Cybercrime Majority Notes
Cybercrime Majority Notes
RULING:
In the cases before it, the Court finds
nothing in Section 4(a)(1) that calls for the
application of the strict scrutiny standard
since no fundamental freedom, like speech,
is involved in punishing what is essentially a
condemnable act – accessing the computer
system of another without right. It is a
universally condemned conduct
Besides, a client’s engagement of an ethical
hacker requires an agreement between
them as to the extent of the search, the
methods to be used, and the systems to be
tested. This is referred to as the "get out of
jail free card."6Since the ethical hacker does
his job with prior permission from the client,
such permission would insulate him from
the coverage of Section 4(a)(1).
b. Section 4 (a) (3) on Data VALID
PETITIONERS:
Interference; Petitioners claim that Section 4(a)(3) suffers
from overbreadth in that, while it seeks to
discourage data interference, it intrudes
into the area of protected speech and
expression, creating a chilling and deterrent
effect on these guaranteed freedoms.
RULING:
1
Under the overbreadth doctrine, a proper
governmental purpose, constitutionally
subject to state regulation, may not be
achieved by means that unnecessarily
sweep its subject broadly, thereby invading
the area of protected freedoms.7 But
Section 4(a)(3) does not encroach on these
freedoms at all. It simply punishes what
essentially is a form of vandalism,8 the act of
willfully destroying without right the things
that belong to others, in this case their
computer data, electronic document, or
electronic data message. Such act has no
connection to guaranteed freedoms. There
is no freedom to destroy other people’s
computer systems and private documents.
c. Section 4 (a) (6) on Cyber- VALID
PETITIONERS:
squatting; Petitioners claim that Section 4(a)(6) or
cyber-squatting violates the equal
protection clause12 in that, not being
narrowly tailored, it will cause a user using
his real name to suffer the same fate as
those who use aliases or take the name of
another in satire, parody, or any other
literary device.
For example, supposing there exists a well
known billionaire-philanthropist named
"Julio Gandolfo," the law would punish for
cyber-squatting both the person who
registers such name because he claims it to
be his pseudo-name and another who
registers the name because it happens to be
his real name. Petitioners claim that,
considering the substantial distinction
between the two, the law should recognize
the difference.
RULING:
there is no real difference whether he uses
"Julio Gandolfo" which happens to be his
real name or use it as a pseudo-name for it
is the evil purpose for which he uses the
name that the law condemns. The law is
reasonable in penalizing him for acquiring
the domain name in bad faith to profit,
mislead, destroy reputation, or deprive
others who are not ill-motivated of the
rightful opportunity of registering the same.
2
The challenge to the constitutionality of
Section 4(a)(6) on ground of denial of equal
protection is baseless.
d. Section 4 (b) (3) on Identity VALID
PETITIONERS:
Theft; Petitioners claim that Section 4(b)(3)
violates the constitutional rights to due
process and to privacy and correspondence,
and transgresses the freedom of the press.
Further, petitioners fear that Section 4(b)(3)
violates the freedom of the press in that
journalists would be hindered from
accessing the unrestricted user account of a
person in the news to secure information
about him that could be published.
RULING:
The usual identifying information regarding
a person includes his name, his citizenship,
his residence address, his contact number,
his place and date of birth, the name of his
spouse if any, his occupation, and similar
data.19 The law punishes those who acquire
or use such identifying information without
right, implicitly to cause damage.
Petitioners simply fail to show how
government effort to curb computer-
related identity theft violates the right to
privacy and correspondence as well as the
right to due process of law.
Also, the charge of invalidity of this section
based on the overbreadth doctrine will not
hold water since the specific conducts
proscribed do not intrude into guaranteed
freedoms like speech. Clearly, what this
section regulates are specific actions: the
acquisition, use, misuse or deletion of
personal identifying data of another. There
is no fundamental right to acquire another’s
personal data.
But this is not the essence of identity theft
that the law seeks to prohibit and punish.
Evidently, the theft of identity information
must be intended for an illegitimate
purpose. Moreover, acquiring and
disseminating information made public by
the user himself cannot be regarded as a
form of theft.
3
The Court has defined intent to gain as an
internal act which can be stablished through
the overt acts of the offender, and it may be
presumed from the furtive taking of useful
property pertaining to another, unless
special circumstances reveal a different
intent on the part of the perpetrator.20 As
such, the press, whether in quest of news
reporting or social investigation, has
nothing to fear since a special circumstance
is present to negate intent to gain which is
required by this Section.
e. Section 4 (c) (1) on Cybersex; VALID
PETITIONERS:
Petitioners claim that the above violates the
freedom of expression clause of the
Constitution.21 They express fear that
private communications of sexual character
between husband and wife or consenting
adults, which are not regarded as crimes
under the penal code, would now be
regarded as crimes when done "for favor" in
cyberspace.
The law as written would invite law
enforcement agencies into the bedrooms of
married couples or consenting individuals.
RULING:
The Court will not declare Section 4(c)(1)
unconstitutional where it stands a
construction that makes it apply only to
persons engaged in the business of
maintaining, controlling, or operating,
directly or indirectly, the lascivious
exhibition of sexual organs or sexual activity
with the aid of a computer system as
Congress has intended.
f. Section 4 (c) (2) on Child VALID
PETITIONERS:
Pornography; Petitioners point out that the provision of
ACPA that makes it unlawful for any person
to "produce, direct, manufacture or create
any form of child pornography"33 clearly
relates to the prosecution of persons who
aid and abet the core offenses that ACPA
seeks to punish.34 Petitioners are wary that a
person who merely doodles on paper and
imagines a sexual abuse of a 16-year-old is
not criminally liable for producing child
4
pornography but one who formulates the
idea on his laptop would be. Further, if the
author bounces off his ideas on Twitter,
anyone who replies to the tweet could be
considered aiding and abetting a
cybercrime.
RULING:
It seems that the above merely expands the
scope of the Anti-Child Pornography Act of
200931 (ACPA) to cover identical activities in
cyberspace. In theory, nothing prevents the
government from invoking the ACPA when
prosecuting persons who commit child
pornography using a computer system.
Actually, ACPA’s definition of child
pornography already embraces the use of
"electronic, mechanical, digital, optical,
magnetic or any other means." Notably, no
one has questioned this ACPA provision.
Of course, the law makes the penalty higher
by one degree when the crime is committed
in cyberspace. But no one can complain
since the intensity or duration of penalty is
a legislative prerogative and there is rational
basis for such higher penalty.32 The potential
for uncontrolled proliferation of a particular
piece of child pornography when uploaded
in the cyberspace is incalculable.
g. Section 4 (c) (3) on UNCONSTITUTIONAL
GOVERNMENT:
Unsolicited Commercial The Government, represented by the
Communications; Solicitor General, points out that unsolicited
commercial communications or spams are a
nuisance that wastes the storage and
network capacities of internet service
providers, reduces the efficiency of
commerce and technology, and interferes
with the owner’s peaceful enjoyment of his
property. Transmitting spams amounts to
trespass to one’s privacy since the person
sending out spams enters the recipient’s
domain without prior permission. The OSG
contends that commercial speech enjoys
less protection in law.
5
Commercial speech is a separate category of speech
which is not accorded the same level of protection
as that given to other constitutionally guaranteed
forms of expression but is nonetheless entitled to
protection.36 The State cannot rob him of this right
without violating the constitutionally guaranteed
freedom of expression. Unsolicited advertisements
are legitimate forms of expression.
h. Section 4 (c) (4) on Libel; VALID
PETITIONERS:
Petitioners lament that libel provisions of
the penal code37 and, in effect, the libel
provisions of the cybercrime law carry with
them the requirement of "presumed
malice" even when the latest jurisprudence
already replaces it with the higher standard
of "actual malice" as a basis for
conviction.38 Petitioners argue that inferring
"presumed malice" from the accused’s
defamatory statement by virtue of Article
354 of the penal code infringes on his
constitutionally guaranteed freedom of
expression
Petitioners would go further. They contend
that the laws on libel should be stricken
down as unconstitutional for otherwise
good jurisprudence requiring "actual
malice" could easily be overturned as the
Court has done in Fermin v. People39 even
where the offended parties happened to be
public figures.
Petitioners peddle the view that both the
penal code and the Cybercrime Prevention
Act violate the country’s obligations under
the International Covenant of Civil and
Political Rights (ICCPR). They point out that
in Adonis v. Republic of the Philippines,47 the
United Nations Human Rights Committee
(UNHRC) cited its General Comment 34 to
the effect that penal defamation laws
should include the defense of truth.
RULING:
The elements of libel are: (a) the allegation
of a discreditable act or condition
concerning another; (b) publication of the
charge; (c) identity of the person defamed;
and (d) existence of malice.
6
Parenthetically, the Court cannot accept the
proposition that its ruling in Fermin
disregarded the higher standard of actual
malice or malice in fact when it found
Cristinelli Fermin guilty of committing libel
against complainants who were public
figures. Actually, the Court found the
presence of malice in fact in that case.
Besides, the UNHRC did not actually enjoin
the Philippines, as petitioners urge, to
decriminalize libel. It simply suggested that
defamation laws be crafted with care to
ensure that they do not stifle freedom of
expression.48Indeed, the ICCPR states that
although everyone should enjoy freedom of
expression, its exercise carries with it
special duties and responsibilities. Free
speech is not absolute. It is subject to
certain restrictions, as may be necessary
and as may be provided by law.
The Court agrees with the Solicitor General
that libel is not a constitutionally protected
speech and that the government has an
obligation to protect private individuals
from defamation. Indeed, cyberlibel is
actually not a new crime since Article 353, in
relation to Article 355 of the penal code,
already punishes it. In effect, Section 4(c)(4)
above merely affirms that online
defamation constitutes "similar means" for
committing libel.
i. Section 5 on Aiding or VALID
PETITIONERS:
Abetting and Attempt in the Petitioners assail the constitutionality of
Commission of Cybercrimes; Section 5 that renders criminally liable any
person who willfully abets or aids in the
commission or attempts to commit any of
the offenses enumerated as cybercrimes. It
suffers from overbreadth, creating a chilling
and deterrent effect on protected
expression.
RULING:
the crime of aiding or abetting the
commission of cybercrimes under Section 5
should be permitted to apply to Section
4(a)(1) on Illegal Access, Section 4(a)(2) on
Illegal Interception, Section 4(a)(3) on Data
Interference, Section 4(a)(4) on System
7
Interference, Section 4(a)(5) on Misuse of
Devices, Section 4(a)(6) on Cyber-squatting,
Section 4(b)(1) on Computer-related
Forgery, Section 4(b)(2) on Computer-
related Fraud, Section 4(b)(3) on Computer-
related Identity Theft, and Section 4(c)(1) on
Cybersex. None of these offenses borders
on the exercise of the freedom of
expression.
the actors aiding and abetting the
commission of such acts can be identified
with some reasonable certainty through
adroit tracking of their works. Absent
concrete proof of the same, the innocent
will of course be spared.
Section 5 with respect to Section 4(c)(4) is
unconstitutional. Its vagueness raises
apprehension on the part of internet users
because of its obvious chilling effect on the
freedom of expression, especially since the
crime of aiding or abetting ensnares all the
actors in the cyberspace front in a fuzzy
way. What is more, as the petitioners point
out, formal crimes such as libel are not
punishable unless consummated.71 In the
absence of legislation tracing the
interaction of netizens and their level of
responsibility such as in other countries,
Section 5, in relation to Section 4(c)(4) on
Libel, Section 4(c)(3) on Unsolicited
Commercial Communications, and Section
4(c)(2) on Child Pornography, cannot stand
scrutiny.
j. Section 6 on the Penalty of VALID
RULING:
One Degree Higher; Section 6 merely makes commission of
existing crimes through the internet a
qualifying circumstance. As the Solicitor
General points out, there exists a
substantial distinction between crimes
committed through the use of information
and communications technology and similar
crimes committed using other means. In
using the technology in question, the
offender often evades identification and is
able to reach far more victims or cause
greater harm. The distinction, therefore,
creates a basis for higher penalties for
cybercrimes.
8
k. Section 7 on the Prosecution VALID
GOVERNMENT:
under both the Revised The Solicitor General points out that Section
Penal Code (RPC) and R.A. 7 merely expresses the settled doctrine that
a single set of acts may be prosecuted and
10175; penalized simultaneously under two laws, a
special law and the Revised Penal Code.
When two different laws define two crimes,
prior jeopardy as to one does not bar
prosecution of the other although both
offenses arise from the same fact, if each
crime involves some important act which is
not an essential element of the other.74 With
the exception of the crimes of online libel
and online child pornography, the Court
would rather leave the determination of the
correct application of Section 7 to actual
cases.
RULING:
9
constitutional prohibition against double
jeopardy.
10
RULING:
The authority that Section 12 gives law
enforcement agencies is too sweeping and
lacks restraint. While it says that traffic data
collection should not disclose identities or
content data, such restraint is but an
illusion. Admittedly, nothing can prevent
law enforcement agencies holding these
data in their hands from looking into the
identity of their sender or receiver and what
the data contains. This will unnecessarily
expose the citizenry to leaked information
or, worse, to extortion from certain bad
elements in these agencies.
Section 12, of course, limits the collection of
traffic data to those "associated with
specified communications." But this
supposed limitation is no limitation at all
since, evidently, it is the law enforcement
agencies that would specify the target
communications. The power is virtually
limitless, enabling law enforcement
authorities to engage in "fishing
expedition," choosing whatever specified
communication they want. This evidently
threatens the right of individuals to privacy.
n. Section 13 on Preservation VALID
PETITIONERS:
of Computer Data; Petitioners in G.R. 20339197 claim that
Section 13 constitutes an undue deprivation
of the right to property. They liken the data
preservation order that law enforcement
authorities are to issue as a form of
garnishment of personal property in civil
forfeiture proceedings. Such order prevents
internet users from accessing and disposing
of traffic data that essentially belong to
them.
RULING:
By virtue of Section 13, however, the law
now requires service providers to keep
traffic data and subscriber information
relating to communication services for at
least six months from the date of the
transaction and those relating to content
data for at least six months from receipt of
the order for their preservation.
11
Actually, the user ought to have kept a copy
of that data when it crossed his computer if
he was so minded. The service provider has
never assumed responsibility for their loss
or deletion while in its keep.
At any rate, as the Solicitor General
correctly points out, the data that service
providers preserve on orders of law
enforcement authorities are not made
inaccessible to users by reason of the
issuance of such orders. The process of
preserving data will not unduly hamper the
normal transmission or use of the same.
RULING:
But it is well-settled that the power to issue
subpoenas is not exclusively a judicial
function. Executive agencies have the
power to issue subpoena as an adjunct of
their investigatory powers.
Besides, what Section 14 envisions is merely
the enforcement of a duly issued court
warrant, a function usually lodged in the
hands of law enforcers to enable them to
carry out their executive functions. The
prescribed procedure for disclosure would
not constitute an unlawful search or seizure
nor would it violate the privacy of
communications and correspondence.
Disclosure can be made only after judicial
intervention.
RULING:
On its face, however, Section 15 merely
enumerates the duties of law enforcement
authorities that would ensure the proper
12
collection, preservation, and use of
computer system or data that have been
seized by virtue of a court warrant. The
exercise of these duties do not pose any
threat on the rights of the person from
whom they were taken. Section 15 does not
appear to supersede existing search and
seizure rules but merely supplements them.
q. Section 17 on Destruction of VALID
PETITIONERS:
Computer Data; Petitioners claim that such destruction of
computer data subject of previous
preservation or examination violates the
user’s right against deprivation of property
without due process of law.
RULING:
Section 17 would have the computer data,
previous subject of preservation or
examination, destroyed or deleted upon the
lapse of the prescribed period. The Solicitor
General justifies this as necessary to clear
up the service provider’s storage systems
and prevent overload. It would also ensure
that investigations are quickly concluded.
it is unclear that the user has a demandable
right to require the service provider to have
that copy of the data saved indefinitely for
him in its storage system. If he wanted them
preserved, he should have saved them in his
computer when he generated the data or
received it. He could also request the
service provider for a copy before it is
deleted.
r. Section 19 on Restricting or UNCONSTITUTIONAL
PETITIONERS:
Blocking Access to Computer Petitioners contest Section 19 in that it
Data; stifles freedom of expression and violates
the right against unreasonable searches and
seizures. The Solicitor General concedes
that this provision may be unconstitutional.
RULING:
Not only does Section 19 preclude any
judicial intervention, but it also disregards
jurisprudential guidelines established to
determine the validity of restrictions on
speech. Restraints on free speech are
generally evaluated on one of or a
combination of three tests: the dangerous
13
tendency doctrine, the balancing of interest
test, and the clear and present danger
rule.101 Section 19, however, merely requires
that the data to be blocked be found prima
facie in violation of any provision of the
cybercrime law. Taking Section 6 into
consideration, this can actually be made to
apply in relation to any penal provision. It
does not take into consideration any of the
three tests mentioned above.
The Court is therefore compelled to strike
down Section 19 for being violative of the
constitutional guarantees to freedom of
expression and against unreasonable
searches and seizures.
RULING:
Thus, the act of non-compliance, for it to be
punishable, must still be done "knowingly or
willfully." There must still be a judicial
determination of guilt, during which, as the
Solicitor General assumes, defense and
justifications for non-compliance may be
raised. Thus, Section 20 is valid insofar as it
applies to the provisions of Chapter IV which
are not struck down by the Court.
t. Section 24 on Cybercrime VALID
PETITIONERS:
Investigation and Petitioners mainly contend that Congress
Coordinating Center (CICC); invalidly delegated its power when it gave
the Cybercrime Investigation and
and Coordinating Center (CICC) the power to
u. Section 26 (a) on CICC's Powers formulate a national cybersecurity plan
without any sufficient standards or
and Functions. parameters for it to follow.
RULING:
14
and implement a national cybersecurity
plan. Also, contrary to the position of the
petitioners, the law gave sufficient
standards for the CICC to follow when it
provided a definition of cybersecurity.
Cybersecurity refers to the collection of
tools, policies, risk management
approaches, actions, training, best
practices, assurance and technologies that
can be used to protect cyber environment
and organization and user’s assets.104 This
definition serves as the parameters within
which CICC should work in formulating the
cybersecurity plan.
15