Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

A.M. No. 08-1-16-SC, February 2, 2008 SEC. 4. Where Returnable; Enforceable.

 - When the writ is


issued by a Regional Trial Court or any judge thereof, it shall be
THE RULE ON THE WRIT OF HABEAS DATA returnable before such court or judge.

SECTION 1. Habeas Data. - The writ of habeas data is a remedy When issued by the Court of Appeals or the Sandiganbayan or
available to any person whose right to privacy in life, liberty or any of its justices, it may be returnable before such court or any
security is violated or threatened by an unlawful act or omission justice thereof, or to any Regional Trial Court of the place where
of a public official or employee, or of a private individual or entity the petitioner or respondent resides, or that which has jurisdiction
engaged in the gathering, collecting or storing of data or over the place where the data or information is gathered,
information regarding the person, family, home and collected or stored.
correspondence of the aggrieved party.
When issued by the Supreme Court or any of its justices, it may
SEC. 2. Who May File. - Any aggrieved party may file a petition be returnable before such Court or any justice thereof, or before
for the writ of habeas data. However, in cases of extralegal the Court of Appeals or the Sandiganbayan or any of its justices,
killings and enforced disappearances, the petition may be filed or to any Regional Trial Court of the place where the petitioner or
by: respondent resides, or that which has jurisdiction over the place
where the data or information is gathered, collected or stored.
(a) Any member of the immediate family of the aggrieved
party, namely: the spouse, children and parents; or The writ of habeas data shall be enforceable anywhere in the
Philippines.
(b) Any ascendant, descendant or collateral relative of the
aggrieved party within the fourth civil degree of Sec. 5. Docket Fees. - No docket and other lawful fees shall be
consanguinity or affinity, in default of those mentioned in required from an indigent petitioner. The petition of the indigent
the preceding paragraph; or shall be docked and acted upon immediately, without prejudice to
subsequent submission of proof of indigency not later than fifteen
(15) days from the filing of the petition.
SEC. 3. Where to File. - The petition may be filed with the
Regional Trial Court where the petitioner or respondent resides,
or that which has jurisdiction over the place where the data or SEC. 6. Petition. - A verified written petition for a writ of habeas
information is gathered, collected or stored, at the option of the data should contain:
petitioner.
(a) The personal circumstances of the petitioner and the
The petition may also be filed with the Supreme Court or the respondent;
Court of Appeals or the Sandiganbayan when the action concerns
public data files of government offices. (b) The manner the right to privacy is violated or
threatened and how it affects the right to life, liberty or
security of the aggrieved party;
(c) The actions and recourses taken by the petitioner to the court, justice or judge who shall retain a copy on which to
secure the data or information; make a return of service. In case the writ cannot be served
personally on the respondent, the rules on substituted service
(d) The location of the files, registers or databases, the shall apply.
government office, and the person in charge, in
possession or in control of the data or information, if SEC. 10. Return; Contents. - The respondent shall file a verified
known; written return together with supporting affidavits within five (5)
working days from service of the writ, which period may be
(e) The reliefs prayed for, which may include the reasonably extended by the Court for justifiable reasons. The
updating, rectification, suppression or destruction of the return shall, among other things, contain the following:
database or information or files kept by the respondent.
(a) The lawful defenses such as national security, state
      In case of threats, the relief may include a prayer for secrets, privileged communications, confidentiality of the
an order enjoining the act complained of; and source of information of media and others;

(f) Such other relevant reliefs as are just and equitable. (b) In case of respondent in charge, in possession or in
control of the data or information subject of the petition;
SEC. 7. Issuance of the Writ. - Upon the filing of the petition, the
court, justice or judge shall immediately order the issuance of the (i) a disclosure of the data or information about
writ if on its face it ought to issue. The clerk of court shall issue the petitioner, the nature of such data or
the writ under the seal of the court and cause it to be served information, and the purpose for its collection;
within three (3) days from the issuance; or, in case of urgent
necessity, the justice or judge may issue the writ under his or her (ii) the steps or actions taken by the respondent to
own hand, and may deputize any officer or person serve it. ensure the security and confidentiality of the data
or information; and,
The writ shall also set the date and time for summary hearing of
the petition which shall not be later than ten (10) work days from (iii) the currency and accuracy of the data or
the date of its issuance. information held; and,

SEC. 8. Penalty for Refusing to Issue or Serve the Writ. - A (c) Other allegations relevant to the resolution of the
clerk of court who refuses to issue the writ after its allowance, or proceeding.
a deputized person who refuses to serve the same, shall be
punished by the court, justice or judge for contempt without A general denial of the allegations in the petition shall not be
prejudice to other disciplinary actions. allowed.

SEC. 9. How the Writ is Served. - The writ shall be served upon SEC. 11. Contempt. - The court, justice or judge may punish with
the respondent by a judicial officer or by a person deputized by imprisonment or fine a respondent who commits contempt by
making a false return, or refusing to make a return; or any person (k) Motion for reconsideration of interlocutory orders or
who otherwise disobeys or resist a lawful process or order of the interim relief orders; and
court.
(l) Petition for certiorari, mandamus or prohibition against
SEC. 12. When Defenses May be Heard in Chambers. - A any interlocutory order.
hearing in chambers may be conducted where the respondent
invokes the defense that the release of the data or information in SEC. 14. Return; Filing. - In case the respondent fails to file a
question shall compromise national security or state secrets, or return, the court, justice or judge shall proceed to hear the
when the data or information cannot be divulged to the public due petition ex parte, granting the petitioner such relief as the petition
to its nature or privileged character. may warrant unless the court in its discretion requires the
petitioner to submit evidence.
Sec. 13. Prohibited Pleadings and Motions. - The following
pleadings and motions are prohibited: SEC. 15. Summary Hearing. - The hearing on the petition shall
be summary. However, the court, justice or judge may call for a
(a) Motion to dismiss; preliminary conference to simplify the issues and determine the
possibility of obtaining stipulations and admissions from the
(b) Motion for extension of time to file return, opposition, parties.
affidavit, position paper and other pleadings;
SEC. 16. Judgment. - The court shall render judgment within ten
(c) Dilatory motion for postponement; (10) days from the time the petition is submitted for decision. If
the allegations in the petition are proven by substantial evidence,
(d) Motion for a bill of particulars; the court shall enjoin the act complained of, or order the deletion,
destruction, or rectification of the erroneous data or information
and grant other relevant reliefs as may be just and equitable;
(e) Counterclaim or cross-claim;
otherwise, the privilege of the writ shall be denied.
(f) Third-party complaint;
Upon its finality, the judgment shall be enforced by the sheriff or
any lawful officers as may be designated by the court, justice or
(g) Reply; judge within five (5) working days.

(h) Motion to declare respondent in default; SEC. 17. Return of Service. - The officer who executed the final
judgment shall, within three (3) days from its enforcement, make
(i) Intervention; a verified return to the court. The return shall contain a full
statement of the proceedings under the writ and a complete
(j) Memorandum; inventory of the database or information, or documents and
articles inspected, updated, rectified, or deleted, with copies
served on the petitioner and the respondent.
The officer shall state in the return how the judgment was writ shall be filed. The relief under the writ shall be available to an
enforced and complied with by the respondent, as well as all aggrieved party by motion in the criminal case.
objections of the parties regarding the manner and regularity of
the service of the writ. The procedure under this Rule shall govern the disposition of the
reliefs available under the writ of habeas data.
SEC. 18. Hearing on Officer’s Return. - The court shall set the
return for hearing with due notice to the parties and act SEC. 23. Substantive Rights. - This Rule shall not diminish,
accordingly. increase or modify substantive rights.

SEC. 19. Appeal. - Any party may appeal from the final judgment SEC. 24. Suppletory Application of the Rules of Court. - The
or order to the Supreme Court under Rule 45. The appeal may Rules of Court shall apply suppletorily insofar as it is not
raise questions of fact or law or both. inconsistent with this Rule.

The period of appeal shall be five (5) working days from the date SEC. 25. Effectivity. - This Rule shall take effect on February 2,
of notice of the judgment or final order. 2008, following its publication in three (3) newspapers of general
circulation.
The appeal shall be given the same priority as in habeas
corpus and amparo cases. [PUBLISHED IN THE MANILA BULLETIN, THE PHILIPPINE
STAR AND THE PHILIPPINE DAILY INQUIRER ON 25
SEC. 20. Institution of Separate Actions. - The filing of a JANUARY 2008]
petition for the writ of habeas data shall not preclude the filing of
separate criminal, civil or administrative actions.

SEC. 21. Consolidation. - When a criminal action is filed


subsequent to the filing of a petition for the writ, the latter shall be
consolidated with the criminal action.

When a criminal action and a separate civil action are filed


subsequent to a petition for a writ of habeas data, the petition
shall be consolidated with the criminal action.

After consolidation, the procedure under this Rule shall continue


to govern the disposition of the reliefs in the petition.

SEC. 22. Effect of Filing of a Criminal Action. - When a


criminal action has been commenced, no separate petition for the
Roxas v. Macapagal-Arroyo, G.R. No. 189155, September 7, 2010, Meralco v. Lim. G.R. No. 184769, October 5, 2010
Facts:
630 SCRA 211
A letter was sent to the Meralco admin department in bulacan denouncing Lim, an
administrative clerk. She was ordered to be transferred to Alabang due to concerns
over her safety. She complained under the premise that the transfer was a denial
of her due process. She wrote a letter stating that:
“It appears that the veracity of these accusations and threats to be [sic] highly
suspicious, doubtful or are just mere jokes if they existed at all.” She added,
“instead of the management supposedly extending favor to me, the net result and
effect of management action would be a punitive one.” She asked for deferment
thereafter. Since the company didn’t respond, she filed for a writ of habeas data in
the Bulacan RTC due to meralco’s omission of provding her with details about the
report of the letter. To her, this constituted a violation of her liberty and security.
She asked for disclosure of the data and measures for keeping the confidentiality of
the data.
Meralco filed a reply saying that the jurisdiction was with the NLRC and that the
petition wasn’t in order.
Trial court ruled in her favor.
In the SC, Meralco petitioned that Habeas Data applies to entities engaged in the
gathering, collecting or storing of data or information regarding an aggrieved
party’s person, family or home
Issue: Is Habeas Data the right remedy for Lim?
Held: No, petition dismissed
Ratio:
“Section 1. Habeas Data. – The writ of habeas data is a remedy available to any
person whose right to privacy in life, liberty or security is violated or threatened by
an unlawful act or omission of a public official or employee or of a private
individual or entity engaged in the gathering, collecting or storing of data or
information regarding the person, family, home and correspondence of the
aggrieved party”
It’s a forum for enforcing one’s right to the truth. Like amparo, habeas data was a
response to killings and enforced disappearances.
Castillo v Cruz- and habeas data will NOT issue to protect purely property or
commercial concerns nor when the grounds invoked in support of the petitions
therefor are vague or doubtful.
Employment is a property right in the due process clause. Lim was concerned with
her employment, one that can be solved in the NLRC.
There was no violation of respondent’s right to privacy. Respondent even said that seeks to protect a person’s right to control information regarding
the letters were mere jokes and even conceded the fact that the issue was labor
oneself, particularly in instances in which such information is being
related due to references to “real intent of management”.
collected through unlawful means in order to achieve unlawful
Gamboa v. Chan, G.R. No. 193636, July 24, 2012, 677 SCRA 385. ends. It must be emphasized that in order for the privilege of the
FACTS writ to be granted, there must exist a nexus between the right to
privacy on the one hand, and the right to life, liberty or security on
Gamboa alleged that the Philippine National Police in Ilocos Norte the other.
(PNP–Ilocos Norte) conducted a series of surveillance operations
against her and her aides, and classified her as someone who keeps In this case, the Court ruled that Gamboa was unable to prove
a Private Army Group (PAG). Purportedly without the benefit of through substantial evidence that her inclusion in the list of
data verification, PNP–Ilocos Norte forwarded the information individuals maintaining PAGs made her and her supporters
gathered on her to the Zeñarosa Commission, thereby causing her susceptible to harassment and to increased police surveillance. In
inclusion in the Report’s enumeration of individuals maintaining this regard, respondents sufficiently explained that the
PAGs. Contending that her right to privacy was violated and her investigations conducted against her were in relation to the criminal
reputation maligned and destroyed, Gamboa filed a Petition for the cases in which she was implicated. As public officials, they enjoy the
issuance of a writ of habeas data against respondents in their presumption of regularity, which she failed to overcome. [T]he state
capacities as officials of the PNP-Ilocos Norte. interest of dismantling PAGs far outweighs the alleged intrusion on
the private life of Gamboa, especially when the collection and
ISSUE forwarding by the PNP of information against her was pursuant to a
lawful mandate. Therefore, the privilege of the writ of habeas data
Whether or not the petition for the issuance of writ of habeas data must be denied.
is proper when the right to privacy is invoked as opposed to the
state’s interest in preserving the right to life, liberty or security.

RULING

NO.

The writ of habeas data is an independent and summary remedy


designed to protect the image, privacy, honor, information, and
freedom of information of an individual, and to provide a forum to
enforce one’s right to the truth and to informational privacy. It
VIVARES v. ST. THERESA'S COLLEGE, G.R. No. 202666, September 29,
2014
In January 2012, Angela Tan, a high school student at St. Theresa’s
College (STC), uploaded on Facebook several pictures of her and her
classmates (Nenita Daluz and Julienne Suzara) wearing only their
undergarments.

Thereafter, some of their classmates reported said photos to their


teacher, Mylene Escudero. Escudero, through her students, viewed
and downloaded said pictures. She showed the said pictures to
STC’s Discipline-in-Charge for appropriate action.

Later, STC found Tan et al to have violated the student’s handbook


and banned them from “marching” in their graduation ceremonies
scheduled in March 2012.

The issue went to court but despite a TRO (temporary restraining


order) granted by the Cebu RTC enjoining the school from barring
the students in the graduation ceremonies, STC still barred said
students.

Subsequently, Rhonda Vivares, mother of Nenita, and the other


mothers filed a petition for the issuance of the writ of habeas data
against the school. They argued, among others, that:

1. The privacy setting of their children’s Facebook accounts was set


at “Friends Only.” They, thus, have a reasonable expectation of
privacy which must be respected.

2. The photos accessed belong to the girls and, thus, cannot be


used and reproduced without their consent. Escudero, however,
violated their rights by saving digital copies of the photos and by
subsequently showing them to STC’s officials. Thus, the Facebook entity engaged in the business of gathering, storing, and collecting
accounts of the children were intruded upon; of data.

3. The intrusion into the Facebook accounts, as well as the copying Right to Privacy on Social Media (Online Networking Sites)
of information, data, and digital images happened at STC’s
Computer Laboratory; The Supreme Court ruled that if an online networking site (ONS) like
Facebook has privacy tools, and the user makes use of such privacy
They prayed that STC be ordered to surrender and deposit with the tools, then he or she has a reasonable expectation of privacy (right
court all soft and printed copies of the subject data and have such to informational privacy, that is). Thus, such privacy must be
data be declared illegally obtained in violation of the children’s right respected and protected.
to privacy.
In this case, however, there is no showing that the students
The Cebu RTC eventually denied the petition. Hence, this appeal. concerned made use of such privacy tools. Evidence would show
that that their post (status) on Facebook were published as “Public”.
ISSUE: Whether or not the petition for writ of habeas data is proper.
Facebook has the following settings to control as to who can view a
HELD: Yes, it is proper but in this case, it will not prosper. user’s posts on his “wall” (profile page):

Contrary to the arguments of STC, the Supreme Court ruled that: (a) Public – the default setting; every Facebook user can view the
photo;
1. The petition for writ of habeas data can be availed of even if this
is not a case of extralegal killing or enforced disappearance; and (b) Friends of Friends – only the user’s Facebook friends and their
friends can view the photo;
2. The writ of habeas data can be availed of against STC even if it is
not an entity engaged in the business of “gathering, collecting, or (c) Friends – only the user’s Facebook friends can view the photo;
storing data or information regarding the person, family, home and
correspondence of the aggrieved party”. (d) Custom – the photo is made visible only to particular friends
and/or networks of the Facebook user; and
First, the Rule on Habeas Data does not state that it can be applied
only in cases of extralegal killings or enforced disappearances. (e) Only Me – the digital image can be viewed only by the user.
Second, nothing in the Rule would suggest that the habeas data
protection shall be available only against abuses of a person or
The default setting is “Public” and if a user wants to have some 2. United States v. Maxwell: “The more open the method of
privacy, then he must choose any setting other than “Public”. If it is transmission is, the less privacy one can reasonably expect.
true that the students concerned did set the posts subject of this Messages sent to the public at large in the chat room or e-mail that
case so much so that only five people can see them (as they claim), is forwarded from correspondent to correspondent loses any
then how come most of their classmates were able to view them. semblance of privacy.”
This fact was not refuted by them. In fact, it was their classmates
who informed and showed their teacher, Escudero, of the said 3. H v. W, (South Africa Case dated January 30, 2013): “The law has
pictures. Therefore, it appears that Tan et al never use the privacy to take into account the changing realities not only technologically
settings of Facebook hence, they have no reasonable expectation of but also socially or else it will lose credibility in the eyes of the
privacy on the pictures of them scantily clad. people. x x x It is imperative that the courts respond appropriately
to changing times, acting cautiously and with wisdom.”
STC did not violate the students’ right to privacy. The manner which
the school gathered the pictures cannot be considered illegal. As it This case recognized this ability of Facebook users to “customize
appears, it was the classmates of the students who showed the their privacy settings,” but did so with this caveat: “Facebook states
picture to their teacher and the latter, being the recipient of said in its policies that, although it makes every effort to protect a user’s
pictures, merely delivered them to the proper school authority and information, these privacy settings are not foolproof.”
it was for a legal purpose, that is, to discipline their students
according to the standards of the school (to which the students and
their parents agreed to in the first place because of the fact that
they enrolled their children there).

Some notable foreign jurisprudence used by the Supreme Court in


this case:

1. United States v. Gines-Perez: “A person who places a photograph


on the Internet precisely intends to forsake and renounce all privacy
rights to such imagery, particularly under circumstances such as
here, where the Defendant did not employ protective measures or
devices that would have controlled access to the Web page or the
photograph itself.”

You might also like