE)
FACTORS FOR ASSESSING EVIDENTIARY
WEIGHT
...
d. The familiarity of the witness or the person who made the entry
with the communication and information system;
e. The nature and quality of the information which went into the
communication and information system upon which
the electronic data message or electronic document was based; or
f. Other factors which the court may consider as affecting the
accuracy or integrity of the electronic document or electronic data
message.
(Rule 7, Sec. 1, REE)
INTEGRITY OF AN INFORMATION AND
COMMUNICATION SYSTEM
In any dispute involving the integrity of the information and communication system in which
an electronic document or electronic data message is recorded or stored, the court may consider,
among others, the following factors:
(a) Whether the information and communication system or other similar device was
operated in a manner that did not affect the integrity of the electronic document, and there
are no other reasonable grounds to doubt the integrity of the information and
communication system;
(b) Whether the electronic document was recorded or stored by a party to the proceedings
with interest adverse to that of the party using it; or
(c) Whether the electronic document was recorded or stored in the usual and ordinary
course of business by a person who is not a party to the proceedings and who did
not act under the control of the party using it.
(Rule7 , Sec. 2, REE; Sec. 17, IRR)
EXCEPTION TO THE HEARSAY TO RULE
Except for the purposes authorized under [the Law], any person who
obtained access to any electronic key, electronic data message
or electronic document, book, register, correspondence, information,
or other material pursuant to any powers conferred under [the ECA],
shall not convey to or share the same with any other person.
(Sec. 32, ECA)
HACKING
“Hacking” or “cracking” refers to unauthorized access into or interference
in a computer system/server or information and communication system; or
any access in order to corrupt, alter, steal, or destroy using a computer or
other similar information and communication devices, without the
knowledge and consent of the owner of the computer or information and
communication system, including the introduction of computer viruses and
the like, resulting in the corruption, destruction, alteration, theft or loss
of electronic data messages or electronic documents.
(Sec. 33[a], ECA)
PIRACY
• Garvida v. Sales, G.R. No. 124893, April 18, 1997 – filing of pleading with the COMELEC through
facsimile
• MCC Industial Sales Corp. v. Ssangyong Corp., G.R. No. 170633, October 17, 2007 – sale
documents sent through facsimile
• Torres v. Philippine Amusement and Gaming Corp., G.R. No. 193531, [December 6, 2011] – filing
of motion for reconsideration with the CSC by facsimile
• National Power Corporation v. Codilla, Jr., G.R. No. 170491, [April 3, 2007 – where petitioner
erroneously claimed that photocopies are the functional equivalent of their original
• Garcillano v. House of Representatives Committees on Public Information, G.R. Nos. 170338 &
179275, December 23, 2008 – where the Court did not consider as valid publication rules posted
on the website
• Capalla v. Commission on Elections, G.R. Nos. 201112, etc., June 13, 2012 – where the
COMELEC was questioned on its Poll Automation Project
• Gunda y Alamodin v. People, G.R. No. 264245 (Notice), [March 29, 2023]
• Nuez v. Cruz-Apao, A.M. No. CA-05-18-P [Formerly OCA I.P.I. No. 05-80-CA-P], [April 12, 2005]
• People v. Enojas y Hingpit, G.R. No. 204894, [March 10, 2014])
• Commissioner of Internal Revenue v. Philippine Airlines, Inc., G.R. Nos. 236343-45 & 236372-74
(Notice), [January 17, 2023])
• Gomez y Declaro v. People, G.R. No. 255088 (Notice), [September 19, 2022])
• People v. Manansala y Alfaro, G.R. No. 233104, [September 2, 2020])
• Bartolome v. Maranan, A.M. No. P-11-2979, [November 18, 2014], 747 PHIL 72-87)
• Guerrero v. Phil. Phoenix Surety & Insurance, Inc., G.R. No. 223178, [December 9, 2020])
• Vidallon-Magtolis v. Salud, A.M. No. CA-05-20-P (Formerly OCA IPI No. 05-81-CA-P), [September 9,
2005], 506 PHIL 423-454)
• Francia v. Abdon, A.C. No. 10031, [July 23, 2014])
• People v. Concepcion y Arguelles, G.R. No. 249500, [December 6, 2021])
• Maliksi v. Commission on Elections, G.R. No. 203302, [March 12, 2013], 706 PHIL 214-279)
• Bagumbayan-VNP Movement, Inc. v. Commission on Elections, G.R. Nos. 206719, 206784 &
207755, [April 10, 2019])
ACCESS DEVICES
REGULATION CODE
Republic Act No. 8484
Republic Act No. 8484 was signed into law on February 11, 1998.
Its amendatory law, Republic Act No. 11449, took effect on October 16, 2019.
Rep. Act No. 11449 provides for additional prohibitions and increased the
penalties for violations of RA No. 8484.
DECLARATION OF POLICY
“Credit Card” means any card, plate, coupon book, or other credit
device existing for the purpose of obtaining money, goods,
property, labor or services or any thing of value on credit;
(Sec. 3[f], ADRA)
Credit card refers to any card or other credit device intended for the
purpose of obtaining money, property, or services on credit;
(Sec. 4[g], RA10870)
3 CONTRACTS
[E]every credit card transaction involves three contracts, namely: (a) the sales
contract between the credit card holder and the merchant or the business
establishment which accepted the credit card; (b) the loan agreement between the
credit card issuer and the credit card holder; and lastly, (c) the promise to
pay between the credit card issuer and the merchant or business establishment.
Article 1319. Consent is manifested by the meeting of the offer and the acceptance
upon the thing and the cause which are to constitute the contract. The offer must be
certain and the acceptance absolute. A qualified acceptance constitutes a counter-offer.
(Pantaleon v. American Express International, Inc., G.R. No. 174269 (Resolution), [August 25,
2010], 643 PHIL 488-519)
[T]he use of a credit card to pay for a purchase is only an offer to the
credit card company to enter a loan agreement with the credit card
holder. Before the credit card issuer accepts this offer, no obligation
relating to the loan agreement exists between them.
(Pantaleon v. American Express International, Inc.,
G.R. No. 174269 (Resolution), August 25, 2010)
TRAFFICKING
(k) having in one's possession, without authority from the owner of the
access device or the access device company, an access device, or any
material, such as slips, carbon paper, or any other medium, on which
the access device is written, printed, embossed, or otherwise indicated;
(l) writing or causing to be written on sales slips, approval numbers
from the issuer of the access device of the fact of approval, where in
fact no such approval was given, or where, if given, what is written is
deliberately different from the approval actually given;
(m) making any alteration, without the access device holder's authority,
of any amount or other information written on the sales slip;
(n) effecting transaction, with one or more access devices issued to
another person or persons, to receive payment or any other thing of
value;
(o) without the authorization of the issuer of the access device,
soliciting a person for the purpose of —
1) offering an access device; or
2) selling information regarding or an application to obtain
an access device;
(p) without the authorization of the credit card system member or its
agent, causing or arranging for another person to present to the
member or its agent, for payment, one or more evidence or records of
transactions made by credit card.
"(q) skimming, copying or counterfeiting any credit card, payment card
or debit card, and obtaining any information therein with the intent of
accessing the account and operating the same whether or not cash is
withdrawn or monetary injury is caused by a perpetrator against the
account holder or the depositary bank;
"(r) production or possession of any software component such as
programs, application, or malware, or any hardware component such
as skimming device or any electronic gadget or equipment that is used
to perpetrate any of the foregoing acts;
"(s) accessing, with or without authority, any application, online
banking account, credit card account, ATM account, debit card account,
in a fraudulent manner, regardless of whether or not it will result in
monetary loss to the account holder; and
"(t) hacking refers to the unauthorized access into or interference in a
computer system/server, or information and communication system,
or any access in order to corrupt, alter, steal, or destroy using a
computer or other similar information and communication devices
without the knowledge and consent of the owner of the computer or
information and communication system, including the introduction of
computer viruses and the like resulting in the corruption, destruction,
alteration, theft, or loss of electronic data messages or electronic
documents."
ECONOMIC SABOTAGE
Life imprisonment and a fine of not less than One million pesos
(P1,000,000.00) but not more than Five million pesos (P5,000,000.00) if
the offense constitutes economic sabotage.
CONSPIRACY TO COMMIT ADF
If two (2) or more persons conspire to commit any of the offenses listed
in Section 9 and one or more of such persons does any act to effect the
object of the conspiracy, each of the parties to such conspiracy shall be
punished as in the case of the doing of the act, the accomplishment of
which is the object of such conspiracy.
FRUSTRATED AND ATTEMPTED ADF
Any person who performs all the acts of execution which would produce any of the
unlawful acts enumerated in Section 9 of this Act, but which nevertheless does not
produce it by reason of causes independent of the will of said person, shall be
punished with two-thirds (2/3) of the fine and imprisonment provided for the
consummated offenses listed in said section. Any person who commences the
commission of any of the unlawful acts enumerated in Section 9 of this Act directly by
overt acts and does not perform all the acts of execution which would produce the
said acts by reason of some cause or accident other than said person's own
spontaneous desistance, shall be punished with one-half (1/2) of the fine and
imprisonment provided for the consummated offenses listed in the said section.
ACCESSORY TO ADF
Any person who, with intent to gain for himself or for another, buys, receives,
possesses, keeps, acquires, conceals, sells, or disposes of, shall buy and sell, or in any
manner deal in any article, item, object or anything of value which he knows or should
be known to him, to have been acquired through the use of counterfeit access device
or an unauthorized access device or an access device known to him to have been
fraudulently applied for, shall be considered as an accessory to an access device fraud
and shall be punished with one-half (1/2) of the fine and imprisonment provided for
the applicable consummated offenses listed in Section 9 of this Act. Said person shall
be prosecuted under this Act or under the Anti-Fencing Law of 1979 (Presidential
Decree No. 1612) whichever imposes the longer prison term as penalty for the
consummated offense.
WHAT TO DO IN CASE OF LOSS OF ACCESS
DEVICE
• In case of loss of an access device, the holder thereof must notify the
issuer of the access device of the details and circumstances of such
loss upon knowledge of the loss. Full compliance with such procedure
would absolve the access device holder of any financial liability from
fraudulent use of the access device from the time the loss or theft is
reported to the issuer. (Sec. 15, ADR)
• In case a credit card is lost or stolen, any transaction made prior to
reporting to the credit card issuer shall be for the account of the
cardholder. (Sec. 15, RA 10870)
LIABILITY UNDER THE RPC AND OTHER LAWS
Prosecution under this Act shall be without prejudice to any liability for
violation of any provision of the Revised Penal Code or any other law.
(Sec. 17, ADRA)
PRIMA FACIE EVIDENCE OF INTENT TO
DEFRAUD
The mere possession, control or custody of :
a. an access device, without permission of the owner or without any lawful
authority;
b. a counterfeit access device;
c. access device fraudulently applied for;
d. any device-making or altering equipment by any person whose business
or employment does not lawfully deal with the manufacture, issuance, or
distribution of access device;
e. an access device or medium on which an access device is written, not in
the ordinary course of the possessor's trade or business; or
f. a genuine access device, not in the name of the possessor, or not in the
ordinary course of the possessor's trade or business . . .
. . . shall be prima facie evidence that such device or equipment is intended to be used
to defraud.
(Sec. 14, ADRC)
TORRES V. PEOPLE
(G.R. NO. 255262, SEPTEMBER 14, 2021)
On May 6, 2015, Aldrin Torres y David (petitioner) was charged with violation of Section 9 (f) of
Republic Act (R.A.) No. 8484 (Access Devices Regulation Act of 1998) in an Information, which reads:
On the 4th of May 2015, in the City of Makati, the Philippines, accused[,] not being in
the business or employment that deals with the manufacture, issuance or distribution of
access device-making or altering equipment, with intent to defraud, did then and there
willfully, unlawfully and feloniously, without authority of law, possess[,] have in his custody
and control one piece of an unauthorized pin pad cover with improvised camera and
unauthorized card reader slot, a skimming device containing a card reader with memory
storage capability, with intent to defraud, in violation of the aforesaid law and to the
damage and prejudice of complainant Bank of the Philippine Islands.
[T]he card reader slot and personal identification number (PIN) pad cover with an attached
camera which were in the possession of petitioner and subsequently seized from him, were
intended to be used to retain data contained in access devices, i.e., the automated teller
machine (ATM) cards of unwary bank customers, and to record and secure the ATM PINs
without authority. These illegally obtained data and information would make possible the
creation of counterfeit access devices, such as fake ATM cards, which R.A. No. 8484 seeks to
prevent.
(Torres y David v. People, G.R. No. 255262 (Notice), [September 14, 2021])
Intent is immaterial in crimes involving special laws. Criminal law has long divided crimes into
acts which are wrong in themselves called "acts mala in se," and acts which would not be wrong
but for the fact that positive law forbids them, called "acts mala prohibita." This distinction
determines whether proof of intent to commit a wrongful act is necessary. In acts mala in se,
intent governs, while in acts mala prohibita, the only question is, has the law been violated?
When an act is illegal per se, the intent of the offender is immaterial.
(Torres y David v. People, G.R. No. 255262 (Notice), [September 14, 2021])
It is incumbent upon petitioner to overthrow the presumption of intent to defraud by
sufficient and convincing evidence . . . . Petitioner could only offer a mere denial.
Between the categorical statements of the prosecution witnesses, on one hand, and
the bare denial of the petitioner, on the other, the former must perforce prevail. An
affirmative testimony is far stronger than a negative testimony, especially when given
by a credible witness who was not shown to have any ill motive to testify against the
appellant.
(Torres y David v. People, G.R. No. 255262 (Notice), [September 14, 2021])
"A cardholder who abandons or surreptitiously leaves the place of employment,
business or residence stated in his application for credit card, without informing the
credit card company of the place where he could actually be found, if at the time of
such abandonment or surreptitious leaving, the outstanding and unpaid balance is
past due for at least ninety (90) days and is more than Two hundred thousand pesos
(P200,000.00), shall be prima facie presumed to have used his credit card with intent
to defraud.“
(Sec. 14, ADRC)
CRUZ V. PEOPLE
(G.R. NO. 210266, JUNE 7, 2017)
Cruz purchased two (2) bottles of Calving Klein perfumes and a pair of Ferragamo Shoes
using counterfeit Citibank Visa Cards at the Duty Free Philippines Festival Mall. When
apprehended by Mall guards, he tried to escape.
Cruz was charged with using as well as possessing counterfeit access device.
During pre-trial the prosecution marked a certification stating that the access device
used was counterfeit. The access device itself was not marked. The trial court, however,
allowed the presentation of the counterfeit access device. The SC held that the trial
court did not violate the Rules on Pre-Trial.
Under Section 9 (a) and (e) of Republic Act No. 8484, the possession and use of an
access device is not illegal. Rather, what is prohibited is the possession and use of
a counterfeit access device. Therefore, the corpus delicti of the crime is not merely the
access device, but also any evidence that proves that it is counterfeit.
(Cruz v. People, G.R. No. 210266, June 7, 2017)
PEOPLE V. CALDA
(G.R. No. 227876, December 1, 2021)
Accused was charged with Violation of Section 9 (e), R.A. No. 8484 for "possessing a
counterfeit access device or access device fraudulently applied for.“
Accused for a credit card from Metrobank using the name of complainant Henry C. Yu
and his personal documents fraudulently obtained from him. The credit card in the
name of Henry Yu was successfully issued and delivered to said accused using a
fictitious identity and addresses of Henry Yu, to the damage and prejudice of the real
Henry Yu.
(Soledad y Cristobal v. People, G.R. No. 184274, February 23, 2011)
LIST OF CASES
CASES
Pursuant to the constitutional goals for the national economy to attain a more
equitable distribution of opportunities, income, and wealth; a sustained
increase in the amount of goods and services produced by the nation for the
benefit of the people; and an expanding productivity as the key to raising the
quality of life for all, especially the underprivileged and the constitutional
mandate that the State shall regulate or prohibit monopolies when the public
interest so requires and that no combinations in restraint of trade or
unfair competition shall be allowed, the State shall:
(Sec. 2, PCA)
a. Enhance economic efficiency and promote free and fair competition in trade,
industry and all commercial economic activities, as well as establish a
National Competition Policy to be implemented by the Government of the
Republic of the Philippines and all of its political agencies as a whole;
b. Prevent economic concentration which will control the production, distribution,
trade, or industry that will unduly stifle competition, lessen, manipulate or
constrict the discipline of free markets; and
c. (c) Penalize all forms of anti-competitive agreements, abuse of dominant
position and anti-competitive mergers and acquisitions, with the objective of
protecting consumer welfare and advancing domestic and international trade
and economic development.
SCOPE AND APPLICATION
This Act shall be enforceable against any person or entity engaged in any trade,
industry and commerce in the Republic of the Philippines. It shall likewise be
applicable to international trade having direct, substantial, and reasonably
foreseeable effects in trade, industry, or commerce in the Republic of the
Philippines, including those that result from acts done outside the Republic of the
Philippines.
This Act shall not apply to the combinations or activities of workers or employees
nor to agreements or arrangements with their employers when such combinations,
activities, agreements, or arrangements are designed solely to facilitate collective
bargaining in respect of conditions of employment.
(Sec. 3, PCA)
EXPRESSLY REPEALS . . .
The relevant geographic market comprises the area in which the entity
concerned is involved in the supply and demand of goods and services,
in which the conditions of competition are sufficiently homogenous
and which can be distinguished from neighboring areas because the
conditions of competition are different in those areas.
The determination of a particular relevant market depends on the
consideration of factors which affect the substitutability among goods
or services constituting such market, and the geographic area
delineating the boundaries of the market.
(Gios-Samar, Inc. v. Department of Transportation and Communications,
G.R. No. 217158, [March 12, 2019])
PROHIBITED ACTS
ANTI-COMPETITIVE AGREEMENTS
Republic Act No. 10667 prohibits one or more entities which has/have
acquired or achieved a "dominant position" in a "relevant market" from
"abusing" its dominant position. In other words, an entity is not
prohibited from, or held liable for prosecution and punishment for,
simply securing a dominant position in the relevant market in which it
operates. It is only when that entity engages in conduct in abuse of its
dominant position that it will be exposed to prosecution and possible
punishment.
In determining whether an entity has market dominant position for purposes of this Act, the
Commission shall consider the following:
(a) The share of the entity in the relevant market and the ability of the entity to fix prices
unilaterally or to restrict supply in the relevant market;
(c) The existence of barriers to entry and the elements which could foreseeably alter both
the said barriers and the supply from competitors;
(e) The credible threat of future expansion by its actual competitors or entry by potential
competitors (expansion and entry);
(f) Market exit of actual competitors;
(h) The possibility of access by its competitors or other entities to its sources of inputs;
(k) Its ownership, possession or control of infrastructure which are not easily duplicated;
Provided, That an entity shall not be prohibited from continuing to own and hold the
stock or other share capital or assets of another corporation which it acquired prior
to the approval of this Act or acquiring or maintaining its market share in a relevant
market through such means without violating the provisions of this Act:
Provided, further, That the acquisition of the stock or other share capital of one or
more corporations solely for investment and not used for voting or exercising
control and not to otherwise bring about, or attempt to bring about the prevention,
restriction, or lessening of competition in the relevant market shall not be
prohibited.
THE PHILIPPINE COMPETITION COMMSSION
PHILIPPINE COMPETITION COMMISSION
• Gios-Samar, Inc. v. Department of Transportation and Communications, G.R. No. 217158, March
12, 2019
PUBLIC SERVICE ACT
Commonwealth Act No. 164, as amended
by Republic Act No. 11659
COMMONWEALTH ACT NO. 164
Enacted on November 7, 1936
Its amendatory law, Republic Act No. 11659, was enacted on
March 21, 2022.
The provisions on limitation on foreign ownership in the following laws are hereby amended or
modified:
(a) Republic Act No. 6957, entitled, "An Act Authorizing the Financing, Construction,
Operation and Maintenance of Infrastructure Projects by the Private Sector, and for Other
Purposes," as amended;
(b) Republic Act No. 9295, otherwise known as the "Domestic Shipping Development Act of
2004," as amended;
(c) Republic Act No. 9497, otherwise known as the "Civil Aviation Authority Act of 2008," as
amended;
(d) Republic Act No. 776, otherwise known as "The Civil Aeronautics Act of the Philippines,"
as amended;
(e) Presidential Decree No. 1112, otherwise known as the "Toll Operation Decree,"
as amended;
(g) Republic Act No. 7925, otherwise known as the "Public Telecommunications
Policy Act of the Philippines," as amended, on the classification of all
telecommunications entities as public utilities.
THE 1987 CONSTITUTION SAYS . . .
Neither shall any such franchise or right be granted except under the
condition that it shall be subject to amendment, alteration, or repeal by the
Congress when the common good so requires.
(Art. 12, Sec. 11)
STILL FURTHER . . .
The State recognizes the role of the private sector as one of the main
engines for national growth and development. It is hereby declared the
policy of the State to encourage private enterprise and expand the
base of investment in the country, with the goal of providing efficient,
reliable and affordable basic services to all. These policies are fulfilled
by: (a) ensuring effective regulation of public services; (b) providing
reasonable rate of return to public services; (c) rationalizing foreign
equity restrictions by clearly defining the term "public utilities"; and (d)
instituting processes for the protection of national security.
INTERPRETATION
Th[e] Act shall be subject to and consistent with the regulatory powers
of the State to promote public interest in Article IX-C, Section 4 and
Article XII, Section 17 of the Constitution.
ART. IX-C, SECTION 4
The Commission may, during the election period, supervise or regulate the enjoyment or
utilization of all franchises or permits for the operation of transportation and other public
utilities, media of communication or information, all grants, special privileges, or
concessions granted by the Government or any subdivision, agency, or instrumentality
thereof, including any government-owned or controlled corporation or its subsidiary. Such
supervision or regulation shall aim to ensure equal opportunity, time, and space, and the
right to reply, including reasonable, equal rates therefor, for public information campaigns
and forums among candidates in connection with the objective of holding free, orderly,
honest, peaceful, and credible elections.
ART. XII, SEC. 17
(i) directly or indirectly owns more than fifty percent (50%) of the capital taking
into account both the voting rights and beneficial ownership;
(ii) controls, through ownership interests, the exercise of more than fifty percent
(50%) of the voting rights; or
(iii) holds the power to appoint a majority of members of the board of directors
or any other equivalent management body.
A joint venture is an association of persons or companies jointly
undertaking some commercial enterprise with all of them generally
contributing assets and sharing risks. It requires a community of
interest in the performance of the subject matter, a right to direct and
govern the policy in connection therewith, and duty, which may be
altered by agreement to share both in profit and losses.
(JG Summit Holdings, Inc. v. Court of Appeals, G.R. No. 124293, November 20, 2000)
Upon the recommendation of the NEDA, the President may
recommend to Congress the classification of a public service as a
public utility on the basis of the following criteria:
(1) The person or juridical entity regularly supplies and transmits and distributes to the
public through a network a commodity or service of public consequence;
(2) The commodity or service is a natural monopoly that needs to be regulated when the
common good so requires. For this purpose, natural monopoly exists when the market
demand for a commodity or service can be supplied by a single entity at a lower cost than
by two or more entities;
(3) The commodity or service is necessary for the maintenance of life and occupation of
the public; and
(4) The commodity or service is obligated to provide adequate service to the public on
demand.
BUSINESSES AFFECTED WITH PUBLIC
INTEREST
SECTION 17. In times of national emergency, when the public interest so requires, the
State may, during the emergency and under reasonable terms prescribed by it, temporarily
take over or direct the operation of any privately owned public utility or business affected
with public interest.
SECTION 18. The State may, in the interest of national welfare or defense, establish and
operate vital industries and, upon payment of just compensation, transfer to public
ownership utilities and other private enterprises to be operated by the Government.
BUSINESS AFFECTED WITH PUBLIC INTEREST
A public service which is not classified as a public utility under this Act
shall be considered a business affected with public interest for
purposes of Sections 17 and 18 of Article XII of the Constitution.
CRITICAL INFRASTRUCTURE
• Laguna Tayabas Bus Co. v. Regodon, G.R. No. L-9586, December 27, 1956
• Republic v. Maria Basa Express Jeepney Operators and Drivers Association, Inc., G.R. Nos. 206486,
etc., August 16, 2022
• JG Summit Holdings v. Court of Appeals, G.R. No. 124293 (Resolution), September 24, 2003)