Professional Documents
Culture Documents
Al., Wherein Percival Carag Mabasa, Atty. Causing's Client, Was One of The Accused
Al., Wherein Percival Carag Mabasa, Atty. Causing's Client, Was One of The Accused
Al., Wherein Percival Carag Mabasa, Atty. Causing's Client, Was One of The Accused
This is a complaint for gross ignorance of the law, gross misconduct and gross
incompetence for reversing the dismissal of criminal case entitled People v. Eleazar, et
al., wherein Percival Carag Mabasa, Atty. Causing’s client, was one of the accused.
To address concerns about privacy, but without defeating its purpose, Facebook
was armed with different privacy tools designed to regulate the accessibility of a user's
profile, as well as information uploaded by the user. In H v. W, the South Gauteng
High Court of Johannesburg, Republic of South Africa recognized this ability of the
users to "customize their privacy settings," but with the cautionary advice that although
Facebook, as stated in its policies, "makes every effort to protect a user's information,
these privacy settings are however not foolproof." Consequently, before one can have
an expectation of privacy in his or her online social networking activity — in this case,
Facebook — it is first necessary that said user manifests the intention to keep certain
posts private, through the employment of measures to prevent access thereto or to
limit its visibility. This intention can materialize in cyberspace through the utilization
of Facebook's privacy tools. In other words, utilization of these privacy tools is the
1
manifestation, in the cyber world, of the user's invocation of his or her right to
informational privacy.
The bases of the instant complaint are the Facebook posts maligning and
insulting complainant, which posts respondent insists were set to private view.
However, the latter has failed to offer evidence that he utilized any of the privacy tools
or features of Facebook available to him to protect his posts, or that he restricted its
privacy to a select few. Therefore, without any positive evidence to corroborate his
statement that the subject posts, as well as the comments thereto, were visible only to
him and his circle of friends, respondent's statement is, at best, self-serving, thus
deserving scant consideration.
Moreover, even if the Court were to accept respondent's allegation that his posts
were limited to or viewable by his "Friends" only, there is no assurance that the same
— or other digital content that he uploads or publishes on his Facebook profile — will
be safeguarded as within the confines of privacy, in light of the following:
(1) Facebook "allows the world to be more open and connected by giving its
users the tools to interact and share in any conceivable way";
(2) A good number of Facebook users "befriend" other users who are total
strangers;
(3) The sheer number of "Friends" one user has, usually by the hundreds; and
(4) A user's Facebook friend can "share" the former's post, or "tag" others who
are not Facebook friends with the former, despite its being visible only
to his or her own Facebook friends.
Thus, restricting the privacy of one's Facebook posts to "Friends" does not
guarantee absolute protection from the prying eyes of another user who does not
belong to one's circle of friends. The user's own Facebook friend can share said
content or tag his or her own Facebook friend thereto, regardless of whether the
user tagged by the latter is Facebook friends or not with the former. Also, when
the post is shared or when a person is tagged, the respective Facebook friends of
the person who shared the post or who was tagged can view the post, the privacy
setting of which was set at "Friends." Under the circumstances, therefore,
respondent's claim of violation of right to privacy is negated.
In this case, the act alleged to have caused the loss of trust and confidence of
petitioners in Simbillo was her Facebook post which supposedly suggests that
Interadent was being "feasted on" by the BIR and also contains insulting statements
against a co-worker and hence has compromised the reputation of the company.
According to petitioners, there was disclosure of confidential information that gives the
impression that Interadent is under investigation by the BIR for irregular transactions.
However, we agree with the CA's observation that the Facebook entry did not contain
any corporate record or any confidential information. Otherwise stated, there was
2
really no actual leakage of information. No company information or corporate
record was divulged by Simbillo.
Simbillo's failure to substantiate her claim that the Facebook entry was posted for
a friend who consulted her on a predicament she has with her company and that the
term "b_i_r_" represents "bwitre" will not weaken her case against petitioners. It must
be emphasized at this point that in illegal dismissal cases, the burden of proof is upon
the employer to show that the employee's dismissal was for a valid cause. The
Facebook entry did not mention any specific name of employer/company/government
agency or person. Contrary to petitioners' insistence, the intended subject matter was
not clearly identifiable. As acknowledged by petitioners themselves, Simbillo's
Facebook account contained a list of her former and present employers. If anything, the
entry would merely merit some suspicion on the part of Interadent being the present
employer, but it would be far-fetched to conclude that Interadent may be involved in
anomalous transactions with the BIR. Clearly, petitioners' theory was based on mere
speculations.
The exclusionary rule, or the fruit of the poisonous tree doctrine, presupposes a
violation of law on the part of the agents of the Government, and bars the admission of
evidence obtained in violation of the right against unreasonable searches and seizures
expressly defined under Section 2, Article III of the Constitution. The exclusionary rule
under Section 3 (2), Article III of the Constitution refers to the prohibition against the
issuance of general warrants that encourage law enforcers to go on fishing expeditions.
Judge Yu did not specify that the State had unlawfully intruded into her privacy.
The subjects of the present inquiry were the messages sent by her to Judge San Gaspar-
Gito. Regardless of the mode of their transmission, the ownership of the messages
pertained to the latter as the recipient. Considering that it was the latter who granted
access to such messages, there was no violation of Judge Yu's right to privacy. As such,
the grant of access by Judge San Gaspar-Gito did not require the consent of Judge Yu as
the writer. To recall, the Court directed the MISO to retrieve the messages for purposes
of these cases. Based on the certification issued by the authorized MISO personnel, the
messages were extracted from the Yahoo and Facebook accounts of Judge San Gaspar-
Gito with the use of her official workstation. Hence, the exclusionary rule did not apply.
The denial lacked persuasion. In her October 3, 2009 message to Judge San Gaspar-
Gito's Yahoo account, Judge Yu apologized to Judge San Gaspar-Gito, and expressly
clarified that Judge San Gaspar-Gito had not sent the "meal stub." Judge Yueven
3
requested Judge San Gaspar-Gito to "forget all [her] emails . . . since June . . ." This
apologetic tone from Judge Yu rendered her denial of responsibility devoid of substance.
Moreover, the barrage of messages, most of which were sent within the same day,
makes us believe that they had all come from Judge Yu. Although she insisted
that Judge San Gaspar-Gito had sent the "meal stub," Judge Yu did not offer any
plausible explanation on the other messages containing sexual innuendos.
It is notable that the Facebook and Yahoo messages started in August 2009
when Judge Yu was still a public prosecutor. Nonetheless, she could still be disciplined
for such acts committed prior to her appointment to the Judiciary because her internet
stalking of Judge San Gaspar-Gito continued after she had herself become a
MeTC Judge in Pasay City on January 12, 2010 and lasted until July 2010.
Before this Court is a petition to cite respondents for indirect contempt for
publishing articles on the petitioner Atty. Raymund P. Palad's suspension, which was
subject of a pending administrative case.
4
Petitioners allege that when Maj. Gen. Lopez denied in his March 11, 2014 letter
Cadet 1CL Cudia's request for documents, footages, and recordings relevant to the HC
hearings, the vital evidence negating the regularity of the HC trial and supporting his
defense have been surely overlooked by the CRAB in its case review. Indeed, for them,
the answers on whether Cadet 1CL Cudia was deprived of due process and whether he
lied could easily be unearthed from the video and other records of the HC investigation.
Respondents did not deny their existence but they refused to present them for the parties
and the Court to peruse. In particular, they note that the Minutes of the HC dated January
21, 2014 and the HC Formal Investigation Report dated January 20, 2014 were
considered by the CRAB but were not furnished to petitioners and the Court; hence, there
is no way to confirm the truth of the alleged statements therein. In their view, failure to
furnish these documents could only mean that it would be adverse if produced pursuant to
Section 3 (e), Rule 131 of the Rules of Court.
In this case, petitioners have not particularly identified any documents, witness
testimony, or oral or written presentation of facts submitted at the hearing that would
support Cadet 1CL Cudia's defense. The Court may require that an administrative record
be supplemented, but only "where there is a 'strong showing of bad faith or improper
behavior' on the part of the agency," both of which are not present here. Petitioners have
not specifically indicated the nature of the concealed evidence, if any, and the reason for
withholding it. What they did was simply supposing that Cadet 1CL Cudia's guilty
verdict would be overturned with the production and examination of such documents,
footages, and recordings. As will be further shown in the discussions below, the
requested matters, even if denied, would not relieve Cadet 1CL Cudia's predicament. If at
all, such denial was a harmless procedural error since he was not seriously prejudiced
thereby.
5
an individual, and to provide a forum to enforce one’s right to the truth and to
informational privacy. It seeks to protect a person’s right to control information regarding
oneself, particularly in instances in which such information is being collected through
unlawful means in order to achieve unlawful ends
In developing the writ of habeas data, the Court aimed to protect an individual’s
right to informational privacy, among others. A comparative law scholar has, in fact,
defined habeas data as “a procedure designed to safeguard individual freedom from
abuse in the information age.” The writ, however, will not issue on the basis merely of
an alleged unauthorized access to information about a person. Availment of the writ
requires the existence of a nexus between the right to privacy on the one hand, and the
right to life, liberty or security on the other. Thus, the existence of a person’s right to
informational privacy and a showing, at least by substantial evidence, of an actual or
threatened violation of the right to privacy in life, liberty or security of the victim are
indispensable before the privilege of the writ may be extended.
The writ of habeas data is not only confined to cases of extralegal killings and
enforced disappearances
Habeas data, to stress, was designed “to safeguard individual freedom from abuse
in the information age.” As such, it is erroneous to limit its applicability to extralegal
killings and enforced disappearances only. In fact, the annotations to the Rule prepared
by the Committee on the Revision of the Rules of Court, after explaining that the Writ
of Habeas Data complements the Writ of Amparo, pointed out that:
The writ of habeas data, however, can be availed of as an
independent remedy to enforce one’s right to privacy, more
specifically the right to informational privacy. The remedies against
the violation of such right can include the updating, rectification,
suppression or destruction of the database or information or files in
possession or in control of respondents. (emphasis Ours)
Clearly then, the privilege of the Writ of Habeas Data may also be availed of in
cases outside of extralegal killings and enforced disappearances.
Respondents’ contention that the habeas data writ may not issue against STC, it
not being an entity engaged in the gathering, collecting or storing of data or information
regarding the person, family, home and correspondence of the aggrieved party, while
valid to a point, is, nonetheless, erroneous.
6
Section 1. Habeas Data. — The writ of habeas data is a remedy
available to any person whose right to privacy in life, liberty or security is
violated or threatened by an unlawful act or omission of a public official
or employee, or of a private individual or entity engaged in the
gathering, collecting or storing of data or information regarding the
person, family, home and correspondence of the aggrieved party.
(emphasis Ours)
The provision, when taken in its proper context, as a whole, irresistibly conveys
the idea that habeas data is a protection against unlawful acts or omissions of public
officials and of private individuals or entities engaged in gathering, collecting, or
storing data about the aggrieved party and his or her correspondences, or about his
or her family. Such individual or entity need not be in the business of collecting or
storing data.
To agree with respondents’ above argument, would mean unduly limiting the
reach of the writ to a very small group, i.e., private persons and entities whose business is
data gathering and storage, and in the process decreasing the effectiveness of the writ as
an instrument designed to protect a right which is easily violated in view of rapid
advancements in the information and communications technology — a right which a
great majority of the users of technology themselves are not capable of protecting.
Having resolved the procedural aspect of the case, We now proceed to the core of
the controversy.
With the availability of numerous avenues for information gathering and data
sharing nowadays, not to mention each system’s inherent vulnerability to attacks and
intrusions, there is more reason that every individual’s right to control said flow of
information should be protected and that each individual should have at least a reasonable
expectation of privacy in cyberspace. Several commentators regarding privacy and social
networking sites, however, all agree that given the millions of OSN users, “[i]n this
[Social Networking] environment, privacy is no longer grounded in reasonable
expectations, but rather in some theoretical protocol better known as wishful thinking.”
It is due to this notion that the Court saw the pressing need to provide for judicial
remedies that would allow a summary hearing of the unlawful use of data or information
and to remedy possible violations of the right to privacy. In the same vein, the South
African High Court, in its Decision in the landmark case, H v. W, promulgated on
7
January 30, 2013, recognized that “[t]he law has to take into account the changing
realities not only technologically but also socially or else it will lose credibility in the
eyes of the people. . . . It is imperative that the courts respond appropriately to changing
times, acting cautiously and with wisdom.” Consistent with this, the Court, by developing
what may be viewed as the Philippine model of the writ of habeas data, in effect,
recognized that, generally speaking, having an expectation of informational privacy is
not necessarily incompatible with engaging in cyberspace activities, including those
that occur in OSNs.
The question now though is up to what extent is the right to privacy protected in
OSNs? Bear in mind that informational privacy involves personal information. At the
same time, the very purpose of OSNs is socializing — sharing a myriad of information,
some of which would have otherwise remained personal.
Briefly, the purpose of an OSN is precisely to give users the ability to interact and
to stay connected to other members of the same or different social media platform
through the sharing of statuses, photos, videos, among others, depending on the services
provided by the site. It is akin to having a room filled with millions of personal bulletin
boards or “walls,” the contents of which are under the control of each and every user. In
his or her bulletin board, a user/owner can post anything — from text, to pictures, to
music and videos — access to which would depend on whether he or she allows one,
some or all of the other users to see his or her posts. Since gaining popularity, the OSN
phenomenon has paved the way to the creation of various social networking sites,
including the one involved in the case at bar, www.facebook.com (Facebook), which,
according to its developers, people use “to stay connected with friends and family, to
discover what’s going on in the world, and to share and express what matters to them.”
For instance, a Facebook user can regulate the visibility and accessibility of digital
images (photos), posted on his or her personal bulletin or “wall,” except for the user’s
profile picture and ID, by selecting his or her desired privacy setting:
(a) Public — the default setting; every Facebook user can view the photo;
(b) Friends of Friends — only the user’s Facebook friends and their
friends can view the photo;
(b) Friends — only the user’s Facebook friends can view the photo;
© Custom — the photo is made visible only to particular friends and/or
networks of the Facebook user; and
(d) Only Me — the digital image can be viewed only by the user.
8
The foregoing are privacy tools, available to Facebook users, designed to set up
barriers to broaden or limit the visibility of his or her specific profile content, statuses,
and photos, among others, from another user’s point of view. In other words, Facebook
extends its users an avenue to make the availability of their Facebook activities reflect
their choice as to “when and to what extent to disclose facts about [themselves] — and to
put others in the position of receiving such confidences.” Ideally, the selected setting will
be based on one’s desire to interact with others, coupled with the opposing need to
withhold certain information as well as to regulate the spreading of his or her personal
information. Needless to say, as the privacy setting becomes more limiting, fewer
Facebook users can view that user’s particular post. ISDCHA
Cyberspace responsibility
It has been said that “the best filter is the one between your children’s
ears.” This means that self-regulation on the part of OSN users and internet consumers in
general is the best means of avoiding privacy rights violations. As a cyberspace
community member, one has to be proactive in protecting his or her own privacy. It is in
this regard that many OSN users, especially minors, fail. Responsible social networking
or observance of the “netiquettes” on the part of teenagers has been the concern of many
due to the widespread notion that teenagers can sometimes go too far since they generally
lack the people skills or general wisdom to conduct themselves sensibly in a public
forum.
Respondent STC is clearly aware of this and incorporating lessons on good cyber
citizenship in its curriculum to educate its students on proper online conduct may be most
timely. Too, it is not only STC but a number of schools and organizations have already
deemed it important to include digital literacy and good cyber citizenship in their
respective programs and curricula in view of the risks that the children are exposed to
every time they participate in online activities. Furthermore, considering the complexity
of the cyber world and its pervasiveness, as well as the dangers that these children are
wittingly or unwittingly exposed to in view of their unsupervised activities in cyberspace,
the participation of the parents in disciplining and educating their children about being a
good digital citizen is encouraged by these institutions and organizations. In fact, it is
believed that “to limit such risks, there’s no substitute for parental involvement and
supervision.”
As such, STC cannot be faulted for being steadfast in its duty of teaching its
students to be responsible in their dealings and activities in cyberspace, particularly in
OSNs, when it enforced the disciplinary actions specified in the Student Handbook,
absent a showing that, in the process, it violated the students’ rights.
OSN users should be aware of the risks that they expose themselves to whenever
they engage in cyberspace activities. Accordingly, they should be cautious enough to
control their privacy and to exercise sound discretion regarding how much information
about themselves they are willing to give up. Internet consumers ought to be aware that,
by entering or uploading any kind of data or information online, they are automatically
and inevitably making it permanently available online, the perpetuation of which is
outside the ambit of their control. Furthermore, and more importantly, information,
otherwise private, voluntarily surrendered by them can be opened, read, or copied by
third parties who may or may not be allowed access to such.
It is, thus, incumbent upon internet users to exercise due diligence in their online
dealings and activities and must not be negligent in protecting their rights. Equity serves
the vigilant. Demanding relief from the courts, as here, requires that claimants themselves
take utmost care in safeguarding a right which they allege to have been violated. These
are indispensable. We cannot afford protection to persons if they themselves did nothing
9
to place the matter within the confines of their private zone. OSN users must be mindful
enough to learn the use of privacy tools, to use them if they desire to keep the information
private, and to keep track of changes in the available privacy settings, such as those of
Facebook, especially because Facebook is notorious for changing these settings and the
site’s layout often.
10
As to the petition in G.R. No. 179275, the Court grants the same. The Senate cannot
be allowed to continue with the conduct of the questioned legislative inquiry without duly
published rules of procedure, in clear derogation of the constitutional requirement.
The respondents in G.R. No. 179275 admit in their pleadings and even on oral
argument that the Senate Rules of Procedure Governing Inquiries in Aid of Legislation
had been published in newspapers of general circulation only in 1995 and in 2006. With
respect to the present Senate of the 14th Congress, however, of which the term of half of
its members commenced on June 30, 2007, no effort was undertaken for the publication
of these rules when they first opened their session.
Recently, the Court had occasion to rule on this very same question. In Neri v.
Senate Committee on Accountability of Public Officers and Investigations, we said:
11
Respondents justify their non-observance of the constitutionally mandated
publication by arguing that the rules have never been amended since 1995 and, despite
that, they are published in booklet form available to anyone for free, and accessible to
the public at the Senate's internet web page.
The Court does not agree. The absence of any amendment to the rules cannot
justify the Senate's defiance of the clear and unambiguous language of Section 21,
Article VI of the Constitution. The organic law instructs, without more, that the Senate
or its committees may conduct inquiries in aid of legislation only in accordance with
duly published rules of procedure, and does not make any distinction whether or not
these rules have undergone amendments or revision. The constitutional mandate to
publish the said rules prevails over any custom, practice or tradition followed by the
Senate.
Given this discussion, the respondent Senate Committees, therefore, could not, in
violation of the Constitution, use its unpublished rules in the legislative inquiry subject
of these consolidated cases. The conduct of inquiries in aid of legislation by the Senate
has to be deferred until it shall have caused the publication of the rules, because it can
do so only "in accordance with its duly published rules of procedure".
12
word communicare, meaning "to share or to impart." In its ordinary signification,
communication connotes the act of sharing or imparting, as in a conversation, or signifies
the "process by which meanings or thoughts are shared between individuals through a
common system of symbols (as language signs or gestures)." These definitions are broad
enough to include verbal or non-verbal, written or expressive communications of
"meanings or thoughts" which are likely to include the emotionally-charged exchange, on
February 22, 1988, between petitioner and private respondent, in the privacy of the
latter's office. Any doubts about the legislative body's meaning of the phrase "private
communication" are, furthermore, put to rest by the fact that the terms "conversation" and
"communication" were interchangeably used by Senator Tañada in his Explanatory Note
to the bill quoted below:
"It has been said that innocent people have nothing to fear from
their conversations being overheard. But this statement ignores the usual nature
of conversations as well as the undeniable fact that most, if not all, civilized people have
some aspects of their lives they do not wish to expose. Free conversations are often
characterized by exaggerations, obscenity, agreeable falsehoods, and the expression of
anti-social desires of views not intended to be taken seriously. The right to the privacy of
communication, among others, has expressly been assured by our Constitution. Needless
to state here, the framers of our Constitution must have recognized the nature
of conversations between individuals and the significance of man's spiritual nature, of his
feelings and of his intellect. They must have known that part of the pleasures and
satisfactions of life are to be found in the unaudited, and free exchange of communication
between individuals — free from every unjustifiable intrusion by whatever means."
In Gaanan vs. Intermediate Appellate Court, a case which dealt with the issue of
telephone wiretapping, we held that the use of a telephone extension for the purpose of
overhearing a private conversation without authorization did not violate R.A.
4200 because a telephone extension devise was neither among those devises enumerated
in Section 1 of the law nor was it similar to those "device(s) or arrangement(s)"
enumerated therein," following the principle that "penal statutes must be construed
strictly in favor of the accused." The instant case turns on a different note, because the
applicable facts and circumstances pointing to a violation of R.A. 4200 suffer from no
ambiguity, and the statute itself explicitly mentions the unauthorized "recording" of
private communications with the use of tape-recorders as among the acts punishable.
13
Even assuming arguendo that petitioner indeed submitted a letter reconsideration
which he claims was sent through a facsimile transmission, such letter reconsideration
did not toll the period to appeal. The mode used by petitioner in filing his reconsideration
is not sanctioned by the Uniform Rules on Administrative Cases in the Civil Service. As
we stated earlier, the motion for reconsideration may be filed only in two ways, either by
mail or personal delivery.
We, therefore, found no reversible error committed by the CA when it affirmed the
CSC in dismissing petitioner's appeal. Petitioner's dismissal from the service became
final and executory after he failed to file his motion for reconsideration or appeal in the
manner and within the period provided for under the Revised Uniform Rules on
Administrative Cases in the Civil Service.
14
visitors. Neither did he allege that he used passwords or adopted any means to prevent
other employees from accessing his computer files. On the contrary, he submits that
being in the public assistance office of the CSC-ROIV, he normally would have visitors
in his office like friends, associates and even unknown people, whom he even allowed to
use his computer which to him seemed a trivial request. He described his office as "full of
people, his friends, unknown people" and that in the past 22 years he had been
discharging his functions at the PALD, he is "personally assisting incoming clients,
receiving documents, drafting cases on appeals, in charge of accomplishment
report, Mamamayan Muna Program, Public Sector Unionism, Correction of name,
accreditation of service, and hardly had anytime for himself alone, that in fact he stays in
the office as a paying customer." Under this scenario, it can hardly be deduced that
petitioner had such expectation of privacy that society would recognize as reasonable.
POLICY
1. The Computer Resources are the property of the Civil Service
Commission and may be used only for legitimate business
purposes.
2. Users shall be permitted access to Computer Resources to assist them
in the performance of their respective jobs.
3. Use of the Computer Resources is a privilege that may be revoked at
any given time.
xxx xxx xxx
No Expectation of Privacy
4. No expectation of privacy. Users except the Members of the
Commission shall not have an expectation of privacy in anything
they create, store, send, or receive on the computer system.
The Head of the Office for Recruitment, Examination and
Placement shall select and assign Users to handle the confidential
examination data and processes.
5. Waiver of privacy rights. Users expressly waive any right to privacy
in anything they create, store, send, or receive on the computer
through the Internet or any other computer
network. Users understand that the CSC may use human or
automated means to monitor the use of its Computer Resources.
6. Non-exclusivity of Computer Resources. A computer resource is not a
personal property or for the exclusive use of a User to whom a
memorandum of receipt (MR) has been issued. It can be shared or
operated by other users. However, he is accountable therefor and
must insure its care and maintenance.
xxx xxx xxx
Passwords
12. Responsibility for passwords. Users shall be responsible for
safeguarding their passwords for access to the computer system.
Individual passwords shall not be printed, stored online, or given to
others. Users shall be responsible for all transactions made using
their passwords. No User may access the computer system with
another User's password or account.
13. Passwords do not imply privacy. Use of passwords to gain access to
the computer system or to encode particular files or messages does
not imply that Users have an expectation of privacy in the material
they create or receive on the computer system. The Civil Service
15
Commission has global passwords that permit access to all
materials stored on its networked computer system regardless of
whether those materials have been encoded with a
particular User's password. Only members of the Commission
shall authorize the application of the said global passwords.
The CSC in this case had implemented a policy that put its employees on notice
that they have no expectation of privacy in anything they create, store, send or receive on
the office computers, and that the CSC may monitor the use of the computer resources
using both automated or human means. This implies that on-the-spot inspections may be
done to ensure that the computer resources were used only for such legitimate business
purposes.
16
Under the facts obtaining, the search conducted on petitioner's computer was
justified at its inception and scope.
The Court En Banc held that while Atty. Morales may have fallen short of the
exacting standards required of every court employee, the Court cannot use the evidence
obtained from his personal computer against him for it violated his constitutional right
against unreasonable searches and seizures. The Court found no evidence to support the
claim of OCA that they were able to obtain the subject pleadings with the consent of
Atty. Morales, as in fact the latter immediately filed an administrative case against the
persons who conducted the spot investigation, questioning the validity of the
investigation and specifically invoking his constitutional right against unreasonable
search and seizure. And as there is no other evidence, apart from the pleadings, retrieved
from the unduly confiscated personal computer of Atty. Morales, to hold him
administratively liable, the Court had no choice but to dismiss the charges against him for
insufficiency of evidence.
The above case is to be distinguished from the case at bar because, unlike the
former which involved a personal computer of a court employee, the computer from
which the personal files of herein petitioner were retrieved is a government-issued
computer, hence government property the use of which the CSC has absolute right to
regulate and monitor.
17
This outlines the procedural map to follow in cases like the one at bar as it spells
out the following: (a) the test; (b) the presumption; (c) the burden of proof; (d) the party
to discharge the burden; and (e) the quantum of evidence necessary. On the basis of the
records of the case at bar, respondents who have the burden to show that these acts do not
abridge freedom of speech and of the press failed to hurdle the clear and present danger
test. It appears that the great evil which government wants to prevent is the airing of a
tape recording in alleged violation of the anti-wiretapping law. The records of the case at
bar, however, are confused and confusing, and respondents' evidence falls short of
satisfying the clear and present danger test. Firstly, the various statements of the Press
Secretary obfuscate the identity of the voices in the tape recording. Secondly, the
integrity of the taped conversation is also suspect. The Press Secretary showed to the
public two versions, one supposed to be a "complete" version and the other, an "altered"
version. Thirdly, the evidence of the respondents on the who's and the how's of the
wiretapping act is ambivalent, especially considering the tape's different versions. The
identity of the wire-tappers, the manner of its commission and other related and relevant
proofs are some of the invisibles of this case. Fourthly, given all these unsettled facets of
the tape, it is even arguable whether its airing would violate the anti-wiretapping law.
We rule that not every violation of a law will justify straitjacketing the exercise
of freedom of speech and of the press. Our laws are of different kinds and doubtless,
some of them provide norms of conduct which even if violated have only an adverse
effect on a person's private comfort but does not endanger national security. There are
laws of great significance but their violation, by itself and without more, cannot support
suppression of free speech and free press. In fine, violation of law is just a factor, a vital
one to be sure, which should be weighed in adjudging whether to restrain freedom of
speech and of the press. The totality of the injurious effects of the violation to private
and public interest must be calibrated in light of the preferred status accorded by
the Constitution and by related international covenants protecting freedom of speech and
of the press. In calling for a careful and calibrated measurement of the circumference of
all these factors to determine compliance with the clear and present danger test, the
Court should not be misinterpreted as devaluing violations of law. By all means,
violations of law should be vigorously prosecuted by the State for they breed their own
evil consequence. But to repeat, the need to prevent their violation cannot per se
trump the exercise of free speech and free press, a preferred right whose breach can
lead to greater evils. For this failure of the respondents alone to offer proof to satisfy the
clear and present danger test, the Court has no option but to uphold the exercise of free
speech and free press. There is no showing that the feared violation of the anti-
wiretapping law clearly endangers the national security of the State.
This is not all the faultline in the stance of the respondents. We slide to the issue of
whether the mere press statements of the Secretary of Justice and of the NTC in
question constitute a form of content-based prior restraint that has transgressed
the Constitution. In resolving this issue, we hold that it is not decisive that the press
statements made by respondents were not reduced in or followed up with formal
orders or circulars. It is sufficient that the press statements were made by
respondents while in the exercise of their official functions. Undoubtedly,
respondent Gonzales made his statements as Secretary of Justice, while the NTC issued
its statement as the regulatory body of media. Any act done, such as a speech uttered,
for and on behalf of the government in an official capacity is covered by the rule on
prior restraint. The concept of an "act" does not limit itself to acts already
converted to a formal order or official circular. Otherwise, the non formalization of
an act into an official order or circular will result in the easy circumvention of the
prohibition on prior restraint. The press statements at bar are acts that should be struck
down as they constitute impermissible forms of prior restraints on the right to free speech
and press.
18
There is enough evidence of chilling effect of the complained acts on record.
The warnings given to media came from no less the NTC, a regulatory agency that can
cancel the Certificate of Authority of the radio and broadcast media. They also came
from the Secretary of Justice, the alter ego of the Executive, who wields the awesome
power to prosecute those perceived to be violating the laws of the land. After the
warnings, the KBP inexplicably joined the NTC in issuing an ambivalent Joint Press
Statement. After the warnings, petitioner Chavez was left alone to fight this battle for
freedom of speech and of the press. This silence on the sidelines on the part of some
media practitioners is too deafening to be the subject of misinterpretation.
Prudence and good sense could have saved Mayordomo from his current tribulation,
but he was unfortunately stubborn to imbibe advice of caution. His claim that he was
obliged to change his IP address due to the inaction of the ITSG in resolving the problem
with his own IP address, cannot exonerate him from responsibility. Obviously, choosing
the RAS IP address to replace his own was way too drastic from sensible conduct
expected of a government employee. Surely, there were other available means to improve
his situation of alleged hampered performance of duties for failure to access the system
due to IP conflict. Certainly, gaining access to the exclusive external trafficking route to
the GSIS computer system was not one of them. SDEITC
The Court neither loses sight of the undisputed fact that Vice-President J. Fernando
U. Campana's Memorandum stated that the ITSG discovered unauthorized and
unnecessary downloaded programs in Mayordomo's personal computer when it was
pulled out. Hence, despite his insistence that exigency was his sole reason in altering his
IP address, sheer common sense and evidence to the contrary belie this.
Mayordomo likewise fails to convince the Court to adhere to his position that the
lack of official policy and guidelines at the time of commission makes the act of
unauthorized alteration of IP addresses exempt from punishment. While official policy
and guidelines apprise covered employees of offenses carrying specific penalties, the
Court may not close its eyes from the fact that actual notice of the dangers of changing
his IP address was made known to Mayordomo, right after the first incident. The CSC
was correct in holding that subsequent to the first warning, Mayordomo was fully aware
that changing his IP address without acquiescence from the ITSG, was inherently wrong.
In the same vein, proof of the alleged damage caused by Mayordomo's act to
the GSIS system and its use by the general public, is not necessary. The inaccessibility,
unnecessary interruption, and downtime to the GSIS network as may be experienced by
outside users, is obvious. Proof that the public was inconvenienced in using
the GSIS website is not necessary in order to conclude that the unauthorized changing of
IP address can produce pernicious effects to the orderly administration of government
19
services. It is well-settled that in administrative cases, the injury sought to be remedied is
not merely the loss of public money or property. Acts that go against the established rules
of conduct for government personnel, [in this case, that of resorting to unauthorized and
radical solutions, without clearance from appropriate parties] bring harm to the civil
service, whether they result in loss or not. This rule is in line with the purpose of
administrative proceedings, which is mainly to protect the public service, based on the
time-honored principle that a public office is a public trust.
This case concerns a claim of commission of the crime of violence against women
when a former boyfriend sent to the girl the picture of a naked woman, not her, but with
her face on it.
Rustan argues that, since he was arrested and certain items were seized from him
without any warrant, the evidence presented against him should be deemed inadmissible.
But the fact is that the prosecution did not present in evidence either the cellphone or the
SIM cards that the police officers seized from him at the time of his arrest. The
prosecution did not need such items to prove its case. Exhibit C for the prosecution was
but a photograph depicting the Sony Ericsson P900 cellphone that was used, which
cellphone Rustan admitted owning during the pre-trial conference.
Actually, though, the bulk of the evidence against him consisted in Irish's testimony
that she received the obscene picture and malicious text messages that the sender's
cellphone numbers belonged to Rustan with whom she had been previously in
communication. Indeed, to prove that the cellphone numbers belonged to Rustan, Irish
and the police used such numbers to summon him to come to Lorentess Resort and he
did. Consequently, the prosecution did not have to present the confiscated cellphone and
SIM cards to prove that Rustan sent those messages.
Moreover, Rustan admitted having sent the malicious text messages to Irish. His
defense was that he himself received those messages from an unidentified person who
was harassing Irish and he merely forwarded the same to her, using his cellphone. But
Rustan never presented the cellphone number of the unidentified person who sent the
messages to him to authenticate the same. The RTC did not give credence to such version
and neither will this Court. Besides, it was most unlikely for Irish to pin the things on
Rustan if he had merely tried to help her identify the sender.
20
In addition, Rustan claims that the obscene picture sent to Irish through a text
message constitutes an electronic document. Thus, it should be authenticated by means of
an electronic signature, as provided under Section 1, Rule 5 of the Rules on Electronic
Evidence (A.M. 01-7-01-SC). But, firstly, Rustan is raising this objection to the
admissibility of the obscene picture, Exhibit A, for the first time before this Court. The
objection is too late since he should have objected to the admission of the picture on such
ground at the time it was offered in evidence. He should be deemed to have already
waived such ground for objection.
Besides, the rules he cites do not apply to the present criminal action. The Rules on
Electronic Evidence applies only to civil actions, quasi-judicial proceedings, and
administrative proceedings.
It is worth mentioning that the Court has resolved to refrain from posting in its
Internet Web Page the full text of decisions in cases involving child sexual abuse in
response to a letter from a mother of a child abuse victim addressed to the Chief Justice
expressing anxiety over the posting of full text decisions of the Supreme Court on its
Internet Web Page. The mother submitted that confidentiality and the best interest of the
child must prevail over public access to information and pleaded that her daughter's case,
as well as those of a similar nature, be excluded from the Web Page.
The position of the OSG in its Comment is noteworthy. The OSG submits that the
posting of the full text of decisions in cases involving child abuse on the Supreme Court
Web Page violates the right to privacy of the aggrieved parties. In order to determine
whether the subject matter upon which the right to privacy being invoked falls within the
constitutionally-protected zone of privacy, it must be shown that the person's expectation
of privacy is reasonable. The reasonableness of such expectancy depends on a two-part
test: (1) whether by his conduct, the individual has exhibited an expectation of privacy;
and (2) whether this expectation is one that society recognizes as reasonable.
According to the OSG, the fact that the aggrieved child may have consented,
through a parent or guardian, to a public hearing of the case does not negate the
expectation of privacy which the child may later invoke because child victims cannot be
presumed to have intended their initial agreement to extend beyond the termination of
their case to the posting of the decision reached by the Court on the Web Page. Moreover,
such an expectation of privacy is reasonable considering the various statutes and rules
which reveal the intention of the State to maintain the confidentiality of information
pertaining to child abuse cases. The OSG invites the Court's attention to a New Jersey
statute which provides that all court documents which state the name, address and
identity of a child victim in certain sexual assault, endangering the welfare and
abuse and neglect cases should remain confidential. The name of the victim shall not
appear in any public record; rather, initials or a fictitious name shall appear. The
offenses covered by the law include aggravated sexual assault, sexual assault,
aggravated criminal sexual contact, criminal sexual contact, endangering the
welfare of children, and any action alleging an abused or neglected child. Thus,
in Application of V Pub. Corp., 120 N.J. 508 (1990), and Div. of Youth & Fam. Serv. V.
J.B., 120 N.J. 112 (1990), the New Jersey Supreme Court provided guidelines in the
implementation of this statute.
In conclusion, the OSG suggests the adoption of a system of coding which could
include the use of pseudonyms in cases of a similar nature. Short of withdrawing the full
text of decisions in such cases from the Web Page, the OSG proposes that the Court
instead replace the material information, such as the name of the child-victim, in its
decisions.
21
Taking all these opinions into account and in view of recent enactments which
unequivocally express the intention to maintain the confidentiality of information in cases
involving violence against women and their children, in this case and henceforth, the
Court shall withhold the real name of the victim-survivor and shall use fictitious initials
instead to represent her. Likewise, the personal circumstances of the victims-survivors or
any other information tending to establish or compromise their identities, as well those of
their immediate family or household members, shall not be disclosed.
It becomes clear that the venue of libel cases where the complainant is a private
individual is limited to only either of two places, namely: 1) where the complainant
actually resides at the time of the commission of the offense; or 2) where the alleged
defamatory article was printed and first published. The Amended Information in the
present case opted to lay the venue by availing of the second. Thus, it stated that the
offending article "was first published and accessed by the private complainant in Makati
City." In other words, it considered the phrase to be equivalent to the requisite allegation
of printing and first publication.
Before article 360 was amended, the rule was that a criminal action for libel may be
instituted in any jurisdiction where the libelous article was published or circulated,
irrespective of where it was written or printed (People v. Borja, 43 Phil. 618). Under that
rule, the criminal action is transitory and the injured party has a choice of venue.
Experience had shown that under that old rule the offended party could harass
the accused in a libel case by laying the venue of the criminal action in a remote or
distant place. To forestall such harassment, Republic Act No. 4363 was enacted. It
lays down specific rules as to the venue of the criminal action so as to prevent the
offended party in written defamation cases from inconveniencing the accused by
means of out-of-town libel suits, meaning complaints filed in remote municipal
courts(Explanatory Note for the bill which became Republic Act No. 4363,
Congressional Record of May 20, 1965, pp. 424-5; Time, Inc. v. Reyes, L-28882, May
31, 1971, 39 SCRA 303, 311).
xxx xxx xxx (emphasis and underscoring supplied)
Clearly, the evil sought to be prevented by the amendment to Article 360 was the
indiscriminate or arbitrary laying of the venue in libel cases in distant, isolated or far-
flung areas, meant to accomplish nothing more than harass or intimidate an accused. The
disparity or unevenness of the situation becomes even more acute where the offended
party is a person of sufficient means or possesses influence, and is motivated by spite or
the need for revenge.
If the circumstances as to where the libel was printed and first published are used by
the offended party as basis for the venue in the criminal action, the Information must
allege with particularity where the defamatory article was printed and first published, as
evidenced or supported by, for instance, the address of their editorial or business offices
in the case of newspapers, magazines or serial publications. This pre-condition becomes
necessary in order to forestall any inclination to harass.
22
requires much imagination to see the chaos that would ensue in situations where the
website's author or writer, a blogger or anyone who posts messages therein could be sued
for libel anywhere in the Philippines that the private complainant may have allegedly
accessed the offending website.
For the Court to hold that the Amended Information sufficiently vested
jurisdiction in the courts of Makati simply because the defamatory article
was accessed therein would open the floodgates to the libel suit being filed in all
other locations where the pepcoalition website is likewise accessed or capable of
being accessed.
Indeed, Aznar failed to demonstrate how the information reflected on the print-out
was generated and how the said information could be relied upon as true.
As can be clearly gleaned from the above disquisitions, petitioner's acts constitute
theft of respondent PLDT's business and service, committed by means of the
unlawful use of the latter's facilities. In this regard, the Amended Information
inaccurately describes the offense by making it appear that what petitioner took were the
international long distance telephone calls, rather than respondent PLDT's business.
A perusal of the records of this case readily reveals that petitioner and respondent
PLDT extensively discussed the issue of ownership of telephone calls. The prosecution
23
has taken the position that said telephone calls belong to respondent PLDT. This is
evident from its Comment where it defined the issue of this case as whether or not "the
unauthorized use or appropriation of PLDT international telephone calls, service and
facilities, for the purpose of generating personal profit or gain that should have otherwise
belonged to PLDT, constitutes theft."
In discussing the issue of ownership, petitioner and respondent PLDT gave their
respective explanations on how a telephone call is generated. For its part, respondent
PLDT explains the process of generating a telephone call as follows:
In the assailed Decision, it was conceded that in making the international phone
calls, the human voice is converted into electrical impulses or electric current which are
transmitted to the party called. A telephone call, therefore, is electrical energy. It was also
held in the assailed Decision that intangible property such as electrical energy is capable
of appropriation because it may be taken and carried away. Electricity is personal
property under Article 416 (3) of the Civil Code, which enumerates "forces of nature
which are brought under control by science."
Indeed, while it may be conceded that "international long distance calls", the matter
alleged to be stolen in the instant case, take the form of electrical energy, it cannot be said
that such international long distance calls were personal properties belonging to PLDT
since the latter could not have acquired ownership over such calls. PLDT merely
encodes, augments, enhances, decodes and transmits said calls using its complex
communications infrastructure and facilities. PLDT not being the owner of said
24
telephone calls, then it could not validly claim that such telephone calls were taken
without its consent. It is the use of these communications facilities without the consent
of PLDT that constitutes the crime of theft, which is the unlawful taking of the telephone
services and business.
The respondent's claim that the admission of the text messages as evidence against
him constitutes a violation of his right to privacy is unavailing. Text messages have been
classified as "ephemeral electronic communication" under Section 1 (k), Rule 2 of
the Rules on Electronic Evidence, and "shall be proven by the testimony of a person who
was a party to the same or has personal knowledge thereof." Any question as to the
admissibility of such messages is now moot and academic, as the respondent himself, as
well as his counsel, already admitted that he was the sender of the first three messages on
Atty. Madarang's cell phone.
This was also the ruling of the Court in the recent case of Zaldy Nuez v. Elvira
Cruz-Apao. In that case, the Court, in finding the respondent therein guilty of dishonesty
and grave misconduct, considered text messages addressed to the complainant asking for
a million pesos in exchange for a favorable decision in a case pending before the CA. The
Court had the occasion to state:
25
ZALDY NUEZ v. ELVIRA CRUZ-APAO
A.M. No. CA-05-18-P, April 12, 2005, EN BANC (PER CURIAM)
Complainant was able to prove by his testimony in conjunction with the text
messages from respondent duly presented before the Committee that the latter asked for
One Million Pesos (P1,000,000.00) in exchange for a favorable decision of the former's
pending case with the CA. The text messages were properly admitted by the Committee
since the same are now covered by Section 1(k), Rule 2 of the Rules on Electronic
Evidence which provides:
Although the parties did not raise the question whether the original facsimile
transmissions are "electronic data messages" or "electronic documents" within the
context of the Electronic Commerce Act (the petitioner merely assails as inadmissible
evidence the photocopies of the said facsimile transmissions), we deem it appropriate to
determine first whether the said fax transmissions are indeed within the coverage of R.A.
No. 8792 before ruling on whether the photocopies thereof are covered by the law. In any
case, this Court has ample authority to go beyond the pleadings when, in the interest of
justice or for the promotion of public policy, there is a need to make its own findings in
order to support its conclusions.
Petitioner contends that the photocopies of the pro forma invoices presented by
respondent Ssangyong to prove the perfection of their supposed contract of sale are
inadmissible in evidence and do not fall within the ambit of R.A. No. 8792, because the
law merely admits as the best evidence the original fax transmittal. On the other hand,
respondent posits that, from a reading of the law and the Rules on Electronic Evidence,
the original facsimile transmittal of the pro forma invoice is admissible in evidence since
it is an electronic document and, therefore, the best evidence under the law and the Rules.
Respondent further claims that the photocopies of these fax transmittals
(specifically ST2-POSTS0401-1 and ST2-POSTS0401-2) are admissible under the
Rules on Evidence because the respondent sufficiently explained the non-production of
the original fax transmittals.
26
authenticated in the manner prescribed by the said Rules. An electronic document is also
the equivalent of an original document under the Best Evidence Rule, if it is a printout or
output readable by sight or other means, shown to reflect the data accurately.
"Electronic record" fixes the scope of the Act. The record is the data. The record
may be any medium. It is "electronic" because it is recorded or stored in or by a computer
system or similar device. The Act is intended to apply, for example, to data on magnetic
strips on cards, or in smart cards. As drafted, it would not apply to telexes or faxes
(except computer-generated faxes), unlike the United Nations Model Law on Electronic
Commerce. It would also not apply to regular digital telephone conversations, since the
information is not recorded. It would apply to voice mail, since the information has been
recorded in or by a device similar to a computer. Likewise video records are not covered,
though when the video is transferred to a Web site it would be, because of the
involvement of the computer. Music recorded by a computer system on a compact disk
would be covered.
In short, not all data recorded or stored in "digital" form is covered. A computer or
similar device has to be involved in its creation or storage. The term "similar device"
does not extend to all devices that create or store data in digital form. Although things
that are not recorded or preserved by or in a computer system are omitted from this Act,
they may well be admissible under other rules of law. This Act focuses on replacing the
search for originality, proving the reliability of systems instead of that of individual
records, and using standards to show systems reliability.
Paper records that are produced directly by a computer system, such as printouts,
are themselves electronic records, being just the means of intelligible display of the
contents of the record. Photocopies of the printout would be paper records subject to the
usual rules about copies, but the "original" printout would be subject to the rules of
admissibility of this Act.
However, printouts that are used only as paper records, and whose computer origin
is never again called on, are treated as paper records. See subsection 4(2). In this case the
reliability of the computer system that produced the record is relevant to its reliability.
There is no question then that when Congress formulated the term "electronic data
message," it intended the same meaning as the term "electronic record" in the Canada
law. This construction of the term "electronic data message," which excludes telexes or
faxes, except computer-generated faxes, is in harmony with the Electronic Commerce
Law's focus on "paperless" communications and the "functional equivalent approach"
that it espouses. In fact, the deliberations of the Legislature are replete with discussions
on paperless and digital transactions.
Facsimile transmissions are not, in this sense, "paperless," but verily are paper-
based.
27
into a series of zeros and ones (called a bit map) that can be transmitted like normal
computer data. On the receiving side, a fax machine reads the incoming data, translates
the zeros and ones back into dots, and reprints the picture. A fax machine is essentially an
image scanner, a modem and a computer printer combined into a highly specialized
package. The scanner converts the content of a physical document into a digital image,
the modem sends the image data over a phone line, and the printer at the other end makes
a duplicate of the original document. Thus, in Garvida v. Sales, Jr., where we explained
the unacceptability of filing pleadings through fax machines, we ruled that:
We, therefore, conclude that the terms "electronic data message" and "electronic
document," as defined under the Electronic Commerce Act of 2000, do not include a
facsimile transmission. Accordingly, a facsimile transmission cannot be considered
as electronic evidence. It is not the functional equivalent of an original under the Best
Evidence Rule and is not admissible as electronic evidence.
28
or by which a fact may be proved and affirmed, which is received, recorded,
transmitted, stored, processed, retrieved or produced electronically. It includes
digitally signed documents and any printout, readable by sight or other means which
accurately reflects the electronic data message or electronic document.
The rules use the word "information" to define an electronic document received,
recorded, transmitted, stored, processed, retrieved or produced electronically. This would
suggest that an electronic document is relevant only in terms of the information contained
therein, similar to any other document which is presented in evidence as proof of its
contents. However, what differentiates an electronic document from a paper-based
document is the manner by which the information is processed; clearly, the information
contained in an electronic document is received, recorded, transmitted, stored, processed,
retrieved or produced electronically.
Furthermore, no error can be ascribed to the court a quo in denying admission and
excluding from the records petitioner's Exhibits "A", "C", "D", "E", "H" and its sub-
markings, "I", "J" and its sub-markings, "K", "L", "M" and its sub-markings, "N" and its
sub-markings, "O", "P" and its sub-markings, "Q" and its sub-markings, and "R". The
trial court was correct in rejecting these photocopies as they violate the best evidence rule
and are therefore of no probative value being incompetent pieces of evidence. Before the
onset of liberal rules of discovery, and modern technique of electronic copying, the best
evidence rule was designed to guard against incomplete or fraudulent proof and the
introduction of altered copies and the withholding of the originals. But the modern
justification for the rule has expanded from the prevention of fraud to a recognition that
writings occupy a central position in the law. The importance of the precise terms of
writings in the world of legal relations, the fallibility of the human memory as reliable
evidence of the terms, and the hazards of inaccurate or incomplete duplicate are the
concerns addressed by the best evidence rule.
29
the fact sought to be established from them is only the general
result of the whole."
When the original document has been lost or destroyed, or cannot be produced in
court, the offeror, upon proof of its execution or existence and the cause of its
unavailability without bad faith on his part, may prove its contents by a copy, or by a
recital of its contents in some authentic document, or by the testimony of witnesses in the
order stated. The offeror of secondary evidence is burdened to prove the predicates
thereof: (a) the loss or destruction of the original without bad faith on the part of the
proponent/offeror which can be shown by circumstantial evidence of routine practices of
destruction of documents; (b) the proponent must prove by a fair preponderance of
evidence as to raise a reasonable inference of the loss or destruction of the original copy;
and (c) it must be shown that a diligent and bona fide but unsuccessful search has been
made for the document in the proper place or places. However, in the case at bar, though
petitioner insisted in offering the photocopies as documentary evidence, it failed to
establish that such offer was made in accordance with the exceptions as enumerated
under the above quoted rule. Accordingly, we find no error in the Order of the court a
quo denying admissibility of the photocopies offered by petitioner as documentary
evidence.
30