Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

REPUBLIC ACT NO.

10175 (g) Computer system refers to any device or group of


interconnected or related devices, one or more of which,
AN ACT DEFINING CYBERCRIME, PROVIDING FOR pursuant to a program, performs automated processing of
THE PREVENTION, INVESTIGATION, SUPPRESSION data. It covers any type of device with data processing
AND THE IMPOSITION OF PENALTIES THEREFOR capabilities including, but not limited to, computers and
AND FOR OTHER PURPOSES mobile phones. The device consisting of hardware and
software may include input, output and storage
Be it enacted by the Senate and House of components which may stand alone or be connected in a
network or other similar devices. It also includes computer
Representatives of the Philippines in Congress
data storage devices or media.
assembled:

(h) Without right refers to either: (i) conduct undertaken


CHAPTER I
PRELIMINARY PROVISIONS without or in excess of authority; or (ii) conduct not
covered by established legal defenses, excuses, court
orders, justifications, or relevant principles under the law.
Section 1. Title. — This Act shall be known as
the "Cybercrime Prevention Act of 2012″.
(i) Cyber refers to a computer or a computer network, the
electronic medium in which online communication takes
Section 2. Declaration of Policy. — The State recognizes place.
the vital role of information and communications
industries such as content production,
(j) Critical infrastructure refers to the computer systems,
telecommunications, broadcasting electronic commerce,
and data processing, in the nation’s overall social and and/or networks, whether physical or virtual, and/or the
economic development. The State also recognizes the computer programs, computer data and/or traffic data so
vital to this country that the incapacity or destruction of or
importance of providing an environment conducive to the
interference with such system and assets would have a
development, acceleration, and rational application and
debilitating impact on security, national or economic
exploitation of information and communications
technology (ICT) to attain free, easy, and intelligible security, national public health and safety, or any
access to exchange and/or delivery of information; and combination of those matters.
the need to protect and safeguard the integrity of
computer, computer and communications systems, (k) Cybersecurity refers to the collection of tools, policies,
networks, and databases, and the confidentiality, risk management approaches, actions, training, best
integrity, and availability of information and data stored practices, assurance and technologies that can be used
therein, from all forms of misuse, abuse, and illegal to protect the cyber environment and organization and
access by making punishable under the law such conduct user’s assets.
or conducts. In this light, the State shall adopt sufficient
powers to effectively prevent and combat such offenses (l) Database refers to a representation of information,
by facilitating their detection, investigation, and knowledge, facts, concepts, or instructions which are
prosecution at both the domestic and international levels, being prepared, processed or stored or have been
and by providing arrangements for fast and reliable prepared, processed or stored in a formalized manner
international cooperation. and which are intended for use in a computer system.

Section 3. Definition of Terms. — For purposes of this (m) Interception refers to listening to, recording,
Act, the following terms are hereby defined as follows: monitoring or surveillance of the content of
communications, including procuring of the content of
(a) Access refers to the instruction, communication with, data, either directly, through access and use of a
storing data in, retrieving data from, or otherwise making computer system or indirectly, through the use of
use of any resources of a computer system or electronic eavesdropping or tapping devices, at the same
communication network. time that the communication is occurring.

(b) Alteration refers to the modification or change, in form (n) Service provider refers to:
or substance, of an existing computer data or program.
(1) Any public or private entity that provides to users of its
(c) Communication refers to the transmission of service the ability to communicate by means of a
information through ICT media, including voice, video and computer system; and
other forms of data.
(2) Any other entity that processes or stores computer
(d) Computer refers to an electronic, magnetic, optical, data on behalf of such communication service or users of
electrochemical, or other data processing or such service.
communications device, or grouping of such devices,
capable of performing logical, arithmetic, routing, or (o) Subscriber’s information refers to any information
storage functions and which includes any storage facility contained in the form of computer data or any other form
or equipment or communications facility or equipment that is held by a service provider, relating to subscribers
directly related to or operating in conjunction with such of its services other than traffic or content data and by
device. It covers any type of computer device including which identity can be established:
devices with data processing capabilities like mobile
phones, smart phones, computer networks and other (1) The type of communication service used, the technical
devices connected to the internet. provisions taken thereto and the period of service;

(e) Computer data refers to any representation of facts, (2) The subscriber’s identity, postal or geographic
information, or concepts in a form suitable for processing address, telephone and other access numbers, any
in a computer system including a program suitable to assigned network address, billing and payment
cause a computer system to perform a function and information, available on the basis of the service
includes electronic documents and/or electronic data agreement or arrangement; and
messages whether stored in local computer systems or
online. (3) Any other available information on the site of the
installation of communication equipment, available on the
(f) Computer program refers to a set of instructions basis of the service agreement or arrangement.
executed by the computer to achieve intended results.
(p) Traffic data or non-content data refers to any (b) Computer-related Offenses:
computer data other than the content of the
communication including, but not limited to, the (1) Computer-related Forgery. —
communication’s origin, destination, route, time, date,
size, duration, or type of underlying service. (i) The input, alteration, or deletion of any computer data
without right resulting in inauthentic data with the intent
CHAPTER II that it be considered or acted upon for legal purposes as
PUNISHABLE ACTS if it were authentic, regardless whether or not the data is
directly readable and intelligible; or
Section 4. Cybercrime Offenses. — The following acts
constitute the offense of cybercrime punishable under this (ii) The act of knowingly using computer data which is the
Act: product of computer-related forgery as defined herein, for
the purpose of perpetuating a fraudulent or dishonest
(a) Offenses against the confidentiality, integrity and design.
availability of computer data and systems:
(2) Computer-related Fraud. — The unauthorized input,
(1) Illegal Access. – The access to the whole or any part alteration, or deletion of computer data or program or
of a computer system without right. interference in the functioning of a computer system,
causing damage thereby with fraudulent
(2) Illegal Interception. – The interception made by intent: Provided, That if nodamage has yet been caused,
technical means without right of any non-public the penalty imposable shall be one (1) degree lower.
transmission of computer data to, from, or within a
computer system including electromagnetic emissions (3) Computer-related Identity Theft. – The intentional
from a computer system carrying such computer data. acquisition, use, misuse, transfer, possession, alteration
or deletion of identifying information belonging to another,
(3) Data Interference. — The intentional or reckless whether natural or juridical, without right: Provided, That if
alteration, damaging, deletion or deterioration of no damage has yet been caused, the penalty imposable
computer data, electronic document, or electronic data shall be one (1) degree lower.
message, without right, including the introduction or
transmission of viruses. (c) Content-related Offenses:

(4) System Interference. — The intentional alteration or (1) Cybersex. — The willful engagement, maintenance,
reckless hindering or interference with the functioning of control, or operation, directly or indirectly, of any
a computer or computer network by inputting, lascivious exhibition of sexual organs or sexual activity,
transmitting, damaging, deleting, deteriorating, altering or with the aid of a computer system, for favor or
suppressing computer data or program, electronic consideration.
document, or electronic data message, without right or
authority, including the introduction or transmission of (2) Child Pornography. — The unlawful or prohibited acts
viruses. defined and punishable by Republic Act No. 9775 or the
Anti-Child Pornography Act of 2009, committed through a
(5) Misuse of Devices. computer system: Provided, That the penalty to be
imposed shall be (1) one degree higher than that provided
(i) The use, production, sale, procurement, importation, for in Republic Act No. 9775.1âwphi1
distribution, or otherwise making available, without right,
of: (3) Unsolicited Commercial Communications. — The
transmission of commercial electronic communication
(aa) A device, including a computer program, designed or with the use of computer system which seek to advertise,
adapted primarily for the purpose of committing any of the sell, or offer for sale products and services are prohibited
offenses under this Act; or unless:

(bb) A computer password, access code, or similar data (i) There is prior affirmative consent from the recipient; or
by which the whole or any part of a computer system is
capable of being accessed with intent that it be used for (ii) The primary intent of the communication is for service
the purpose of committing any of the offenses under this and/or administrative announcements from the sender to
Act. its existing users, subscribers or customers; or

(ii) The possession of an item referred to in paragraphs (iii) The following conditions are present:
5(i)(aa) or (bb) above with intent to use said devices for
the purpose of committing any of the offenses under this (aa) The commercial electronic communication contains
section. a simple, valid, and reliable way for the recipient to reject.
receipt of further commercial electronic messages (opt-
(6) Cyber-squatting. – The acquisition of a domain name out) from the same source;
over the internet in bad faith to profit, mislead, destroy
reputation, and deprive others from registering the same, (bb) The commercial electronic communication does not
if such a domain name is: purposely disguise the source of the electronic message;
and
(i) Similar, identical, or confusingly similar to an existing
trademark registered with the appropriate government (cc) The commercial electronic communication does not
agency at the time of the domain name registration: purposely include misleading information in any part of
the message in order to induce the recipients to read the
(ii) Identical or in any way similar with the name of a message.
person other than the registrant, in case of a personal
name; and (4) Libel. — The unlawful or prohibited acts of libel as
defined in Article 355 of the Revised Penal Code, as
(iii) Acquired without right or with intellectual property amended, committed through a computer system or any
interests in it. other similar means which may be devised in the future.
Section 5. Other Offenses. — The following acts shall on behalf of or for the benefit of a juridical person, by a
also constitute an offense: natural person acting either individually or as part of an
organ of the juridical person, who has a leading position
(a) Aiding or Abetting in the Commission of Cybercrime. – within, based on: (a) a power of representation of the
Any person who willfully abets or aids in the commission juridical person provided the act committed falls within the
of any of the offenses enumerated in this Act shall be held scope of such authority; (b) an authority to take decisions
liable. on behalf of the juridical person: Provided, That the act
committed falls within the scope of such authority; or (c)
an authority to exercise control within the juridical person,
(b) Attempt in the Commission of Cybercrime. — Any
the juridical person shall be held liable for a fine equivalent
person who willfully attempts to commit any of the
to at least double the fines imposable in Section 7 up to a
offenses enumerated in this Act shall be held liable.
maximum of Ten million pesos (PhP10,000,000.00).
Section 6. All crimes defined and penalized by the
If the commission of any of the punishable acts herein
Revised Penal Code, as amended, and special laws, if
defined was made possible due to the lack of supervision
committed by, through and with the use of information and
or control by a natural person referred to and described in
communications technologies shall be covered by the
the preceding paragraph, for the benefit of that juridical
relevant provisions of this Act: Provided, That the penalty
to be imposed shall be one (1) degree higher than that person by a natural person acting under its authority, the
provided for by the Revised Penal Code, as amended, juridical person shall be held liable for a fine equivalent to
at least double the fines imposable in Section 7 up to a
and special laws, as the case may be.
maximum of Five million pesos (PhP5,000,000.00).
Section 7. Liability under Other Laws. — A prosecution
The liability imposed on the juridical person shall be
under this Act shall be without prejudice to any liability for
without prejudice to the criminal liability of the natural
violation of any provision of the Revised Penal Code, as
person who has committed the offense.
amended, or special laws.

CHAPTER IV
CHAPTER III
PENALTIES ENFORCEMENT AND IMPLEMENTATION

Section 8. Penalties. — Any person found guilty of any of Section 10. Law Enforcement Authorities. — The
National Bureau of Investigation (NBI) and the Philippine
the punishable acts enumerated in Sections 4(a) and 4(b)
of this Act shall be punished with imprisonment of prision National Police (PNP) shall be responsible for the efficient
mayor or a fine of at least Two hundred thousand pesos and effective law enforcement of the provisions of this Act.
The NBI and the PNP shall organize a cybercrime unit or
(PhP200,000.00) up to a maximum amount
center manned by special investigators to exclusively
commensurate to the damage incurred or both.
handle cases involving violations of this Act.
Any person found guilty of the punishable act under
Section 11. Duties of Law Enforcement Authorities. — To
Section 4(a)(5) shall be punished with imprisonment of
ensure that the technical nature of cybercrime and its
prision mayor or a fine of not more than Five hundred
prevention is given focus and considering the procedures
thousand pesos (PhP500,000.00) or both.
involved for international cooperation, law enforcement
authorities specifically the computer or technology crime
If punishable acts in Section 4(a) are committed against divisions or units responsible for the investigation of
critical infrastructure, the penalty of reclusion temporal or cybercrimes are required to submit timely and regular
a fine of at least Five hundred thousand pesos reports including pre-operation, post-operation and
(PhP500,000.00) up to maximum amount commensurate investigation results and such other documents as may
to the damage incurred or both, shall be imposed. be required to the Department of Justice (DOJ) for review
and monitoring.
Any person found guilty of any of the punishable acts
enumerated in Section 4(c)(1) of this Act shall be Section 12. Real-Time Collection of Traffic Data. — Law
punished with imprisonment of prision mayor or a fine of enforcement authorities, with due cause, shall be
at least Two hundred thousand pesos (PhP200,000.00) authorized to collect or record by technical or electronic
but not exceeding One million pesos (PhPl,000,000.00) or means traffic data in real-time associated with specified
both. communications transmitted by means of a computer
system.
Any person found guilty of any of the punishable acts
enumerated in Section 4(c)(2) of this Act shall be Traffic data refer only to the communication’s origin,
punished with the penalties as enumerated in Republic destination, route, time, date, size, duration, or type of
Act No. 9775 or the "Anti-Child Pornography Act of underlying service, but not content, nor identities.
2009″: Provided, That the penalty to be imposed shall be
one (1) degree higher than that provided for in Republic
All other data to be collected or seized or disclosed will
Act No. 9775, if committed through a computer system.
require a court warrant.
Any person found guilty of any of the punishable acts
Service providers are required to cooperate and assist
enumerated in Section 4(c)(3) shall be punished with
law enforcement authorities in the collection or recording
imprisonment of arresto mayor or a fine of at least Fifty
of the above-stated information.
thousand pesos (PhP50,000.00) but not exceeding Two
hundred fifty thousand pesos (PhP250,000.00) or both.
The court warrant required under this section shall only
be issued or granted upon written application and the
Any person found guilty of any of the punishable acts
examination under oath or affirmation of the applicant and
enumerated in Section 5 shall be punished with
the witnesses he may produce and the showing: (1) that
imprisonment one (1) degree lower than that of the
there are reasonable grounds to believe that any of the
prescribed penalty for the offense or a fine of at least One
hundred thousand pesos (PhPl00,000.00) but not crimes enumerated hereinabove has been committed, or
is being committed, or is about to be committed: (2) that
exceeding Five hundred thousand pesos
there are reasonable grounds to believe that evidence
(PhP500,000.00) or both.
that will be obtained is essential to the conviction of any
person for, or to the solution of, or to the prevention of,
Section 9. Corporate Liability. — When any of the any such crimes; and (3) that there are no other means
punishable acts herein defined are knowingly committed readily available for obtaining such evidence.
Section 13. Preservation of Computer Data. — The authority shall also certify that no duplicates or copies of
integrity of traffic data and subscriber information relating the whole or any part thereof have been made, or if made,
to communication services provided by a service provider that all such duplicates or copies are included in the
shall be preserved for a minimum period of six (6) months package deposited with the court. The package so
from the date of the transaction. Content data shall be deposited shall not be opened, or the recordings
similarly preserved for six (6) months from the date of replayed, or used in evidence, or then contents revealed,
receipt of the order from law enforcement authorities except upon order of the court, which shall not be granted
requiring its preservation. except upon motion, with due notice and opportunity to be
heard to the person or persons whose conversation or
Law enforcement authorities may order a one-time communications have been recorded.
extension for another six (6) months: Provided, That once
computer data preserved, transmitted or stored by a Section 17. Destruction of Computer Data. — Upon
service provider is used as evidence in a case, the mere expiration of the periods as provided in Sections 13 and
furnishing to such service provider of the transmittal 15, service providers and law enforcement authorities, as
document to the Office of the Prosecutor shall be deemed the case may be, shall immediately and completely
a notification to preserve the computer data until the destroy the computer data subject of a preservation and
termination of the case. examination.

The service provider ordered to preserve computer data Section 18. Exclusionary Rule. — Any evidence
shall keep confidential the order and its compliance. procured without a valid warrant or beyond the authority
of the same shall be inadmissible for any proceeding
Section 14. Disclosure of Computer Data. — Law before any court or tribunal.
enforcement authorities, upon securing a court warrant,
shall issue an order requiring any person or service Section 19. Restricting or Blocking Access to Computer
provider to disclose or submit subscriber’s information, Data. — When a computer data is prima facie found to be
traffic data or relevant data in his/its possession or control in violation of the provisions of this Act, the DOJ shall
within seventy-two (72) hours from receipt of the order in issue an order to restrict or block access to such computer
relation to a valid complaint officially docketed and data.
assigned for investigation and the disclosure is necessary
and relevant for the purpose of investigation. Section 20. Noncompliance. — Failure to comply with the
provisions of Chapter IV hereof specifically the orders
Section 15. Search, Seizure and Examination of from law enforcement authorities shall be punished as a
Computer Data. — Where a search and seizure warrant violation of Presidential Decree No. 1829 with
is properly issued, the law enforcement authorities shall imprisonment of prision correctional in its maximum
likewise have the following powers and duties. period or a fine of One hundred thousand pesos
(Php100,000.00) or both, for each and every
Within the time period specified in the warrant, to conduct noncompliance with an order issued by law enforcement
interception, as defined in this Act, and: authorities.

(a) To secure a computer system or a computer data CHAPTER V


storage medium; JURISDICTION

(b) To make and retain a copy of those computer data Section 21. Jurisdiction. — The Regional Trial Court shall
secured; have jurisdiction over any violation of the provisions of this
Act. including any violation committed by a Filipino
(c) To maintain the integrity of the relevant stored national regardless of the place of commission.
Jurisdiction shall lie if any of the elements was committed
computer data;
within the Philippines or committed with the use of any
computer system wholly or partly situated in the country,
(d) To conduct forensic analysis or examination of the or when by such commission any damage is caused to a
computer data storage medium; and natural or juridical person who, at the time the offense was
committed, was in the Philippines.
(e) To render inaccessible or remove those computer data
in the accessed computer or computer and There shall be designated special cybercrime courts
communications network. manned by specially trained judges to handle cybercrime
cases.
Pursuant thereof, the law enforcement authorities may
order any person who has knowledge about the CHAPTER VI
functioning of the computer system and the measures to INTERNATIONAL COOPERATION
protect and preserve the computer data therein to
provide, as is reasonable, the necessary information, to
Section 22. General Principles Relating to International
enable the undertaking of the search, seizure and
examination. Cooperation. — All relevant international instruments on
international cooperation in criminal matters,
arrangements agreed on the basis of uniform or reciprocal
Law enforcement authorities may request for an legislation, and domestic laws, to the widest extent
extension of time to complete the examination of the possible for the purposes of investigations or proceedings
computer data storage medium and to make a return concerning criminal offenses related to computer systems
thereon but in no case for a period longer than thirty (30) and data, or for the collection of evidence in electronic
days from date of approval by the court. form of a criminal, offense shall be given full force and
effect.
Section 16. Custody of Computer Data. — All computer
data, including content and traffic data, examined under a CHAPTER VII
proper warrant shall, within forty-eight (48) hours after the COMPETENT AUTHORITIES
expiration of the period fixed therein, be deposited with
the court in a sealed package, and shall be accompanied
Section 23. Department of Justice (DOJ). — There is
by an affidavit of the law enforcement authority executing
hereby created an Office of Cybercrime within the DOJ
it stating the dates and times covered by the examination,
and the law enforcement authority who may access the designated as the central authority in all matters related
deposit, among other relevant data. The law enforcement to international mutual assistance and extradition.
Section 24. Cybercrime Investigation and Coordinating 8792 or the "Electronic Commerce Act" is hereby modified
Center. — There is hereby created, within thirty (30) days accordingly.
from the effectivity of this Act, an inter-agency body to be
known as the Cybercrime Investigation and Coordinating Section 31. Effectivity. — This Act shall take effect fifteen
Center (CICC), under the administrative supervision of (15) days after the completion of its publication in the
the Office of the President, for policy coordination among Official Gazette or in at least two (2) newspapers of
concerned agencies and for the formulation and general circulation.
enforcement of the national cybersecurity plan.

Section 25. Composition. — The CICC shall be headed REPUBLIC ACT No. 4200
by the Executive Director of the Information and
Communications Technology Office under the AN ACT TO PROHIBIT AND PENALIZE WIRE TAPPING
Department of Science and Technology (ICTO-DOST) as AND OTHER RELATED VIOLATIONS OF THE
Chairperson with the Director of the NBI as Vice PRIVACY OF COMMUNICATION, AND FOR OTHER
Chairperson; the Chief of the PNP; Head of the DOJ PURPOSES.
Office of Cybercrime; and one (1) representative from the
private sector and academe, as members. The CICC shall Section 1. It shall be unlawful for any person, not being
be manned by a secretariat of selected existing personnel authorized by all the parties to any private communication
and representatives from the different participating or spoken word, to tap any wire or cable, or by using any
agencies.1âwphi1 other device or arrangement, to secretly overhear,
intercept, or record such communication or spoken word
Section 26. Powers and Functions. — The CICC shall by using a device commonly known as a dictaphone or
have the following powers and functions: dictagraph or dictaphone or walkie-talkie or tape recorder,
or however otherwise described:
(a) To formulate a national cybersecurity plan and extend
immediate assistance for the suppression of real-time It shall also be unlawful for any person, be he a participant
commission of cybercrime offenses through a computer or not in the act or acts penalized in the next preceding
emergency response team (CERT); sentence, to knowingly possess any tape record, wire
record, disc record, or any other such record, or copies
(b) To coordinate the preparation of appropriate and thereof, of any communication or spoken word secured
effective measures to prevent and suppress cybercrime either before or after the effective date of this Act in the
activities as provided for in this Act; manner prohibited by this law; or to replay the same for
any other person or persons; or to communicate the
(c) To monitor cybercrime cases being bandied by contents thereof, either verbally or in writing, or to furnish
participating law enforcement and prosecution agencies; transcriptions thereof, whether complete or partial, to any
other person: Provided, That the use of such record or
(d) To facilitate international cooperation on intelligence, any copies thereof as evidence in any civil, criminal
investigations, training and capacity building related to investigation or trial of offenses mentioned in section 3
cybercrime prevention, suppression and prosecution; hereof, shall not be covered by this prohibition.

(e) To coordinate the support and participation of the Section 2. Any person who willfully or knowingly does or
business sector, local government units and who shall aid, permit, or cause to be done any of the acts
nongovernment organizations in cybercrime prevention declared to be unlawful in the preceding section or who
programs and other related projects; violates the provisions of the following section or of any
order issued thereunder, or aids, permits, or causes such
(f) To recommend the enactment of appropriate laws, violation shall, upon conviction thereof, be punished by
issuances, measures and policies; imprisonment for not less than six months or more than
six years and with the accessory penalty of perpetual
(g) To call upon any government agency to render absolute disqualification from public office if the offender
assistance in the accomplishment of the CICC’s be a public official at the time of the commission of the
mandated tasks and functions; and offense, and, if the offender is an alien he shall be subject
to deportation proceedings.
(h) To perform all other matters related to cybercrime
prevention and suppression, including capacity building Section 3. Nothing contained in this Act, however, shall
and such other functions and duties as may be necessary render it unlawful or punishable for any peace officer, who
for the proper implementation of this Act. is authorized by a written order of the Court, to execute
any of the acts declared to be unlawful in the two
CHAPTER VIII preceding sections in cases involving the crimes of
FINAL PROVISIONS treason, espionage, provoking war and disloyalty in case
of war, piracy, mutiny in the high seas, rebellion,
Section 27. Appropriations. — The amount of Fifty million conspiracy and proposal to commit rebellion, inciting to
pesos (PhP50,000,000_00) shall be appropriated rebellion, sedition, conspiracy to commit sedition, inciting
annually for the implementation of this Act. to sedition, kidnapping as defined by the Revised Penal
Code, and violations of Commonwealth Act No. 616,
Section 28. Implementing Rules and Regulations. — The punishing espionage and other offenses against national
ICTO-DOST, the DOJ and the Department of the Interior security: Provided, That such written order shall only be
and Local Government (DILG) shall jointly formulate the issued or granted upon written application and the
necessary rules and regulations within ninety (90) days examination under oath or affirmation of the applicant and
from approval of this Act, for its effective implementation. the witnesses he may produce and a showing: (1) that
there are reasonable grounds to believe that any of the
Section 29. Separability Clause — If any provision of this crimes enumerated hereinabove has been committed or
Act is held invalid, the other provisions not affected shall is being committed or is about to be committed: Provided,
remain in full force and effect.
however, That in cases involving the offenses of rebellion,
conspiracy and proposal to commit rebellion, inciting to
Section 30. Repealing Clause. — All laws, decrees or rebellion, sedition, conspiracy to commit sedition, and
rules inconsistent with this Act are hereby repealed or
inciting to sedition, such authority shall be granted only
modified accordingly. Section 33(a) of Republic Act No.
upon prior proof that a rebellion or acts of sedition, as the
case may be, have actually been or are being committed; CHAPTER I
(2) that there are reasonable grounds to believe that GENERAL PROVISIONS
evidence will be obtained essential to the conviction of
any person for, or to the solution of, or to the prevention Section 1. Short Title. – This Act shall be known as
of, any of such crimes; and (3) that there are no other the "Data Privacy Act of 2012″.
means readily available for obtaining such evidence. Section 2. Declaration of Policy. – It is the policy of the
The order granted or issued shall specify: (1) the identity State to protect the fundamental human right of privacy,
of the person or persons whose communications, of communication while ensuring free flow of information
conversations, discussions, or spoken words are to be to promote innovation and growth. The State recognizes
overheard, intercepted, or recorded and, in the case of the vital role of information and communications
telegraphic or telephonic communications, the telegraph technology in nation-building and its inherent obligation to
line or the telephone number involved and its location; (2) ensure that personal information in information and
the identity of the peace officer authorized to overhear, communications systems in the government and in the
intercept, or record the communications, conversations, private sector are secured and protected.
discussions, or spoken words; (3) the offense or offenses Section 3. Definition of Terms. – Whenever used in this
committed or sought to be prevented; and (4) the period Act, the following terms shall have the respective
of the authorization. The authorization shall be effective meanings hereafter set forth:
for the period specified in the order which shall not exceed
sixty (60) days from the date of issuance of the order, (a) Commission shall refer to the National Privacy
unless extended or renewed by the court upon being Commission created by virtue of this Act.
satisfied that such extension or renewal is in the public
(b) Consent of the data subject refers to any freely given,
interest.
specific, informed indication of will, whereby the data
All recordings made under court authorization shall, within subject agrees to the collection and processing of
forty-eight hours after the expiration of the period fixed in personal information about and/or relating to him or her.
the order, be deposited with the court in a sealed envelope Consent shall be evidenced by written, electronic or
or sealed package, and shall be accompanied by an recorded means. It may also be given on behalf of the
affidavit of the peace officer granted such authority stating data subject by an agent specifically authorized by the
the number of recordings made, the dates and times data subject to do so.
covered by each recording, the number of tapes, discs, or
(c) Data subject refers to an individual whose personal
records included in the deposit, and certifying that no
information is processed.
duplicates or copies of the whole or any part thereof have
been made, or if made, that all such duplicates or copies (d) Direct marketing refers to communication by whatever
are included in the envelope or package deposited with means of any advertising or marketing material which is
the court. The envelope or package so deposited shall not directed to particular individuals.
be opened, or the recordings replayed, or used in
evidence, or their contents revealed, except upon order of (e) Filing system refers to any act of information relating
the court, which shall not be granted except upon motion, to natural or juridical persons to the extent that, although
with due notice and opportunity to be heard to the person the information is not processed by equipment operating
or persons whose conversation or communications have automatically in response to instructions given for that
been recorded. purpose, the set is structured, either by reference to
individuals or by reference to criteria relating to
The court referred to in this section shall be understood to individuals, in such a way that specific information relating
mean the Court of First Instance within whose territorial to a particular person is readily accessible.
jurisdiction the acts for which authority is applied for are
to be executed. (f) Information and Communications System refers to a
system for generating, sending, receiving, storing or
Section 4. Any communication or spoken word, or the otherwise processing electronic data messages or
existence, contents, substance, purport, effect, or electronic documents and includes the computer system
meaning of the same or any part thereof, or any or other similar device by or which data is recorded,
information therein contained obtained or secured by any transmitted or stored and any procedure related to the
person in violation of the preceding sections of this Act recording, transmission or storage of electronic data,
shall not be admissible in evidence in any judicial, quasi- electronic message, or electronic document.
judicial, legislative or administrative hearing or
investigation. (g) Personal information refers to any information whether
recorded in a material form or not, from which the identity
Section 5. All laws inconsistent with the provisions of this of an individual is apparent or can be reasonably and
Act are hereby repealed or accordingly amended. directly ascertained by the entity holding the information,
or when put together with other information would directly
Section 6. This Act shall take effect upon its approval.
and certainly identify an individual.
Approved: June 19, 1965
(h) Personal information controller refers to a person or
organization who controls the collection, holding,
processing or use of personal information, including a
REPUBLIC ACT NO. 10173 person or organization who instructs another person or
AN ACT PROTECTING INDIVIDUAL PERSONAL organization to collect, hold, process, use, transfer or
INFORMATION IN INFORMATION AND disclose personal information on his or her behalf. The
COMMUNICATIONS SYSTEMS IN THE GOVERNMENT term excludes:
AND THE PRIVATE SECTOR, CREATING FOR THIS (1) A person or organization who performs such functions
PURPOSE A NATIONAL PRIVACY COMMISSION, AND as instructed by another person or organization; and
FOR OTHER PURPOSES
(2) An individual who collects, holds, processes or uses
Be it enacted, by the Senate and House of personal information in connection with the individual’s
Representatives of the Philippines in Congress personal, family or household affairs.
assembled:
(i) Personal information processor refers to any natural or (e) Information necessary in order to carry out the
juridical person qualified to act as such under this Act to functions of public authority which includes the processing
whom a personal information controller may outsource of personal data for the performance by the independent,
the processing of personal data pertaining to a data central monetary authority and law enforcement and
subject. regulatory agencies of their constitutionally and statutorily
mandated functions. Nothing in this Act shall be construed
(j) Processing refers to any operation or any set of as to have amended or repealed Republic Act No. 1405,
operations performed upon personal information otherwise known as the Secrecy of Bank Deposits Act;
including, but not limited to, the collection, recording, Republic Act No. 6426, otherwise known as the Foreign
organization, storage, updating or modification, retrieval, Currency Deposit Act; and Republic Act No. 9510,
consultation, use, consolidation, blocking, erasure or otherwise known as the Credit Information System Act
destruction of data. (CISA);
(k) Privileged information refers to any and all forms of (f) Information necessary for banks and other financial
data which under the Rides of Court and other pertinent institutions under the jurisdiction of the independent,
laws constitute privileged communication. central monetary authority or Bangko Sentral ng Pilipinas
(l) Sensitive personal information refers to personal to comply with Republic Act No. 9510, and Republic Act
information: No. 9160, as amended, otherwise known as the Anti-
Money Laundering Act and other applicable laws; and
(1) About an individual’s race, ethnic origin, marital status,
age, color, and religious, philosophical or political (g) Personal information originally collected from
affiliations; residents of foreign jurisdictions in accordance with the
laws of those foreign jurisdictions, including any
(2) About an individual’s health, education, genetic or applicable data privacy laws, which is being processed in
sexual life of a person, or to any proceeding for any the Philippines.
offense committed or alleged to have been committed by
such person, the disposal of such proceedings, or the Section 5. Protection Afforded to Journalists and Their
sentence of any court in such proceedings; Sources. – Nothing in this Act shall be construed as to
have amended or repealed the provisions of Republic Act
(3) Issued by government agencies peculiar to an No. 53, which affords the publishers, editors or duly
individual which includes, but not limited to, social security accredited reporters of any newspaper, magazine or
numbers, previous or cm-rent health records, licenses or periodical of general circulation protection from being
its denials, suspension or revocation, and tax returns; and compelled to reveal the source of any news report or
information appearing in said publication which was
(4) Specifically established by an executive order or an
related in any confidence to such publisher, editor, or
act of Congress to be kept classified.
reporter.
Section 4. Scope. – This Act applies to the processing of
Section 6. Extraterritorial Application. – This Act applies
all types of personal information and to any natural and
to an act done or practice engaged in and outside of the
juridical person involved in personal information
Philippines by an entity if:
processing including those personal information
controllers and processors who, although not found or (a) The act, practice or processing relates to personal
established in the Philippines, use equipment that are information about a Philippine citizen or a resident;
located in the Philippines, or those who maintain an office,
branch or agency in the Philippines subject to the (b) The entity has a link with the Philippines, and the entity
immediately succeeding paragraph: Provided, That the is processing personal information in the Philippines or
requirements of Section 5 are complied with. even if the processing is outside the Philippines as long
as it is about Philippine citizens or residents such as, but
This Act does not apply to the following: not limited to, the following:
(a) Information about any individual who is or was an (1) A contract is entered in the Philippines;
officer or employee of a government institution that relates
to the position or functions of the individual, including: (2) A juridical entity unincorporated in the Philippines but
has central management and control in the country; and
(1) The fact that the individual is or was an officer or
employee of the government institution; (3) An entity that has a branch, agency, office or
subsidiary in the Philippines and the parent or affiliate of
(2) The title, business address and office telephone the Philippine entity has access to personal information;
number of the individual; and
(3) The classification, salary range and responsibilities of (c) The entity has other links in the Philippines such as,
the position held by the individual; and but not limited to:
(4) The name of the individual on a document prepared (1) The entity carries on business in the Philippines; and
by the individual in the course of employment with the
government; (2) The personal information was collected or held by an
entity in the Philippines.
(b) Information about an individual who is or was
performing service under contract for a government CHAPTER II
institution that relates to the services performed, including THE NATIONAL PRIVACY COMMISSION
the terms of the contract, and the name of the individual Section 7. Functions of the National Privacy
given in the course of the performance of those services; Commission. – To administer and implement the
(c) Information relating to any discretionary benefit of a provisions of this Act, and to monitor and ensure
financial nature such as the granting of a license or permit compliance of the country with international standards set
given by the government to an individual, including the for data protection, there is hereby created an
name of the individual and the exact nature of the benefit; independent body to be known as the National Privacy
Commission, winch shall have the following functions:
(d) Personal information processed for journalistic,
artistic, literary or research purposes;
(a) Ensure compliance of personal information controllers accountability agents, participate in international and
with the provisions of this Act; regional initiatives for data privacy protection;

(b) Receive complaints, institute investigations, facilitate (o) Negotiate and contract with other data privacy
or enable settlement of complaints through the use of authorities of other countries for cross-border application
alternative dispute resolution processes, adjudicate, and implementation of respective privacy laws;
award indemnity on matters affecting any personal
information, prepare reports on disposition of complaints (p) Assist Philippine companies doing business abroad to
and resolution of any investigation it initiates, and, in respond to foreign privacy or data protection laws and
cases it deems appropriate, publicize any such regulations; and
report: Provided, That in resolving any complaint or (q) Generally perform such acts as may be necessary to
investigation (except where amicable settlement is facilitate cross-border enforcement of data privacy
reached by the parties), the Commission shall act as a protection.
collegial body. For this purpose, the Commission may be
given access to personal information that is subject of any Section 8. Confidentiality. – The Commission shall
complaint and to collect the information necessary to ensure at all times the confidentiality of any personal
perform its functions under this Act; information that comes to its knowledge and possession.

(c) Issue cease and desist orders, impose a temporary or Section 9. Organizational Structure of the Commission.
permanent ban on the processing of personal information, – The Commission shall be attached to the Department of
upon finding that the processing will be detrimental to Information and Communications Technology (DICT) and
national security and public interest; shall be headed by a Privacy Commissioner, who shall
also act as Chairman of the Commission. The Privacy
(d) Compel or petition any entity, government agency or Commissioner shall be assisted by two (2) Deputy Privacy
instrumentality to abide by its orders or take action on a Commissioners, one to be responsible for Data
matter affecting data privacy; Processing Systems and one to be responsible for
(e) Monitor the compliance of other government agencies Policies and Planning. The Privacy Commissioner and the
or instrumentalities on their security and technical two (2) Deputy Privacy Commissioners shall be appointed
measures and recommend the necessary action in order by the President of the Philippines for a term of three (3)
to meet minimum standards for protection of personal years, and may be reappointed for another term of three
information pursuant to this Act; (3) years. Vacancies in the Commission shall be filled in
the same manner in which the original appointment was
(f) Coordinate with other government agencies and the made.
private sector on efforts to formulate and implement plans
and policies to strengthen the protection of personal The Privacy Commissioner must be at least thirty-five (35)
information in the country; years of age and of good moral character, unquestionable
integrity and known probity, and a recognized expert in the
(g) Publish on a regular basis a guide to all laws relating field of information technology and data privacy. The
to data protection; Privacy Commissioner shall enjoy the benefits, privileges
and emoluments equivalent to the rank of Secretary.
(h) Publish a compilation of agency system of records and
notices, including index and other finding aids; The Deputy Privacy Commissioners must be recognized
experts in the field of information and communications
(i) Recommend to the Department of Justice (DOJ) the technology and data privacy. They shall enjoy the
prosecution and imposition of penalties specified in benefits, privileges and emoluments equivalent to the
Sections 25 to 29 of this Act; rank of Undersecretary.
(j) Review, approve, reject or require modification of The Privacy Commissioner, the Deputy Commissioners,
privacy codes voluntarily adhered to by personal or any person acting on their behalf or under their
information controllers: Provided, That the privacy codes direction, shall not be civilly liable for acts done in good
shall adhere to the underlying data privacy principles faith in the performance of their duties. However, he or
embodied in this Act: Provided, further, That such privacy she shall be liable for willful or negligent acts done by him
codes may include private dispute resolution mechanisms or her which are contrary to law, morals, public policy and
for complaints against any participating personal good customs even if he or she acted under orders or
information controller. For this purpose, the Commission instructions of superiors: Provided, That in case a lawsuit
shall consult with relevant regulatory agencies in the is filed against such official on the subject of the
formulation and administration of privacy codes applying performance of his or her duties, where such performance
the standards set out in this Act, with respect to the is lawful, he or she shall be reimbursed by the
persons, entities, business activities and business sectors Commission for reasonable costs of litigation.
that said regulatory bodies are authorized to principally
regulate pursuant to the law: Provided, finally. That the Section 10. The Secretariat. – The Commission is hereby
Commission may review such privacy codes and require authorized to establish a Secretariat. Majority of the
changes thereto for purposes of complying with this Act; members of the Secretariat must have served for at least
five (5) years in any agency of the government that is
(k) Provide assistance on matters relating to privacy or involved in the processing of personal information
data protection at the request of a national or local including, but not limited to, the following offices: Social
agency, a private entity or any person; Security System (SSS), Government Service Insurance
(l) Comment on the implication on data privacy of System (GSIS), Land Transportation Office (LTO), Bureau
proposed national or local statutes, regulations or of Internal Revenue (BIR), Philippine Health Insurance
procedures, issue advisory opinions and interpret the Corporation (PhilHealth), Commission on Elections
provisions of this Act and other data privacy laws; (COMELEC), Department of Foreign Affairs (DFA),
Department of Justice (DOJ), and Philippine Postal
(m) Propose legislation, amendments or modifications to Corporation (Philpost).
Philippine laws on privacy or data protection as may be
necessary; CHAPTER III
PROCESSING OF PERSONAL INFORMATION
(n) Ensure proper and effective coordination with data
privacy regulators in other countries and private
Section 11. General Data Privacy Principles. – The personal information and privileged information shall be
processing of personal information shall be allowed, prohibited, except in the following cases:
subject to compliance with the requirements of this Act
and other laws allowing disclosure of information to the (a) The data subject has given his or her consent, specific
public and adherence to the principles of transparency, to the purpose prior to the processing, or in the case of
legitimate purpose and proportionality. privileged information, all parties to the exchange have
given their consent prior to processing;
Personal information must, be:
(b) The processing of the same is provided for by existing
(a) Collected for specified and legitimate purposes laws and regulations: Provided, That such regulatory
determined and declared before, or as soon as enactments guarantee the protection of the sensitive
reasonably practicable after collection, and later personal information and the privileged
processed in a way compatible with such declared, information: Provided, further, That the consent of the
specified and legitimate purposes only; data subjects are not required by law or regulation
permitting the processing of the sensitive personal
(b) Processed fairly and lawfully; information or the privileged information;
(c) Accurate, relevant and, where necessary for purposes (c) The processing is necessary to protect the life and
for which it is to be used the processing of personal health of the data subject or another person, and the data
information, kept up to date; inaccurate or incomplete subject is not legally or physically able to express his or
data must be rectified, supplemented, destroyed or their her consent prior to the processing;
further processing restricted;
(d) The processing is necessary to achieve the lawful and
(d) Adequate and not excessive in relation to the purposes noncommercial objectives of public organizations and
for which they are collected and processed; their associations: Provided, That such processing is only
(e) Retained only for as long as necessary for the confined and related to the bona fide members of these
fulfillment of the purposes for which the data was obtained organizations or their associations: Provided,
or for the establishment, exercise or defense of legal further, That the sensitive personal information are not
claims, or for legitimate business purposes, or as transferred to third parties: Provided, finally, That consent
provided by law; and of the data subject was obtained prior to processing;

(f) Kept in a form which permits identification of data (e) The processing is necessary for purposes of medical
subjects for no longer than is necessary for the purposes treatment, is carried out by a medical practitioner or a
for which the data were collected and medical treatment institution, and an adequate level of
processed: Provided, That personal information collected protection of personal information is ensured; or
for other purposes may lie processed for historical, (f) The processing concerns such personal information as
statistical or scientific purposes, and in cases laid down in is necessary for the protection of lawful rights and
law may be stored for longer periods: Provided, interests of natural or legal persons in court proceedings,
further, That adequate safeguards are guaranteed by said or the establishment, exercise or defense of legal claims,
laws authorizing their processing. or when provided to government or public authority.
The personal information controller must ensure Section 14. Subcontract of Personal Information. –
implementation of personal information processing A personal information controller may subcontract the
principles set out herein. processing of personal information: Provided, That the
Section 12. Criteria for Lawful Processing of Personal personal information controller shall be responsible for
Information. – The processing of personal information ensuring that proper safeguards are in place to ensure the
shall be permitted only if not otherwise prohibited by law, confidentiality of the personal information processed,
and when at least one of the following conditions exists: prevent its use for unauthorized purposes, and generally,
comply with the requirements of this Act and other laws
(a) The data subject has given his or her consent; for processing of personal information. The personal
information processor shall comply with all the
(b) The processing of personal information is necessary
requirements of this Act and other applicable laws.
and is related to the fulfillment of a contract with the data
subject or in order to take steps at the request of the data Section 15. Extension of Privileged Communication.
subject prior to entering into a contract; – Personal information controllers may invoke the
principle of privileged communication over privileged
(c) The processing is necessary for compliance with a
information that they lawfully control or process. Subject
legal obligation to which the personal information
to existing laws and regulations, any evidence gathered
controller is subject;
on privileged information is inadmissible.
(d) The processing is necessary to protect vitally
CHAPTER IV
important interests of the data subject, including life and
RIGHTS OF THE DATA SUBJECT
health;
Section 16. Rights of the Data Subject. – The data
(e) The processing is necessary in order to respond to
subject is entitled to:
national emergency, to comply with the requirements of
public order and safety, or to fulfill functions of public (a) Be informed whether personal information pertaining
authority which necessarily includes the processing of to him or her shall be, are being or have been processed;
personal data for the fulfillment of its mandate; or
(b) Be furnished the information indicated hereunder
(f) The processing is necessary for the purposes of the before the entry of his or her personal information into the
legitimate interests pursued by the personal information processing system of the personal information controller,
controller or by a third party or parties to whom the data is or at the next practical opportunity:
disclosed, except where such interests are overridden by
fundamental rights and freedoms of the data subject (1) Description of the personal information to be entered
which require protection under the Philippine Constitution. into the system;

Section 13. Sensitive Personal Information and (2) Purposes for which they are being or are to be
Privileged Information. – The processing of sensitive processed;
(3) Scope and method of the personal information (f) Be indemnified for any damages sustained due to such
processing; inaccurate, incomplete, outdated, false, unlawfully
obtained or unauthorized use of personal information.
(4) The recipients or classes of recipients to whom they
are or may be disclosed; Section 17. Transmissibility of Rights of the Data Subject.
– The lawful heirs and assigns of the data subject may
(5) Methods utilized for automated access, if the same is invoke the rights of the data subject for, which he or she
allowed by the data subject, and the extent to which such is an heir or assignee at any time after the death of the
access is authorized; data subject or when the data subject is incapacitated or
(6) The identity and contact details of the personal incapable of exercising the rights as enumerated in the
information controller or its representative; immediately preceding section.

(7) The period for which the information will be stored; and Section 18. Right to Data Portability. – The data subject
shall have the right, where personal information is
(8) The existence of their rights, i.e., to access, correction, processed by electronic means and in a structured and
as well as the right to lodge a complaint before the commonly used format, to obtain from the personal
Commission. information controller a copy of data undergoing
processing in an electronic or structured format, which is
Any information supplied or declaration made to the data
commonly used and allows for further use by the data
subject on these matters shall not be amended without
subject. The Commission may specify the electronic
prior notification of data subject: Provided, That the
format referred to above, as well as the technical
notification under subsection (b) shall not apply should the
standards, modalities and procedures for their transfer.
personal information be needed pursuant to
a subpoena or when the collection and processing are for Section 19. Non-Applicability. – The immediately
obvious purposes, including when it is necessary for the preceding sections are not applicable if the processed
performance of or in relation to a contract or service or personal information are used only for the needs of
when necessary or desirable in the context of an scientific and statistical research and, on the basis of
employer-employee relationship, between the collector such, no activities are carried out and no decisions are
and the data subject, or when the information is being taken regarding the data subject: Provided, That the
collected and processed as a result of legal obligation; personal information shall be held under strict
confidentiality and shall be used only for the declared
(c) Reasonable access to, upon demand, the following:
purpose. Likewise, the immediately preceding sections
(1) Contents of his or her personal information that were are not applicable to processing of personal information
processed; gathered for the purpose of investigations in relation to
any criminal, administrative or tax liabilities of a data
(2) Sources from which personal information were subject.
obtained;
CHAPTER V
(3) Names and addresses of recipients of the personal SECURITY OF PERSONAL INFORMATION
information;
Section 20. Security of Personal Information. – (a) The
(4) Manner by which such data were processed; personal information controller must implement
reasonable and appropriate organizational, physical and
(5) Reasons for the disclosure of the personal information
technical measures intended for the protection of
to recipients;
personal information against any accidental or unlawful
(6) Information on automated processes where the data destruction, alteration and disclosure, as well as against
will or likely to be made as the sole basis for any decision any other unlawful processing.
significantly affecting or will affect the data subject;
(b) The personal information controller shall implement
(7) Date when his or her personal information concerning reasonable and appropriate measures to protect personal
the data subject were last accessed and modified; and information against natural dangers such as accidental
loss or destruction, and human dangers such as unlawful
(8) The designation, or name or identity and address of access, fraudulent misuse, unlawful destruction,
the personal information controller; alteration and contamination.
(d) Dispute the inaccuracy or error in the personal (c) The determination of the appropriate level of security
information and have the personal information controller under this section must take into account the nature of the
correct it immediately and accordingly, unless the request personal information to be protected, the risks
is vexatious or otherwise unreasonable. If the personal represented by the processing, the size of the
information have been corrected, the personal information organization and complexity of its operations, current data
controller shall ensure the accessibility of both the new privacy best practices and the cost of security
and the retracted information and the simultaneous implementation. Subject to guidelines as the Commission
receipt of the new and the retracted information by may issue from time to time, the measures implemented
recipients thereof: Provided, That the third parties who must include:
have previously received such processed personal
information shall he informed of its inaccuracy and its (1) Safeguards to protect its computer network against
rectification upon reasonable request of the data subject; accidental, unlawful or unauthorized usage or
interference with or hindering of their functioning or
(e) Suspend, withdraw or order the blocking, removal or availability;
destruction of his or her personal information from the
personal information controller’s filing system upon (2) A security policy with respect to the processing of
discovery and substantial proof that the personal personal information;
information are incomplete, outdated, false, unlawfully
(3) A process for identifying and accessing reasonably
obtained, used for unauthorized purposes or are no
foreseeable vulnerabilities in its computer networks, and
longer necessary for the purposes for which they were
for taking preventive, corrective and mitigating action
collected. In this case, the personal information controller
against security incidents that can lead to a security
may notify third parties who have previously received
breach; and
such processed personal information; and
(4) Regular monitoring for security breaches and a Section 22. Responsibility of Heads of Agencies. – All
process for taking preventive, corrective and mitigating sensitive personal information maintained by the
action against security incidents that can lead to a security government, its agencies and instrumentalities shall be
breach. secured, as far as practicable, with the use of the most
appropriate standard recognized by the information and
(d) The personal information controller must further communications technology industry, and as
ensure that third parties processing personal information recommended by the Commission. The head of each
on its behalf shall implement the security measures government agency or instrumentality shall be
required by this provision. responsible for complying with the security requirements
(e) The employees, agents or representatives of a mentioned herein while the Commission shall monitor the
personal information controller who are involved in the compliance and may recommend the necessary action in
processing of personal information shall operate and hold order to satisfy the minimum standards.
personal information under strict confidentiality if the Section 23. Requirements Relating to Access by Agency
personal information are not intended for public Personnel to Sensitive Personal Information. – (a) On-site
disclosure. This obligation shall continue even after and Online Access – Except as may be allowed through
leaving the public service, transfer to another position or guidelines to be issued by the Commission, no employee
upon termination of employment or contractual relations. of the government shall have access to sensitive personal
(f) The personal information controller shall promptly information on government property or through online
notify the Commission and affected data subjects when facilities unless the employee has received a security
sensitive personal information or other information that clearance from the head of the source agency.
may, under the circumstances, be used to enable identity (b) Off-site Access – Unless otherwise provided in
fraud are reasonably believed to have been acquired by guidelines to be issued by the Commission, sensitive
an unauthorized person, and the personal information personal information maintained by an agency may not be
controller or the Commission believes (bat such transported or accessed from a location off government
unauthorized acquisition is likely to give rise to a real risk property unless a request for such transportation or
of serious harm to any affected data subject. The access is submitted and approved by the head of the
notification shall at least describe the nature of the breach, agency in accordance with the following guidelines:
the sensitive personal information possibly involved, and
the measures taken by the entity to address the breach. (1) Deadline for Approval or Disapproval – In the case of
Notification may be delayed only to the extent necessary any request submitted to the head of an agency, such
to determine the scope of the breach, to prevent further head of the agency shall approve or disapprove the
disclosures, or to restore reasonable integrity to the request within two (2) business days after the date of
information and communications system. submission of the request. In case there is no action by
the head of the agency, then such request is considered
(1) In evaluating if notification is unwarranted, the disapproved;
Commission may take into account compliance by the
personal information controller with this section and (2) Limitation to One thousand (1,000) Records – If a
existence of good faith in the acquisition of personal request is approved, the head of the agency shall limit the
information. access to not more than one thousand (1,000) records at
a time; and
(2) The Commission may exempt a personal information
controller from notification where, in its reasonable (3) Encryption – Any technology used to store, transport
judgment, such notification would not be in the public or access sensitive personal information for purposes of
interest or in the interests of the affected data subjects. off-site access approved under this subsection shall be
secured by the use of the most secure encryption
(3) The Commission may authorize postponement of standard recognized by the Commission.
notification where it may hinder the progress of a criminal
investigation related to a serious breach. The requirements of this subsection shall be implemented
not later than six (6) months after the date of the
CHAPTER VI enactment of this Act.
ACCOUNTABILITY FOR TRANSFER OF PERSONAL
INFORMATION Section 24. Applicability to Government Contractors. – In
entering into any contract that may involve accessing or
Section 21. Principle of Accountability. – Each personal requiring sensitive personal information from one
information controller is responsible for personal thousand (1,000) or more individuals, an agency shall
information under its control or custody, including require a contractor and its employees to register their
information that have been transferred to a third party for personal information processing system with the
processing, whether domestically or internationally, Commission in accordance with this Act and to comply
subject to cross-border arrangement and cooperation. with the other provisions of this Act including the
(a) The personal information controller is accountable for immediately preceding section, in the same manner as
complying with the requirements of this Act and shall use agencies and government employees comply with such
contractual or other reasonable means to provide a requirements.
comparable level of protection while the information are CHAPTER VIII
being processed by a third party. PENALTIES
(b) The personal information controller shall designate an Section 25. Unauthorized Processing of Personal
individual or individuals who are accountable for the Information and Sensitive Personal Information. – (a) The
organization’s compliance with this Act. The identity of the unauthorized processing of personal information shall be
individual(s) so designated shall be made known to any penalized by imprisonment ranging from one (1) year to
data subject upon request. three (3) years and a fine of not less than Five hundred
CHAPTER VII thousand pesos (Php500,000.00) but not more than Two
SECURITY OF SENSITIVE PERSONAL million pesos (Php2,000,000.00) shall be imposed on
INFORMATION IN GOVERNMENT persons who process personal information without the
consent of the data subject, or without being authorized
under this Act or any existing law.
(b) The unauthorized processing of personal sensitive to three (3) years and a fine of not less than Five hundred
information shall be penalized by imprisonment ranging thousand pesos (Php500,000.00) but not more than Two
from three (3) years to six (6) years and a fine of not less million pesos (Php2,000,000.00) shall be imposed on
than Five hundred thousand pesos (Php500,000.00) but persons who knowingly and unlawfully, or violating data
not more than Four million pesos (Php4,000,000.00) shall confidentiality and security data systems, breaks in any
be imposed on persons who process personal information way into any system where personal and sensitive
without the consent of the data subject, or without being personal information is stored.
authorized under this Act or any existing law.
Section 30. Concealment of Security Breaches Involving
Section 26. Accessing Personal Information and Sensitive Personal Information. – The penalty of
Sensitive Personal Information Due to Negligence. – (a) imprisonment of one (1) year and six (6) months to five (5)
Accessing personal information due to negligence shall years and a fine of not less than Five hundred thousand
be penalized by imprisonment ranging from one (1) year pesos (Php500,000.00) but not more than One million
to three (3) years and a fine of not less than Five hundred pesos (Php1,000,000.00) shall be imposed on persons
thousand pesos (Php500,000.00) but not more than Two who, after having knowledge of a security breach and of
million pesos (Php2,000,000.00) shall be imposed on the obligation to notify the Commission pursuant to
persons who, due to negligence, provided access to Section 20(f), intentionally or by omission conceals the
personal information without being authorized under this fact of such security breach.
Act or any existing law.
Section 31. Malicious Disclosure. – Any personal
(b) Accessing sensitive personal information due to information controller or personal information processor
negligence shall be penalized by imprisonment ranging or any of its officials, employees or agents, who, with
from three (3) years to six (6) years and a fine of not less malice or in bad faith, discloses unwarranted or false
than Five hundred thousand pesos (Php500,000.00) but information relative to any personal information or
not more than Four million pesos (Php4,000,000.00) shall personal sensitive information obtained by him or her,
be imposed on persons who, due to negligence, provided shall be subject to imprisonment ranging from one (1) year
access to personal information without being authorized and six (6) months to five (5) years and a fine of not less
under this Act or any existing law. than Five hundred thousand pesos (Php500,000.00) but
not more than One million pesos (Php1,000,000.00).
Section 27. Improper Disposal of Personal Information
and Sensitive Personal Information. – (a) The improper Section 32. Unauthorized Disclosure. – (a) Any personal
disposal of personal information shall be penalized by information controller or personal information processor
imprisonment ranging from six (6) months to two (2) years or any of its officials, employees or agents, who discloses
and a fine of not less than One hundred thousand pesos to a third party personal information not covered by the
(Php100,000.00) but not more than Five hundred immediately preceding section without the consent of the
thousand pesos (Php500,000.00) shall be imposed on data subject, shall he subject to imprisonment ranging
persons who knowingly or negligently dispose, discard or from one (1) year to three (3) years and a fine of not less
abandon the personal information of an individual in an than Five hundred thousand pesos (Php500,000.00) but
area accessible to the public or has otherwise placed the not more than One million pesos (Php1,000,000.00).
personal information of an individual in its container for
trash collection. (b) Any personal information controller or personal
information processor or any of its officials, employees or
b) The improper disposal of sensitive personal information agents, who discloses to a third party sensitive personal
shall be penalized by imprisonment ranging from one (1) information not covered by the immediately preceding
year to three (3) years and a fine of not less than One section without the consent of the data subject, shall be
hundred thousand pesos (Php100,000.00) but not more subject to imprisonment ranging from three (3) years to
than One million pesos (Php1,000,000.00) shall be five (5) years and a fine of not less than Five hundred
imposed on persons who knowingly or negligently thousand pesos (Php500,000.00) but not more than Two
dispose, discard or abandon the personal information of million pesos (Php2,000,000.00).
an individual in an area accessible to the public or has
otherwise placed the personal information of an individual Section 33. Combination or Series of Acts. – Any
in its container for trash collection. combination or series of acts as defined in Sections 25 to
32 shall make the person subject to imprisonment ranging
Section 28. Processing of Personal Information and from three (3) years to six (6) years and a fine of not less
Sensitive Personal Information for Unauthorized than One million pesos (Php1,000,000.00) but not more
Purposes. – The processing of personal information for than Five million pesos (Php5,000,000.00).
unauthorized purposes shall be penalized by
imprisonment ranging from one (1) year and six (6) Section 34. Extent of Liability. – If the offender is a
months to five (5) years and a fine of not less than Five corporation, partnership or any juridical person, the
hundred thousand pesos (Php500,000.00) but not more penalty shall be imposed upon the responsible officers, as
than One million pesos (Php1,000,000.00) shall be the case may be, who participated in, or by their gross
imposed on persons processing personal information for negligence, allowed the commission of the crime. If the
purposes not authorized by the data subject, or otherwise offender is a juridical person, the court may suspend or
authorized under this Act or under existing laws. revoke any of its rights under this Act. If the offender is an
alien, he or she shall, in addition to the penalties herein
The processing of sensitive personal information for prescribed, be deported without further proceedings after
unauthorized purposes shall be penalized by serving the penalties prescribed. If the offender is a public
imprisonment ranging from two (2) years to seven (7) official or employee and lie or she is found guilty of acts
years and a fine of not less than Five hundred thousand penalized under Sections 27 and 28 of this Act, he or she
pesos (Php500,000.00) but not more than Two million shall, in addition to the penalties prescribed herein, suffer
pesos (Php2,000,000.00) shall be imposed on persons perpetual or temporary absolute disqualification from
processing sensitive personal information for purposes office, as the case may be.
not authorized by the data subject, or otherwise
authorized under this Act or under existing laws. Section 35. Large-Scale. – The maximum penalty in the
scale of penalties respectively provided for the preceding
Section 29. Unauthorized Access or Intentional Breach. offenses shall be imposed when the personal information
– The penalty of imprisonment ranging from one (1) year
of at least one hundred (100) persons is harmed, affected REPUBLIC ACT No. 9775
or involved as the result of the above mentioned actions.
AN ACT DEFINING THE CRIME OF CHILD
Section 36. Offense Committed by Public Officer. – When PORNOGRAPHY, PRESCRIBING PENALTIES
the offender or the person responsible for the offense is a THEREFOR AND FOR OTHER PURPOSES
public officer as defined in the Administrative Code of the
Philippines in the exercise of his or her duties, an Be it enacted by the Senate and House of
accessory penalty consisting in the disqualification to Representatives of the Philippines in Congress
occupy public office for a term double the term of criminal assembled:
penalty imposed shall he applied. Section 1. Short Title. - This Act shall be known as
Section 37. Restitution. – Restitution for any aggrieved the "Anti-Child Pornography Act of 2009."
party shall be governed by the provisions of the New Civil Section 2. Declaration of Policy. - The State recognizes
Code. the vital role of the youth in nation building and shall
CHAPTER IX promote and protect their physical, moral, spiritual,
MISCELLANEOUS PROVISIONS intellectual, emotional, psychological and social well-
being. Towards this end, the State shall:
Section 38. Interpretation. – Any doubt in the
interpretation of any provision of this Act shall be liberally (a) Guarantee the fundamental rights of every child from
interpreted in a manner mindful of the rights and interests all forms of neglect, cruelty and other conditions
of the individual about whom personal information is prejudicial to his/her development;
processed. (b) Protect every child from all forms of exploitation and
Section 39. Implementing Rules and Regulations abuse including, but not limited to:
(IRR). – Within ninety (90) days from the effectivity of this (1) the use of a child in pornographic performances and
Act, the Commission shall promulgate the rules and materials; and
regulations to effectively implement the provisions of this
Act. (2) the inducement or coercion of a child to engage or be
involved in pornography through whatever means; and
Section 40. Reports and Information. – The Commission
shall annually report to the President and Congress on its (c) Comply with international treaties to which the
activities in carrying out the provisions of this Act. The Philippines is a signatory or a State party concerning the
Commission shall undertake whatever efforts it may rights of children which include, but not limited to, the
determine to be necessary or appropriate to inform and Convention on the Rights of the Child, the Optional
educate the public of data privacy, data protection and fair Protocol to the Convention on the Rights of the Child of
information rights and responsibilities. the Child on the Sale of Children, Child Prostitution and
Child Pornography, the International Labor Organization
Section 41. Appropriations Clause. – The Commission (ILO) Convention No.182 on the Elimination of the Worst
shall be provided with an initial appropriation of Twenty Forms of Child Labor and the Convention Against
million pesos (Php20,000,000.00) to be drawn from the Transnational Organized Crime.
national government. Appropriations for the succeeding
years shall be included in the General Appropriations Act. Section 3. Definition of Terms. -
It shall likewise receive Ten million pesos
(a) "Child" refers to a person below eighteen (18) years of
(Php10,000,000.00) per year for five (5) years upon
age or over, but is unable to fully take care of
implementation of this Act drawn from the national
himself/herself from abuse, neglect, cruelty, exploitation
government.
or discrimination because of a physical or mental disability
Section 42. Transitory Provision. – Existing industries, or condition.
businesses and offices affected by the implementation of
For the purpose of this Act, a child shall also refer to:
this Act shall be given one (1) year transitory period from
the effectivity of the IRR or such other period as may be (1) a person regardless of age who is presented, depicted
determined by the Commission, to comply with the or portrayed as a child as defined herein; and
requirements of this Act.
(2) computer-generated, digitally or manually crafted
In case that the DICT has not yet been created by the time images or graphics of a person who is represented or who
the law takes full force and effect, the National Privacy is made to appear to be a child as defined herein.
Commission shall be attached to the Office of the
President. (b) "Child pornography" refers to any representation,
whether visual, audio, or written combination thereof, by
Section 43. Separability Clause. – If any provision or part electronic, mechanical, digital, optical, magnetic or any
hereof is held invalid or unconstitutional, the remainder of other means, of child engaged or involved in real or
the law or the provision not otherwise affected shall simulated explicit sexual activities.
remain valid and subsisting.
(c) "Explicit Sexual Activity" includes actual or simulated -
Section 44. Repealing Clause. – The provision of Section
7 of Republic Act No. 9372, otherwise known as the (1) As to form:
"Human Security Act of 2007″, is hereby amended.
(i) sexual intercourse or lascivious act including, but not
Except as otherwise expressly provided in this Act, all
limited to, contact involving genital to genital, oral to
other laws, decrees, executive orders, proclamations and
genital, anal to genital, or oral to anal, whether between
administrative regulations or parts thereof inconsistent
persons of the same or opposite sex;
herewith are hereby repealed or modified accordingly.
(2) bestiality;
Section 45. Effectivity Clause. – This Act shall take
effect fifteen (15) days after its publication in at least two (3) masturbation;
(2) national newspapers of general circulation.
(4) sadistic or masochistic abuse;
Approved: AUG 15 2012
(5) lascivious exhibition of the genitals, buttocks, breasts,
pubic area and/or anus; or
(6) use of any object or instrument for lascivious acts (k) To conspire to commit any of the prohibited acts stated
in this section. Conspiracy to commit any form of child
(d) "Internet address" refers to a website, bulletin board pornography shall be committed when two (2) or more
service, internet chat room or news group, or any other persons come to an agreement concerning the
internet or shared network protocol address. commission of any of the said prohibited acts and decide
(e) "Internet cafe or kiosk" refers to an establishment that to commit it; and
offers or proposes to offer services to the public for the (l) To possess any form of child pornography.
use of its computer/s or computer system for the purpose
of accessing the internet, computer games or related Section 5. Syndicated Child Pornography - The crime of
services. child pornography is deemed committed by a syndicate if
carried out by a group of three (3) or more persons
(f) "Internet content host" refers to a person who hosts or conspiring or confederating with one another and shall be
who proposes to host internet content in the Philippines. punished under Section 15(a) of this Act.
(g) "Internet service provider (ISP)" refers to a person or Section 6. Who May File a Complaint. - Complaints on
entity that supplies or proposes to supply, an internet cases of any form of child pornography and other offenses
carriage service to the public. punishable under this Act may be filed by the following:
(h) "Grooming" refers to the act of preparing a child or (a) Offended party;
someone who the offender believes to be a child for
sexual activity or sexual relationship by communicating (b) Parents or guardians;
any form of child pornography. It includes online
enticement or enticement through any other means. (c) Ascendant or collateral relative within the third degree
of consanguinity;
(i) "Luring" refers to the act of communicating, by means
of a computer system, with a child or someone who the (d) Officer, social worker or representative of a licensed
offender believes to be a child for the purpose of child-caring institution;
facilitating the commission of sexual activity or production (e) Officer or social worker of the Department of Social
of any form of child pornography.(2) Bestiality; Welfare and Development (DSWD);
(j) "Pandering" refers to the act of offering, advertising, (f) Local social welfare development officer;
promoting, representing or distributing through any
means any material or purported material that is intended (g) Barangay chairman;
to cause another to believe that the material or purported
(h) Any law enforcement officer;
material contains any form of child pornography,
regardless of the actual content of the material or (i) At least three (3) concerned responsible citizens
purported material. residing in the place where the violation occurred; or
(k) "Person" refers to any natural or juridical entity. (j) Any person who has personal knowledge of the
circumstances of the commission of any offense under
Section 4. Unlawful or Prohibited Acts. - It shall be
this Act.
unlawful for any person:
Section 7. Appointment of Special Prosecutors. - The
(a) To hire, employ, use, persuade, induce or coerce a
Department of Justice (DOJ) shall appoint or designate
child to perform in the creation or production of any form
special prosecutors to prosecute cases for the violation of
of child pornography;
this Act.
(b) To produce, direct, manufacture or create any form of
Section 8. Jurisdiction. - Jurisdiction over cases for the
child pornography;
violation of this Act shall be vested in the Family Court
(c) To publish offer, transmit, sell, distribute, broadcast, which has territorial jurisdiction over the place where the
advertise, promote, export or import any form of child offense or any of its essential elements was committed
pornography; pursuant to Republic Act No. 8369, otherwise known as
"Family Courts Act of 1997".
(d) To possess any form of child pornography with the
intent to sell, distribute, publish, or broadcast: Provided. Section 9. Duties of an Internet Service Provider (ISP). -
That possession of three (3) or more articles of child All internet service providers (ISPs) shall notify the
pornography of the same form shall be prima facie Philippine National Police (PNP) or the National Bureau
evidence of the intent to sell, distribute, publish or of Investigation (NBI) within seven (7) days from obtaining
broadcast; facts and circumstances that any form of child
pornography is being committed using its server or facility.
(e) To knowingly, willfully and intentionally provide a venue Nothing in this section may be construed to require an ISP
for the commission of prohibited acts as, but not limited to engage in the monitoring of any user, subscriber or
to, dens, private rooms, cubicles, cinemas, houses or in customer, or the content of any communication of any
establishments purporting to be a legitimate business; such person: Provided, That no ISP shall be held civilly
(f) For film distributors, theaters and telecommunication liable for damages on account of any notice given in good
companies, by themselves or in cooperation with other faith in compliance with this section.
entities, to distribute any form of child pornography; Furthermore, an ISP shall preserve such evidence for
(g) For a parent, legal guardian or person having custody purpose of investigation and prosecution by relevant
or control of a child to knowingly permit the child to authorities.
engage, participate or assist in any form of child An ISP shall, upon the request of proper authorities,
pornography; furnish the particulars of users who gained or attempted
(h) To engage in the luring or grooming of a child; to gain access to an internet address which contains any
form of child pornography.
(i) To engage in pandering of any form of child
pornography; All ISPs shall install available technology, program or
software to ensure that access to or transmittal of any
(j) To willfully access any form of child pornography; form of child pornography will be blocked or filtered.
An ISP who shall knowingly, willfully and intentionally prosecution and trial of an offense under this Act. Towards
violate this provision shall be subject to the penalty this end, the following rules shall be observed:
provided under Section 15(k) of this Act.
(a) The judge, prosecutor or any officer of the law to whom
The National Telecommunications Commission (NTC) the complaint has been referred to may, whenever
shall promulgate within ninety (90) days from the necessary to ensure a fair and impartial proceeding and
effectivity of this Act the necessary rules and regulations after considering all circumstances for the best interest of
for the implementation of this provision which shall the child conduct a closed-door investigation, prosecution
include, among others, the installation of filtering software or trial;
that will block access to or transmission of any form of the
child pornography. (b) The name and personal circumstances of the child,
including the child's immediate family, or any other
Section 10. Responsibility of Mall Owners/Operators and information tending to establish his/her identity shall not
Owners or Lessors of Other Business Establishments. - be disclosed to the public;
All mall owners/operators and owners or lessors of other
business establishments shall notify the PNP or the NBI (c) Any record regarding a child shall be confidential and
within seven (7) days from obtaining facts and kept under seal. Except upon written request and order of
circumstances that child pornography is being committed the court, a record shall be released only to the following:
in their premises. Provided, That public display of any (1) Members of the court staff for administrative use;
form of child pornography within their premises is a
conclusive presumption of the knowledge of the mall (2) The prosecuting attorney;
owners/operators and owners or lessors of other business
(3) Defense counsel;
establishments of the violation of this Act: Provided,
further, That a disputable presumption of knowledge by (4) The guardian ad litem;
mall owners/operators and owners or lessors of other
business establishments should know or reasonably (5) Agents of investigating law enforcement agencies and
know that a violation of this Act is being committed in their
(6) Other persons as determined by the court.
premises.
(d) Any form of child pornography that is part of the court
Photo developers, information technology professionals,
records shall be subject to a protective order that provides
credit card companies and banks and any person who has
as follows:
direct knowledge of any form of child pornography
activities shall have the duty to report any suspected child (1) Any form of child pornography may be viewed only by
pornography materials or transactions to the proper the parties, their counsel, their expert witness and
authorities within seven (7) days from discovery thereof. guardian ad litem;
Any willful and intentional violation of this provision shall (2) Neither form of child pornography nor any portion
be subject to the penalty provided under Section 15(l) of thereof shall be divulged to any other person, except as
this Act. necessary for investigation, prosecution or trial; and
Section 11. Duties of an Internet Content Host. - An (3) No person shall be granted access to any form of child
internet content host shall: pornography or any part thereof unless he/she signs a
written affirmation that he/she has received and read a
(a) Not host any form of child pornography on its internet
copy of the protection order; that he/she submits to the
address;
jurisdiction of the court with respect to the protective
(b) Within seven (7) days, report the presence of any form order; and that, in case of violation thereof, he/she will be
of child pornography, as well as the particulars of the subject to the contempt power of the court; and
person maintaining, hosting, distributing or in any manner
(e) In cases when prosecution or trial is conducted behind
contributing to such internet address, to the proper
closed doors, it shall be unlawful for any editor, publisher
authorities; and
and reporter or columnist in case of printed materials,
(c) Preserve such evidence for purposes of investigation announcer or producer in case of television and radio,
and prosecution by relevant authorities. producer and director of a film in case of the movie
industry, or any person utilizing the tri-media facilities or
An internet content host shall, upon the request of proper information technology to publish or broadcast the names
authorities, furnish the particulars of users who gained or of the victims of any case of child pornography.
attempted to gain access to an internet address that
contains any form of child pornography. Any violation of this provision shall be subject to the
penalty provided for under Section 15(m) of this Act.
An internet content host who shall knowingly, willfully and
intentionally violate this provision shall be subject to the Section 14. Care, Custody and Treatment of a Child
penalty provided under Section 15(j) of this Act: Provided, Victim. - The DSWD shall ensure that the child who is a
That the failure of the internet content host to remove any victim of any form of child pornography is provided
form of child pornography within forty-eight (48) hours appropriate care, custody and support for their recovery
from receiving the notice that any form of child and reintegration in accordance with existing laws.
pornography is hitting its server shall be conclusive
The child and his family shall be entitled to protection as
evidence of willful and intentional violation thereof.
well as to the rights and benefits of witnesses
Section 12. Authority to Regulate Internet Café or under Republic Act No. 6981, otherwise known as "The
Kiosk. - The local government unit (LGU) of the city or Witness Protection, Security and Benefit Act".
municipality where an internet café or kiosk is located
The child shall also be considered as a victim of a violent
shall have the authority to monitor and regulate the
crime defined under Section 3(d) of Republic Act No.
establishment and operation of the same or similar
7309, otherwise known as "An Act Creating a Board of
establishments in order to prevent violation of the
Claims under the Department of Justice for Victims of
provisions of this Act.
Unjust Imprisonment or Detention and Victims of Violent
Section 13. Confidentiality. - The right to privacy of the Crimes and for Other Purposes", so that the child may
child shall be ensured at any stage of the investigation, claim compensation therein.
Section 15. Penalties and Sanctions. - The following (l) Any mall owner-operator and owner or lessor of other
penalties and sanctions are hereby established for business establishments including photo developers,
offenses enumerated in this Act: information technology professionals, credit card
companies and banks, found guilty of willfully and
(a) Any person found guilty of syndicated child knowingly failing to comply with the notice requirements
pornography as defined in Section 5 of this Act shall suffer under Section 10 of this Act shall suffer the penalty of a
the penalty of reclusion perpetua and a fine of not less fine of not less than One million pesos (Php1,000,000.00)
than Two million pesos (Php2,000,000.00) but not more but not more than Two million pesos (Php2,000,000.00)
than Five million pesos (Php5,000,000.00); for the first offense. In the case of a subsequent offense,
(b) Any person found guilty of violating Section 4(a), (b) the penalty shall be a fine of not less than Two million
and (c) of this Act shall suffer the penalty of reclusion pesos (Php2,000,000.00) but not more than Three million
temporal in its maximum period and a fine of not less than pesos (Php3,000,000.00) and revocation of its license to
One million pesos (Php1,000,000.00) but not more than operate and immediate closure of the establishment; and
Two million (Php2,000,000.00); (m) Any person found guilty of violating Section 13 of this
(c) Any person found guilty of violating Section 4(d), (e) Act shall suffer the penalty of arresto mayor in its
and (f) of this Act shall suffer the penalty of reclusion minimum period and a fine of not less than One hundred
temporal in its medium period and a fine of not less than thousand pesos (Php100,000.00) but not more than
Seven hundred fifty thousand pesos (Php750,000.00) but Three hundred thousand pesos (Php300,000.00).
not more than One million pesos (Php1,000,000.00); Section 16. Common Penal Provisions. -
(d) Any person found guilty of violating Section 4(g) of this (a) If the offender is a parent, ascendant, guardian, step-
Act shall suffer the penalty of reclusion temporal in its parent or collateral relative within the third degree of
minimum period and a fine of not less than Five hundred consanguinity or affinity or any person having control or
thousand pesos (Php500,000.00) but not more than moral ascendancy over the child, the penalty provided
Seven hundred thousand pesos (Php700,000.00); herein shall be in its maximum duration; Provided, That
(e) Any person found guilty of violating Section 4(h) of this this provision shall not apply to Section 4(g) of this Act;
Act shall suffer the penalty of prision mayor in its (b) If the offender is a juridical person, the penalty shall be
maximum period and a fine of not less than Three imposed upon the owner, manager, partner, member of
hundred thousand pesos (Php300,000.00) but not more the board of directors and/or any responsible officer who
than Five hundred thousand pesos (Php500,000.00); participated in the commission of the crime or shall have
(f) Any person found guilty of violating Section 4(I) of this knowingly permitted or failed to prevent its commissions;
Act shall suffer the penalty of prision mayor in its minimum (c) If the offender is a foreigner, he/she shall be
period and a fine of not less than Three hundred thousand immediately deported after the complete service of his/her
pesos (php300,000.00) but not more than Five hundred sentence and shall forever be barred from entering the
thousand pesos (Php500,000.00); country; and
(g) Any person found guilty of violating Section 4(j) of this (d) The penalty provided for in this Act shall be imposed
Act shall suffer the penalty of prision correccional in its in its maximum duration if the offender is a public officer
maximum period and a fine of not less than Two hundred or employee.
thousand pesos (Php200,000.00) but not more than
Three hundred thousand pesos (Php300,000.00); Section 17. Confiscation and Forfeiture of the Proceeds,
Tools and Instruments Used in Child Pornography. - In
(h) Any person found guilty of violating Section 4(k) of this addition to the penalty imposed for the violation of this Act,
Act shall suffer the penalty of prision correccional in its the court shall order the confiscation and forfeiture in favor
medium period and a fine of not less than One hundred of the government of all the proceeds, tools and
thousand pesos (php100,000.00) but not more than Two instruments used in the commission of the crime, unless
hundred fifty thousand pesos (php250,000.00); they are the property of a third person not liable for the
(i) Any person found guilty of violating Section 4(l) of this unlawful act; Provided, however, That all awards for
Act shall suffer the penalty of arresto mayor in its damages shall be taken from the personal and separate
minimum period and a fine of not less than Fifty thousand properties of the offender; Provided, further, That if such
pesos (Php50,000.00) but not more than One hundred properties are insufficient, the deficiency shall be taken
thousand pesos (Php100,000.00); from the confiscated and forfeited proceeds, tools and
instruments.
(j) Any person found guilty of violating Section 11 of this
Act shall suffer the penalty of prision correccional in its All proceeds derived from the sale of properties used for
medium period and a fine of not less than One million the commission of any form of child pornography shall
pesos (Php1,000,000.00) but not more than Two million accrue to the special account of the DSWD which shall be
pesos (Php2,000,000.00) for the first offense. In the case used exclusively for the implementation of this Act.
of a subsequent offense, the penalty shall be a fine not When the proceeds, tools and instruments used in the
less than Two million pesos (Php2,000,000.00) but not commission of the offense have been destroyed
more than Three million pesos (Php3,000,000.00) and diminished in value or otherwise rendered worthless by
revocation of its license to operate and immediate closure any act or omission, directly or indirectly, of the offender,
of the establishment; or it has been concealed, removed, converted or
(k) Any ISP found guilty of willfully and knowingly failing to transferred to prevent the same from being found or to
comply with the notice and installation requirements avoid forfeiture or confiscation, the offender shall be
under Section 9 of this Act shall suffer the penalty of a fine ordered to pay the amount equal to the value of the
of not less than Five hundred thousand pesos proceeds, tools and instruments used in the commission
(Php500,000.00) but not more than One million pesos of the offense.1avvphi1
(Php1,000,000.00) for the first offense. In case of Section 18. Mandatory Services to Victims of Child
subsequent offense, the penalty shall be a fine of not less Pornography. - To ensure recovery, rehabilitation and
than One million pesos (Php1,000,000.00) but not more reintegration into the mainstream of society concerned
than Two million pesos (Php2,000,000.00) and revocation government agencies and the LGUs shall make available
of its license to operate;
the following services to victims of any form of child (k) Director of the National Bureau of Investigation; and
pornography:
(l) Three (3) representatives from children's
(a) Emergency shelter or appropriate housing; nongovernmental organizations. These representatives
shall be nominated by the government agency
(b) Counseling; representatives of the Council for appointment by the
(c) Free legal services, which shall include information President for a term of three (3) years and may be
about the victim's rights and the procedure for filing of renewed upon renomination and reappointment by the
complaints, claims for compensation and such other legal Council and the President respectively.
remedies available to them in a language understood by The members of the Council mat designate their
the child; permanent representatives, who shall have a rank not
(d) Medical or psychological services; lower than assistant secretary or its equivalent, to
meetings and shall receive emoluments as may be
(e) Livelihood and skills training; and determined by the Council in accordance with existing
budget and accounting rules and regulations.
(f) Educational assistance.
The DSWD shall establish the necessary Secretariat for
Sustained supervision and follow through mechanism that
the Council.
will track the progress of recovery, rehabilitation and
reintegration of the child victims shall adopted and carried Section 21. Functions of the Council. - The Council shall
out. have the following powers and functions:
Section 19. Programs for Victims of Child (a) Formulate comprehensive and integrated plans and
Pornography. The Inter-Agency Council Against Child programs to prevent and suppress any form of child
Pornography created under Section 20 of this Act shall pornography;
develop and implement the necessary programs that will
prevent any form of child pornography, as well as protect, (b) Promulgate rules and regulations as may be
heal and reintegrate the child into the mainstream of necessary for the effective implementation of this Act;
society. Such programs shall include beat but not limited (c) Monitor and oversee the strict implementation of this
to the following: Act;
(a) Provision of mandatory services including counseling (d) Coordinate the programs and projects of the various
free legal services, medical or psychological services, members agencies effectively address the issues and
livelihood and skills training and educational assistance to problems attendant to child pornography;
the child pursuant to Section 18 of this Act;
(e) Conduct and coordinate massive information
(b) Sponsorship of a national research program on any disseminations and campaign on the existence of the law
form of child pornography and other acts covered by the and the various issues and problems attendant to child
law and the establishment of a data collection system for pornography;
monitoring and evaluation purposes;
(f) Direct other agencies to immediately respond to the
(c) Provision of necessary technical and material support problems brought to their attention and report to the
services to appropriate government agencies and Council on the action taken;
nongovernmental organizations:
(g) Assist in the filling of cases against individuals,
(d) Sponsorship of conferences and seminars to provide agencies, institutions or establishments that violate the
venue for consensus building amongst the public, the provisions of this Act;
academe , government, nongovernmental and
international organizations and (h) Formulate a program for the reintegration of victims of
child pornography;
(e) Promotion of information and education campaign.
(i) Secure from any department, bureau, office, agency or
Section 20. Inter - Agency Council against Child instrumentality of the government or from NGOs and
Pornography. - There is hereby established an Inter- other civic organizations such assistance as may be
Agency Council against Child Pornography to be needed to effectively implement this Act;
composed of the Secretary of the DSWD as chairperson
and the following as members: (j) Complement the shared government information
system relative to child abuse and exploitation and ensure
(a) Secretary of the Department of Justice: that the proper agencies conduct a continuing research
(b) Secretary of the Department of Labor and and study on the patterns and schemes of any form of
Employment child pornography which form basis for policy formulation
and program direction;
(c) Secretary of the Department of Science and
Technology (k) develop the mechanism to ensure the timely,
coordinated and effective response to cases of child
(d) Chief of the Philippine National Police; pornography;
(e) Chairperson of the Commission on Information and (l) Recommend measures to enhance cooperative efforts
Communications Technology; and mutual assistance among foreign countries through
bilateral and/or multilateral arrangements to prevent and
(g) Commissioner of the National Telecommunications
suppress any form of child pornography;
Commission;
(m) Adopt measures and policies to protect the rights and
(h) Executive Director of the Council for the Welfare of
needs of the victims of child pornography who are foreign
Children;
nationals in the Philippines;
(i) Executive Director of the Philippine Center for
(n) maintain a database of cases of child pornography;
Transnational Crimes;

(j) Executive Director of the Optical Media Board;


(o) Initiate training programs in identifying and providing Section 28. Separability Clause. - If any part of this Act is
the necessary intervention or assistance to victims of child declared unconstitutional or invalid, the other provisions
pornography. not affected thereby shall continue to be in full force and
effect.
(p) Submit to the President and the Congressional
Oversight committee credited herein the annual report on Section 29. Repealing Clause. - All laws, presidential
the policies, plans, programs and activities of the Council decrees, executive orders, administrative orders, rules
relative to the implementation of this Act; and and regulations inconsistent with or contrary to the
provisions of this Act are deemed amended, modified or
(q) Exercise all the powers and perform such other repealed accordingly.
functions necessary to attain the purposes and objectives
of this Act. Section 30. Effectivity. - This Act shall effect after fifteen
(15) days following its complete publication in the Official
Section 22. Child Pornography as a Transnational Gazette or in at least two (2) newspapers of general
Crime. - Pursuant to the Convention on transnational circulation.
Organized Crime, the DOJ may execute the request of a
foreign state for assistance in the investigation or Approved: November 17, 2009
prosecution of any form of child pornography by: (1)
conducting a preliminary investigation against the
offender and, if appropriate, to file the necessary charges
in court; (2) giving information needed by the foreign state;
and (3) to apply for an order of forfeiture of any proceeds
or monetary instrument or properly located in the
Philippines used in connection with child pornography in
the court; Provided, That if the DOJ refuses to act on the
request of for delaying the execution
thereof: Provided, further, That the principles of mutuality
and reciprocity shall, for this purpose, be at all times
recognized.

Section 23. Extradition. - The DOJ, in consultation with


the Department of Foreign Affairs (DFA), shall endeavor
to include child pornography among extraditable offenses
in future treaties.

Section 24. Congressional Oversight Committee. -There


is hereby created a Congressional Oversight Committee
composed of five (5) members from the Senate and five
(5) members from the House of Representatives. The
members from the Senate shall be appointed by the
Senate President based on proportional representation of
the parties or coalition therein with at least one (1)
member representing the Minority. The members from the
House of Representative shall be appointed by the
Speaker, also based on proportional representation of the
parties or coalitions therein with the Chair of the House of
Committee on Welfare of Children and at least one (1)
member representing the Minority

The Committee shall be headed by the respective Chairs


of the Senate Committee on Youth, Women and Family
relations and the House of Representatives Committee on
Justice. The Secretariat of the Congressional Oversight
Committee shall come from the existing Secretariat
personnel of the Committees of the Senate and the House
of Representatives concerned.

The Committee shall monitor and ensure the effective


implementation of this Act, determine inherent weakness
and loopholes in the law. Recommend the necessary
remedial legislator or administrative measures and
perform such other duties and functions as may be
necessary to attain the objectives of this Act.

Section 25. Appropriations. - The amount necessary to


implement the provisions of the Anti-Child Pornography
Act and the operationalization of the Inter-Agency Council
Against Child Pornography shall be included in the annual
General Appropriations Act.

Section 26. Implementing Rules and Regulations. - The


Inter- Agency Council Against Child pornography shall
promulgate the necessary implementing rules and
regulations within ninety (90) days from the effectivity of
this Act.

Section 27. Suppletory Application of the Revised Penal


Code. - The Revised penal Code shall be suppletorily
applicable to this Act.

You might also like