­

Attorneys of the Philippines Legal News

Welcome to our legal news pages. Here is where we provide updates about what's happening in Philippines legal news, and publish helpful articles and tips for Pinoys researching legal matters.

Senator Eyes To Penalize Facebook To End Fake News Proliferation

Facebook is a social media platform with many purposes. Aside from connecting with loved ones or catching up with friends, it is also a place for speaking one's mind and obtaining a wealth of information. However, it comes with a caveat because it has recently become a breeding ground for half-baked stories and fake news. Aside from fake news, keyboard warriors are also on the look out for someone who is on the other side of the fence. 

Fake news is said to spread digital mayhem. With multitudes of users sharing fake news every day, a senator just cannot turn a blind eye on it. Senator Francis Pangilinan wants to put a lid on spreading fake news by penalizing Facebook because of allowing misinformation to mislead users. 

Is this even a viable option? The idea is tongue-in-cheek considering the fact that any user can feign everything so long as they hide behind the Facebook curtains. Simply put, if you left your door open and a burglar broke into your house, would you pin the blame on your door when burglary occurred because of human error? 

Fake news exists because people continue to read them. At the end of the day, it all boils down to our personal choices. It is not just Facebook, it can be the demons squatting on our shoulder. The thought of penalizing Facebook is so far-fetched. Educate users about social media etiquette before anything else. Let Republic Act 10175 or Cybercrime Prevention Act of 2012 be a reminder to think before you click.

PUNISHABLE ACTS

SEC. 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime punishable under this Act:

(a) Offenses against the confidentiality, integrity and availability of computer data and systems:

(1) Illegal Access. – The access to the whole or any part of a computer system without right.

(2) Illegal Interception. – The interception made by technical means without right of any non-public transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data.

(3) Data Interference. — The intentional or reckless alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses.

(4) System Interference. — The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data message, without right or authority, including the introduction or transmission of viruses.

(5) Misuse of Devices.

(i) The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:

(aa) A device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or

(bb) A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.

(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent to use said devices for the purpose of committing any of the offenses under this section.

(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to profit, mislead, destroy reputation, and deprive others from registering the same, if such a domain name is:

(i) Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration:

(ii) Identical or in any way similar with the name of a person other than the registrant, in case of a personal name; and

(iii) Acquired without right or with intellectual property interests in it.

(b) Computer-related Offenses:

(1) Computer-related Forgery. —

(i) The input, alteration, or deletion of any computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible; or

(ii) The act of knowingly using computer data which is the product of computer-related forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest design.

(2) Computer-related Fraud. — The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent: Provided, That if nodamage has yet been caused, the penalty imposable shall be one (1) degree lower.

(3) Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty imposable shall be one (1) degree lower.

(c) Content-related Offenses:

(1) Cybersex. — The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

(2) Child Pornography. — The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system: Provided, That the penalty to be imposed shall be (1) one degree higher than that provided for in Republic Act No. 9775.

(3) Unsolicited Commercial Communications. — The transmission of commercial electronic communication with the use of computer system which seek to advertise, sell, or offer for sale products and services are prohibited unless:

(i) There is prior affirmative consent from the recipient; or

(ii) The primary intent of the communication is for service and/or administrative announcements from the sender to its existing users, subscribers or customers; or

(iii) The following conditions are present:

(aa) The commercial electronic communication contains a simple, valid, and reliable way for the recipient to reject. receipt of further commercial electronic messages (opt-out) from the same source;

(bb) The commercial electronic communication does not purposely disguise the source of the electronic message; and

(cc) The commercial electronic communication does not purposely include misleading information in any part of the message in order to induce the recipients to read the message.

(4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.

American National Found Guilty Of Online Libel

The digital era, where anyone can bask in the glory of anonymity, has proven that thoughts indeed travel faster than the speed of light. What used to be a cosmic phenomenon has now been a virtual phenomenon. Everyone yearns to enjoy freedom of speech, but when is too much, too much?

Now that the Cybercrime Prevention Act of 2012 or the Republic Act 10175 has been strengthened, it has also tightened its grip on people violating the law. Andre Philippe LaFlamme, an American national has been found guilty of online libel due to his caustic remarks against his colleague in 2014.

LeFlamme's Facebook posts from 2014 through 2016 pointed to one direction: defaming plaintiff Quennie Samane. A P120,000 bail has already been set to grant LaFlamme's temporary freedom. The posts contained derogatory remarks that tainted the plaintiff's good reputation.

One post showed a photograph of Samane with the heading "I'd do anything for money." Aside from the case of online libel LaFlamme has yet to face another complaint due to threatening other employees. 

The prosecutor will file a warrant of arrest after LaFlamme failed to submit his counter-affidavit.

The violation that LaFlamme committed falls under Article 353, 354 and 355 of the Revised Penal Code.

ART. 353. Definition of libel. — A libel is a public and malicious imputation of a crime, or of a vice or defect, real or imaginary, or any act, omission, condition, status or circumstance tending to cause the dishonor, discredit, or contempt of a natural or juridical person, or to blacken the memory of one who is dead.

ART. 354. Requirement for publicity. — Every defamatory imputation is presumed to be malicious, even if it be true, if no good intention and justifiable motive for making it is shown, except in the following cases:

A private communication made by any person to another in the performance of any legal, moral, or social duty; and

A fair and true report, made in good faith, without any comments or remarks, of any judicial, legislative, or other official proceedings which are not of confidential nature, or of any statement, report, or speech delivered in said proceedings, or of any other act performed by public officers in the exercise of their functions.

ART. 355. Libel by means of writings or similar means. — A libel committed by means of writing, printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition, cinematographic exhibition, or any similar means, shall be punished by prisión correccional in its minimum and medium periods or a fine ranging from 200 to 6,000 pesos, or both, in addition to the civil action which may be brought by the offended party.

The case is also in relation to the Cybercrime Prevention Act of 2012

(4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended, committed through a computer system or any other similar means which may be devised in the future.

How Would You Know You Are Committing Cyber-Bullying Via Social Media?

It seems so easy to pick on someone via social media because of the freedom to remain anonymous. Cyber-bullying has been plaguing people because of the damage it causes that are sometimes beyond repair. There are quite a few examples of cyber-bullying taken to extremes. Just recently, A woman was doing the rounds on the Internet because of ranting about a man whom he perceived to be "ungentleman" for failing to offer a seat during an MRT ride. Her comments went a little too personal that it earned the ire of netizens. Cyber-bullying did not end with just an exchange of derogatory remarks because the ones who criticized the woman were also doing the same thing.

What acts considered as cyber-bullying?

"a) Repeatedly sending offensive, rude and insulting message;

b) Distributing derogatory information about the victim;

c) Posting or sending offensive photos of the victim, whether these are digitally altered or not, or were taken with or without consent, with the intention to humiliate and embarrass the victim;

d) Breaking into an email, social networking or any electronic account and using the victim’s virtual identity to send, upload or distribute embarrassing materials to or about others;

e) Sharing the victim’s personal information or any embarrassing information, or tricking the victim into revealing personal or embarrassing information and sharing it to others; and

f) Repeatedly sending messages that include threats of harm or engaging in online activities that cause fear on the victim’s safety."

What to do about cyber-bullying?

1. Take a screenshot of the hateful messages and save it.
2. Be sure to inform your loved ones about the attacks you receive.
3. Inform the authorities about the attacks.
4. If the bully uses social accounts, report the account being used.
5. Change your mobile number if these are also being used for the attacks.
6. Deactivate your account and try to avoid going online for a time being. Online aggression from the bully can be monitored by your friends or family.
7. Seek professional counseling.
8. Seek police help.

Things may not always go your way, but this does not mean that you should use social media as an avenue for expressions. Be sure to think twice before posting anything to social media because not everyone understands. Remember that photos speak volumes and anyone can be a storyteller. Everyone can have a bad day, but instead of using Facebook and other social accounts to vent out, talk to your friends and loved ones. It saves you from bullying and being bullied plus you get advice from real people.

Enactment Of IP Rights Protection Law: The Answer To Digital Piracy

On Tuesday, April 26, the world celebrated Intellectual Property (IP) Day. Since the Philippines is not spared from digital piracy, several groups demand for the enactment of IP rights protection law. Although there are currently two laws covering digital piracy, Republic Act 10175 is one of them, the country does not have specific legislation that will penalize those who violate anti-piracy law.

Aside from the two existing laws, there is another bill being proposed that can be fused into the current laws covering digital piracy. House Bill 6187 or better known as the Anti-Online Piracy Act was waiting for enactment. It has been filed in 2012 and the bill puts more emphasis on the protection of IP rights.

Due to the access of Internet users to various sources of information, anything can be copied in a few clicks.  Even though the violation of the current laws is evident, the agencies’ hands are tied because there are no formal complaints being filed. As of 2011, there are only 15 digital piracy convictions made. For five years, there are only a total of 15 cases of digital piracy and this is because of the lack of stricter enforcement of anti-piracy law. Here’s an overview of the laws covering digital piracy:

Republic Act No. 8293

“Sec. 2. Declaration of State Policy. - The State recognizes that an effective intellectual and industrial property system is vital to the development of domestic and creative activity, facilitates transfer of technology, attracts foreign investments, and ensures market access for our products. It shall protect and secure the exclusive rights of scientists, inventors, artists and other gifted citizens to their intellectual property and creations, particularly when beneficial to the people, for such periods as provided in this Act.

The use of intellectual property bears a social function. To this end, the State shall promote the diffusion of knowledge and information for the promotion of national development and progress and the common good.

It is also the policy of the State to streamline administrative procedures of registering patents, trademarks and copyright, to liberalize the registration on the transfer of technology, and to enhance the enforcement of intellectual property rights in the Philippines.”

Republic Act No. 10175

“SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and communications industries such as content production, telecommunications, broadcasting electronic commerce, and data processing, in the nation’s overall social and economic development. The State also recognizes the importance of providing an environment conducive to the development, acceleration, and rational application and exploitation of information and communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or delivery of information; and the need to protect and safeguard the integrity of computer, computer and communications systems, networks, and databases, and the confidentiality, integrity, and availability of information and data stored therein, from all forms of misuse, abuse, and illegal access by making punishable under the law such conduct or conducts. In this light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by facilitating their detection, investigation, and prosecution at both the domestic and international levels, and by providing arrangements for fast and reliable international cooperation.”

The Use Of Leaked Poll Data: A Violation Of Data Privacy Act

It has been recently reported that the voter’s data had been stolen by hackers from the Comelec’s database.  There unlawful use of stolen data is considered a violation of Data Privacy Act according to the acting Justice Secretary Emmanual Caparas. The Comelec is the rightful owner of the stolen information and the unauthorized individuals who use the information will face the consequences for the violation. Although the   leaked poll data is a serious issue, Caparas assured that it should not be a cause for alarm as the integrity of May 9 election will not be compromised. The Department of Justice together with the foreign agencies are also doing their best to hunt down the person/s responsible for hacking the Comelec’s database system.

SECURITY OF PERSONAL INFORMATION

“SEC. 20. Security of Personal Information. – (a) The personal information controller must implement reasonable and appropriate organizational, physical and technical measures intended for the protection of personal information against any accidental or unlawful destruction, alteration and disclosure, as well as against any other unlawful processing.

(b) The personal information controller shall implement reasonable and appropriate measures to protect personal information against natural dangers such as accidental loss or destruction, and human dangers such as unlawful access, fraudulent misuse, unlawful destruction, alteration and contamination.

(c) The determination of the appropriate level of security under this section must take into account the nature of the personal information to be protected, the risks represented by the processing, the size of the organization and complexity of its operations, current data privacy best practices and the cost of security implementation. Subject to guidelines as the Commission may issue from time to time, the measures implemented must include:

(1) Safeguards to protect its computer network against accidental, unlawful or unauthorized usage or interference with or hindering of their functioning or availability;

(2) A security policy with respect to the processing of personal information;

(3) A process for identifying and accessing reasonably foreseeable vulnerabilities in its computer networks, and for taking preventive, corrective and mitigating action against security incidents that can lead to a security breach; and

(4) Regular monitoring for security breaches and a process for taking preventive, corrective and mitigating action against security incidents that can lead to a security breach.

(d) The personal information controller must further ensure that third parties processing personal information on its behalf shall implement the security measures required by this provision.

(e) The employees, agents or representatives of a personal information controller who are involved in the processing of personal information shall operate and hold personal information under strict confidentiality if the personal information are not intended for public disclosure. This obligation shall continue even after leaving the public service, transfer to another position or upon termination of employment or contractual relations.

(f) The personal information controller shall promptly notify the Commission and affected data subjects when sensitive personal information or other information that may, under the circumstances, be used to enable identity fraud are reasonably believed to have been acquired by an unauthorized person, and the personal information controller or the Commission believes (bat such unauthorized acquisition is likely to give rise to a real risk of serious harm to any affected data subject. The notification shall at least describe the nature of the breach, the sensitive personal information possibly involved, and the measures taken by the entity to address the breach. Notification may be delayed only to the extent necessary to determine the scope of the breach, to prevent further disclosures, or to restore reasonable integrity to the information and communications system.

(1) In evaluating if notification is unwarranted, the Commission may take into account compliance by the personal information controller with this section and existence of good faith in the acquisition of personal information.

(2) The Commission may exempt a personal information controller from notification where, in its reasonable judgment, such notification would not be in the public interest or in the interests of the affected data subjects.

(3) The Commission may authorize postponement of notification where it may hinder the progress of a criminal investigation related to a serious breach.”

Identity Theft: A Gateway To Another Crime

Crimes come in many forms these days. This is why people take necessary security measures to increase the level of protection and decrease the possibility of crimes. Unfortunately, vigilance may not be enough if culprits have a way of committing a crime without getting caught. A few weeks ago, a robbery-homicide case in Laguna has left fear to many especially to homeowners who are often left alone with their kids. In a country where alarm systems and other security devices are not yet considered a necessity, the only weapon a homeowner can arm himself with is vigilance.

In the Laguna robber-homicide case, the victim has taken some necessary precautions to protect herself and her one-year-old child from harm. An exchange of text messages with her spouse is proof that she followed best practices in letting a stranger inside her house. Unfortunately, the cunning suspects had better plans, and those were something that the victims were unprepared for.

While the information about the supposed suspect was obtained by the spouse, a shocking revelation just turned the spouse’s world upside down. During the earlier investigation, it was revealed, through the victim’s text message, that David Dela Cruz was the primary suspect of the heinous crime. It was all over the news and a hefty reward awaits those who can give leads to the suspect’s whereabouts. A few days later, a senior specialist from a telecom company named Christopher Oliveros said he was the person on the Identification card of the suspect.

Colleagues have attested that the specialist was in a different location when the incident happened. As the story unfolds, the truth becomes more and more alarming because Oliveros himself was a victim of identity theft. The picture shown on the ID card was stolen from his Facebook account.  Although the suspects have documents to show, those were fake documents. The job order taken from the victims’ residence was merely fabricated. The suspects were captured by a nearby CCTV in the area, and further investigations will be conducted to solve the puzzle. With this robbery-homicide case, vigilance may not be enough to stay protected against unscrupulous criminals.

The crimes related to identity theft are covered under the Republic Act No. 10173 or the Data Privacy Act of 2012 and the Republic Act 10175 or Cybercrime Prevention Act. The robbery-homicide suspects are still out in the streets. It may take weeks or months to consider this crime solved, but one thing is for sure, there are still predators, waiting for another victim to fall into their evil schemes. With the craftiness of these identity thieves, one could only hope for the best and prepare for the worst.

It Is The Season For Mudslinging: Online Bashers May Face Legal Liability

If there is one routine that most people are stuck in, it is taking rants to social media at the same rate an individual changes clothes. During a social-media induced hysteria, your fingers seem to have a mind of their own. They think for themselves carrying one sole mission: to win the cyber word war. Online bashing or cyber bullying has become prevalent during the election period. Just visit one of the electoral candidate’s Facebook page and you will realize how a die-hard supporter can dominate the comments section.

Social media users enjoy basking in the glory of anonymity that it becomes an addiction like a druggie to cocaine. Online bashers can easily get out of this situation scot-free because they can create fake accounts and comment as they please. Unfortunately, these internet trolls just do not know when to stop because they know no limitations. They can post rude comments in rapid succession and get away with it.

These social media platforms have become an avenue for no-holds-barred expressions and a passive-aggressive way of venting out. Employees who are against their employer may choose to create a Facebook Group where they can freely express their turmoil and discontentment. These individuals can put up a façade and report to work as though everything is perfectly fine. Cyber bullying comes in many forms, but it yields the same negative result.

A bill that may soon put a stop to cyber bullying has been proposed by Camarines Sur Representative Rolando Andaya. Anti-Cyber Bullying Act of 2015, if enacted into a law cyberbullies will receive a penalty between six months and six years imprisonment. They will also pay a fine of not less than P50,000 to a maximum of 100,000.

The following offenses are considered to be a violation of anti-cyber bullying act of 2015:

“a) Repeatedly sending offensive, rude and insulting message;

b) Distributing derogatory information about the victim;

c) Posting or sending offensive photos of the victim, whether these are digitally altered or not, or were taken with or without consent, with the intention to humiliate and embarrass the victim;

d) Breaking into an email, social networking or any electronic account and using the victim’s virtual identity to send, upload or distribute embarrassing materials to or about others;

e) Sharing the victim’s personal information or any embarrassing information, or tricking the victim into revealing personal or embarrassing information and sharing it to others; and

f) Repeatedly sending messages that include threats of harm or engaging in online activities that cause fear on the victim’s safety.”

Think Twice When Posting Offensive Photos On Facebook

Are Filipinos completely aware of on-line laws and etiquette when using various social networking sites including Facebook? When cybercrime law was implemented in the Philippines, it earned the ire of netizens as it is said to deny freedom of speech.  The law is defined in the Republic Act No. 10175. Without a doubt, Facebook has been a substitute to the old-fashioned journal where you can simply write your thoughts away. In this era of mouse potatoes, you no longer keep a secret in your journal. You share your views, opinions, angst, pains or any challenges that life throws at you on Facebook. 

Yes, Facebook is your very own version of cyber counselling and it does not take long enough to earn sympathy from your “friends”.  While Facebook users consider this social networking site a great relief to stress, it can breach confidentiality once you hit post or share. It does not guarantee secrecy when you know for a fact that there is already an intrusion to your privacy. The million dollar question is: Are we completely aware of what we post on Facebook?

The thesis “The Unintelligent Facebook Users” authored by a Filipino-American graduate school student from Harvard University, Genevieve Molina shows Pinoy Facebook users’ carelessness when it comes to posting status updates, sharing videos and uploading photos. According to Molina’s research, there are 6,020,958 horrific images shared around the world on Facebook on a daily basis and 951,311 are shared by Pinoy users. 

An irresponsible and unintelligent use of Facebook and other social networking sites gets users into serious trouble. Sharing or uploading offensive photos is still part of the cybercrime law umbrella. Although it is an unusual crime, the damage can still be considered irreparable especially when photos become viral. Nela Llamas is just another perfect example that you really need to think twice when uploading videos or photos on your Facebook wall. This 19-year old Nursing Junior at Manila Doctor’s College faces criminal liability because of posting a photo of the late Pete Rogas, who was killed due to a vehicular accident at C5. The incident happened two months ago. 

The family of the victim is still seeking justice for their son and sharing the offensive photo does more harm than good. This is another reminder to Facebook users who are fond of posting offensive photos for the belief that it will alleviate the family members’ emotional pain but it only takes a turn for the worse. Llamas’ case is still on progress and can serve as another warning for Facebook users to be more careful when sharing or posting photos. 

­