Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 137

Cybercrime Laws

in the Philippines

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
A brief retrospective view
How it all started

2
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The ILOVEYOU worm

On the year 2000,


A Filipino named Onel De Guzman created a
worm that sent messages through email with
an attachment: “LOVE-LETTER-
FORYOU.txt.vbs”
▣ when opened, the file activates a code that sends
an instruction to forward the same email to all the
contacts of the user.

3
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The ILOVEYOU worm

▣ The worm spread to e-mail accounts across the globe, affecting even the
accounts of U.S. Officials.
▣ This prompted the FBI to identify the source of the worm, which was then
traced back to the Philippines.
▣ It is believed that the estimated damages caused by the worm reached 10
billion USD.

4
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions

▣ Q 1.1: Upon the arrest of Onel De Guzman,


Were his actions illegal?

5
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No
Onel De Guzman was caught but was released shortly afterwards
because there wasn’t any pre-existing laws in the country for which he
can be prosecuted.

6
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Want big impact?
Use big image.

7
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Beginnings of cybercrime in the philippines

▣ A serious threat was exposed due to Onel De Guzman’s actions.


▣ Prior to Onel De Guzman’s actions, there were no legal provision that
criminalizes cybercrimes in any way, providing a way for internet-users to be
exploited in a lot of different ways.
▣ Legislators scrammed to enact a law that would begin to cover this.

8
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
Republict Act 8792

9
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000

▣ R.A. 8792 is an act providing for the recognition and use of electronic
commercial and non-commercial transactions and documents, penalties for
unlawful use thereof and for other purposes.
▣ In addition, R.A. 8792 was also used to define certain illegal activities
concerning the use of various devices in an effort to provide a legal
provision to deter future actions similar to what Onel De Guzman did.

10
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important provisions of R.A. 8792
▣ Ch. II. Sec 6. Legal Recognition of Data Messages.

□ Information shall not be denied legal effect, validity or enforceability


solely on the grounds that it is in the data message purporting to give
rise to such legal effect, or that it is merely referred to in that electronic
data message.

11
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important provisions of R.A. 8792
▣ Ch. II. Sec 6. Legal Recognition of Data Messages.

□ This provision gives text messages, e-mails, or any other similar modes
communication done through electronic means such as unaltered
screenshots, the same legal validity as physical messages.

12
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
▣ Ch. II. Sec 7. Legal Recognition of Electronic Documents.

□ Electronic documents shall have the legal effect, validity or


enforceability as any other document or legal writing.
□ For evidentiary purposes, an electronic document shall be the functional
equivalent of a written document under existing laws.

13
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
▣ Ch. II. Sec 7. Legal Recognition of Electronic Documents.

□ This provision gives softcopy of documents, the same legal validity as


physical documents.
□ These documents should be recognized for as long as their authenticity
is verified.

14
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited acts: Hacking
▣ Hacking / Cracking
□ Unauthorized access into a computer system/server or information and
communication system;
□ Any access in order to corrupt, alter, steal, or destroy using a
computer, … , without the knowledge and consent of the owner [of
the computer system];
□ Introduction of computer viruses and the like, resulting in the
corruption, destruction, alteration, theft or loss of electronic data
messages or electronic document.

15
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited acts: Hacking
▣ Hacking / Cracking

□ In order for anyone to be prosecuted for having performed these acts, it is


important to focus on the exact wording of the law, which requires
individual to:
access a computer or computer system, with the intention to corrupt,
alter, steal, or destroy.
□ It is important for these intentions to be present for someone to be
considered as “hacking” or “cracking”.
16
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited acts: Piracy
▣ Piracy
□ Unauthorized copying, reproduction, storage, uploading, downloading,
communication, or broadcasting of protected material, … , through the
use of telecommunication networks, such as, but not limited to, the
internet, in a manner that infringes intellectual property rights.

17
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Philippine E-commerce Act of 2000
▣ Penalties

□ Minimum fine of One Hundred Thousand Pesos (Php 100,000.00) and a


maximum commensurate to the damage incurred, and;
□ Mandatory imprisonment of 6 months to 3 years;

18
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions: R.A. 8792

▣ Does connecting to an open WiFi Network (WiFi with no


password), without the consent of the owner of the network,
constitute to a violation of RA 8792?

19
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
By merely accessing it, there was no clear intent to
“corrupt, alter, steal, or destroy”.
At least according to RA 8792, this is not illegal.

20
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era

More recently, the following law is the most
comprehensive cybercrime law enacted in the
Philippines.
To date, this is the cornerstone of cybercrime
protection for citizens in the Philippines.

21
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Republict Act 10175

22
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012

▣ R.A. 10175 is an act that adopts sufficient powers to effectively


prevent and combat cybercrime offenses by facilitating their
detection, investigation, and prosecution at both the domestic and
international levels, and by providing arrangements for fast and
reliable international cooperation.

23
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012

DEFINTION
▣ A cybercrime is a crime committed with or through the use of
information and communication technologies such as radio,
television, cellular phone, computer and network, and other
communication device or application.

24
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Three Types of Cybercrimes
1. Offenses against the confidentiality, integrity and availability
(CIA) of computer data and systems;
2. Computer-related offenses;
3. Content-related offenses;
** There is a fourth offense, which refers to “offenses related to infringements of copyright and
related rights”. This, however, is not included in the RA 10175 because a separate law is currently in
that punishes such offenses.

25
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Jurisdiction of RA 10175
Who can be charged with violations of this law?
1. Any violation committed by a Filipino national regardless of the place of
commission.
2. Any of the elements was committed within the Philippines or committed with the use
of any computer system wholly or partly situated in the country.
3. When by such commission any damage is caused to a natural or juridical person
who, at the time the offense was committed, was in the Philippines.

26
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
Explanation
1. Pag isang Pilipino ang nagkasala, kahit nasaan pa siyang lupalop ng mundo, ay
pwedeng kasuhan ng paglabag sa RA 10175.
2. Kung may kahit na anong parte ng krimen na nangyari sa Pilipinas, kasama na ang
paggamit ng kahit na anong computer sa Pilipinas para sa gawaing maaaring
maparusahan ng paglabas sa bata s na ito.
3. Kung ang biktima, sa panahon na nangyari ang isang krimen, ay nasa loob ng
Pilipinas, ang sinumang gumawa ng krimen ay maaari din maparusahan.

27
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
1. Illegal Access
□ The access to the whole or any part of a computer system without right.
▪ Without right means having no consent from the owner of the computer
system.
▪ Access is the instruction, communication with, storing / retrieving data
from, or [making] use of any resources of a computer system or
communication network.

28
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions: R.A. 10175

▣ Does connecting to an open WiFi Network (WiFi with no


password) without the consent of the owner of the network
constitute to a violation of RA 10175?

29
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
Illegal access is to “make use of any resources” without right (consent).
Even if this is not punishable under RA 8792, it is under RA 10175.

30
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
2. Illegal Interception
□ The interception made by technical means without right of any non-
public transmission of computer data.
□ Interception is listening to, recording, monitoring or surveillance of
the content of communications, (…), through the use of electronic
eavesdropping or tapping devices, at the same time that the
communication is occurring.

31
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems

32
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Example:
□ Have you experienced receiving coming from “bpionline.com.ph” with
a subject line of “Update your security details now”?
□ These e-mails ask the recipients to go to a site to login by placing their
credentials.
□ Unknown to many, the purpose of those websites is to intercept or to
just get your user credentials so they can access your real online banking
accounts.

33
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
3. Data Interference
□ The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data
message, without right, including the introduction or transmission of
viruses.

34
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions: R.A. 10175
▣ Consider this situation:
□ You have a friend who will send a file to you through a flash drive.
□ Unknown to both of you, the flash drive has a virus in it.
□ After you copied the file you need from the flash drive of your friend,
you noticed that your files and folders suddenly disappeared and only a
shortcut icon appeared on your personal folder.
▣ Is your friend liable for any violation of RA 10175?

35
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
Data interference includes “the intentional or reckless alteration, damaging, deletion or deterioration
of computer data.” In the situation, even if you friend lent you his/her flash drive in good faith (has no
intentions to infect your computer with a virus), it is still considered as recklessness in his/her part and
it also caused an “alteration”, or “deletion”, or even “deterioration” of data.

36
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
4. System Interference
□ The intentional alteration or reckless hindering or interference with the
functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering or
suppressing computer data or program, electronic document, or
electronic data message, without right or authority, including the
introduction or transmission of viruses

37
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Explanation
▣ This is more or less an extension of the previous offense, whereby the
affected entity is not just data but the whole system.
▣ The previous situation can also apply here if, instead of just having the files
“damaged” or “altered”, the whole computer system went into error.

38
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ Cryptojacking or Cryptomining Malware

□ Refers to software programs and malware


components developed to take over a computer's resources and use them
for cryptocurrency mining without a user's explicit permission.
□ There are reports that malware are now embedded on certain websites to
run on a visitor's computer.

39
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ When you download through torrent sites like “thepiratebay”, you basically
give them the authority to use your computer’s CPU (whether mobile or
desktop) to “mine” cryptocurrencies.
▣ This is one of the reasons why, in most cases, downloading a lot of files can
cause your computer to heat up. Your computer’s CPU is being used to
calculate and solve blocks of encrypted data to mine cryptocurrencies.

40
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ Website defacing

41
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems

5. Misuse of Devices
□ The use, production, sale, procurement, distribution, or otherwise making
available, without right, of a device or computer password designed
primarily for the purpose of committing any of the offenses under this
Act;
□ The possession of an item referred to above.

42
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Misuse of Devices
▣ Use of Skimming Devices / Keyloggers

43
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Misuse of Devices
Use of Skimming Devices
□ Ivaylo Sashov Galapov was a
Bulgarian man arrested in
Pampanga, when the security
guards of BPI Family Savings Bank
noticed him inserting ATM cards in
succession.
□ He was arrested for violation of
R.A. 8792 and R.A. 10175.
Credits: ABS-CBN News Website

44
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (a). CIA of Computer Data and Systems
6. Cyber-squatting
□ The acquisition of a domain name over the internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the same, if
such a domain name is:
i. Similar, identical, to an existing trademark (…) at the time of the domain name
registration:
ii. Identical with the name of a person other than the registrant;
iii. Acquired without right or with intellectual property interests in it.

45
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ MikeRoweSoft
□ In January 2004, Mike Rowe was a grade 12 student who operated a
profitable web design business as a part time job. He registered the
website with the domain name MikeRoweSoft.com.
□ Lawyers from Microsoft asked him to stop using the website. Mike Rowe
asked for $10,000 in return.
□ Microsoft said no and proceeded to filing a case against him.

46
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ MikeRoweSoft
□ Perhaps due to the stress that the whole process would entail, not
withstanding the fact that this legal process would cost a lot of money,
Mike Rowe decided to give away the website.
□ News outlets reported that what he got in return was an XBOX console.
□ But after some research, the following reddit thread appears apparently
from Mike Rowe himself.

47
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Data / System Interference
▣ I found this on reddit, Mike Row had this to say:

48
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (b). Computer-Related Offense

7. Computer-Related Forgery
□ The input, alteration, or deletion of any computer data without right resulting
in inauthentic data with the intent that it be considered or acted upon for legal
purposes as if it were authentic.

49
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Computer-Related Forgery

▣ Hacking into the iSLU portal to change your grade from 65 to 95.
□ This has no monetary value and is therefore considered as “forgery” and
not “fraud”.

50
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (b). Computer-Related Offense

8. Computer-Related Fraud
□ The unauthorized input, alteration, or deletion of computer data or program or
interference in the functioning of a computer system, causing damage thereby
with fraudulent intent.

51
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Computer-Related Fraud
The only difference between forgery and fraud, it is now considered fraud
instead of forgery if the damage incurred has “monetary value”.
Some examples include:
▣ Hacking into a bank’s database and changing your account balance
from “Php 500” to “Php 5,000”.
▣ Asking people to send you “prepaid load”, as they maliciously deceive
you from believing that they are your “relatives from abroad”.

52
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (b). Computer-Related Offense

9. Computer-Related Identity Theft


□ The intentional acquisition, use, misuse, transfer, possession, alteration or
deletion of identifying information belonging to another, whether natural or
juridical, without right.

53
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example of Computer-Related Identity Theft
▣ Fake profiles in Facebook, Instagram, and other websites.
□ There must be a use of “identifying information” which includes pictures of
another person and his/her other personal details but not someone’s NAME.
□ This is because it is completely possible for anyone to have the same name as
another person, as well as for fan pages bearing the name of another person.
□ If the intentions in the use of such profiles are for malicious purposes, such as
pretending to be the actual person even if not, is already a violation of this law .

54
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense

10. Cybersex
□ The willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual activity,
with the aid of a computer system, for favor or consideration.

55
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175

▣ What if two individuals, who happen to be partners in life, gave


their consent to each other to record any sexual act they are
doing?
▣ Is this a case of cybersex?

56
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
Even if both partied consented, and even if these acts are publicly denounced, they do not constitute to
cybersex since the act is not done for “any favour or consideration”. For the purposes of this law, there
must be an element of “engagement in business” for the act to be considered as prohibited.

57
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
11. Child Pornography
□ The unlawful or prohibited acts defined and punishable by Republic Act
No. 9775 or the Anti-Child Pornography Act of 2009, committed through
a computer system.
□ Any representation, whether visual, audio thereof, by electronic, … , or
any other means, of a child engaged or involved in real or simulated
explicit sexual activities.

58
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175

▣ Are “hentai” clips considered as a violation if this law?

59
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
UNLESS: the hentai clip itself contains a character which is explicitly identified as a minor. If so, the
said material is prohibited and the creator / distributor of the said material are liable for violations of
this law.

60
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
12. Online Libel
□ Libel is the public and malicious imputation of a crime, real or
imaginary, or any act, omission, condition, status, or circumstance
tending to cause the dishonor, discredit, or contempt of a natural or
juridical person, or to blacken the memory of one who is dead.

61
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Cybercrime Prevention Act of 2012
▣ Ch. II. Sec 4 (c). Content-Related Offense
12. Online Libel
□ Elements of Libel:
1. Allegation of a discreditable act or condition
concerning another;
2. Publication of the charge;
3. Identity of the person defamed; and
4. Existence of malice.

62
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175
▣ Consider the following post:
□ “Hoy Maria David! Ikaw malandi ka! Alam naman ng lahat
na kahit kanino pumapatol ka! Tuwing gabi nasa park ka,
kasama mo nanay mo! Magkano ba ang rate natin ngayon?
500 hundred, tatlong oras? Ha? Pokpok! Pokpok! Pokpok
kayo ng nanay mo!”

63
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175

▣ Is the person who posted it liable for any crime?

64
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
The statements in the post contains: 1. An allegation against Maria David; 2. Publicized since it was
posted in a social media site; 3. The identity of Maria David was clear; 4. There was no doubt that the
intentions were to defame Maria David, including her mother.
All elements of libel are existent in this post.

65
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175

▣ If you liked / reacted the said post, are you liable?

66
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
Liking or reacting may be a sign of approval to the said post, but no statement was mentioned in
anyway that makes any allegation towards Maria David. Hence, the first element of libel is not
present.

67
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175

▣ If you shared the said post, are you liable?

68
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
The shared post might contain a message that is already established as libelous, BUT the statements
were not made by the person who shared it. Thus, the person who shared the same post cannot be held
liable.

69
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175

▣ If you commented “OO NGA!”, are you liable?

70
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
NO!
Similar to liking or reacting, commenting “oo” is a sign of approval but is not a statement that
discredits or alleges Maria David. Thus, the person is not liable.

71
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions on RA 10175

▣ If you commented “OO NGA! Pokpok talaga kayong mag-


ina!!” on the post, are you liable?

72
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
YES!
This statement is not merely an approval but also states an allegation towards Maria David herself.
Thus making the person liable for libel since the comment can be seen publicly as well.

73
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The concept of PRIVACY
Privacy under the civil code

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
The Right to Privacy
▣ This is the right of an individual "to be free from
unwarranted publicity, or to live without unwarranted
interference by the public in matters in which the public
is not necessarily concerned.”

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question

▣ Does the state (government) have the right to disturb


private individuals in their homes?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
The State recognizes the right of the people to be secure in their houses. No one, not even the State,
except "in case of overriding […] and only under the stringent procedural safeguards," can disturb
them in the privacy of their homes.

77
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Privacy in the Civil Code

Art. 26. of the Civil Code of the Philippines:


▣ Every person shall respect the dignity, personality, privacy and peace
of mind of his neighbors and other
persons.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts under the Civil Code

1. Prying into the privacy of another's residence;


2. Meddling with or disturbing the private life or family relations of
another;
3. Intriguing to cause another to be alienated from his friends;
4. Vexing or humiliating another on account of his religious beliefs,
lowly station in life, place of birth, physical defect, or other personal
condition.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question

(Hing vs Choachuy, 2013)

▣ May an individual install surveillance cameras on his own property facing the
property of another?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
A man’s house is his castle, where his right to privacy cannot be denied or even restricted
by others.
It includes any act of intrusion into, peeping or peering inquisitively into the
residence of another without the consent of the latter.

81
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Privacy in the Civil Code

▣ On the installation of cameras:


▣ The installation of surveillance cameras, should not cover places where there
is reasonable expectation of privacy, unless the consent of the individual,
whose right to privacy would be affected, was obtained.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question

▣ Does an employee / student have a reasonable expectation


of privacy in the workplace / school?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases

According to a court decision, employees in workplace have


less or no expectation of privacy. Similarly, students have
less or no expectation of privacy within school grounds.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example Case

▣ Case: (Zulueta vs C.A., 1996)


□ Cecilia is the wife of Alfredo, a doctor of medicine.
□ Cecilia entered the clinic of her husband and in the presence of witnesses,
forcibly opened the drawers and cabinet and took 157 documents
consisting of private correspondence between Dr. Martin and his
alleged paramours, greetings cards, cancelled checks, diaries, Dr.
Martin’s passport, and photographs.
□ The said items were used as evidence in legal separation case.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question

▣ Was the right to privacy of Dr. Alfredo Martin violated?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes!
In the decision of the court: “A person, by contracting marriage, does not shed his/her
integrity or his right to privacy as an individual and the constitutional protection is ever
available to him or to her.”

87
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Example Case

With respect to the legal separation case, what was the decision of the
court?
▣ The documents and papers are inadmissible as evidence.
▣ The Court said: “the intimacies between husband and wife do not justify any
one of them in breaking the drawers and cabinets of the other and in
ransacking them for any telltale evidence of marital infidelity.”

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Reasonable Expectation of Privacy

When does a person have a reasonable expectation of privacy?

1. When the person believes that one could undress in privacy without being
concerned that an image of him or her is being taken;
2. When a reasonable person would believe that one’s private area would not be
visible regardless of whether the person is in a public or private place.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question

Does a person have a reasonable expectation of privacy inside


a fitting room while, say, trying out a set of clothes?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes!
A person would normally expect to change his or her clothes without worrying about
anyone who could see him / her.
In addition, a fitting room is properly secluded to ensure that no one else can see what a
person inside is doing. Thus, a person has a reasonable expectation of privacy inside a
fitting room
91
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Photo and Video Voyeurism Act of
2009
Republic Act 9995

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Punishable Acts: R.A. 9995

1. The unconsented taking of a photo or video of a person or group of persons


engaged in a sexual act or any similar activity, or capturing an image of the
private area of a person, under circumstances in which the said person has a
reasonable expectation of privacy;

2. The copying or reproduction of such photo or


video recording of the sexual act;

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Punishable Acts

3. The selling or distribution of such photo or video recording;

4. The publication or broadcasting, whether in print or broadcast media, or the


showing of such sexual act or any similar activity through VCD/DVD, the
internet, cellular phones, and other similar means or devices without the written
consent of the persons featured.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions

The phrase “private area of a person” appears on the first punishable act under R.A.
9995.

What does the “private area of a person” include?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions

The “private area of a person” includes naked or


undergarment-clad genitals, pubic area, buttocks, or the female
breast.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Question

Will one be liable for the non-commercial (simply sharing


without asking for money) copying or reproduction of said
photo or video?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes!
The mere copying or reproduction of said material will make one liable under the law
regardless of the reason or whether one profits or not from such act. In fact, the mere
showing of the material on one’s cellphone would violate the law.

98
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions

If the persons in the photo knew and consented to the video


recording or taking of the photo; can anyone reproduce,
distribute, or broadcast it?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
The person merely consented to the taking of the photo or the video recording and did not
give written consent for its reproduction, distribution, and broadcasting.

100
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Penalty

The penalty for the commission of any of the said prohibited acts would
incur a penalty of:

3 years to 7 years imprisonment AND a fine of


Php 100,000.00 to Php 500,000.00

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Data Privacy Act
Republic Act 10173

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Data Privacy Act of 2012

1. Protects the privacy of individuals while ensuring free flow of information


to promote innovation and growth.
2. Regulates the collection, recording, organization, storage, updating or
modification, retrieval, consultation, use, consolidation, blocking, erasure or
destruction of personal data.
3. Ensures that the Philippines complies with
international standards set for data protection.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important Definitions

1. Personal Information Controller


▣ The individual, corporation, or body who decides what to do with data.
2. Personal Information Processor
▣ One who processes data for a Personal Information Controller. The PIP
does not process information for the PIP’s own purpose.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Important Definitions

3. Consent
▣ Where the data subject agrees to the collection and processing of his
personal data. The agreement must inform:
□ purpose, nature, and extent of processing;
□ period of consent/instruction;
□ rights as a data subject

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Definitions

4. Breach
▣ A security incident that:
□ Leads to unlawful or unauthorized processing of personal,
sensitive, or privileged information;
□ Compromises the availability, integrity, or confidentiality of
personal data.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
What is Personal Information?
Personal Information Sensitive Personal Information
▣ Refers to any information or opinion about ▣ This is a type of personal information that
a particular individual that can be used in may be used to harm or discriminate other
identifying a person. This includes: people when mishandled. This include:
□ name □ race or ethnic origin;
□ address □ political opinions
□ phone number □ religious affiliations;
□ date of birth □ criminal record;
□ E-mail address □ biometric information.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Processing Personal Information

▣ The processing of personal information shall be allowed


and shall adhere to the following:
□ Principles of transparency;
□ Legitimate purpose; and
□ Proportionality

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PRINCIPLE OF TRANSPARENCY
▣ The data subject must know:
□ The kind of personal data collected
□ How the personal data will be collected
□ Why personal data will be collected
▣ The data processing policies of the PIC must be known to
the data subject.
▣ The information to be provided to the data subject must be
in clear and plain language.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Legitimate Purpose Principle

▣ Data collected must be always be collected only for the specific, explicit, and
legitimate purposes of the PIC.

▣ Data that is not compatible with the purpose for which the data was collected
shall not be processed.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PRINCIPLE OF PROPORTIONALITY

▣ The processing of personal data should be limited to such processing as is


adequate, relevant, and not excessive in relation to the purpose of the data
processing.

▣ Efforts should be made to limit the processed data to the minimum necessary.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PROCESSING SENSITIVE PERSONAL INFO.
1. The data subject has given his or her consent;
2. The processing of personal information is necessary and
is related to the fulfillment of a contract with the data subject or in order to
take steps at the request of the data subject prior to entering into a contract;
3. The processing is necessary for compliance with a
legal obligation to which the personal information
controller is subject;

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
PROCESSING SENSITIVE PERSONAL INFO.
4. The processing is necessary to protect vitally important interests of the data
subject, including life and health;
5. The processing is necessary in order to respond to national emergency, to
comply with the requirements of public order and safety, or to fulfill functions
of public authority (…); or
6. The processing is necessary for the purposes of the legitimate interests
pursued by the personal information controller (…), except where such
interests are overridden by fundamental rights and freedoms of the data
subject (…).

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Rights of the Data Subject
1. Right to be informed.
2. Right to object.
3. Right to access.
4. Right to rectification.
5. Right to erasure or blocking.
6. Right to damages.
7. Right to data portability.
8. Right to file a complaint.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
1. Right to be Informed

▣ This is the right to be informed that your personal data shall be, are being, or
have been processed, including the existence of automated decision-making
and profiling
▣ The disclosure must be made before the entry of the data into the processing
system or at the next practical opportunity

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
2. Right to Object
▣ The right to object to the processing of personal data, including processing for
direct marketing, automated processing, or profiling.
□ If you do not want to share any information, or you do not want any other person to
collect information from you, then you have the right to say NO.
▣ This includes the right to be given an opportunity to withhold consent to the
processing in case of any changes or any amendment to the information
supplied or declared.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
2. Right to Object
There are several exceptions where you cannot invoke your right to
object:

□ Personal data is needed pursuant to a subpoena issued by a court.


□ Processing is necessary for or related to a contract or service to which the data
subject is a party;
□ Information is being processed as a result of a legal obligation.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
3. Right to Access
▣ The right to find out whether a PIC holds any personal
data about you.
▣ The right to reasonable access to personal data that were
processed, sources of personal data, names and addresses of recipients,
manner/method of processing, information on automated process, date when
personal data was last accessed and modified, designation, name or identity,
and address of the PIC

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
4. RIGHT TO RECTIFICATION
▣ This involves the right to dispute the inaccuracy or error in the personal
data and have the PIC correct it immediately.
▣ It also includes access to new and retracted information, and
simultaneous receipt thereof.
▣ Recipients previously given erroneous data must be
informed of inaccuracy and rectification upon reasonable
request of the data subject.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
5. RIGHT TO ERASURE OR BLOCKING

▣ This is the right to suspend, withdraw, or order the


blocking, removal, or destruction of his or her personal
information from the personal information controller’s
filing system

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
5. RIGHT TO ERASURE OR BLOCKING

The right to erase or block can be invoked in the following


circumstances:
□ There are data which are incomplete, outdated, false, or unlawfully
obtained.
□ The data was used for unauthorized purposes.
□ The data is no longer necessary for purposes of collection.
□ The processing of data was found to be unlawful.
□ The PIC or PIP violated the rights of the data subject.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
6. RIGHT TO DAMAGES
▣ This is the right to be indemnified (receive compensation) for
any damages sustained due to inaccurate, incomplete, outdated,
false, unlawfully obtained, or unauthorized use of personal data.

□ If there are circumstances where you discovered that your


personal data was mishandled, you have the right to ask for
compensation for the damage it has caused you.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
7. RIGHT TO DATA PORTABILITY

▣ The right to obtain a copy of data undergoing processing in an electronic or


structured format, commonly used, and allows for further use by the data
subject.
▣ Takes into account the right to have control over personal data being
processed based on consent, contract, for commercial purposes, or through
automated means.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
8. RIGHT TO FILE A COMPLAINT

▣ In circumstances wherein the PIC or the PIP has breached the privacy of the
data subject, a complaint may be filed through complaints@privacy.gov.ph

▣ National Privacy Commission – Government agency responsible for


implementing R.A. 10173.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases

May a teacher/professor search the contents of a


student’s cellular phone?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
Any search through a student’s cellular phone without justification under a law or
regulation is UNLAWFUL, and may be considered as unauthorized processing of data.

126
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases

However, there are exceptions:

▣ If it was done with student’s consent ( except if the student is a minor.)


▣ If it is required by the student’s life and health, or by national
emergency.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Questions and Cases

Is an implied (indirect) form of consent


valid?
An example of this is the following paragraph that appears in several websites:
▣ “By continuing to avail of xxx products and services:, you explicitly authorize xxx, its
employees, duly authorized representatives, related companies and third-party service
providers, to use, process and share personal data needed in the administration of your
xxx”

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
Consent under the Data Privacy Act has three requirements, none of which are seen in an implied
consent:
Consent must be freely given;
Details about what consent is being asked must be specific.
And there must be an informed indication of will.

129
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions

Are handwritten signatures considered


sensitive personal information?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
No!
It is possible that one may share a similar signature as another person. Moreover, some
signatures do not, in any way, show signs of identity of a person. Nonetheless, these may
be considered personal information when used to identify an individual such as a
signature affixed on the name of a person.

131
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions

Are usernames, password, IP and MAC address, location


cookies and birthday (month and day only) are considered
personal information?

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Yes*!
*Only when they are combined with other pieces of information that may allow an
individual to be distinguished from others.
Remember that a username, say “iloveyou3000”, does not identify any particular person
unless it is combined with other information.

133
Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Guide Questions

In addition:
▣ There are a lot of people who share the same birthday as others. This makes it
impossible to use birthdays to identify any person.
▣ IP addresses alone cannot identify who a person is because it is possible that
two or more people make use of a single computer / server.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts: R.A. 10173

1. Unauthorized processing of personal information and sensitive


personal information.
▣ Process (sensitive) personal information without the consent of the data subject
or without being authorized under the
Data Privacy Act or any other law.
2. Accessing personal information and sensitive personal
information due to negligence.
▣ Provided access to (sensitive) personal information due to negligence or was
unauthorized under the Data Privacy Act or any existing law.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts: R.A. 10173

3. Improper disposal of (sensitive) personal information.


▣ Negligently dispose, discard or abandon the (sensitive) personal information of
an individual in an area accessible to the public or placed the (sensitive) personal
information of an individual in a container for trash collection.
4. Processing of personal information and sensitive personal
information for unauthorized purposes.
▣ Process personal information for purposes not authorized by the data
subject or not otherwise authorized by the Data Privacy Act or under
existing laws.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era
Prohibited Acts: R.A. 10173

5. Unauthorized access or intentional breach.


▣ Knowingly and unlawfully violate data confidentiality and security data
systems where personal and sensitive personal information is stored.
6. Malicious disclosure.
▣ Discloses to a third party unwarranted or false
information with malice or in bad faith relative to any (sensitive) personal
information obtained by such PIC or PIP.

Saint Louis University – SAMCIS - Computer Applications Department G.I.T. – Living in the IT Era

You might also like