Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

C.

Originator - person by whom, or on whose behalf, the data message


UNCITRAL MODEL LAW ON E-COMMERCE (MLEC)
purports to have been sent or generated prior to storage, if any
I. Legal basis - UNGA Resolution 51/162
ARTICLE 13: A data message is that of the originator if sent by:
II. Purpose - to enable and facilitate commerce conducted using electronic
A. Originator itself
means by providing national legislators with a set of internationally B. Person who had the authority to act on behalf of the originator
acceptable rules aimed at removing legal obstacles and increasing legal C. Information system programmed by, or on behalf of, the
predictability for e-commerce originator
III. Fundamental principles An addressee may regard a data message as that of the originator if:
A. Non-discrimination - ensures that a document would not be denied A. Addressee properly applied a procedure previously agreed to
legal effect, validity or enforceability solely on the grounds that it is by the originator to ascertain
B. Data message resulted from actions of a person whose
in electronic form relationship with the originator or his agent enabled that
(NOTE: This principle is embodied in Article 5 of the law and is person to gain access to a method used by the originator
sometimes referred to as media neutrality)
Thereafter, the addressee is entitled to act on that assumption.
ARTICLE 5 BIS ON INCORPORATION: Information shall not be denied
legal effect, validity or enforceability solely on the grounds that it is not ARTICLE 14: When the parties agree that receipt of the data message
contained, but is merely referred to in the data message. has to be acknowledged, the following rules are to observed:
A. No agreement as to form of acknowledgment
B. Technological neutrality - mandates the adoption of provisions that
1. Given by any communication by the addressee
are neutral with respect to technology used; this aims to 2. Given by any conduct of the addressee
accommodate any developments without further legislative work B. Data message is conditional on receipt of acknowledgment -
C. Functional equivalence - lays out criteria under which e- data message is treated as not sent, until acknowledgment
received
communications may be considered equivalent to paper-based
communication; sets out the specific requirements that e- D. Addressee - person who is intended by the originator to receive the
communications need to meet in order to fulfill the same purposes data message
and functions as traditional paper-based system (NOTE: “Originator” and “Addressee”, however, is exclusive of
IV. Definitions (Article 2) intermediaries)
A. Data message - information generated, sent, received or stored by E. Intermediary - person who, on behalf of another, sends, receives or
electronic, optical or similar means stores data message or provides other services with respect to that
B. Electronic data interchange (EDI) - means the electronic transfer data message
from computer to computer of information using an agreed F. Information system - means a system for generating, sending,
standard to structure the information receiving, storing or otherwise processing data messages
V. Interpretation 4. Admissibility (Article 9) - a data message shall not be denied
A. GR (Article 3)- regard must be had to international origin of the law admissibility on the sole ground that it is a data message
and the need to promote uniformity in its application and the 5. Evidential weight (Article 9) - information in the form of a
observance of good faith data message shall be given due evidential weight.
B. XPN (Article 4) - parties involved may vary by agreement as to the ADMISSIBILITY EVIDENTIAL WEIGHT
processing of data messages
VI. Application Refers to relevance and Refers to info or document already
competence of an info or admitted, and subsequently, its
A. General application (Article 1) - law applies to any kind of
document to an issue tendency to persuade
information in the form of a data message used in the context of
6. Retention (Article 10) - requirement for retention of
commercial activities
(NOTE: “Commercial” covers matters arising from all relationships documents or info is met if:
a. Info is accessible
of a commercial nature.)
B. Application of requirements to data messages; in re: principle of b. Data message is retained in the format it was
generated, sent, or received
non-discrimination
1. In writing (Article 6) - met if the information contained in a c. Info enables the identification of the origin and
destination of data message and date and time it
data message is accessible so as to be usable for
subsequent reference was sent or received
VII. Communication of data messages
2. Signature (Article 7) - met if:
a. A method is used to identify the person and to A. Contracts (Article 11) - offer and acceptance may be expressed by
means of data messages; if done so, contract created shall not be
indicate his approval of the information
b. Such method is reliable denied validity or enforceability
B. Recognition (Article 12) - as between the originator and the
(NOTE: Test for reliability is provided under the
Model Law on E-Signatures) addressee, a declaration of will or other statement shall not be
denied effect, validity, or enforceability
3. In original form (Article 8) - met if:
a. There is reliable assurance as to the integrity of the
info UNCITRAL MODEL LAW ON E-SIGNATURES (MLES)
TEST FOR DETERMINING INTEGRITY: W/N information has remained I. Legal basis - UNGA Resolution A/56/588
complete and unaltered II. Fundamental principles - observes same principles as MLEC
b. Where presentation is required, that info is capable
of being displayed
III. Purpose - to enable and facilitate the use of e-signatures by establishing for the purpose which the data message was generated tro
criteria of technical reliability for the equivalence between electronic and communicated
hand-written signatures CRITERIA FOR RELIABILITY:
IV. Definitions (Article 2) A. Signature creation data (“SCD”) are linked to the signatory
A. Electronic signature - data in electronic form in, affixed to or B. SCD were under the control of the signatory
logically associated with, a data message, which may be used to C. Any alteration to the e-signature, made after the time of
signing, is detectable
identify the signatory D. Where the purpose of the signature is to provide assurance as
B. Certificate - data message or other record confirming the link to the integrity of the into to which it relates, any alteration
between a signatory and signature creation data made to the info is detectable.
C. Data message - information generated, sent, received or stored by VII. Conduct of signatory (Article 8)
electronic, optical or similar means A. Must exercise reasonable care to avoid unauthorized use of its SCD
D. Signatory - person that holds signature creation data and acts either B. Utilize means made available by the CSP pursuant to the law, or
on its own behalf or on behalf of the person it represents otherwise use reasonable efforts, to notify any person that may
E. Certification service provider (“CSP”) - person that issues certificates reasonably be expected by signatory to rely on or to provide
and may provide other services related to e-signatures services in support of the e-sig, if:
F. Relying party - person that may act on the basis of a certificate or an 1. Signatory knows the SCD have been compromised
e-signature 2. Circumstances known to signatory give rise to a substantial
V. Interpretation risk that the SCD may have been compromised
A. GR (Article 4)- regard must be had to international origin of the law C. Where a certificate is used to support the e-signature, exercise
and the need to promote uniformity in its application and the reasonable care to ensure the accuracy and completeness of all
observance of good faith material representations made by signatory relevant to the
B. XPN (Article 5) - law may be derogated from or their effect be varied certificate
by agreement VIII. Conduct of the certification service provider (“CSP”)
(NOTE: Provisions on interpretation are essentially the same with MLES) A. Act in accordance with representations made by it with respect to
VI. Application its policies and practices
A. General application (Article 1) - law applies where e-signatures are B. Exercise reasonable care to ensure the accuracy and completeness
used in the context of commercial activities; does not override any of all material representations made by it that are relevant to the
rule of law intended for protection of consumers certificate
B. Application of requirement for a signature (Article 6) - requirement C. Provide means that enable a relying party to ascertain from the
is met if an e-signature is used that is as reliable as was appropriate certificate the ff:
1. Identity of the CSP IX. Conduct of relying party (Article 11)
2. That the signatory identified in the certificate had control of A. Must take reasonable steps to verify the reliability of an e-signature
the SCD at the time certificate was issued B. Where e-signature is supported by a certificate, to take reasonable
3. That SCD were valid at or before the time the certificate was steps to:
issued 1. Verify the validity, suspension, or revocation of the
D. Provide means that enable a relying party to ascertain, where certificate
relevant, from the certificate the ff: 2. Observe any limitation with respect to the certificate
1. Method used to identify the signatory X. Recognition of foreign cert and e-signatures (Article 12)
2. Any limitation on the purpose or value for which the SCD or A. Cert or e-signature is legally effective regardless of the geographical
certificate may be used location where it was issued, created or used or where the place of
3. That the SCD are valid and not compromised business of the issuer or signatory is located
4. Any limitation on the scope or extent of liability stipulated B. Cert issued or e-signature created or used outside the enacting
by the CSP State shall have same legal effect in such state if it offers a
5. W/N means exist for signatory to give notice substantially equivalent level of reliability
6. W/N a timely revocation service is offered C. In determining “substantially equivalent level of reliability”, regard
E. Where notice services are offered, provide means for a signatory to shall be had to recognized international standards and other
give notice; where revocation services are offered, ensure the relevant factors
availability of timely revocation service D. Notwithstanding the above-stated, the parties may agree to the use
F. Utilize trustworth systems, procedures, and human resources in of certain types of certs or e-signatures and such agreement shall be
performing its services recognized as sufficient for cross-border recognition
ARTICLE 10 ON TRUSTWORTHINESS: In determining trustworthiness of
CSP, regard may be had to the following factors: RA 8792 (E-Commerce Act)
1. Financial and human resources
2. Quality of hardware and software systems I. Declaration of policies (Section 2)
3. Procedures for processing of and applications for certificates A. Vital role of ICT in nation-building
and retention of records
B. Need to create an in formation-friendly environment
4. Availability of info to signatories identified in certificates and to
potential relying parties C. Primary responsibility of private sector in contributing investments
5. Regularity and extent of audit by an independent body and services in ICT
6. Existence of a declaration by the State, an accreditation body, D. Need to develop HR for the information age
or the CSP regarding compliance
E. Obligation to facilitate the transfer and promotion of technology
7. Any other relevant factor
F. Ensure network security, connectivity, and neutrality of technology E. Electronic Signature - any distinctive mark, characteristic and/or
G. Need to marshal, organize, deploy national information sound in electronic form, representing the identity of a person and
infrastructures attached to or logically associated with the EDM or electronic
II. Objective (Section 3) - to facilitate domestic and international processes re: document or any methodology or procedures employed or adopted
information through the utilization of electronic, optical and similar medium by a person and executed or adopted by such person with the
to recognize the authenticity and reliability of EDMs or EDs related to such intention of authenticating or approving an EDM or ED.
activities and to promote the universal use of electronic transactions F. Electronic Document (ED) - refers to info or the representation of
III. Application (Section 4) - applies to any kind of EDM and ED used in the information, data, figures, symbols or other modes of written
context of commercial and non-commercial activities expression, described or however represented, by which a right is
(NOTE: This in contrast with the MLEC, which only provides for commercial established or an obligation extinguished, or by which a fact may
activities) be prove and affirmed, which is receive, recorded, transmitted,
IV. Definitions stored, processed, retrieved or produced electronically.
A. Addressee - same definition used in MLES G. Electronic Key - a secret code which secures and defends sensitive
B. Computer - any device or apparatus which, by electronic, electro- information that cross over public channels into a form
mechanical, or magnetic impulse, or by other means, is capable of decipherable only with a matching electronic key
receiving, recording, transmitting, storing, processing, retrieving, or H. Intermediary - same definition used in MLES
producing information, data, figures, symbols or other modes of I. Originator - same definition used in MLES
written expression according to mathematical and logical rules or of J. Service provider - provider of:
performing any one or more of these functions 1. On-line services or network access or the operator of
C. Electronic Data Message (EDM) - info generated, sent, received or facilities; or
stored by electronic, optical or similar means 2. Necessary technical means by which EDs of an originator
(NOTE: Congress deliberately omitted the phrase “but not limited may be stored and made accessible to designated or
to, electronic data interchange (EDI), electronic mail, telegram, telex undesignated third party.
or telecopy” suggested in MLEC. See MCC Industrial case) V. Legal recognition
D. Information and Communications System - refers to a system (NOTE: The chapter on legal recognition follows the MLES principle of
intended for and capable of generating, sending, receiving, storing, functional equivalence)
or otherwise processing EDMs or electronic documents (EDs) and A. Electronic Data Message (Section 6) - info shall not be denied legal
includes the computer system or other similar device by or in which effect, validity or enforceability solely on the grounds that it is in the
data is recorded or stored and any procedures related to the data message purporting to give rise to such legal effect, or that it is
recording or storage of EDMs or EDs. merely referred to in that EDM
B. Electronic documents (Section 7) - shall have the legal effect, validity (NOTE: E-signatures that don’t comply with these requirements
or enforceability as any other document or legal writing, and: can still be used to prove the consent of an individual to the
1. In writing - met if the ED maintains its integrity and document which they signed electronically)
reliability and can be authenticated so as to be usable for
subsequent reference
TEST FOR DETERMINING INTEGRITY: W/N document has remained VI. ORIGINAL DOCUMENTS
complete and unaltered A. Definition: (Section 4 (a) of Revised Rules on Evidence)
- An “original” of a document is the document itself or any
TEST FOR DETERMINING RELIABILITY: W/N document is reliable in light
of the purpose for which it was generated and in light of all relevant counterpart intended to have the same effect by a person executing
circumstances. or issuing it.
2. In original form - observes same standards as provided in - If data is stored in a computer or similar device, any printout or
MLEC other output readable by sight or other means, shown to reflect the
Moreover, an electronic document shall be the functional data accurate “original.”
equivalent of a written document.
C. Electronic signatures (Section 8) - shall be equivalent to the B. REQUIREMENTS TO BE ORIGINAL: Where the law requires information to be
signature on a written document, if: presented or retained in its original form, that requirement is met by an
1. Signature complies with the definition of an e-signature electronic data message or electronic document if;
under the Act a. the integrity of the information from the time when it was first
2. Method of signing is not alterable by the parties interested generated in its final form, as an electronic data message or
in the document electronic document is shown by evidence aliunde or otherwise;
3. Method is used to identify the signatory and to indicate said and
his access to the electronic document
4. Method is reliable and appropriate b. where it is required that information be presented, that the
5. It is necessary for the signatory, in order to proceed with information is capable of being displayed to the person to whom it
the transaction, to have executed or provided the e- is to be presented.
signature
6. Other party is authorized and enabled to verify the e- ● CRITERIA FOR ASSESSING INTEGRITY
signature and to make the decision to proceed thereafter. a) whether the information has remained complete and
unaltered, apart from the addition of any endorsement and
any change which arises in the normal course of a specific point, which, using algorithm or codes, identifying words
communication, storage and display ; and or numbers, encryptions, answers back or acknowledgement
b) the standard of reliability required shall be assessed in the procedures, or similar security devices.
light of purpose for which the information was generated and
in the light of all the relevant circumstances. C. BURDEN OF PROOF: The person seeking to introduce an E-data message or
electronic document in any legal proceeding has the burden of proving its
VII. AUTHENTICATION authenticity by evidence capable of supporting a finding that the electronic
Electronic documents, electronic data messages and electronic signatures, shall be data message or electronic document is what the person claims it to be.
authenticated by demonstrating, substantiating and validating a claimed identity of
a user, device, or another entity in an information or communication system, among ● ESTABLISHING INTEGRITY
other ways. In the absence of evidence to the contrary, the integrity of the information
and communication system in which an electronic data message or
A. E-SIGNATURE: electronic document is recorded or stored may be established in any legal
Shall be authenticated by (Section 11 (a)) proceeding -
1) proof than a letter , character, number or other symbol in electronic
form representing the persons named in and attached to or logically a.) By evidence that at all material times the information and
associated with an electronic data message, electronic document, communication system or other similar device was operating in a manner
or that did not affect the integrity of the electronic data message and/or
2) that the appropriate methodology or security procedures, when electronic document, and there are no other reasonable grounds to doubt
applicable, were employed or adopted by such person, with the the integrity of the information and communication system,
intention of authenticating or approving in an electronic data
b.) By showing that the electronic data message and/or electronic
message or electronic document.
document was recorded or stored by a party to the proceedings who is
B. E-DATA MESSAGE OR E-DOCUMENT
adverse in interest to the party using it; or
shall be authenticated by (Section 11 (b))
1. proof that an appropriate security procedure, c.) By showing that the electronic data message and/or electronic
2. when applicable was adopted and employed for the purpose of document was recorded or stored in the usual and ordinary course of
verifying the originator of an electronic data message and/or business by a person who is not a party to the proceedings and who did not
electronic document, or act under the control of the party using the record.
3. detecting error or alteration in the communication, content or
storage of an electronic document or electronic data message from VIII. ADMISSIBILITY
In any legal proceedings, nothing in the application of the rules on evidence (b) The requirement referred to in paragraph (a) is satisfied by using the
shall deny the admissibility of an electronic data message or electronic document in services of a third party, provided that the conditions set forth in subparagraph s (i),
evidence - (ii) and (iii) of paragraph (a) are met.
X. PROOF BY AFFIDAVIT - REMOVE????
(a) On the sole ground that it is in electronic form; or The matters referred to in Real-Time Collection of Traffic Data (Section 12) on
admissibility and on the presumption of integrity (Section 9), may be presumed to
(b) On the ground that it is not in the standard written form, and the
have been established by an affidavit given to the best of the deponent's
electronic data message or electronic document meeting, and complying
knowledge subject to the rights of parties in interest as defined in the following
with the requirements under Sections 6 or 7 hereof shall be the best
section.
evidence of the agreement and transaction contained therein.

In assessing the evidential weight of an electronic data message or electronic XI. CROSS-EXAMINATION - REMOVE???
document, the reliability of the manner in which it was generated, stored or (1) A deponent of an affidavit referred to in Section 14 that has been introduced in
communicated, the reliability of the manner in which its originator was identified, evidence may be cross-examined as of right by a party to the proceedings who is
and other relevant factors shall be given due regard. adverse in interest to the party who has introduced the affidavit or has caused the
affidavit to be introduced.
IX. RETENTION
Notwithstanding any provision of law, rule or regulation to the contrary - (2) Any party to the proceedings has the right to cross-examine a person referred to
(a) The requirement in any provision of law that certain documents be in section 11, paragraph 4, sub paragraph c.
retained in their original form is satisfied by retaining them in the form of an
XII. COMMUNICATION - Communication of Electronic Data Message or Electronic
electronic data message or electronic document which -
Documents(Chap III)
(i) Remains accessible so as to be usable for subsequent reference;
A. Contracts - Same rule(SR): Model Law on E- Commerce - VII - A
(ii) Is retained in the format in which it was generated, sent or
B. Electronic Bank transactions - consummated upon actual
received, or in a format which can be demonstrated to accurately represent
dispensation of cash, debit of account or credit to another.Whether
the electronic data message or electronic document generated, sent or
initiated by depositor or authorized collecting party.
received;
C. Recognition - SR: Model Law on E- Commerce VII - B
(iii) Enables the identification of its originator and addressee, as well
D. Attribution - SR: Model Law on E- Commerce Art. 13 and 14
as the determination of the date and the time it was sent or received.

XPN to Art. 13 par 2/ Par. 3 of Sec 18 E- commerce Act


1.Addressee received notice that the e-message or e-doc is not G. Time of Dispatch - entry in IS outside control of originator or person in his
from originator and the addressee had reasonable time to act behalf, unless other agreed by parties.
accordingly. H. Time of Receipt - unless otherwise agreed by parties, time of receipt is as
2)Addressee knew or should have known, had it exercised follows:
reasonable care or exercised procedure, that e- message/doc :
1. Has designated IS - time e- message/doc enters the system(if: parties as
a. was not from originator both participants in IS - time of retrieved)
b. resulted in error as received 2. Sent to IS not designated - time retrieved
c. was a duplicate 3. Has no designated IS - time it enters IS of addressee
E. Error - addressee not entitled to regard e- message received as what the
originator intended to send when he knew or should have known, had he exercised I. Place of Dispatch - unless otherwise agreed by parties:
reasonable care and agreed procedure :
1. Dispatch - originator’s place of business
1. Transmission resulted in error therein or in the e-message/doc 2.Recieved - addressee’s place of business
when it enters the designated information system.
2. E- message/doc i sent to an IS not designated by the addressee *more than one place of business - place of business that has closest
relationship to transaction
F. Agreement on Acknowledgement of receipt - SR: Model Law on E- *no place of business - habitual residence(place of incorporation or
Commerce - Art. 14 constitution)

Note: When originator has not stated the effect of e-message/doc J. Choice of Security Methods - parties to e- transaction free to:
conditional on receipt of acknowledgement and acknowledgement was
not received on time specified: 1. determine the type and level of security needed
2. select and use appropriate technological methods that suit their needs.
- Originator shall give notice to the addressee stating no
acknowledgement was received and specifying reasonable time by ELECTRONIC COMMERCE IN CARRIAGE OF GOODS
which acknowledgement must be received.
- If acknowledgement is not received after notice, the originator may I. Applies to the following actions in relation to carriage of goods(Part III, Sec
upon notice to addrese, treat e-message/doc as never been sent . 25):
1. furnishing the marks, number, quantity or weight of goods;
2. stating or declaring the nature or value of goods; ELECTRONIC TRANSACTIONS IN GOVERNMENT
3. issuing a receipt for goods; A. Government Use - All dept., bureaus, offices, agencies, GOCC’s shall:
4. confirming that goods have been loaded;
5. notifying a person of terms and conditions of the contract; 1.Accept creation, filing, retention of docs in the form of e-
6. giving instructions to a carrier; messages/docs.
7. claiming delivery of goods; 2. Issue permits, licenses, or approval in the form of e- data
8. authorizing release of goods; message/docs.
9. giving notice of loss of, or damage to goods; 3. Require or accept payments, and issue receipts acknowledging
10. giving any other notice or statement in connection with the performance of such payments, through systems using e-message/doc.
the contract; 4. Transact gov. Business and/or perform gov. Functions using e-
11. undertaking to deliver goods to a named person or a person authorized to message/doc and authorized to adopt and promulgate rule on:
claim delivery;
12. granting, acquiring, renouncing, surrendering, transferring or negotiating a. Manner and format of e-message/doc is filed, created,
rights in goods; retained or sutained
13. acquiring or transferring rights and obligations under the contract. b. Use of e-signature, type of e-signature
c. Format of e- message/doc and maner the e-signature shall
B. Transport Documents - when transactions above is required to be 1)in writing be affixed in it.
or be in paper document, requirement is met if action is carried out using one or d. Control process to enure adequate integrity, security, and
more e-messages/doc confidentiality or e-message/doc.records/payments
e. Other attributes required
- This applies whether requirement is form of obligation or law simply f. Full or limited use of doc and paper
provides consequence for failing to carry out the action in writing or n
paper doc.
B. RPWEB - directed to promote the use of E-message/doc in gov. or gen
Standard of reliability - assessed in light of purpose and circumstances public.

Note: E-message/doc must first be terminated for a replacement paper doc DTI, NTC, NCC(National Computer Center) - directed to promote and
to be valid in transactions no. 12 and 13 in Sec 25. Replacement shall not implement policy environment and regulatory and non- regulatory
affect rights and obligations involved.
framework that shall lead to reduction of costs of lease lines, land, the infringing activity or unlawful act of another person or
satellite, cheap broadband etc. prty: Provided the following shall not be affected:

C. Authority of DTI and participating entities a.Any obligation founded on contract


b.obligation of service provider as such under a licensing or
other regulatory regime established under written law
FINAL PROVISIONS c.Obligation imposed under written law
d.Civil liability of any party to the extent that such liability
A. Extent of Liability of Service providers * forms as the basis for injunctive relief issued by a court
issued by a court under any law requiring service provider
GR: No person shall be subject to any civil or criminal liability in respect to to take and refrain from actions necessary to remove. Block,
e- message/doc for acting as a service provider that merely provides access or deny access to any material or preserve evidence of a
if such liability if founded on: violation of law.

1. Obligations and liabilities of parties under the e-message/doc B.Lawful Access( electronic file, electronic signature) - only authorized and
2. Making, publication, dissemination or distribution of such material enforced in favor of an individual or entity having the legal right to the
or any statement made in such material, including infringement of possession or use of the plaintext, electronic signature file and solely for
right subsisting in or in relation to such material provided: authorized purposes.

a. Service provider has no actual knowledge, or is not aware of C.Obligation of Confidentiality - any person who obtained access to any
the facts or circumstances from which it is apparent, that electronic key, e-message/doc, book, register, correspondence, information,
the making, publication, dissemination or distribution of other material pursuant to any powets conferred under this act , shall not
such material is unlawful or infringes any rights subsisting in convey to or share the same with any other person.
or inn relation to such material
b. The service provider does not knowingly receive a financial
benefit directly attributable to the lawful infringing activity. D.Penalties - Fine and/or imprisonment for the following acts:
c. Service provider does not directly commit any infringement
or any other unlawful act and does not induce or caue Act Penalty
another person or party to commit any infringement or
other unlawful act and/or does not benefit financially from
1. Hacking/ cracking - unauthorized Fine - P100k and Max - P1,000,000
access into or interference in a maximum Violations of provision of this act or 6 years
computer system; or access in order commensurate imprisonment
to damage
to corrupt, alter, steal, or destroy
incurred
using a computer or other similar E. IRR - by DTI, DBM, BSP in coordination with other related agencies.
information and communication Imprisonment - 6
devices, without the knowledge and mos- 3 yrs F. Oversight Committee - Congressional oversight committee
consent of the owner of computer or Appropriations
system, including introduction of G.Statutory Interpretation and Variation by Agreement - SR: Model Law on
computer viruses resulting in E- Commerce - V
corruption, destruction, alteration,
theft, loss of e- data Reciprocity - all benefits, privileges, advantages of statutory rules shall be
enjoyed by parties whose countries of origin grants the same benefits and
Piracy - unauthorized copying, Fine - min: privileges or advantages to Filipino citizens.
reproduction, dissemination, P100,000 - max:
distribution, importation, use, commensurate I. AM 01-7-01-SC (Rules on Electronic Evidence of 2001)
removal, alteration, substitution, to damage I. Scope (Rule 1, Section 1) - applies whenever an ED or EDM is offered or used
modification, storage, uploading, incurred
in evidence. The present rules were drafted in consideration of the E-
downloading, communication,
making available to public or Imprisonment - Commerce Law.
broadcasting protected material, e- 6mos- 3yrs II. Application (Rule 1, Section 2)
sign, copyrighted works, including A. Civil actions
protected sound recordings or B. Quasi-judicial and administrative cases
phonograph or info on protected C. Criminal actions
works through but not limited to the
(NOTE: Criminal actions were added upon subsequent resolution of the
internet
Supreme Court in 2002)
Same penalties RULE 1, SEC 3: Rules of Court and pertinent provisions of status
Violations of the Consumer Act or containing rules on evidence apply suppletorily.
Republic Act No. 7394 and other
pertinent laws through transactions III. Definitions (Rule 2, Section 1)
using e-message/doc
A. Certificate - an electronic document issued to support a digital witnesses, other competent evidence may be admitted.
signature which purports to confirm the identity or other significant
characteristics of the persons who holds a particular key pair See People v Enojas for jurisprudential support.
B. Computer - same definition used in E-Commerce Act IV. Construction (Rule 2, Section 2)
C. Digital signature - an electronic signature consisting of a A. Liberally construed
transformation of an ED or EDM using an asymmetric or public B. Interpretation must be made in consideration of the international
cryptosystem such that a person having the initial untransformed origin of the E-Commerce Act.
electronic document and the signer’s public key can accurately V. Characteristics of Electronic Documents (Rule 3)
determine: A. Functional equivalent of paper-based documents
1. W/N transformation was created using the private key that B. Admissible if compliant with rules on admissibility per Rules of Court
corresponds to the signer’s public key; and and related laws
2. W/N initial electronic document had been altered after the C. If privileged in character, this character of a communication is not
transformation was made lost on the ground that it is in the form of an electronic document
D. Digitally signed - an ED or EDM bearing a digital signature verified by VI. Best Evidence Rule (Rule 4)
the public key listed in a certificate. A. Original - an electronic document shall be regarded as the
E. Electronic data message - same definition used in E-Commerce Act equivalent of an original if it is a printout or output readable by
F. Electronic document - same definition used in E-Commerce Act. sight or other means, shown to reflect the data accurately
However, the Rules include digitally signed documents and any B. Copies
print-out or output, readable by sight or other means, which 1. GR: a copy of an electronic document shall be regarded as
accurately reflects the EDM or ED. the equivalent of an original
G. Electronic signature - same definition used in E-Commerce Act. 2. XPN:
However, the Rules provide that an e-signature includes digital a. Genuine question is raised as to the authenticity of
signatures. the original
H. Ephemeral electronic communication - telephone conversations, b. In the circumstances it would be unjust to admit the
text messages, chatroom sessions, streaming audio, streaming copy in lieu of the original
video, and other electronic forms of communication the evidence of VII. Burden of proof (Rule 5, Section 1) - on person seeking to introduce the
which is not recorded or retained. electronic document in any legal proceeding
RULE 11, SEC 2: Ephemeral electronic communications shall be proven RULE 9 ON METHOD OF PROOF: All matters relating to the admissibility
by the testimony of a person who was a party to the same or has and evidentiary weight of an ED may be established by an affidavit
personal knowledge thereof. In the absence or unavailability of such stating facts of direct personal knowledge of the affiant or based on
authentic records. The affidavit must affirmatively show the competence revocable
of the affiant to testify on the matters contained therein. 4. Message associated with a d-signature has not been
altered from the time it was signed
VIII. Manner of authentication 5. Certificate had been issued by the authority indicated
A. Electronic document (Rule 5, Section 2)
1. By evidence that it had been digitally signed by the person SECTION 9, E-COMMERCE ACT: Presumption is rebuttable if the relying
purported to have signed the same party knows or has notice of defects in or unreliability of the signature
or when reliance on the e-signature is not reasonable under the
2. By evidence that other appropriate security procedures or circumstances.
devices authorized by the Supreme Court or by law for
IX. Evidentiary weight (Rule 7, Section 1) - the following factors are to be
authentication of electronic documents were applied to the
considered in assessing the evidentiary weight of an ED:
document
A. Reliability of the manner or method in which it was generated,
3. By other evidence showing its integrity and reliability to the
stored, or communicated in light of all the circumstances as well as
satisfaction of the judge
any relevant agreement
B. Electronic signature (Rule 6, Sec 2)
B. Reliability of the manner in which its originator was identified
1. By evidence that a method or process was utilized to establish a
C. Integrity of the info and communication system in which it was
digital signature and verify the same;
recorded or stored
2. By any other means provided by law
D. Familiarity of the witness or the person who made the entry with
3. By any other means satisfactory to the judge as establishing the
the info and communication system
genuineness of the electronic signature.
E. Nature and quality of the info
DISPUTABLE PRESUMPTIONS RE: SIGNATURES: F. Other factors
A. On Electronic Signatures:
1. E-signature is that of the person to whom it correlates RULE 8: Business records are excepted from the rule on hearsay
2. E-signature was affixed by that person with the evidence. This may only be overcome by evidence of untrustworthiness
intention of authenticating or approving the electronic of the source of information or the method or circumstances of the
document to which it is related or to indicate such preparation, transmission or storage thereof.
person's consent to the transaction embodied therein
3. Methods or processes utilized to affix or verify the
electronic signature operated without error or fault.
B. On Digital Signatures: CASE DOCTRINE
1. Information contained in a certificate is correct;
2. D-signature was created during the operational period MCC Industrial ● The terms “electronic data message” and
of a certificate v Ssangyong “electronic document” do not include a
3. No cause exists to render a certificate invalid or facsimile transmission.
● In the formulation of the E-Commerce Act, the maker
legislature omitted “but not limited to, ● Even applying the Rules on Electronic Evidence,
electronic data interchange (EDI), electronic the party proffering the evidence must
mail, telegram, telex or telecopy” suggested in demonstrate how the information reflected on
the MLEC definition. the print-out was generated and how the said
● Thus, under the E-Commerce Act, what is information could be relied upon as true.
considered is virtual or paperless writings which
technically have no original copy to speak of. On NAPOCOR v ● What differentiates an electronic document
the contrary, facsimile transmissions have Codilla from a paper-based document is the manner
original paper-based copies. Thus, it could not by which the information is processed. Clearly,
be contemplated under such law. the information contained in an electronic
document is received, recorded, transmitted,
Garcillano v ● The Senators in this case rely on the E-
House of Commerce act to justify valid publication of its stored, processed, retrieved or produced
Representative rules of procedure through the internet. electronically.
However, the E-Commerce Law merely ● If any part of the information is recorded,
recognizes the admissibility in evidence (for produced, or affixed (in this case, a signature)
their being the original) of electronic data manually, it cannot be considered an
messages and/or electronic documents. It does
electronic document.
not make the internet a medium for publishing
laws, rules, and regulations.
People v Enojas ● Text messages, in order to be admitted to
Ang v CA ● Rules on Electronic Evidence do not apply to evidence, are to be proved by the testimony of
criminal actions. It applies only to civil, quasi- a person who was a party to the same or has
judicial, and administrative proceedings. personal knowledge of them.
● Decided in 2010, but has been OVERRULED. ● Decided in 2014; observes the NEW resolution
of the SC applying the Rules on Electronic
Aznar v Citibank ● An exhibit can only be considered admissible if Evidence to criminal actions.
its authenticity and due execution are
sufficiently established by the party which
profferred it to evidence. RA 10175 (Cybercrime Prevention Act of 2021)
● SEC 20, RULE 132, ROC: Authenticity and due
execution are proved either by:
a. Anyone who saw the document I. Cybercrime - also called computer crime is the use of a computer as an
executed or written instrument to further illegal ends such as committing fraud trafficking child
b. Evidence of the genuineness of the
pornography, intellectual property violations, stealing identities or violation
signature or handwriting of the
of privacy.
E. Misuse of devices: Unauthorized use, possession, production, sale,
II. CLASSIFICATION OF CYBERCRIME OFFENSES: procurement, importation, distribution, or otherwise making
A. Offenses against the confidentiality, integrity and availability of available of gadgets, computer programmes, or other materials
computer data and systems; developed or adapted for committing any of the acts listed in
B. Computer-related Offenses; and Republic Act 10175. Unauthorized use of a computer password,
C. Content-related Offenses access code, or similar data that allows the entire or a portion of a
computer system to be accessed with the intent of using it to
III. Types of cybercrime covered under the Cybercrime Prevention Act: perpetrate any of the offenses listed in Republic Act 10175.

Offenses against the confidentiality, integrity and availability of computer data and F. Cybersquatting: Acquisition of a domain name in bad faith on the
systems; internet to profit, deceive, harm reputation, and prevent others
A. Illegal Access: Access to a computer or any application without from registering it. Incudes:
permission.
● trademarks that were already registered at the time of
B. Illegal Interception: Interception of any non-public communication registration,
of computer data to, from, or within a computer system by an ● names of people other than the registrant, and trademarks
unauthorized person. that were purchased with intellectual property interests in
them,
C. Data Interference: Unauthorized tampering with, destroying, ● those who get domain names of prominent brands and
deleting, or deteriorating computer data, electronic documents, or individuals who in turn are used to damage their reputation
electronic data messages, as well as the introduction or can be sued under this provision.
transmission of viruses.
Note that freedom of expression and infringement on trademarks or names
D. System Interference: Unauthorized interference with the operation of persons are usually treated separately. A party can exercise freedom of
of a computer or computer network, including the introduction or expression without necessarily violating the trademarks of a brand or the
transmission of viruses, by inputting, transmitting, damaging, names of persons.
deleting, deteriorating, altering, or suppressing computer data or
programmes, electronic data messages, or by deleting, Computer-related Offenses:
deteriorating, altering, or suppressing them. G. Computer related Forgery: Unauthorized input, alteration, or
deletion of computer data that results in inauthentic data with the
intent that it be considered or acted on for legal purposes as if it **Libel - defamation of character by writings or other
were authentic, regardless of whether the data is directly readable means. Libel committed by writing, printing, lithography,
and intelligible; or the act of knowingly using computer data that is engraving, radio, phonograph, painting, theatrical
the product of computer-related forgery as defined here to exhibition, cinematographic exhibition, or any other similar
perpetuate. means is punishable by prison correctional for the minimum
and medium periods, or a fine ranging from 200 to 6,000
H. Computer-related Fraud: Unauthorized access to, alteration of, or pesos, or both, in addition to any civil action that the
deletion of computer data or programmes, or interference with the offended party may bring. (RPC)
operation of a computer system, with the purpose to cause Other Offenses:
damage. M. Aiding or Abetting in the commission of cybercrime: Anyone who
knowingly assists or abets the conduct of any of the offenses listed
I. Computer-related Identity Theft: Unauthorized acquisition, use, in this Act will be held accountable.
abuse, transfer, possession, change, or deletion of an individual’s
identifying information, whether natural or legal. N. Attempt in the commission of cybercrime: Any person who willfully
attempts to commit any of the offenses enumerated in this Act shall
Content-related Offenses: be held liable.
J. Cybersex: For favour or consideration, willful engagement,
maintenance, control, or operation, directly or indirectly, of any All crimes defined and penalized by the Revised Penal Code, as
lascivious presentation of sexual organs or sexual activity via a amended, and special laws, if committed by, through and with the
computer system. use of information and communications technologies shall be
covered by the relevant provisions of this Act.
K. Child Pornography: Unlawful or banned activities conducted
through a computer system, as defined and punished by Republic IV. Corporate Liability: When any of the punishable acts herein defined are
Act No. 9775 or the Anti-Child Pornography Act of 2009. knowingly committed on behalf of or for the benefit of a juridical person by
a natural person acting either individually or as part of an organ of the
L. Libel: Acts of libel that are illegal or forbidden under Article 355 of juridical person who has a leading position within, based on: [Section 9]
the Revised Penal Code, as amended, and are committed using a (a) a power of representation of the juridical person provided the
computer system or any other similar means that may be created in act committed falls within the scope of such authority; or
the future. (b) an authority to make decisions on behalf of the juridical person.
It also includes the commission of any of the penal acts made possible due
to the lack of supervision, provided that the act committed falls within the - responsible for enforcement of the provisions of this Act.
scope of such authority; or - shall organize a cybercrime unit or center manned by special
(c) an authority to exercise control inside the juridical person. investigators to exclusively handle cases involving violations of this Act.
- with due cause, shall be authorized to collect or record by technical or
electronic means traffic data in real-time associated with specified
V. PENALTIES: communications transmitted by means of a computer system
a. Offenses against the confidentiality, integrity and availability of computer Traffic data refer only to the communication’s origin, destination,
data and systems and computer related offenses -prision mayor or a fine of route, time, date, size, duration, or type of underlying service, but
at least PhP200,000.00 up to a maximum amount commensurate to the not content, nor identities
damage incurred or both. All other data to be collected or seized or disclosed will require a
b. Misuse of Devices - prision mayor or a fine of not more than PhP500,000.00 court warrant.
or both. b. Department of Justice (DOJ) - reviews and monitors reports from the NBI
c. Offenses against the confidentiality, integrity and availability of computer and PNP including pre-operation, post-operation and investigation results
data and systems against critical infrastructure - reclusion temporal or a fine and such other documents.
of at least PhP500,000.00 up to maximum amount commensurate to the c. Court Warrant - shall only be issued or granted upon written application and
damage incurred or both the examination under oath or affirmation of the applicant and the
d. Cybersex - prision mayor or a fine of at least PhP200,000.00 but not witnesses he may produce and the showing:
exceeding PhP1,000,000.00 or both i. that there are reasonable grounds to believe that any of the crimes
e. Child Pornography - penalties as enumerated in Republic Act No. 9775 or has been committed, or is being committed, or is about to be
the “Anti-Child Pornography Act of 2009”: by one (1) degree higher if committed;
committed through a computer system ii. that there are reasonable grounds to believe that evidence that will
f. Unsolicited Commercial Communications - arresto mayor or a fine of at least be obtained is essential to the conviction of any person for, or to
PhP50,000.00 but not exceeding PhP250,000.00 or both the solution of, or to the prevention of, any such crimes
g. Other Offenses - imprisonment 1 degree lower than that of the prescribed iii. that there are no other means readily available for obtaining such
penalty for the offense or a fine of at least PhP100,000.00 but not exceeding evidence.
PhP500,000.00 or both d. Preservation of Computer Data
- Traffic data - minimum period of six (6) months from the date of the
VI. Enforcement and Implementation transaction.
a. National Bureau of Investigation (NBI) and the Philippine National Police - Content data - six (6) months from the date of receipt of the order
(PNP) from law enforcement authorities requiring its preservation.
e. Disclosure of Computer Data - a person or service provider is required to ● Regional Trial Court - any violation of the provisions of this Act including any
disclose or submit subscriber’s information, traffic data or relevant data in violation committed by a Filipino national regardless of the place of
his/its possession or control within seventy-two (72) hours from receipt of commission
the order in relation to a valid complaint officially docketed and assigned for VIII. COMPETENT AUTHORITIES
investigation. ● Office of Cybercrime within DOJ - the central authority in all matters related
f. Search, Seizure and Examination of Computer Data to international mutual assistance and extradition
- Powers and duties of authorities Where a search and seizure ● Cybercrime Investigation and Coordinating Center - an inter-agency body
warrant is properly issued: under the administrative supervision of the Office of the President, for
(a) To secure a computer system or a computer data storage policy coordination among concerned agencies and for the formulation and
medium; enforcement of the national cybersecurity plan.
(b) To make and retain a copy of those computer data secured; a. Powers and Functions.
(c) To maintain the integrity of the relevant stored computer data; (a) To formulate a national cybersecurity plan and extend
(d) To conduct forensic analysis or examination of the computer immediate assistance for the suppression of real-time commission
data storage medium; and of cybercrime offenses through a computer emergency response
(e) To render inaccessible or remove those computer data in the team (CERT);
accessed computer or computer and communications network.
g. Destruction of Computer Data - Upon expiration of the periods, service (b) To coordinate the preparation of appropriate and effective
providers and law enforcement authorities, shall immediately and measures to prevent and suppress cybercrime activities as provided
completely destroy the computer data subject of a preservation and for in this Act;
examination.
h. Exclusionary Rule - Any evidence procured without a valid warrant or (c) To monitor cybercrime cases being bandied by participating law
beyond the authority of the same shall be inadmissible for any proceeding enforcement and prosecution agencies;
before any court or tribunal
i. Noncompliance - prision correctional in its maximum period or a fine of (d) To facilitate international cooperation on intelligence,
Php100,000.00 or both, for each and every noncompliance with an order investigations, training and capacity building related to cybercrime
issued by law enforcement authorities. prevention, suppression and prosecution;

VII. JURISDICTION (e) To coordinate the support and participation of the business
sector, local government units and nongovernment organizations in
cybercrime prevention programs and other related projects;
● The following provisions were found void with
(f) To recommend the enactment of appropriate laws, issuances, qualifications:
measures and policies; a. On aiding and abetting and attempt in
the commission of cybercrime -
unconstitutional with respect to libel.
(g) To call upon any government agency to render assistance in the It was found vague because of its
accomplishment of the CICC’s mandated tasks and functions; and obvious chilling effect on the freedom
of expression. Only the original author
of the assailed statement must be held
(h) To perform all other matters related to cybercrime prevention
liable. Other persons engaged
and suppression, including capacity building and such other (commenters and sharers) merely give
functions and duties as may be necessary for the proper knee-jerk sentiments.
implementation of this Act. b. On prosecution of libel under both RPC
and the assailed law - “libel” under the
RPC and “cyberlibel” under the
CASE DOCTRINE Cybercrime law have essentially the
same elements. To charge a person
Disini v Sec of ● The following provisions of the Cybercrime with both would constitute double
Justice Prevention Act were found by the Court to be jeopardy.
void and unconstitutional for the ff reasons: ● Libel is unprotected speech. The Cybercrime
a. On unsolicited commercial Prevention Law affirms that online defamation
communications - such are considered constitutes "similar means" for committing libel
commercial speech which is a legitimate as defined in Article 353-355.
form of expression entitled to ● Making the commission of crimes through the
protection. internet a qualifying circumstance is justified as
b. On real-time collection of traffic data - through ICT, an offender evades identification
the terms used by the legislature lacks and is able to reach more victims and cause
restraint and gives law enforcement greater harm
agencies sweeping authority.
c. On restricting or blocking access to Vivares v STC ● WRIT OF HABEAS DATA: an independent and
computer data - precludes judicial summary remedy designed to protect the
intervention as it disregards guidelines image, privacy, honor, information, and
established by the judiciary to determine freedom of information of an individual, and to
the validity of restrictions on speech. provide a forum to enforce one’s right to the
This constitutes violation of the freedom truth and to informational privacy.
of speech and unlawful searches and ● An entity may only be held liable for privacy
seizure. invasion if it can be shown that the information
involved was gathered by unlawful means. ● Receive complaints of genderbased online sexual
harassment
● Develop an online mechanism for reporting real-time
II. Safe Spaces Act RA 11313 on Online-Gender Based Sexual Harassment
genderbased online sexual harassment acts
● Apprehend perpetrators
I. Declaration of Policy
2. Cybercrime Investigation and Coordinating Center (CICC) of the DICT
II. Definition of Terms
● Coordinate with the PNPACG to prepare appropriate and
III. Gender based online sexual harassment(Sec 12, Article II)
effective measures to monitor and penalize gender-based
online sexual harassment.
A. Gender-based online sexual harassment includes the following acts:

C. Penalties(Sec. 14 Article II)


1. Use information and communications technology in terrorizing and
intimidating victims through physical, psychological, and emotional threats
1. Prision correccional(medium) or a fine of not less than ₱100,000.00
u
but not more than ₱500,000.00, or both, at the discretion of the
2.Unwanted sexual misogynistic, transphobic, homophobic and sexist
court.
remarks and comments online whether publicly or through direct and
private messages
2. Perpetrator is a juridical person - license or franchise, automatically
3. Invasion of victim’s privacy through cyberstalking and incessant deemed revoked.
messaging, uploading and sharing without the consent of the victim, any - Officers shall be liable, including the editor or reporter in
form of media that contains photos, voice, or video with sexual content the case of print media, and the station manager, editor and
broadcaster in the case of broadcast media.
4. Unauthorized recording and sharing of any of the victim’s photos, videos, 3. Alien - deportation after serving sentence and payment of fines.
or any information online, impersonating identities of victims online or
posting lies about victims to harm their reputation, or filing, false abuse D. Exemption to acts constitutive and penalized as gender-based online
reports to online platforms to silence victims. sexual harassment - authorized written orders of the court to use online
records or any copy thereof as evidence in any civil, criminal investigation or
B. Implementing Body - PNP Anti- Cybercrime Group (Sec13, Art. II) trial of the crime.
1. PNP Anti-Cybercrime Group
Written order only issued upon:
(d) If the perpetrator is a member of the uniformed services, such as the
1. Written application and the examination under oath or PNP and the Armed Forces of the Philippines (AFP), and the act was
affirmation of the applicant and the witnesses may produce. perpetrated while the perpetrator was in uniform; and

2. Showing that there are reasonable grounds to believe that (e) If the act takes place in the premises of a government agency offering
gender-based online sexual harassment has been committed or is frontline services to the public and the perpetrator is a government
about to be committed employee.

3.Evidence to be obtained is essential to the Note: Imprescriptible


conviction of any person for, or to the solution or prevention of
such crime.
RPC PROVISIONS ON LIBEL (Articles 353 to 362)
Note: Any record, photo or video, or copy thereof in violation of
I. Definition (Article 353) - a public and malicious imputation of a crime, or of a
shall not be admissible in evidence.
vice or defect, real or imaginary, or any act, omission, condition, status, or
circumstance tending to cause the dishonor, discredit, or contempt of a
person, or to blacken the memory of someone who is dead.
E. Qualified(Article 3) - penalty next higher in degree will be applied in the
II. Elements
following cases:
A. Defamatory imputation
B. Publicity of the libelous matter
(a) If the act takes place in a common carrier or PUV, including, but not
C. Identity of the person libeled
limited to, jeepneys, taxis, tricycles, or app-based transport network vehicle
D. Malice on the part of the accused (Article 354)
services, where the perpetrator is the driver of the vehicle and the offended
1. GR: Every defamatory imputation is presumed malicious
party is a passenger;
(NOTE: Still malicious even if the imputation is true. Truth is
generally not a defense in libel cases.)
(b) If the offended party is a minor, a senior citizen, or a person with
(NOTE, further: Truth may only be a defense if coupled with
disability (PWD), or a breastfeeding mother nursing her child;
good intentions and justifiable motives)
2. XPN:
(c) If the offended party is diagnosed with a mental problem tending to
a. Private communication made in the performance of
impair consent;
any legal, moral, or social duty
b. Fair and true reports of official proceedings 1. Private individual - action may also be filed in the RTC of the
PRESUMED MALICE ACTUAL MALICE province or city where he actually resides at the time of the
commission of the offense
Taken for granted in view of the Requires positive desire or 2. Public officer, with office in Manila - RTC of Manila
grossness of the imputation intention to injure
3. Public officer, with office outside Manila - RTC of the
Proof of malice not required Proof of malice must be shown by province or city where he holds office at the time of the
extrinsic evidence commission of the offense.
(NOTE: In case of a civil action, it must be filed in the same court
Presumed for private individuals Required of public officials or
public figures where the criminal action was filed, vice versa.)

III. Acts punishable


A. Libel by writing or similar means (Article 355) CASES DOCTRINE
B. Threatening to publish and offer to present libel for a compensation
Reno v ACLU ● OVERBREADTH DOCTRINE: A law violates the
(Article 356) First Amendment (particularly, on freedom of
C. Publication of facts connected with the private life of another and speech) if it is so overly broad that it curtails
offensive to the honor, virtue and reputation of said person, made protected as well as unprotected speech. In this
case, the subject Act failed to define or limit
in connection with or under the pretext that it is necessary in the what constitutes as “indecent” or “patently
narration of official proceedings (Article 357) offensive” material.
D. Oral defamation (Article 358) ● Because it may be made subject to “parental
E. Slander by deed (Article 359) control”, speech on the internet is entitled to
the same high degree of First Amendment
IV. Persons responsible (Article 360) protection extended to print media.
A. Any person who shall publish, exhibit, or cause the publication or
exhibition of any defamation New York Times ● The First Amendment provides that a public
v Sullivan official shall only recover damages for
B. Author or editor of book or pamphlet; editor or business manager
defamation relating to his official conduct upon
of a newspaper, magazine, or serial publication proof that the act was made with actual malice.
V. Venue and jurisdiction (Article 360) ● ACTUAL MALICE STANDARD: Accused has
A. GR: Action may be filed with the RTC of the province or city where knowledge that the defamatory statement was
false or made with reckless disregard of its
the libel was printed or first published truthfulness.
B. Other rules relating to the person libeled:
Garrison v ● Anything that might touch on a public official’s
Louisiana fitness for office is relevant to his official
conduct. This includes personal attributes such corporation or a non resident, a libeled public
as dishonesty, malfeasance, or improper official can still sue in the court of the locality
motivation. where he holds office, in order that the
prosecution of the action not interfere with the
Curtis v Butts ● Public figures are persons whose views and discharge of his official duties.
actions with respect to public issues and events
are often of as much concern to citizens as the
attitudes and behaviors of public officials.
● The rule laid out in New York TImes v Sullivan re:
actual malice likewise applies to defamation
actions by public figures.

Kunkle v ● When a person was not named or specifically


Cablenews identified in an article or publication, no claim
for damages based on defamation can arise.
● Identity of the libeled person is complied with
or shown where a third person recognized or
could identify the party vilified in the article.

Bonifacio v RTC ● Venue of libel cases where the complainant is a


Makati private individual is limited to only two places:
a. Where the complainant actually
resides at the time of the
commission of the offense
b. Where the alleged defamatory
article was printed and first
published

Time v Reyes ● MULTIPLE PUBLICATION RULE: Each


communication of written or printed matter was
a distinct and separate publication of a libel
contained therein, giving rise to a separate
cause of action.
● SINGLE PUBLICATION RULE: Any single
integrated publication is treated as a unit, giving
rise to only one cause of action.
● Even if the accused party is a foreign

You might also like