Professional Documents
Culture Documents
Begun and Held in Metro Manila, On Monday, The Twenty-Fifth Day of July, Two Thousand Eleven
Begun and Held in Metro Manila, On Monday, The Twenty-Fifth Day of July, Two Thousand Eleven
Fifteenth Congress
Second Regular Session
Begun and held in Metro Manila, on Monday, the twenty-fifth day of July, two
thousand eleven.
CHAPTER I
PRELIMINARY PROVISIONS
Section 1. Title. — This Act shall be known as the "Cybercrime Prevention Act
of 2012″.
Section 3. Definition of Terms. — For purposes of this Act, the following terms
are hereby defined as follows:
(a) Access refers to the instruction, communication with, storing data in,
retrieving data from, or otherwise making use of any resources of a computer
system or communication network.
(h) Without right refers to either: (i) conduct undertaken without or in excess of
authority; or (ii) conduct not covered by established legal defenses, excuses, court
orders, justifications, or relevant principles under the law.
(2) Any other entity that processes or stores computer data on behalf of such
communication service or users of such service.
(1) The type of communication service used, the technical provisions taken
thereto and the period of service;
(2) The subscriber’s identity, postal or geographic address, telephone and other
access numbers, any assigned network address, billing and payment information,
available on the basis of the service agreement or arrangement; and
(p) Traffic data or non-content data refers to any computer data other than the
content of the communication including, but not limited to, the communication’s
origin, destination, route, time, date, size, duration, or type of underlying service.
CHAPTER II
PUNISHABLE ACTS
(a) Offenses against the confidentiality, integrity and availability of computer data
and systems:
(1) Illegal Access. – The access to the whole or any part of a computer system
without right.
(2) Illegal Interception. – The interception made by technical means without right
of any non-public transmission of computer data to, from, or within a computer
system including electromagnetic emissions from a computer system carrying
such computer data.
(bb) A computer password, access code, or similar data by which the whole or any
part of a computer system is capable of being accessed with intent that it be used
for the purpose of committing any of the offenses under this Act.
(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with
intent to use said devices for the purpose of committing any of the offenses under
this section.
(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad
faith to profit, mislead, destroy reputation, and deprive others from registering the
same, if such a domain name is:
(ii) Identical or in any way similar with the name of a person other than the
registrant, in case of a personal name; and
(i) The input, alteration, or deletion of any computer data without right resulting
in inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic, regardless whether or not the data is directly
readable and intelligible; or
(ii) The act of knowingly using computer data which is the product of computer-
related forgery as defined herein, for the purpose of perpetuating a fraudulent or
dishonest design.
damage has yet been caused, the penalty imposable shall be one (1) degree lower.
(2) Child Pornography. — The unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed
through a computer system: Provided, That the penalty to be imposed shall be (1)
one degree higher than that provided for in Republic Act No. 9775.1âwphi1
(ii) The primary intent of the communication is for service and/or administrative
announcements from the sender to its existing users, subscribers or customers; or
(bb) The commercial electronic communication does not purposely disguise the
source of the electronic message; and
(4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of
the Revised Penal Code, as amended, committed through a computer system or
any other similar means which may be devised in the future.
Section 5. Other Offenses. — The following acts shall also constitute an offense:
Section 6. All crimes defined and penalized by the Revised Penal Code, as
amended, and special laws, if committed by, through and with the use of
information and communications technologies shall be covered by the relevant
provisions of this Act: Provided, That the penalty to be imposed shall be one (1)
degree higher than that provided for by the Revised Penal Code, as amended, and
special laws, as the case may be.
Section 7. Liability under Other Laws. — A prosecution under this Act shall be
without prejudice to any liability for violation of any provision of the Revised
Penal Code, as amended, or special laws.
CHAPTER III
PENALTIES
Section 8. Penalties. — Any person found guilty of any of the punishable acts
enumerated in Sections 4(a) and 4(b) of this Act shall be punished with
imprisonment of prision mayor or a fine of at least Two hundred thousand pesos
(PhP200,000.00) up to a maximum amount commensurate to the damage incurred
or both.
Any person found guilty of the punishable act under Section 4(a)(5) shall be
punished with imprisonment of prision mayor or a fine of not more than Five
hundred thousand pesos (PhP500,000.00) or both.
If punishable acts in Section 4(a) are committed against critical infrastructure, the
penalty of reclusion temporal or a fine of at least Five hundred thousand pesos
(PhP500,000.00) up to maximum amount commensurate to the damage incurred
or both, shall be imposed.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)
(1) of this Act shall be punished with imprisonment of prision mayor or a fine of
at least Two hundred thousand pesos (PhP200,000.00) but not exceeding One
million pesos (PhPl,000,000.00) or both.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)
(2) of this Act shall be punished with the penalties as enumerated in Republic Act
No. 9775 or the "Anti-Child Pornography Act of 2009″: Provided,That the
penalty to be imposed shall be one (1) degree higher than that provided for in
Republic Act No. 9775, if committed through a computer system.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)
(3) shall be punished with imprisonment of arresto mayor or a fine of at least
Fifty thousand pesos (PhP50,000.00) but not exceeding Two hundred fifty
thousand pesos (PhP250,000.00) or both.
Any person found guilty of any of the punishable acts enumerated in Section 5
shall be punished with imprisonment one (1) degree lower than that of the
prescribed penalty for the offense or a fine of at least One hundred thousand pesos
(PhPl00,000.00) but not exceeding Five hundred thousand pesos (PhP500,000.00)
or both.
Section 9. Corporate Liability. — When any of the punishable acts herein defined
are knowingly committed on behalf of or for the benefit of a juridical person, by a
natural person acting either individually or as part of an organ of the juridical
person, who has a leading position within, based on: (a) a power of representation
of the juridical person provided the act committed falls within the scope of such
authority; (b) an authority to take decisions on behalf of the juridical
person: Provided, That the act committed falls within the scope of such authority;
or (c) an authority to exercise control within the juridical person, the juridical
person shall be held liable for a fine equivalent to at least double the fines
imposable in Section 7 up to a maximum of Ten million pesos
(PhP10,000,000.00).
If the commission of any of the punishable acts herein defined was made possible
due to the lack of supervision or control by a natural person referred to and
described in the preceding paragraph, for the benefit of that juridical person by a
natural person acting under its authority, the juridical person shall be held liable
for a fine equivalent to at least double the fines imposable in Section 7 up to a
maximum of Five million pesos (PhP5,000,000.00).
The liability imposed on the juridical person shall be without prejudice to the
criminal liability of the natural person who has committed the offense.
CHAPTER IV
ENFORCEMENT AND IMPLEMENTATION
Section 10. Law Enforcement Authorities. — The National Bureau of
Investigation (NBI) and the Philippine National Police (PNP) shall be responsible
for the efficient and effective law enforcement of the provisions of this Act. The
NBI and the PNP shall organize a cybercrime unit or center manned by special
investigators to exclusively handle cases involving violations of this Act.
Traffic data refer only to the communication’s origin, destination, route, time,
date, size, duration, or type of underlying service, but not content, nor identities.
All other data to be collected or seized or disclosed will require a court warrant.
Service providers are required to cooperate and assist law enforcement authorities
in the collection or recording of the above-stated information.
The court warrant required under this section shall only be issued or granted upon
written application and the examination under oath or affirmation of the applicant
and the witnesses he may produce and the showing: (1) that there are reasonable
grounds to believe that any of the crimes enumerated hereinabove has been
committed, or is being committed, or is about to be committed: (2) that there are
reasonable grounds to believe that evidence that will be obtained is essential to
the conviction of any person for, or to the solution of, or to the prevention of, any
such crimes; and (3) that there are no other means readily available for obtaining
such evidence.
Section 13. Preservation of Computer Data. — The integrity of traffic data and
subscriber information relating to communication services provided by a service
provider shall be preserved for a minimum period of six (6) months from the date
of the transaction. Content data shall be similarly preserved for six (6) months
from the date of receipt of the order from law enforcement authorities requiring
its preservation.
Law enforcement authorities may order a one-time extension for another six (6)
months: Provided, That once computer data preserved, transmitted or stored by a
service provider is used as evidence in a case, the mere furnishing to such service
provider of the transmittal document to the Office of the Prosecutor shall be
deemed a notification to preserve the computer data until the termination of the
case.
The service provider ordered to preserve computer data shall keep confidential
the order and its compliance.
Pursuant thereof, the law enforcement authorities may order any person who has
knowledge about the functioning of the computer system and the measures to
protect and preserve the computer data therein to provide, as is reasonable, the
necessary information, to enable the undertaking of the search, seizure and
examination.
Law enforcement authorities may request for an extension of time to complete the
examination of the computer data storage medium and to make a return thereon
but in no case for a period longer than thirty (30) days from date of approval by
the court.
Section 16. Custody of Computer Data. — All computer data, including content
and traffic data, examined under a proper warrant shall, within forty-eight (48)
hours after the expiration of the period fixed therein, be deposited with the court
in a sealed package, and shall be accompanied by an affidavit of the law
enforcement authority executing it stating the dates and times covered by the
examination, and the law enforcement authority who may access the deposit,
among other relevant data. The law enforcement authority shall also certify that
no duplicates or copies of the whole or any part thereof have been made, or if
made, that all such duplicates or copies are included in the package deposited
with the court. The package so deposited shall not be opened, or the recordings
replayed, or used in evidence, or then contents revealed, except upon order of the
court, which shall not be granted except upon motion, with due notice and
opportunity to be heard to the person or persons whose conversation or
communications have been recorded.
CHAPTER V
JURISDICTION
Section 21. Jurisdiction. — The Regional Trial Court shall have jurisdiction over
any violation of the provisions of this Act. including any violation committed by a
Filipino national regardless of the place of commission. Jurisdiction shall lie if
any of the elements was committed within the Philippines or committed with the
use of any computer system wholly or partly situated in the country, or when by
such commission any damage is caused to a natural or juridical person who, at the
time the offense was committed, was in the Philippines.
CHAPTER VI
INTERNATIONAL COOPERATION
CHAPTER VII
COMPETENT AUTHORITIES
Section 25. Composition. — The CICC shall be headed by the Executive Director
of the Information and Communications Technology Office under the Department
of Science and Technology (ICTO-DOST) as Chairperson with the Director of the
NBI as Vice Chairperson; the Chief of the PNP; Head of the DOJ Office of
Cybercrime; and one (1) representative from the private sector and academe, as
members. The CICC shall be manned by a secretariat of selected existing
personnel and representatives from the different participating agencies.1âwphi1
Section 26. Powers and Functions. — The CICC shall have the following powers
and functions:
(e) To coordinate the support and participation of the business sector, local
government units and nongovernment organizations in cybercrime prevention
programs and other related projects;
(h) To perform all other matters related to cybercrime prevention and suppression,
including capacity building and such other functions and duties as may be
necessary for the proper implementation of this Act.
CHAPTER VIII
FINAL PROVISIONS
Section 28. Implementing Rules and Regulations. — The ICTO-DOST, the DOJ
and the Department of the Interior and Local Government (DILG) shall jointly
formulate the necessary rules and regulations within ninety (90) days from
approval of this Act, for its effective implementation.
Section 29. Separability Clause — If any provision of this Act is held invalid, the
other provisions not affected shall remain in full force and effect.
Section 30. Repealing Clause. — All laws, decrees or rules inconsistent with this
Act are hereby repealed or modified accordingly. Section 33(a) of Republic Act
No. 8792 or the "Electronic Commerce Act" is hereby modified accordingly.
Section 31. Effectivity. — This Act shall take effect fifteen (15) days after the
completion of its publication in the Official Gazette or in at least two (2)
newspapers of general circulation.
Approved,
This Act which is a consolidation of Senate Bill No. 2796 and House Bill No.
5808 was finally passed by the Senate and the House of Representatives on June
5, 2012 and June 4, 2012, respectively.
Art. 353. Definition of libel. — A libel is public and malicious imputation of a crime, or of a vice or
defect, real or imaginary, or any act, omission, condition, status, or circumstance tending to cause
the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of
one who is dead.
Art. 355. Libel means by writings or similar means. — A libel committed by means of writing,
printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition,
cinematographic exhibition, or any similar means, shall be punished by prision correccional in its
minimum and medium periods or a fine ranging from 200 to 6,000 pesos, or both, in addition to
the civil action which may be brought by the offended party.
Republic of the Philippines
SUPREME COURT
Manila
FIRST DIVISION
DECISION
The criminal action and civil action for damages in cases of written defamations,
as provided for in this chapter shall be filed simultaneously or separately with the
Court of First Instance of the province or city where the libelous article
is printed and first published or where any of the offended parties actually
resides at the time of the commission of the offense: Provided, however, That
where one of the offended parties is a public officer whose office is in the City of
Manila at the time of the commission of the offense, the action shall be filed in
the Court of First Instance of the City of Manila or of the city or province where
the libelous article is printed and first published, and in case such public officer
does not hold office in the City of Manila, the action shall be filed in the Court of
First Instance of the province or city where he held office at the time of the
commission of the offense or where the libelous article is printed and first
published and in case one of the offended parties is a private individual, the action
shall be filed in the Court of First Instance of the province or city where he
actually resides at the time of the commission of the offense or where the libelous
matter is printed and first published x x x. (emphasis and underscoring supplied)
Venue is jurisdictional in criminal actions such that the place where the crime was
committed determines not only the venue of the action but constitutes an essential
element of jurisdiction.33 This principle acquires even greater import in libel
cases, given that Article 360, as amended, specifically provides for the possible
venues for the institution of the criminal and civil aspects of such cases.
For the guidance, therefore, of both the bench and the bar, this Court finds it
appropriate to reiterate our earlier pronouncement in the case of Agbayani, to wit:
In order to obviate controversies as to the venue of the criminal action for written
defamation, the complaint or information should contain allegations as to
whether, at the time the offense was committed, the offended party was a public
officer or a private individual and where he was actually residing at that
time. Whenever possible, the place where the written defamation was printed and
first published should likewise be alleged. That allegation would be a sine qua
non if the circumstance as to where the libel was printed and first published is
used as the basis of the venue of the action. (emphasis and underscoring supplied)
It becomes clear that the venue of libel cases where the complainant is a private
individual is limited to only either of two places, namely: 1) where the
complainant actually resides at the time of the commission of the offense; or 2)
where the alleged defamatory article was printed and first published. The
Amended Information in the present case opted to lay the venue by availing of the
second. Thus, it stated that the offending article "was first published
and accessed by the private complainant in Makati City." In other words, it
considered the phrase to be equivalent to the requisite allegation of printing and
first publication.
"Article 360 in its original form provided that the venue of the criminal and civil
actions for written defamations is the province wherein the libel was published,
displayed or exhibited, regardless of the place where the same was written,
printed or composed. Article 360 originally did not specify the public officers and
the courts that may conduct the preliminary investigation of complaints for libel.
Before article 360 was amended, the rule was that a criminal action for libel may
be instituted in any jurisdiction where the libelous article was published or
circulated, irrespective of where it was written or printed (People v. Borja, 43
Phil. 618). Under that rule, the criminal action is transitory and the injured party
has a choice of venue.
Experience had shown that under that old rule the offended party could harass the
accused in a libel case by laying the venue of the criminal action in a remote or
distant place.
Thus, in connection with an article published in the Daily Mirror and the
Philippine Free Press, Pio Pedrosa, Manuel V. Villareal and Joaquin Roces were
charged with libel in the justice of the peace court of San Fabian, Pangasinan
(Amansec v. De Guzman, 93 Phil. 933).
To forestall such harassment, Republic Act No. 4363 was enacted. It lays down
specific rules as to the venue of the criminal action so as to prevent the offended
party in written defamation cases from inconveniencing the accused by means of
out-of-town libel suits, meaning complaints filed in remote municipal
courts (Explanatory Note for the bill which became Republic Act No. 4363,
Congressional Record of May 20, 1965, pp. 424-5; Time, Inc. v. Reyes, L-28882,
May 31, 1971, 39 SCRA 303, 311).
Clearly, the evil sought to be prevented by the amendment to Article 360 was the
indiscriminate or arbitrary laying of the venue in libel cases in distant, isolated or
far-flung areas, meant to accomplish nothing more than harass or intimidate an
accused. The disparity or unevenness of the situation becomes even more acute
where the offended party is a person of sufficient means or possesses influence,
and is motivated by spite or the need for revenge.
If the circumstances as to where the libel was printed and first published are used
by the offended party as basis for the venue in the criminal action, the Information
must allege with particularity where the defamatory article was printed
and first published, as evidenced or supported by, for instance, the address of their
editorial or business offices in the case of newspapers, magazines or serial
publications. This pre-condition becomes necessary in order to forestall any
inclination to harass.
For the Court to hold that the Amended Information sufficiently vested
jurisdiction in the courts of Makati simply because the defamatory article
was accessed therein would open the floodgates to the libel suit being filed in all
other locations where the pepcoalition website is likewise accessed or capable of
being accessed.1avvphi1
Respecting the contention that the venue requirements imposed by Article 360, as
amended, are unduly oppressive, the Court’s pronouncements in Chavez37 are
instructive:
WHEREFORE, the petition is GRANTED. The assailed Order of April 22, 2008
and the Joint Resolution of August 12, 2008 are hereby SET ASIDE. The
Regional Trial Court of Makati City, Br. 149 is hereby DIRECTED TO QUASH
the Amended Information in Criminal Case No. 06-876 and DISMISS the case.
SO ORDERED.
***Following the principles laid down in the case of Bonifacio, the rules on
venue of criminal actions for Internet libel are as follows: (I) If the offended party
is a private individual, the criminal case can only be filed in either of two places,
namely: (a) where the complainant or offended party actually resides at the time
of the commission of the offense; or (b) where the alleged defamatory article was
printed and first published. (II) If the offended party is a public official, the
criminal case can only be filed in either of two places, namely: (a) in the place
(whether in or outside Manila) where he holds office at the time of the
commission of the crime; or (b) where the alleged defamatory article was printed
and first published.
EN BANC
Of course, if the "Comment" does not merely react to the original posting but
creates an altogether new defamatory story against Armand like "He beats his
wife and children," then that should be considered an original posting published
on the internet. Both the penal code and the cybercrime law clearly punish authors
of defamatory publications. Make no mistake, libel destroys reputations that
society values. Allowed to cascade in the internet, it will destroy relationships
and, under certain circumstances, will generate enmity and tension between social
or economic groups, races, or religions, exacerbating existing tension in their
relationships.
In regard to the crime that targets child pornography, when "Google procures,
stores, and indexes child pornography and facilitates the completion of
transactions involving the dissemination of child pornography," does this make
Google and its users aiders and abettors in the commission of child pornography
crimes?68 Byars highlights a feature in the American law on child pornography
that the Cybercrimes law lacks—the exemption of a provider or notably a plain
user of interactive computer service from civil liability for child pornography as
follows:
But the crime of aiding or abetting the commission of cybercrimes under Section
5 should be permitted to apply to Section 4(a)(1) on Illegal Access, Section 4(a)
(2) on Illegal Interception, Section 4(a)(3) on Data Interference, Section 4(a)(4)
on System Interference, Section 4(a)(5) on Misuse of Devices, Section 4(a)(6) on
Cyber-squatting, Section 4(b)(1) on Computer-related Forgery, Section 4(b)(2) on
Computer-related Fraud, Section 4(b)(3) on Computer-related Identity Theft, and
Section 4(c)(1) on Cybersex. None of these offenses borders on the exercise of
the freedom of expression.
The crime of willfully attempting to commit any of these offenses is for the same
reason not objectionable. A hacker may for instance have done all that is
necessary to illegally access another party’s computer system but the security
employed by the system’s lawful owner could frustrate his effort. Another hacker
may have gained access to usernames and passwords of others but fail to use
these because the system supervisor is alerted.72 If Section 5 that punishes any
person who willfully attempts to commit this specific offense is not upheld, the
owner of the username and password could not file a complaint against him for
attempted hacking. But this is not right. The hacker should not be freed from
liability simply because of the vigilance of a lawful owner or his supervisor.
Petitioners of course claim that Section 5 lacks positive limits and could cover the
innocent.73 While this may be true with respect to cybercrimes that tend to sneak
past the area of free expression, any attempt to commit the other acts specified in
Section 4(a)(1), Section 4(a)(2), Section 4(a)(3), Section 4(a)(4), Section 4(a)(5),
Section 4(a)(6), Section 4(b)(1), Section 4(b)(2), Section 4(b)(3), and Section 4(c)
(1) as well as the actors aiding and abetting the commission of such acts can be
identified with some reasonable certainty through adroit tracking of their works.
Absent concrete proof of the same, the innocent will of course be spared.
Section 6 provides:
Sec. 6. All crimes defined and penalized by the Revised Penal Code, as amended,
and special laws, if committed by, through and with the use of information and
communications technologies shall be covered by the relevant provisions of this
Act: Provided, That the penalty to be imposed shall be one (1) degree higher than
that provided for by the Revised Penal Code, as amended, and special laws, as the
case may be.
Section 7 provides:
Sec. 7. Liability under Other Laws. — A prosecution under this Act shall be
without prejudice to any liability for violation of any provision of the Revised
Penal Code, as amended, or special laws.
The Solicitor General points out that Section 7 merely expresses the settled
doctrine that a single set of acts may be prosecuted and penalized simultaneously
under two laws, a special law and the Revised Penal Code. When two different
laws define two crimes, prior jeopardy as to one does not bar prosecution of the
other although both offenses arise from the same fact, if each crime involves
some important act which is not an essential element of the other. 74 With the
exception of the crimes of online libel and online child pornography, the Court
would rather leave the determination of the correct application of Section 7 to
actual cases.
Online libel is different. There should be no question that if the published material
on print, said to be libelous, is again posted online or vice versa, that identical
material cannot be the subject of two separate libels. The two offenses, one a
violation of Article 353 of the Revised Penal Code and the other a violation of
Section 4(c)(4) of R.A. 10175 involve essentially the same elements and are in
fact one and the same offense. Indeed, the OSG itself claims that online libel
under Section 4(c)(4) is not a new crime but is one already punished under Article
353. Section 4(c)(4) merely establishes the computer system as another means of
publication.75 Charging the offender under both laws would be a blatant violation
of the proscription against double jeopardy.76
The same is true with child pornography committed online. Section 4(c)(2)
merely expands the ACPA’s scope so as to include identical activities in
cyberspace. As previously discussed, ACPA’s definition of child pornography in
fact already covers the use of "electronic, mechanical, digital, optical, magnetic or
any other means." Thus, charging the offender under both Section 4(c)(2) and
ACPA would likewise be tantamount to a violation of the constitutional
prohibition against double jeopardy.
Section 8 provides:
Sec. 8. Penalties. — Any person found guilty of any of the punishable acts
enumerated in Sections 4(a) and 4(b) of this Act shall be punished with
imprisonment of prision mayor or a fine of at least Two hundred thousand pesos
(Ph₱200,000.00) up to a maximum amount commensurate to the damage incurred
or both.
Any person found guilty of the punishable act under Section 4(a)(5) shall be
punished with imprisonment of prision mayor or a fine of not more than Five
hundred thousand pesos (Ph₱500,000.00) or both.
If punishable acts in Section 4(a) are committed against critical infrastructure, the
penalty of reclusion temporal or a fine of at least Five hundred thousand pesos
(Ph₱500,000.00) up to maximum amount commensurate to the damage incurred
or both, shall be imposed.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)
(1) of this Act shall be punished with imprisonment of prision mayor or a fine of
at least Two hundred thousand pesos (Ph₱200,000.00) but not exceeding One
million pesos (Ph₱1,000,000.00) or both.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)
(2) of this Act shall be punished with the penalties as enumerated in Republic Act
No. 9775 or the "Anti-Child Pornography Act of 2009:" Provided, That the
penalty to be imposed shall be one (1) degree higher than that provided for in
Republic Act No. 9775, if committed through a computer system.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)
(3) shall be punished with imprisonment of arresto mayor or a fine of at least
Fifty thousand pesos (Ph₱50,000.00) but not exceeding Two hundred fifty
thousand pesos (Ph₱250,000.00) or both.
Any person found guilty of any of the punishable acts enumerated in Section 5
shall be punished with imprisonment one (1) degree lower than that of the
prescribed penalty for the offense or a fine of at least One hundred thousand pesos
(Ph₱100,000.00) but not exceeding Five hundred thousand pesos
(Ph₱500,000.00) or both.
Section 8 provides for the penalties for the following crimes: Sections 4(a) on
Offenses Against the Confidentiality, Integrity and Availability of Computer Data
and Systems; 4(b) on Computer-related Offenses; 4(a)(5) on Misuse of Devices;
when the crime punishable under 4(a) is committed against critical infrastructure;
4(c)(1) on Cybersex; 4(c)(2) on Child Pornography; 4(c)(3) on Unsolicited
Commercial Communications; and Section 5 on Aiding or Abetting, and Attempt
in the Commission of Cybercrime.
The courts should not encroach on this prerogative of the lawmaking body.78
Section 12 provides:
Traffic data refer only to the communication’s origin, destination, route, time,
date, size, duration, or type of underlying service, but not content, nor identities.
All other data to be collected or seized or disclosed will require a court warrant.
Service providers are required to cooperate and assist law enforcement authorities
in the collection or recording of the above-stated information.
The court warrant required under this section shall only be issued or granted upon
written application and the examination under oath or affirmation of the applicant
and the witnesses he may produce and the showing: (1) that there are reasonable
grounds to believe that any of the crimes enumerated hereinabove has been
committed, or is being committed, or is about to be committed; (2) that there are
reasonable grounds to believe that evidence that will be obtained is essential to
the conviction of any person for, or to the solution of, or to the prevention of, any
such crimes; and (3) that there are no other means readily available for obtaining
such evidence.
Petitioners assail the grant to law enforcement agencies of the power to collect or
record traffic data in real time as tending to curtail civil liberties or provide
opportunities for official abuse. They claim that data showing where digital
messages come from, what kind they are, and where they are destined need not be
incriminating to their senders or recipients before they are to be protected.
Petitioners invoke the right of every individual to privacy and to be protected
from government snooping into the messages or information that they send to one
another.
The first question is whether or not Section 12 has a proper governmental purpose
since a law may require the disclosure of matters normally considered private but
then only upon showing that such requirement has a rational relation to the
purpose of the law,79 that there is a compelling State interest behind the law, and
that the provision itself is narrowly drawn. 80 In assessing regulations affecting
privacy rights, courts should balance the legitimate concerns of the State against
constitutional guarantees.81
Undoubtedly, the State has a compelling interest in enacting the cybercrime law
for there is a need to put order to the tremendous activities in cyberspace for
public good.82 To do this, it is within the realm of reason that the government
should be able to monitor traffic data to enhance its ability to combat all sorts of
cybercrimes.
But is not evidence of yesterday’s traffic data, like the scene of the crime after it
has been committed, adequate for fighting cybercrimes and, therefore, real-time
data is superfluous for that purpose? Evidently, it is not. Those who commit the
crimes of accessing a computer system without right, 84 transmitting
viruses,85 lasciviously exhibiting sexual organs or sexual activity for favor or
consideration;86 and producing child pornography87 could easily evade detection
and prosecution by simply moving the physical location of their computers or
laptops from day to day. In this digital age, the wicked can commit cybercrimes
from virtually anywhere: from internet cafés, from kindred places that provide
free internet services, and from unregistered mobile internet connectors.
Criminals using cellphones under pre-paid arrangements and with unregistered
SIM cards do not have listed addresses and can neither be located nor identified.
There are many ways the cyber criminals can quickly erase their tracks. Those
who peddle child pornography could use relays of computers to mislead law
enforcement authorities regarding their places of operations. Evidently, it is only
real-time traffic data collection or recording and a subsequent recourse to court-
issued search and seizure warrant that can succeed in ferreting them out.
Petitioners of course point out that the provisions of Section 12 are too broad and
do not provide ample safeguards against crossing legal boundaries and invading
the people’s right to privacy. The concern is understandable. Indeed, the Court
recognizes in Morfe v. Mutuc88 that certain constitutional guarantees work
together to create zones of privacy wherein governmental powers may not
intrude, and that there exists an independent constitutional right of privacy. Such
right to be left alone has been regarded as the beginning of all freedoms.89
But that right is not unqualified. In Whalen v. Roe, 90 the United States Supreme
Court classified privacy into two categories: decisional privacy and informational
privacy. Decisional privacy involves the right to independence in making certain
important decisions, while informational privacy refers to the interest in avoiding
disclosure of personal matters. It is the latter right—the right to informational
privacy—that those who oppose government collection or recording of traffic
data in real-time seek to protect.
Informational privacy has two aspects: the right not to have private information
disclosed, and the right to live freely without surveillance and intrusion. 91 In
determining whether or not a matter is entitled to the right to privacy, this Court
has laid down a two-fold test. The first is a subjective test, where one claiming the
right must have an actual or legitimate expectation of privacy over a certain
matter. The second is an objective test, where his or her expectation of privacy
must be one society is prepared to accept as objectively reasonable.92
Since the validity of the cybercrime law is being challenged, not in relation to its
application to a particular person or group, petitioners’ challenge to Section 12
applies to all information and communications technology (ICT) users, meaning
the large segment of the population who use all sorts of electronic devices to
communicate with one another. Consequently, the expectation of privacy is to be
measured from the general public’s point of view. Without reasonable expectation
of privacy, the right to it would have no basis in fact.
As the Solicitor General points out, an ordinary ICT user who courses his
communication through a service provider, must of necessity disclose to the latter,
a third person, the traffic data needed for connecting him to the recipient ICT user.
For example, an ICT user who writes a text message intended for another ICT
user must furnish his service provider with his cellphone number and the
cellphone number of his recipient, accompanying the message sent. It is this
information that creates the traffic data. Transmitting communications is akin to
putting a letter in an envelope properly addressed, sealing it closed, and sending it
through the postal service. Those who post letters have no expectations that no
one will read the information appearing outside the envelope.
Section 12 does not permit law enforcement authorities to look into the contents
of the messages and uncover the identities of the sender and the recipient.
For example, when one calls to speak to another through his cellphone, the
service provider’s communication’s system will put his voice message into
packets and send them to the other person’s cellphone where they are refitted
together and heard. The latter’s spoken reply is sent to the caller in the same way.
To be connected by the service provider, the sender reveals his cellphone number
to the service provider when he puts his call through. He also reveals the
cellphone number to the person he calls. The other ways of communicating
electronically follow the same basic pattern.
In Smith v. Maryland,94 cited by the Solicitor General, the United States Supreme
Court reasoned that telephone users in the ‘70s must realize that they necessarily
convey phone numbers to the telephone company in order to complete a call. That
Court ruled that even if there is an expectation that phone numbers one dials
should remain private, such expectation is not one that society is prepared to
recognize as reasonable.
In much the same way, ICT users must know that they cannot communicate or
exchange data with one another over cyberspace except through some service
providers to whom they must submit certain traffic data that are needed for a
successful cyberspace communication. The conveyance of this data takes them
out of the private sphere, making the expectation to privacy in regard to them an
expectation that society is not prepared to recognize as reasonable.
The Court, however, agrees with Justices Carpio and Brion that when seemingly
random bits of traffic data are gathered in bulk, pooled together, and analyzed,
they reveal patterns of activities which can then be used to create profiles of the
persons under surveillance. With enough traffic data, analysts may be able to
determine a person’s close associations, religious views, political affiliations,
even sexual preferences. Such information is likely beyond what the public may
expect to be disclosed, and clearly falls within matters protected by the right to
privacy. But has the procedure that Section 12 of the law provides been drawn
narrowly enough to protect individual rights?
Indeed, courts are able to save vague provisions of law through statutory
construction. But the cybercrime law, dealing with a novel situation, fails to hint
at the meaning it intends for the phrase "due cause." The Solicitor General
suggests that "due cause" should mean "just reason or motive" and "adherence to
a lawful procedure." But the Court cannot draw this meaning since Section 12
does not even bother to relate the collection of data to the probable commission of
a particular crime. It just says, "with due cause," thus justifying a general
gathering of data. It is akin to the use of a general search warrant that the
Constitution prohibits.
Due cause is also not descriptive of the purpose for which data collection will be
used. Will the law enforcement agencies use the traffic data to identify the
perpetrator of a cyber attack? Or will it be used to build up a case against an
identified suspect? Can the data be used to prevent cybercrimes from happening?
The authority that Section 12 gives law enforcement agencies is too sweeping and
lacks restraint. While it says that traffic data collection should not disclose
identities or content data, such restraint is but an illusion. Admittedly, nothing can
prevent law enforcement agencies holding these data in their hands from looking
into the identity of their sender or receiver and what the data contains. This will
unnecessarily expose the citizenry to leaked information or, worse, to extortion
from certain bad elements in these agencies.
Section 12, of course, limits the collection of traffic data to those "associated with
specified communications." But this supposed limitation is no limitation at all
since, evidently, it is the law enforcement agencies that would specify the target
communications. The power is virtually limitless, enabling law enforcement
authorities to engage in "fishing expedition," choosing whatever specified
communication they want. This evidently threatens the right of individuals to
privacy.
The Solicitor General points out that Section 12 needs to authorize collection of
traffic data "in real time" because it is not possible to get a court warrant that
would authorize the search of what is akin to a "moving vehicle." But warrantless
search is associated with a police officer’s determination of probable cause that a
crime has been committed, that there is no opportunity for getting a warrant, and
that unless the search is immediately carried out, the thing to be searched stands
to be removed. These preconditions are not provided in Section 12.
The Solicitor General is honest enough to admit that Section 12 provides minimal
protection to internet users and that the procedure envisioned by the law could be
better served by providing for more robust safeguards. His bare assurance that
law enforcement authorities will not abuse the provisions of Section 12 is of
course not enough. The grant of the power to track cyberspace communications in
real time and determine their sources and destinations must be narrowly drawn to
preclude abuses.95
Petitioners also ask that the Court strike down Section 12 for being violative of
the void-for-vagueness doctrine and the overbreadth doctrine. These doctrines
however, have been consistently held by this Court to apply only to free speech
cases. But Section 12 on its own neither regulates nor punishes any type of
speech. Therefore, such analysis is unnecessary.
This Court is mindful that advances in technology allow the government and
kindred institutions to monitor individuals and place them under surveillance in
ways that have previously been impractical or even impossible. "All the forces of
a technological age x x x operate to narrow the area of privacy and facilitate
intrusions into it. In modern terms, the capacity to maintain and support this
enclave of private life marks the difference between a democratic and a
totalitarian society."96 The Court must ensure that laws seeking to take advantage
of these technologies be written with specificity and definiteness as to ensure
respect for the rights that the Constitution guarantees.
Section 13 provides:
Sec. 13. Preservation of Computer Data. — The integrity of traffic data and
subscriber information relating to communication services provided by a service
provider shall be preserved for a minimum period of six (6) months from the date
of the transaction. Content data shall be similarly preserved for six (6) months
from the date of receipt of the order from law enforcement authorities requiring
its preservation.
Law enforcement authorities may order a one-time extension for another six (6)
months: Provided, That once computer data preserved, transmitted or stored by a
service provider is used as evidence in a case, the mere furnishing to such service
provider of the transmittal document to the Office of the Prosecutor shall be
deemed a notification to preserve the computer data until the termination of the
case.
The service provider ordered to preserve computer data shall keep confidential
the order and its compliance.
Petitioners in G.R. 20339197 claim that Section 13 constitutes an undue
deprivation of the right to property. They liken the data preservation order that
law enforcement authorities are to issue as a form of garnishment of personal
property in civil forfeiture proceedings. Such order prevents internet users from
accessing and disposing of traffic data that essentially belong to them.
No doubt, the contents of materials sent or received through the internet belong to
their authors or recipients and are to be considered private communications. But it
is not clear that a service provider has an obligation to indefinitely keep a copy of
the same as they pass its system for the benefit of users. By virtue of Section 13,
however, the law now requires service providers to keep traffic data and
subscriber information relating to communication services for at least six months
from the date of the transaction and those relating to content data for at least six
months from receipt of the order for their preservation.
Actually, the user ought to have kept a copy of that data when it crossed his
computer if he was so minded. The service provider has never assumed
responsibility for their loss or deletion while in its keep.
At any rate, as the Solicitor General correctly points out, the data that service
providers preserve on orders of law enforcement authorities are not made
inaccessible to users by reason of the issuance of such orders. The process of
preserving data will not unduly hamper the normal transmission or use of the
same.
Section 14 provides:
Section 15 provides:
Sec. 15. Search, Seizure and Examination of Computer Data. — Where a search
and seizure warrant is properly issued, the law enforcement authorities shall
likewise have the following powers and duties.
Within the time period specified in the warrant, to conduct interception, as
defined in this Act, and:
Pursuant thereof, the law enforcement authorities may order any person who has
knowledge about the functioning of the computer system and the measures to
protect and preserve the computer data therein to provide, as is reasonable, the
necessary information, to enable the undertaking of the search, seizure and
examination.
Law enforcement authorities may request for an extension of time to complete the
examination of the computer data storage medium and to make a return thereon
but in no case for a period longer than thirty (30) days from date of approval by
the court.
Section 17 provides:
Computer data99 may refer to entire programs or lines of code, including malware,
as well as files that contain texts, images, audio, or video recordings. Without
having to go into a lengthy discussion of property rights in the digital space, it is
indisputable that computer data, produced or created by their writers or authors
may constitute personal property. Consequently, they are protected from
unreasonable searches and seizures, whether while stored in their personal
computers or in the service provider’s systems.
Section 2, Article III of the 1987 Constitution provides that the right to be secure
in one’s papers and effects against unreasonable searches and seizures of
whatever nature and for any purpose shall be inviolable. Further, it states that no
search warrant shall issue except upon probable cause to be determined
personally by the judge. Here, the Government, in effect, seizes and places the
computer data under its control and disposition without a warrant. The
Department of Justice order cannot substitute for judicial search warrant.
The content of the computer data can also constitute speech. In such a case,
Section 19 operates as a restriction on the freedom of expression over cyberspace.
Certainly not all forms of speech are protected. Legislature may, within
constitutional bounds, declare certain kinds of expression as illegal. But for an
executive officer to seize content alleged to be unprotected without any judicial
warrant, it is not enough for him to be of the opinion that such content violates
some law, for to do so would make him judge, jury, and executioner all rolled into
one.100
Not only does Section 19 preclude any judicial intervention, but it also disregards
jurisprudential guidelines established to determine the validity of restrictions on
speech. Restraints on free speech are generally evaluated on one of or a
combination of three tests: the dangerous tendency doctrine, the balancing of
interest test, and the clear and present danger rule. 101 Section 19, however, merely
requires that the data to be blocked be found prima facie in violation of any
provision of the cybercrime law. Taking Section 6 into consideration, this can
actually be made to apply in relation to any penal provision. It does not take into
consideration any of the three tests mentioned above.
The Court is therefore compelled to strike down Section 19 for being violative of
the constitutional guarantees to freedom of expression and against unreasonable
searches and seizures.
Section 20 of the Cybercrime Law
Section 20 provides:
x x x.
Sec. 26. Powers and Functions.– The CICC shall have the following powers and
functions:
Here, the cybercrime law is complete in itself when it directed the CICC to
formulate and implement a national cybersecurity plan. Also, contrary to the
position of the petitioners, the law gave sufficient standards for the CICC to
follow when it provided a definition of cybersecurity.
Further, the formulation of the cybersecurity plan is consistent with the policy of
the law to "prevent and combat such [cyber] offenses by facilitating their
detection, investigation, and prosecution at both the domestic and international
levels, and by providing arrangements for fast and reliable international
cooperation."105 This policy is clearly adopted in the interest of law and order,
which has been considered as sufficient standard. 106 Hence, Sections 24 and 26(a)
are likewise valid.
p. Articles 353, 354, 361, and 362 of the Revised Penal Code that
penalizes libel.
1. Online libel as to which, charging the offender under both Section 4(c)(4) of
Republic Act 10175 and Article 353 of the Revised Penal Code constitutes a
violation of the proscription against double jeopardy; as well as
SO ORDERED.
PREJUDICIAL QUESTION:
ELEMENTS:
To be liable for violation of B.P. 22, the following essential elements must be present:
(1) the making, drawing, and issuance of any check to apply for account or for value;
(2) the knowledge of the maker, drawer, or issuer that at the time of issue he does not have
sufficient funds in or credit with the drawee bank for the payment of the check in full upon its
presentment; and
(3) the subsequent dishonor of the check by the drawee bank for insufficiency of funds or credit
or dishonor for the same reason had not the drawer, without any valid cause, ordered the bank
to stop payment.
THIRD DIVISION
RESOLUTION
REYES, J.:
This resolves the petition for review on certiorari filed by petitioner Ma. Rosario
P. Campos (Campos) to assail the Decision 1 dated July 21, 2008 and
Resolution2 dated February 16, 2009 of the Court of Appeals (CA) in CA-G.R.
CR No. 31468, which affirmed the conviction of Campos for fourteen (14) counts
of violation of Batas Pambansa Bilang 22 (B.P. 22), otherwise known as The
Bouncing Checks Law.
₱46,666.62
After Campos failed to satisfy her outstanding obligation with FWCC despite
demand, she was charged before the Metropolitan Trial Court (MeTC) of Pasay
City, Branch 48, with violations of B.P. 22. Campos was tried in absentia, as she
failed to attend court proceedings after being arraigned.5
On December 7, 1999, the MeTC rendered its decision with dispositive portion
that reads: WHEREFORE, all the foregoing considered, the accused is hereby
CONVICTED of fourteen (14) counts of violations of BATAS PAMBANSA
BLG. 22. She is hereby sentenced to suffer the penalty of six (6) months
imprisonment for each violation and to indemnify the complainant the sum of
₱46,666.62 representing the total value of the checks, plus legal interest from date
of default until full payment.
With costs.
SO ORDERED.6
Feeling aggrieved, Campos appealed to the Regional Trial Court (RTC). On July
30, 2007, the RTC of Pasay City, Branch108 rendered its decision upholding
Campos’ conviction. A motion for reconsideration filed by Campos was denied
for lack of merit.7
Unyielding, Campos appealed the RTC decision to the CA, which rendered on
July 21, 2008 its decision8 affirming the ruling of the RTC. Campos moved to
reconsider, but her motion was denied via a Resolution9 dated February 16, 2009.
Hence,this petition for review on certiorari which cites the following issues:
Campos argues that the crime’s element requiring her knowledge at the time of
the check’s issuance that she did not have sufficient funds with the drawee bank
for the payment of the check in full upon presentment was not established by the
prosecution. She denies having received a notice of dishonor from FWCC.
Insisting on an acquittal, Campos discredits the MeTC’s reliance on a supposed
notice of dishonor that was sent to her by FWCC through registered mail. She
also invokes good faith as she allegedly made arrangements with FWCC for the
payment of her obligation after the subject checks were dishonored.
To be liable for violation of B.P. 22, the following essential elements must be
present: (1) the making, drawing, and issuance of any check to apply for account
or for value; (2) the knowledge of the maker, drawer, or issuer that at the time of
issue he does not have sufficient funds in or credit with the drawee bank for the
payment of the check in full upon its presentment; and (3) the subsequent
dishonor of the check by the drawee bank for insufficiency of funds or creditor
dishonor for the same reason had not the drawer, without any valid cause, ordered
the bank to stop payment.11
The presence of the first and third elements is undisputed. An issue being
advanced by Campos through the present petition concerns her alleged failure to
receive a written demand letter from FWCC, the entity in whose favor the
dishonored checks were issued. In a line of cases, the Court has emphasized the
importance of proof of receipt of such notice of dishonor, 12 although not as an
element of the offense,but as a means to establish that the issuer of a check was
aware of insufficiency of funds when he issued the check and the bank dishonored
it, in relation to the second element of the offense and Section 2 of B.P. 22.
Considering that the second element involves a state of mind which is difficult to
establish, Section 2 of B.P. 22 creates a presumption of knowledge of
insufficiency of funds,13 as it reads:
Sec. 2. Evidence of knowledge of insufficient funds. – The making, drawing, and
issuance of a check payment of which is refused by the drawee because of
insufficient funds in or credit with such bank, when presented within ninety days
fromthe date of the check, shall be prima facie evidence of knowledge of such
insufficiency of fundsor credit unless such maker or drawer pays the holder
thereof the amount due thereon, or makes arrangements for payment in full by the
drawee of such check within five (5) banking days after receiving notice that such
check has not been paid by the drawee.
In the instant case, both the RTC and the CA affirmed the MeTC’s finding that the
required notice of dishonor from FWCC was received by Campos. Campos,
nonetheless, still maintains that her personal receipt of the notice was not
sufficiently established, considering that only a written copy of the letter and the
registry return receipt covering it were presented by the prosecution. The Court
has in truth repeatedly held that the mere presentation of registry return receipts
that cover registered mail was not sufficient to establish that written notices of
dishonor had been sent to or served on issuers of checks.1âwphi1 The
authentication by affidavit of the mailers was necessary in order for service by
registered mail to be regarded as clear proof of the giving of notices of dishonor
and to predicate the existence of the second element of the offense.14
In still finding no merit in the present petition, the Court, however, considers
Campos' defense that she exerted efforts to reach an amicable settlement with her
creditor after the checks which she issued were dishonored by the drawee bank,
BPI Family Bank. Campos categorically declared in her petition that, "[she] has in
her favor evidence to show that she was in good faith and indeed made
arrangements for the payment of her obligations subsequently after the dishonor
of the checks."15 Clearly, this statement was a confirmation that she actually
received the required notice of dishonor from FWCC. The evidence referred to in
her statement were receipts16 dated January 13, 1996, February 29, 1996, April 22,
1998 and May 26, 1998 issued by FWCC to Campos for payments in various
amounts ranging from ₱2,500.00 to ₱15,700.00. Campos would not have entered
into the alleged arrangements beginning January 1996 until May 1998 if she had.
not received a notice of dishonor from her creditor, and had no knowledge of the
insufficiency of her funds with the bank and the dishonor of her checks.
Campos could have avoided prosecution by paying the amounts due on the checks
or making arrangements for payment in full within five ( 5) days after receiving
notice. Unfortunately for Campos, these circumstances were not established in the
instant case. She failed to sufficiently disclose the terms of her alleged
arrangement with FWCC, and to establish that the same had been fully complied
with so as to completely satisfy the amounts covered by the subject checks.
Moreover, documents to prove such fact should have been presented before the
MeTC during the trial, yet Campos opted to be tried in absentia, and thus waived
her right to present evidence. While Campos blamed her former counsel for
alleged negligence that led to her failure to be present during the trial, 17 it is
settled that the negligence of counsel binds his or her client. Given the
circumstances, the Court finds no cogent reason to reverse the ruling of the CA
which affirmed the conviction of Campos.
WHEREFORE, the petition is DENIED. The Decision dated July 21, 2008 and
Resolution dated February 16, 2009 of the Court of Appeals in CA-G.R. CR No.
31468 are AFFIRMED.
SO ORDERED.
Republic of the Philippines
SUPREME COURT
Manila
FIRST DIVISION
DECISION
BERSAMIN, J.:
Antecedents
The petitioner was charged with a violation of Batas Pambansa Blg. 22 in the
Municipal Trial Court in Cities (MTCC) in Mandaue City through the information
that alleged as follows:
CONTRARY TO LAW.1
After trial, the MTCC found the petitioner guilty as charged, disposing as follows:
SO ORDERED.2
By petition for review, the petitioner appealed to the CA, stating that: (a) the RTC
erred in affirming the conviction and in not finding instead that the Prosecution
did not establish her guilt beyond reasonable doubt; and (b) the conviction was
contrary to existing laws and jurisprudence, particularly Yu Oh v. Court of
Appeals.4
On December 4, 2006, the CA found the petition to be without merit, and denied
the petition for review.5
Issues
The petitioner assails the affirmance of her conviction by the CA based on the
following grounds, to wit:
The appeal hinges on whether or not all the elements of a violation of Batas
Pambansa Blg. 22 were established beyond reasonable doubt.
Ruling
For a violation of Batas Pambansa Blg. 22, the Prosecution must prove the
following essential elements, namely:
(1) The making, drawing, and issuance of any check to apply for account or for
value;
(2) The knowledge of the maker, drawer, or issuer that at the time of issue there
were no sufficient funds in or credit with the drawee bank for the payment of such
check in full upon its presentment; and
(3) The dishonor of the check by the drawee bank for insufficiency of funds or
credit or the dishonor for the same reason had not the drawer, without any valid
cause, ordered the drawee bank to stop payment.7
The existence of the first element of the violation is not disputed. According to
the petitioner, she was "required to issue a check as a collateral for the
obligation," and that "she was left with no alternative but to borrow the check of
her friend xxx and used the said check as a collateral of her loan." 8 During her
cross-examination, she stated that she did not own the check that she drew and
issued to complainant Bernardo Villadolid.9
Yet, to avoid criminal liability, the petitioner contends that Batas Pambansa Blg.
22 was applicable only if the dishonored check was actually owned by her; and
that she could not be held liable because the check was issued as a mere collateral
of the loan and not intended to be deposited.
What Batas Pambansa Blg. 22 punished was the mere act of issuing a worthless
check. The law did not look either at the actual ownership of the check or of the
account against which it was made, drawn, or issued, or at the intention of the
drawee, maker or issuer. Also, that the check was not intended to be deposited
was really of no consequence to her incurring criminal liability under Batas
Pambansa Blg. 22. In Ruiz v. People,10 the Court debunked her contentions and
cogently observed:
In Lozano v. Martinez, this Court ruled that the gravamen of the offense is the act
of making and issuing a worthless check or any check that is dishonored upon its
presentment for payment and putting them in circulation. The law includes all
checks drawn against banks. The law was designed to prohibit and altogether
eliminate the deleterious and pernicious practice of issuing checks with
insufficient or no credit or funds therefor. Such practice is deemed a public
nuisance, a crime against public order to be abated. The mere act of issuing a
worthless check, either as a deposit, as a guarantee, or even as an evidence of a
pre-existing debt or as a mode of payment is covered by B.P. 22. It is a crime
classified as malum prohibitum. The law is broad enough to include, within its
coverage, the making and issuing of a check by one who has no account with a
bank, or where such account was already closed when the check was presented
for payment. As the Court in Lozano explained:
The effects of the issuance of a worthless check transcends the private interests of
the parties directly involved in the transaction and touches the interests of the
community at large. The mischief it creates is not only a wrong to the payee or
holder, but also an injury to the public. The harmful practice of putting valueless
commercial papers in circulation, multiplied a thousandfold, can very well pollute
the channels of trade and commerce, injure the banking system and eventually
hurt the welfare of society and the public interest. As aptly stated –
The "check flasher" does a great deal more than contract a debt; he shakes the
pillars of business; and to my mind, it is a mistaken charity of judgment to place
him in the same category with the honest man who is unable to pay his debts, and
for whom the constitutional inhibition against "imprisonment for debt, except in
cases of fraud" was intended as a shield and not a sword.
Considering that the law imposes a penal sanction on one who draws and issues a
worthless check against insufficient funds or a closed account in the drawee bank,
there is, likewise, every reason to penalize a person who indulges in the making
and issuing of a check on an account belonging to another with the latter’s
consent, which account has been closed or has no funds or credit with the drawee
bank.11 (Bold emphases supplied)
The State likewise proved the existence of the third element. On direct
examination, Villadolid declared that the check had been dishonored upon its
presentment to the drawee bank through the Bank of the Philippine Islands (BPI)
as the collecting bank. The return check memorandum issued by BPI indicated
that the account had already been closed. 12 The petitioner did not deny or
contradict the fact of dishonor.
The remaining issue is whether or not the second element, that is, the knowledge
of the petitioner as the issuer of the check that at the time of issue there were no
sufficient funds in or credit with the drawee bank for the payment of such check
in full upon its presentment, was existent.
To establish the existence of the second element, the State should present the
giving of a written notice of the dishonor to the drawer, maker or issuer of the
dishonored check. The rationale for this requirement is rendered in Dico v. Court
of Appeals,13 to wit:
To hold a person liable under B.P. Blg. 22, the prosecution must not only establish
that a check was issued and that the same was subsequently dishonored, it must
further be shown that accused knew at the time of the issuance of the check that
he did not have sufficient funds or credit with the drawee bank for the payment of
such check in full upon its presentment.
For this presumption to arise, the prosecution must prove the following: (a) the
check is presented within ninety (90) days from the date of the check; (b) the
drawer or maker of the check receives notice that such check has not been paid by
the drawee; and (c) the drawer or maker of the check fails to pay the holder of the
check the amount due thereon, or make arrangements for payment in full within
five (5) banking days after receiving notice that such check has not been paid by
the drawee. In other words, the presumption is brought into existence only after it
is proved that the issuer had received a notice of dishonor and that within five
days from receipt thereof, he failed to pay the amount of the check or to make
arrangements for its payment. The presumption or prima facie evidence as
provided in this section cannot arise, if such notice of nonpayment by the drawee
bank is not sent to the maker or drawer, or if there is no proof as to when such
notice was received by the drawer, since there would simply be no way of
reckoning the crucial 5-day period.
The giving of the written notice of dishonor does not only supply the proof for the
second element arising from the presumption of knowledge the law puts up but
also affords the offender due process. The law thereby allows the offender to
avoid prosecution if she pays the holder of the check the amount due thereon, or
makes arrangements for the payment in full of the check by the drawee within
five banking days from receipt of the written notice that the check had not been
paid.15 The Court cannot permit a deprivation of the offender of this statutory
right by not giving the proper notice of dishonor. The nature of this opportunity
for the accused to avoid criminal prosecution has been expounded in Lao v. Court
of Appeals:16
It has been observed that the State, under this statute, actually offers the violator
‘a compromise by allowing him to perform some act which operates to preempt
the criminal action, and if he opts to perform it the action is abated’ xxx In this
light, the full payment of the amount appearing in the check within five banking
days from notice of dishonor is a ‘complete defense.’ The absence of a notice of
dishonor necessarily deprives an accused an opportunity to preclude a criminal
prosecution. Accordingly, procedural due process clearly enjoins that a notice of
dishonor be actually served on petitioner. Petitioner has a right to demand – and
the basic postulate of fairness require – that the notice of dishonor be actually sent
to and received by her to afford her the opportunity to avert prosecution under
B.P. 22."17 (Bold emphases supplied)
To prove that he had sent the written notice of dishonor to the petitioner by
registered mail, Villadolid presented the registry return receipt for the first notice
of dishonor dated June 17, 2002 and the registry return receipt for the second
notice of dishonor dated July 16, 2002. However, the petitioner denied receiving
the written notices of dishonor.
The mere presentment of the two registry return receipts was not sufficient to
establish the fact that written notices of dishonor had been sent to or served on the
petitioner as the issuer of the check. Considering that the sending of the written
notices of dishonor had been done by registered mail, the registry return receipts
by themselves were not proof of the service on the petitioner without being
accompanied by the authenticating affidavit of the person or persons who had
actually mailed the written notices of dishonor, or without the testimony in court
of the mailer or mailers on the fact of mailing. The authentication by affidavit of
the mailer or mailers was necessary in order for the giving of the notices of
dishonor by registered mail to be regarded as clear proof of the giving of the
notices of dishonor to predicate the existence of the second element of the
offense. No less would fulfill the quantum of proof beyond reasonable doubt, for,
as the Court said in Ting v. Court of Appeals:18
Aside from the above testimony, no other reference was made to the demand
letter by the prosecution. As can be noticed from the above exchange, the
prosecution alleged that the demand letter had been sent by mail. To prove
mailing, it presented a copy of the demand letter as well as the registry return
receipt. However, no attempt was made to show that the demand letter was indeed
sent through registered mail nor was the signature on the registry return receipt
authenticated or identified. It cannot even be gleaned from the testimony of
private complainant as to who sent the demand letter and when the same was sent.
In fact, the prosecution seems to have presumed that the registry return receipt
was proof enough that the demand letter was sent through registered mail and that
the same was actually received by petitioners or their agents.
Moreover, petitioners, during the pre-trial, denied having received the demand
letter (p. 135, Rollo). Given petitioners’ denial of receipt of the demand letter, it
behooved the prosecution to present proof that the demand letter was indeed sent
through registered mail and that the same was received by petitioners. This, the
prosecution miserably failed to do. Instead, it merely presented the demand letter
and registry return receipt as if mere presentation of the same was equivalent to
proof that some sort of mail matter was received by petitioners. Receipts for
registered letters and return receipts do not prove themselves; they must be
properly authenticated in order to serve as proof of receipt of the letters (Central
Trust Co. v. City of Des Moines, 218 NW 580).
Likewise, for notice by mail, it must appear that the same was served on the
addressee or a duly authorized agent of the addressee. In fact, the registry return
receipt itself provides that "[a] registered article must not be delivered to anyone
but the addressee, or upon the addressee’s written order, in which case the
authorized agent must write the addressee’s name on the proper space and then
affix legibly his own signature below it." In the case at bar, no effort was made to
show that the demand letter was received by petitioners or their agent. All that we
have on record is an illegible signature on the registry receipt as evidence that
someone received the letter. As to whether this signature is that of one of the
petitioners or of their authorized agent remains a mystery. From the registry
receipt alone, it is possible that petitioners or their authorized agent did receive
the demand letter. Possibilities, however, cannot replace proof beyond reasonable
doubt. There being insufficient proof that petitioners received notice that their
checks had been dishonored, the presumption that they knew of the insufficiency
of the funds therefor cannot arise.
As we stated in Savage v. Taypin (G.R. No. 134217, May 11, 2000, 311 SCRA
397), "penal statutes must be strictly construed against the State and liberally in
favor of the accused." Likewise, the prosecution may not rely on the weakness of
the evidence for the defense to make up for its own blunders in prosecuting an
offense. Having failed to prove all the elements of the offense, petitioners may not
thus be convicted for violation of Batas Pambansa Blg. 22. (Bold emphases
supplied)1âwphi1
Also, that the wife of Villadolid verbally informed the petitioner that the check
had bounced did not satisfy the requirement of showing that written notices of
dishonor had been made to and received by the petitioner. The verbal notices of
dishonor were not effective because it is already settled that a notice of dishonor
must be in writing.19 The Court definitively ruled on the specific form of the
notice of dishonor in Domagsang v. Court of Appeals:20
Petitioner counters that the lack of a written notice of dishonor is fatal. The Court
agrees.
While, indeed, Section 2 of B.P. Blg. 22 does not state that the notice of dishonor
be in writing, taken in conjunction, however, with Section 3 of the law, i.e., "that
where there are no sufficient funds in or credit with such drawee bank, such fact
shall always be explicitly stated in the notice of dishonor or refusal," a mere oral
notice or demand to pay would appear to be insufficient for conviction under the
law. The Court is convinced that both the spirit and letter of the Bouncing Checks
Law would require for the act to be punished thereunder not only that the accused
issued a check that is dishonored, but that likewise the accused has actually been
notified in writing of the fact of dishonor. The consistent rule is that penal statutes
have to be construed strictly against the State and liberally in favor of the
accused. (Bold emphases supplied; italics in the original text)
In light of the foregoing, the proof of the guilt of the petitioner for a violation of
Batas Pambansa Blg. 22 for issuing to Villadolid the unfunded Chinabank Check
No. LPU-A0141332 in the amount of ₱ 50,000.00 did not satisfy the quantum of
proof beyond reasonable doubt. According to Section 2 of Rule 133, Rules of
Court, the accused is entitled to an acquittal, unless his guilt is shown beyond
reasonable doubt, which does not mean such a degree of proof as, excluding
possibility of error, produces absolute certainty; only a moral certainty is required,
or that degree of proof that produces conviction in an unprejudiced mind. This is
the required quantum, firstly, because the accused is presumed to be innocent
until the contrary is proved, and, secondly, because of the inequality of the
position in which the accused finds herself, with the State being arrayed against
her with its unlimited command of means, with counsel usually of authority and
capacity, who are regarded as public officers, "and with an attitude of tranquil
majesty often in striking contrast to that of (the accused) engaged in a perturbed
and distracting struggle for liberty if not for life."21
WHEREFORE, the Court REVERSES and SETS ASIDE the decision of the
Court of Appeals promulgated on December 4, 2006, and ACQUITS petitioner
AMADA RESTERIO of the violation of Batas Pambansa Blg. 22 as charged for
failure to establish her guilt beyond reasonable doubt.
The Court ORDERS the petitioner to pay to BERNARDO VILLADOLID the
amount of ₱ 50,000.00, representing the face value of Chinabank Check No.
LPU-A0141332, with legal interest of 6% per annum from the filing of the
information until the finality of this decision, and thereafter 12% per annum until
the principal amount of₱ 50,000.00 is paid.
SO ORDERED.
THIRD DIVISION
August 3, 2016
DECISION
REYES, J.:
This resolves the petition for review on certiorari1 filed by Jesusa T. Dela Cruz
(petitioner) under Rule 45 of the 1997 Rules of Civil Procedure assailing the
Decision2 dated November 13, 2003 and Resolution3 dated May 4, 2004 of the
Court of Appeals (CA) in CA-G.R. CR No. 26337. The CA affirmed the
Decision4 rendered by the Regional Trial Court (RTC) of Manila, Branch 2, on
August 31, 2001, in Criminal Case No. 89-72064-86, convicting the petitioner for
twenty-three (23) counts of violation of Batas Pambansa Bilang 22 (B.P. Blg. 22),
otherwise known as the Bouncing Checks Law.
The Antecedents
The case stems from a complaint for violation of B.P. Blg. 22 filed by Tan Tiac
Chiong, also known as Ernesto Tan (Tan), against the petitioner.5 Tan entered into
several business transactions with the petitioner sometime in 1984 to 1985,
whereby Tan supplied and delivered to the petitioner rolls of textile materials
worth ₱27,090,641.25. For every delivery made by Tan, the petitioner issued
post-dated checks made payable to "Cash". When presented for payment,
however, some of the checks issued by the petitioner to Tan were dishonored by
the drawee-bank for being "Drawn Against Insufficient Funds" or "Account
Closed". The replacement checks later issued by the petitioner were still
dishonored upon presentment for payment. 6
The fourth batch of twenty-three (23) replacement checks issued by the petitioner
to Tan became the subject of his complaint.1âwphi1 All checks were dated March
30, 1987 and drawn against Family Bank & Trust Co. (FBTC), but were issued
for different amounts totaling ₱6,226,390.29,7 to wit:
The 23 checks were still later dishonored by the drawee-bank FBTC for the
reason "Account Closed". Tan informed the petitioner of the checks' dishonor
through a demand letter,8 but the amounts thereof remained unsatisfied. 9
In March 1989, 23 informations for violation of B.P. Blg. 22 were filed in court
against the petitioner. Upon arraignment, the petitioner pleaded "not guilty" to the
charges. The cases were consolidated and thereafter, trial on the merits ensued. 10
The prosecution was able to present its evidence during the trial; it rested its case
on June 5, 1995.1âwphi1 The defense, however, failed to present its evidence
after it had sought several hearing postponements and resettings. In view of the
petitioner's failure to appear or present evidence on scheduled dates, the RTC
issued on July 27, 2000 an Order11 that deemed the petitioner to have waived her
right to present evidence. A copy of the order was received by the petitioner's
counsel of record. 12
The RTC then decided the case based on available records. On August 31, 2001,
the RTC rendered its Decision13finding the petitioner guilty of the charges. The
dispositive portion of the decision reads:
WHEREFORE, viewed from all the foregoing, the Court finds [the
petitioner] guilty beyond reasonable doubt of violation[s] of [B.P.]
Blg. 22 on twenty-three (23) counts, and hereby sentences her to
suffer imprisonment of one (1) year in every case, and to
indemnify [Tan] the amount equal to the collective face value of all
the subject checks, and to pay the costs.
SO ORDERED. 14
Dissatisfied, the petitioner appealed to the CA, arguing, among other grounds,
that she was not accorded an ample opportunity to dispute the charges against her.
Contrary to the RTC's declaration, the petitioner denied any intention to waive her
right to present evidence. 15 In fact, she intended to present a certified public
accountant to prove that she had overpayments with Tan, which then extinguished
the obligations attached to the checks subject of the criminal cases.16
Ruling of the CA
The appeal was dismissed by the CA via the Decision 17 dated November 13,
2003, with dispositive portion that reads:
SO ORDERED. 18
I.
II.
IV.
The petitioner prays for an acquittal or, in the alternative, a remand of the case to
the R TC so that she may be allowed to present evidence for her defense. She also
asks the Court to take into consideration the fact that she was acquitted by the CA
in another set of B.P. Blg. 22 cases on the ground that she has overpaid
Tan. 20 Granting that the Court still declares her guilty of the offense, she asks for
an imposition of fine in lieu of the penalty of imprisonment. 21
In its Comment, 22 respondent People of the Philippines, through the Office of the
Solicitor General (OSG), signifies that it was interposing no objection to the
petitioner's alternative prayer of a case remand.23 The OSG agrees that the
petitioner was not duly notified of the hearing scheduled on July 27, 2000, to wit:
Petitioner was not duly notified of the July 27, 2000 hearing
because, one, the notice of said hearing was sent to her former
address, and, two, the notice was sent on August 3, 2000, that is,
one week after the scheduled date of hearing. Thus, petitioner's
failure to appear at the July 27, 2000 hearing is justified by the
absence of a valid service of notice of hearing to her.
The petition was filed under Rule 45 of the Rules of Court. The general rule is
that petitions for review on certiorarifiled under this rule shall raise only
questions of law that must be distinctly set forth. Questions of fact, which exist
when the doubt centers on the truth or falsity of the alleged facts, are not
reviewable. 28
Pertinent to this limitation are the petitioner's arguments that delve on first, the
claim that she was not properly notified of the proceedings before the RTC
and, second, her alleged non-receipt of a notice of dishonor from Tan. Being
questions of fact, the Court, as a rule, finds those unsuitable to review the issues,
and instead adheres to the findings already made by the R TC and affirmed by the
CA. This is consistent with jurisprudence providing that a trial court's factual
findings that are affirmed by the appellate court are generally conclusive and
binding upon this Court, for it is not our function to analyze and weigh the parties'
evidence all over again except when there is a serious ground to believe a possible
miscarriage of justice would thereby result.29
Taking into consideration the petitioner's allegations that hinge on the RTC's and
CA' s alleged errors in their factual findings that could fall under exceptions (2),
(3), (6) and (7), and which if considered could materially alter the manner by
which the petitioner's guilt was determined, the Court finds it vital to look into
these matters.
The Court rejects the petitioner's claim that she was not duly notified of scheduled
hearing dates by the RTC. It is material that the petitioner was represented by
counsel during the proceedings with the trial court. Fundamental is the rule that
notice to counsel is notice to the client. When a party is represented by a counsel
in an action in court, notices of all kinds, including motions and pleadings of all
parties and all orders of the court must be served on his counsel. 31
Particularly challenged in the instant case was the RTC's service of the notice for
the July 27, 2000 hearing, when the petitioner's and her counsel's absence
prompted the trial court to deem a waiver of the presentation of evidence for the
defense. While the petitioner, and the OSG in its Comment, referred to a belated
sending of notice of hearing to the petitioner's supposedly old address, it appears
that her counsel, Atty. Lorenzo B. Leynes, Jr. (Atty. Leynes), was sufficiently
notified prior to July 27, 2000. 32
Cited in the RTC decision was a timely receipt by Atty. Leynes of the notice, a
matter which the petitioner failed to sufficiently refute. Even after several
postponements and case resettings had been previously sought by the defense,
counsel and the petitioner still failed to appear or come prepared during the
hearing. 33 The RTC decision narrates the antecedents, to wit:
On August 24, 1998, the cases were set for reception of defense
evidence, but counsel arrived late causing the resetting to
September 24, 1998.
On July 27, 2000, defense counsel and the [petitioner] again failed
to appear. Hence, Judge Salvador decreed that "the [petitioner] is
considered to have waived presentation of evidence in her
defense". A copy of the Order was furnished the Office of [Atty.
Leynes]. Same was received by Atty. Virgilio Leynes.
The records support the finding that the petitioner was duly notified of the
scheduled hearings. Specifically for the July 27, 2000 hearing, notice was
received by Atty. Leynes. Minutes of the hearing scheduled on May 23, 2000,
indicating that the next hearing was reset to July 27, 2000, bore the signature of
Atty. Leynes. 36 A notice of hearing dated July 20, 2000 for the July 27, 2000
schedule also indicated receipt for Atty. Leynes by one Edwin Gamba on July 25,
2000. 37 It was not the service to the petitioner that should determine the
sufficiency of the notice because she was then represented by counsel, upon
whom all court notices should be addressed and served.
The Court has explained the reasons in sustaining the RTC's and CA's
declarations that the petitioner was sufficiently apprised of the schedule of
hearing dates for the defense's presentation of evidence. Notwithstanding the
opportunity given to the defense, hearings were repeatedly postponed at the
instance of the petitioner and her counsels.
The question now is whether the trial court committed a reversible error in issuing
the Order dated July 27, 2000, by which the petitioner was considered to have
waived her right to present evidence in her defense.
Thus, in the instant case, the RTC judge could not have allowed the case to
continually drag upon the defense's requests. In Paz T. Bernardo, substituted by
Heirs, Mapalad G. Bernardo, Emilie B. Ko, Marilou B. Valdez, Edwin T.
Bernardo and Gervy B. Santos v. People of the Philippines,41 the Court
emphasized that the postponement of the trial of a case to allow the presentation
of evidence is a matter that lies with the discretion of the trial court; but it is a
discretion that must be exercised wisely, considering the peculiar circumstances
of each case and with a view to doing substantial justice.42
Corollary to this rule on the disposition of motions for postponement during trial
is a rule that addresses an accused's waiver of the right to present evidence. By
jurisprudence, the Court has affirmed a trial court's ruling that the accused was
deemed to have waived her right to present defense evidence following her and
counsel's repeated absences. Such waiver was deemed made after it was
determined that the accused was afforded ample opportunity to present evidence
in her defense but failed to give the case the serious attention it deserved. 43 The
Court has after all consistently held that the essence of due process is simply an
opportunity to be heard, or an opportunity to explain one's side, or an opportunity
to seek a reconsideration of the action or ruling complained of.44
The petitioner's acquittal in another set of B.P. Blg. 22 cases fails to exonerate her
from the indictment for the 23 subject checks. While the petitioner claims that
another division of the CA, specifically the Special Former Fifth Division,
acquitted her in CA-G.R. CR No. 13844 for four counts of violation of B.P. Blg.
22 following a finding that the petitioner had overpayments with Tan, it is not
established that the overpayments similarly apply to the obligations that are
covered by the subject checks. In light of applicable law and prevailing
jurisprudence, the conviction of the petitioner is nevertheless reversed.
"To be liable for violation of B.P. [Blg.] 22, the following essential elements must
be present: (1) the making, drawing, and issuance of any check to apply for
account or for value; (2) the knowledge of the maker, drawer, or issuer that at the
time of issue he does not have sufficient funds in or credit with the drawee bank
for the payment of the check in full upon its presentment; and (3) the subsequent
dishonor of the check by the drawee bank for insufficiency of funds or credit or
dishonor for the same reason had not the drawer, without any valid cause, ordered
the bank to stop payment." 45
As between the parties to this case, the dispute only pertains to the presence or
absence of the second element. In order to support her plea for an acquittal, the
petitioner particularly insists that she failed to receive any notice of dishonor on
the subject checks, which rendered absent the element of knowledge of
insufficient funds.
In Yu Oh v. CA,46 the Court explained that since the second element involves a
state of mind which is difficult to establish, Section 2 of B.P. Blg. 22 created
a prima facie presumption of such knowledge, as follows:
To support its finding that the petitioner knew of the insufficiency of her funds
with the drawee bank, the RTC merely relied on the fact that replacement checks
had been issued, in lieu of those that were originally issued to pay for the
petitioner's obligation with Tan.49 The Court finds the conclusion misplaced,
considering that the last batch of replacement checks, which eventually became
the subject of these cases, were precisely intended to address and preclude any
dishonor. Thus, the replacement checks dated March 30, 1987 were purposely
drawn against a different checking account with FBTC, different from the old
checks that were drawn against another drawee bank.
Similarly, in the instant case, the prosecution failed to sufficiently prove the actual
receipt by the petitioner of the demand letter sent by Tan. No witness testified to
authenticate the registry return card and the signature appearing thereon. The
return card provides that the letter was received by one Rolando Villanueva,
without even further proof that the said person was the petitioner's duly
authorized agent for the purpose of receiving the correspondence. The OSG
contends that the argument on the petitioner's failure to receive a notice of
dishonor could not be raised at this stage. The Court disagrees. While the question
may seemingly present a factual issue that is beyond the scope of a petition for
review on certiorari, it is in essence a question of law as it concerns the correct
application of law or jurisprudence to a certain set of facts. It addresses the
question of whether or not the service and alleged receipt by the petitioner of the
notice of dishonor, as claimed by the prosecution, already satisfies the
requirements of the law.
Clearly, the prosecution failed to establish the presence of all the elements of
violation of B.P. Blg. 22. The petitioner is acquitted from the 23 counts of the
offense charged. The failure of the prosecution to prove the receipt by the
petitioner of the requisite written notice of dishonor and that she was given at
least five banking days within which to settle her account constitutes sufficient
ground for her acquittal. 55
Even the petitioner's waiver of her right to present evidence is immaterial to this
ground cited by the Court for her acquittal. The basis relates to the prosecution's
own failure to prove all the elements of the offense that could warrant the
petitioner's conviction, rather than on an action or argument that should have
emanated from the defense. The burden of proving beyond reasonable doubt each
element of the crime is upon the prosecution, as its case will rise or fall on the
strength of its own evidence. Any doubt shall be resolved in favor of the
accused.56
Notwithstanding the petitioner's acquittal, she remains liable for the payment of
civil damages equivalent to the face value of the 23 subject checks, totaling
₱6,226,390.29. In a line of cases, the Court has emphasized that acquittal from a
crime does not necessarily mean absolution from civil liability. 57
It was not established that the petitioner had paid the amounts covered by the
checks. The Court has explained that the overpayments that were determined by
the CA in another set of B.P. Blg. 22 cases against the petitioner could not be
applied to this case. The petitioner failed to present any evidence that would
prove the extinguishment of her obligations. Thus, the petitioner should pay Tan
the amount of ₱6,226,390.29, plus legal interest at the rate of six percent
(6%) per annum to be computed from the date of finality of this Decision until
full satisfaction thereof.
WHEREFORE, the Decision dated November 13, 2003 and Resolution dated
May 4, 2004 of the Court of Appeals in CA-G.R. CR No. 26337
are REVERSED and SET ASIDE. Petitioner Jesusa T. Dela Cruz
is ACQUITTED of the crime of violation of Batas Pambansa Bilang 22 on
twenty-three (23) counts on the ground that her guilt was not established beyond
reasonable doubt. She is, nonetheless, ordered to pay complainant Tan Tiac
Chiong, also known as Ernesto Tan, the face value of the subject checks totaling
Six Million Two Hundred Twenty-Six Thousand Three Hundred Ninety Pesos and
29/100 (?6,226,390.29), with interest of six percent (6%) per annum from the date
of finality of this Decision until full payment.
SO ORDERED.