Sunteți pe pagina 1din 18

G. R. No.

197788 : February 29, 2012 arrest


There was no valid arrest of petitioner. When he was flagged down
RODEL LUZ y ONG, Petitioner, v. PEOPLE OF THE for committing a traffic violation, he was not, ipso facto and solely for
PHILIPPINES, Respondent. this reason, arrested.

SERENO, J.: Arrest is the taking of a person into custody in order that he or she
FACTS: may be bound to answer for the commission of an offense. It is
effected by an actual restraint of the person to be arrested or by that
PO2 Emmanuel L. Alteza testified that he saw the accused driving a persons voluntary submission to the custody of the one making the
motorcycle without a helmet and this prompted him to flag down the arrest. Neither the application of actual force, manual touching of the
accused for violating a municipal ordinance which requires all body, or physical restraint, nor a formal declaration of arrest, is
motorcycle drivers to wear helmet while driving said motor vehicle. required. It is enough that there be an intention on the part of one of
He invited the accused to come inside their sub-station since the the parties to arrest the other, and that there be an intent on the part
place where he flagged down the accused is almost in front of the of the other to submit, under the belief and impression that
sub-station to where he is assigned as a traffic enforcer. While he submission is necessary. Under R.A. 4136, or the Land
and SPO1 Rayford Brillante were issuing a citation ticket for violation Transportation and Traffic Code, the general procedure for dealing
of municipal ordinance, he noticed that the accused was uneasy and with a traffic violation is not the arrest of the offender, but the
kept on getting something from his jacket. He was alerted and so, he confiscation of the drivers license of the latter.
told the accused to take out the contents of the pocket of his jacket
as the latter may have a weapon inside it. The accused obliged and At the time that he was waiting for PO3 Alteza to write his citation
slowly put out the contents of the pocket of his jacket which included ticket, petitioner could not be said to have been under arrest. There
two (2) plastic sachets of suspected shabu. The RTC convicted was no intention on the part of PO3 Alteza to arrest him, deprive him
petitioner of illegal possession of dangerous drugs. It found the of his liberty, or take him into custody. Prior to the issuance of the
prosecution evidence sufficient to show that he had been lawfully ticket, the period during which petitioner was at the police station
arrested for a traffic violation and then subjected to a valid search, may be characterized merely as waiting time. In fact, as found by the
which led to the discovery on his person of two plastic sachets later trial court, PO3 Alteza himself testified that the only reason they went
found to contain shabu. Upon review, the CA affirmed the RTCs to the police sub-station was that petitioner had been flagged down
Decision. almost in front of that place. Hence, it was only for the sake of
convenience that they were waiting there. There was no intention to
ISSUE: Whether or not the search and seizure of the alleged subject take petitioner into custody.
shabu was incident to a lawful arrest.
Even if one were to work under the assumption that petitioner was
HELD: Court of Appeals decision is reversed. deemed arrested upon being flagged down for a traffic violation and
while awaiting the issuance of his ticket, then the requirements for a
CONSTITUTIONAL LAW: search and seizure incident to a lawful valid arrest were not complied with. At the time a person is arrested,
it shall be the duty of the arresting officer to inform the latter of the CASE DIGEST : Chavez Vs Gonzales
reason for the arrest and must show that person the warrant of G.R. No. 168338 February 15, 2008 FRANCISCO CHAVEZ,
arrest, if any. Persons shall be informed of their constitutional rights petitioner, vs. RAUL M. GONZALES, in his capacity as the
Secretary of the Department of Justice; and NATIONAL
to remain silent and to counsel, and that any statement they might
TELECOMMUNICATIONS COMMISSION (NTC), respondents.
make could be used against them. It may also be noted that in this
case, these constitutional requirements were complied with by the
police officers only after petitioner had been arrested for illegal Facts : Sometime before 6 June 2005, the radio station dzMM aired
possession of dangerous drugs. the Garci Tapes where the parties to the conversation discussed
"rigging" the results of the 2004 elections to favor President Arroyo.
GRANTED. On 6 June 2005, Presidential spokesperson Ignacio Bunye (Bunye)
held a press conference in Malacañang Palace, where he played
before the presidential press corps two compact disc recordings of
conversations between a woman and a man. Bunye identified the
woman in both recordings as President Arroyo but claimed that the
contents of the second compact disc had been "spliced" to make it
appear that President Arroyo was talking to Garcillano. On 11 June
2005, the NTC issued a press release warning radio and television
stations that airing the Garci Tapes is a "cause for the suspension,
revocation and/or cancellation of the licenses or authorizations"
issued to them.5 On 14 June 2005, NTC officers met with officers of
the broadcasters group, Kapisanan ng mga Broadcasters sa
Pilipinas (KBP), to dispel fears of censorship. The NTC and KBP
issued a joint press statement expressing commitment to press
freedom

Issue : WON the NTC warning embodied in the press release of 11


June 2005 constitutes an impermissible prior restraint on freedom of
expression

Held : When expression may be subject to prior restraint, apply in


this jurisdiction to only four categories of expression, namely:
pornography, false or misleading advertisement, advocacy of
imminent lawless action, and danger to national security. All other
expression is not subject to prior restrain Expression not subject to
prior restraint is protected expression or high-value expression. Any
content-based prior restraint on protected expression is
unconstitutional without exception. A protected expression means
what it says – it is absolutely protected from censorship Prior
restraint on expression is content-based if the restraint is aimed at
the message or idea of the expression. Courts will subject to strict IBP vs Hon. Atienza
scrutiny content-based restraint. If the prior restraint is not aimed at
the message or idea of the expression, it is content-neutral even if it GR 175241 Feb 24, 2014
burdens expression The NTC action restraining the airing of the In June 2006, the Integrated Bar of the Philippines (IBP) filed an
Garci Tapes is a content-based prior restraint because it is directed application for a rally permit with the office of Manila Mayor Jose
at the message of the Garci Tapes. The NTC’s claim that the Garci “Lito” Atienza. The IBP sought their rally to be staged at the Mendiola
Tapes might contain "false information and/or willful Bridge. Atienza granted the permit but indicated thereon that IBP is
misrepresentation," and thus should not be publicly aired, is an only allowed to stage their rally at the Plaza Miranda, a freedom
admission that the restraint is content-based The public airing of the park.
Garci Tapes is a protected expression because it does not fall under IBP President Jose Anselmo Cadiz received the rally permit on the
any of the four existing categories of unprotected expression day before the scheduled rally. Cadiz immediately went to the Court
recognized in this jurisdiction. The airing of the Garci Tapes is of Appeals to assail the permit because what Atienza did was only a
essentially a political expression because it exposes that a partial grant which was alleged to be a violation of the constitutional
presidential candidate had allegedly improper conversations with a right to freedom of expression and a grave abuse of discretion on the
COMELEC Commissioner right after the close of voting in the last part of Atienza.
presidential elections. The content of the Garci Tapes affects gravely
the sanctity of the ballot. Public discussion on the sanctity of the Meanwhile, IBP pushed through with the rally not at Plaza Miranda
ballot is indisputably a protected expression that cannot be subject to but at the Mendiola Bridge. Subsequently, the Manila Police District
prior restraint. Public discussion on the credibility of the electoral (MPD) filed a criminal case against Cadiz for allegedly violating the
process is one of the highest political expressions of any electorate, Public Assembly Act or specifically, for staging a rally in a place
and thus deserves the utmost protection. If ever there is a hierarchy different from what was indicated in the rally permit.
of protected expressions, political expression would occupy the The Court of Appeals ruled in favor of Atienza. The CA ruled that
highest rank. The rule, which recognizes no exception, is that there what Atienza did was within his power; that freedom of expression is
can be no content-based prior restraint on protected expression. On not absolute.
this ground alone, the NTC press release is unconstitutional. Of
course, if the courts determine that the subject matter of a Cadiz appealed before the Supreme Court. Cadiz also prayed for the
wiretapping, illegal or not, endangers the security of the State, the suspension of the criminal case against him on the ground that
public airing of the tape becomes unprotected expression that may the certiorari case he filed against Atienza is a prejudicial question to
be subject to prior restraint. However, there is no claim here by the criminal case.
respondents that the subject matter of the Garci Tapes involves ISSUES:
national security and publicly airing the tapes would endanger the
security of the State. The alleged violation of the Anti-Wiretapping 1. Whether or not the certiorari case Cadiz filed against Atienza is a
Law is not in itself a ground to impose a prior restraint on the airing prejudicial question to the criminal case filed against him (Cadiz).
of the Garci Tapes because the Constitution expressly prohibits the
2. Whether or not it is within Mayor Jose Atienza’s power to modify
enactment of any law, and that includes anti-wiretapping laws,
the rally permit without consulting with the IBP.
curtailing freedom of expression. The only exceptions to this rule are
the four recognized categories of unprotected expression. However, HELD:
the content of the Garci Tapes does not fall under any of these
1. No. It is improper for Cadiz to raise the issue of prejudicial
categories of unprotected expression.
question at this stage and in this certiorari case. Under the Rules of
Court, a prejudicial question is a ground to suspend the criminal
proceeding. However, Cadiz must first file a petition to suspend the
criminal proceeding in the said criminal case. The determination of G.R. No. 190582 April 8, 2010
the pendency of a prejudicial question should be made at the first ANG LADLAD LGBT PARTY vs. COMMISSION ON ELECTIONS
instance in the criminal action, and not before the Supreme Court in
an appeal from the civil action. Facts:
Comelec refused to recognize Ang Ladlad LGBT Party, an
2. No. In modifying a rally permit or in granting a rally permit which
organization composed of men and women who identify themselves
contains a time and place different from that applied for, the mayor
as lesbians, gays, bisexuals, or trans-gendered individuals
must first consult with the applicant at the earliest opportunity. This is
(LGBTs),as a party list based on moral grounds. In the elevation of
in order to give the applicant some time to determine if such change
the case to the Supreme Court, Comelec alleged that petitioner
is favorable to him or adverse (and if adverse, he can seek judicial
made misrepresentation in their application.
remedies) – Section 6 of the Public Assembly Act.
It is an indispensable condition to such refusal or modification that Issue:
the clear and present danger test be the standard for the decision Whether or not Ang Ladlad LGBT Party qualifies for registration as
reached. If he is of the view that there is such an imminent and grave party-list.
danger of a substantive evil, the applicant must be heard on the
matter. In this case, Atienza did not consult with the IBP. Atienza Ruling:
capriciously and whimsically changed the venue without any reason Ang Ladlad LGBT Party’s application for registration should be
therefor. Such is a grave abuse of discretion and a violation of the granted.
freedom of expression.
Comelec’s citation of the Bible and the Koran in denying petitioner’s
application was a violation of the non-establishment clause laid down
in Article 3 section 5 of the Constitution. The proscription by law
relative to acts against morality must be for a secular purpose (that
is, the conduct prohibited or sought to be repressed is “detrimental or
dangerous to those conditions upon which depend the existence and
progress of human society"), rather than out of religious conformity.
The Comelec failed to substantiate their allegation that allowing
registration to Ladlad would be detrimental to society.

The LGBT community is not exempted from the exercise of its


constitutionally vested rights on the basis of their sexual orientation.
Laws of general application should apply with equal force to LGBTs,
and they deserve to participate in the party-list system on the same
basis as other marginalized and under-represented sectors.
Discrimination based on sexual orientation is not tolerated ---not by
our own laws nor by any international laws to which we adhere.
Case Digest: Disini v. Secretary of Justice f. Section 4(c)(2) on Child Pornography;
G.R. No. 203335: February 11, 2014
g.Section 4(c)(3) on Unsolicited Commercial Communications;
JOSE JESUS M. DISINI, JR., ROWENA S. DISINI, LIANNE IVY P.
MEDINA, JANETTE TORAL and ERNESTO SONIDO, JR., h. Section 4(c)(4) on Libel;
Petitioners, v. THE SECRETARY OF JUSTICE, THE SECRETARY
OF THE DEPARTMENT OF THE INTERIOR AND LOCAL i. Section 5 on Aiding or Abetting and Attempt in the Commission of
GOVERNMENT, THE EXECUTIVE DIRECTOR OF THE Cybercrimes;
INFORMATION AND COMMUNICATIONS TECHNOLOGY
OFFICE, THE CHIEF OF THE PHILIPPINE NATIONAL POLICE j. Section 6 on the Penalty of One Degree Higher;
and THE DIRECTOR OF THE NATIONAL BUREAU OF
INVESTIGATION, Respondents. k. Section 7 on the Prosecution under both the Revised Penal Code
(RPC) and R.A. 10175;
ABAD, J.:
l. Section 8 on Penalties;
FACTS:
m. Section 12 on Real-Time Collection of Traffic Data;
Petitioners assail the validity of several provision of the Republic Act
(R.A.) 10175, the Cybercrime Prevention Act of 2012. n. Section 13 on Preservation of Computer Data;

Petitioners claim that the means adopted by the cybercrime law for o. Section 14 on Disclosure of Computer Data;
regulating undesirable cyberspace activities violate certain of their
constitutional rights. The government of course asserts that the law p. Section 15 on Search, Seizure and Examination of Computer
merely seeks to reasonably put order into cyberspace activities, Data;
punish wrongdoings, and prevent hurtful attacks on the system.
q. Section 17 on Destruction of Computer Data;
ISSUES:
r. Section 19 on Restricting or Blocking Access to Computer Data;
Whether or not the following provisions are valid and constitutional.
s. Section 20 on Obstruction of Justice;
a. Section 4(a)(1) on Illegal Access;
t. Section 24 on Cybercrime Investigation and Coordinating Center
b. Section 4(a)(3) on Data Interference; (CICC); and

c. Section 4(a)(6) on Cyber-squatting; u. Section 26(a) on CICCs Powers and Functions.

d. Section 4(b)(3) on Identity Theft; Some petitioners also raise the constitutionality of related Articles
353, 354, 361, and 362 of the RPC on the crime of libel.
e. Section 4(c)(1) on Cybersex;
HELD:
a. Section 4(a)(1) of the Cybercrime Law Petitioners claim that Section 4(a)(3) suffers from overbreadth in
that, while it seeks to discourage data interference, it intrudes into
Section 4(a)(1) provides: the area of protected speech and expression, creating a chilling and
deterrent effect on these guaranteed freedoms.
Section 4. Cybercrime Offenses. The following acts constitute the
offense of cybercrime punishable under this Act: Under the overbreadth doctrine, a proper governmental purpose,
constitutionally subject to state regulation, may not be achieved by
(a) Offenses against the confidentiality, integrity and availability of means that unnecessarily sweep its subject broadly, thereby
computer data and systems: invading the area of protected freedoms.But Section 4(a)(3) does not
encroach on these freedoms at all. It simply punishes what
(1) Illegal Access. The access to the whole or any part of a computer essentially is a form of vandalism,the act of willfully destroying
system without right. without right the things that belong to others, in this case their
computer data, electronic document, or electronic data message.
Petitioners contend that Section 4(a)(1) fails to meet the strict Such act has no connection to guaranteed freedoms. There is no
scrutiny standard required of laws that interfere with the fundamental freedom to destroy other peoples computer systems and private
rights of the people and should thus be struck down. documents.

The Court finds nothing in Section 4(a)(1) that calls for the Besides, the overbreadth challenge places on petitioners the heavy
application of the strict scrutiny standard since no fundamental burden of proving that under no set of circumstances will Section
freedom, like speech, is involved in punishing what is essentially a 4(a)(3) be valid.Petitioner has failed to discharge this burden.
condemnable act accessing the computer system of another without
right. It is a universally condemned conduct. Hence, valid and constitutional.

Besides, a clients engagement of an ethical hacker requires an Section 4(a)(6) of the Cybercrime Law
agreement between them as to the extent of the search, the methods
to be used, and the systems to be tested. Since the ethical hacker Section 4(a)(6) provides:
does his job with prior permission from the client, such permission
would insulate him from the coverage of Section 4(a)(1). (6) Cyber-squatting. The acquisition of domain name over the
internet in bad faith to profit, mislead, destroy the reputation, and
Hence, valid and constitutional. deprive others from registering the same, if such a domain name is:

b. Section 4(a)(3) of the Cybercrime Law (i) Similar, identical, or confusingly similar to an existing trademark
registered with the appropriate government agency at the time of the
Section 4(a)(3) provides: domain name registration;

(3) Data Interference. The intentional or reckless alteration, (ii) Identical or in any way similar with the name of a person other
damaging, deletion or deterioration of computer data, electronic than the registrant, in case of a personal name; and
document, or electronic data message, without right, including the
introduction or transmission of viruses. (iii) Acquired without right or with intellectual property interests in it.
these zones, any form of intrusion is impermissible unless excused
Petitioners claim that Section 4(a)(6) or cyber-squatting violates the by law and in accordance with customary legal process. The
equal protection clausein that, not being narrowly tailored, it will meticulous regard we accord to these zones arises not only from our
cause a user using his real name to suffer the same fate as those conviction that the right to privacy is a "constitutional right" and "the
who use aliases or take the name of another in satire, parody, or any right most valued by civilized men," but also from our adherence to
other literary device. the Universal Declaration of Human Rights which mandates that, "no
one shall be subjected to arbitrary interference with his privacy" and
The law is reasonable in penalizing the offender for acquiring the "everyone has the right to the protection of the law against such
domain name in bad faith to profit, mislead, destroy reputation, or interference or attacks." In the Matter of the Petition for Issuance of
deprive others who are not ill-motivated of the rightful opportunity of Writ of Habeas Corpus of Sabio v. Senator Gordon, 535 Phil. 687,
registering the same. 714-715 (2006).

Hence, valid and constitutional. Two constitutional guarantees create these zones of privacy: (a) the
right against unreasonable searchesand seizures, which is the basis
Section 4(b)(3) of the Cybercrime Law of the right to be let alone, and (b) the right to privacy of
communication and correspondence.In assessing the challenge that
Section 4(b)(3) provides: the State has impermissibly intruded into these zones of privacy, a
court must determine whether a person has exhibited a reasonable
b) Computer-related Offenses: expectation of privacy and, if so, whether that expectation has been
violated by unreasonable government intrusion.
xxxx
Petitioners simply fail to show how government effort to curb
(3) Computer-related Identity Theft. The intentional acquisition, use, computer-related identity theft violates the right to privacy and
misuse, transfer, possession, alteration, or deletion of identifying correspondence as well as the right to due process of law.
information belonging to another, whether natural or juridical, without
right: Provided: that if no damage has yet been caused, the penalty Clearly, what this section regulates are specific actions: the
imposable shall be one (1) degree lower. acquisition, use, misuse or deletion of personal identifying data of
another. There is no fundamental right to acquire anothers personal
Petitioners claim that Section 4(b)(3) violates the constitutional rights data.
to due process and to privacy and correspondence, and
transgresses the freedom of the press. Further, petitioners fear that Section 4(b)(3) violates the freedom of
the press in that journalists would be hindered from accessing the
In Morfe v. Mutuc,it ruled that the right to privacy exists unrestricted user account of a person in the news to secure
independently of its identification with liberty; it is in itself fully information about him that could be published.
deserving of constitutional protection.
The Court held, the press, whether in quest of news reporting or
Relevant to any discussion of the right to privacy is the concept social investigation, has nothing to fear since a special circumstance
known as the "Zones of Privacy." is present to negate intent to gain which is required by this Section.

Zones of privacy are recognized and protected in our laws. Within Hence, valid and constitutional.
punishable by Republic Act No. 9775 or the Anti-Child Pornography
Section 4(c)(1) of the Cybercrime Law Act of 2009, committed through a computer system: Provided, That
the penalty to be imposed shall be (1) one degree higher than that
Section 4(c)(1) provides: provided for in Republic Act No. 9775.

(c) Content-related Offenses: The above merely expands the scope of the Anti-Child Pornography
Act of 2009(ACPA) to cover identical activities in cyberspace. In
(1) Cybersex. The willful engagement, maintenance, control, or theory, nothing prevents the government from invoking the ACPA
operation, directly or indirectly, of any lascivious exhibition of sexual when prosecuting persons who commit child pornography using a
organs or sexual activity, with the aid of a computer system, for favor computer system. Actually, ACPAs definition of child pornography
or consideration. already embraces the use of "electronic, mechanical, digital, optical,
magnetic or any other means."
Petitioners claim that the above violates the freedom of expression
clause.They express fear that private communications of sexual Of course, the law makes the penalty higher by one degree when the
character between husband and wife or consenting adults, which are crime is committed in cyberspace. But no one can complain since
not regarded as crimes under the penal code, would now be the intensity or duration of penalty is a legislative prerogative and
regarded as crimes when done "for favor" in cyberspace. In common there is rational basis for such higher penalty.The potential for
usage, the term "favor" includes "gracious kindness," "a special uncontrolled proliferation of a particular piece of child pornography
privilege or right granted or conceded," or "a token of love (as a when uploaded in the cyberspace is incalculable.
ribbon) usually worn conspicuously."This meaning given to the term
"favor" embraces socially tolerated trysts. The law as written would Hence, valid and constitutional.
invite law enforcement agencies into the bedrooms of married
couples or consenting individuals. Section 4(c)(3) of the Cybercrime Law

The Act actually seeks to punish cyber prostitution, white slave trade, Section 4(c)(3) provides:
and pornography for favor and consideration. This includes
interactive prostitution and pornography, i.e., by webcam. (3) Unsolicited Commercial Communications. The transmission of
commercial electronic communication with the use of computer
Likewise, engaging in sexual acts privately through internet system which seeks to advertise, sell, or offer for sale products and
connection, perceived by some as a right, has to be balanced with services are prohibited unless:
the mandate of the State to eradicate white slavery and the
exploitation of women. (i) There is prior affirmative consent from the recipient; or

Hence, valid and constitutional. (ii) The primary intent of the communication is for service and/or
administrative announcements from the sender to its existing users,
Section 4(c)(2) of the Cybercrime Law subscribers or customers; or

Section 4(c)(2) provides: (iii) The following conditions are present:

(2) Child Pornography. The unlawful or prohibited acts defined and (aa) The commercial electronic communication contains a simple,
valid, and reliable way for the recipient to reject receipt of further
commercial electronic messages (opt-out) from the same source; Section 4(c)(4) of the Cyber Crime Law

(bb) The commercial electronic communication does not purposely Petitioners dispute the constitutionality of both the penal code
disguise the source of the electronic message; and provisions on libel as well as Section 4(c)(4) of the Cybercrime
Prevention Act on cyberlibel.
(cc) The commercial electronic communication does not purposely
include misleading information in any part of the message in order to The RPC provisions on libel read:
induce the recipients to read the message.
Art. 353. Definition of libel. A libel is public and malicious imputation
The above penalizes the transmission of unsolicited commercial of a crime, or of a vice or defect, real or imaginary, or any act,
communications, also known as "spam." The term "spam" surfaced omission, condition, status, or circumstance tending to cause the
in early internet chat rooms and interactive fantasy games. One who dishonor, discredit, or contempt of a natural or juridical person, or to
repeats the same sentence or comment was said to be making a blacken the memory of one who is dead.
"spam."
Art. 354. Requirement for publicity. Every defamatory imputation is
The Government, represented by the Solicitor General, points out presumed to be malicious, even if it be true, if no good intention and
that unsolicited commercial communications or spams are a justifiable motive for making it is shown, except in the following
nuisance that wastes the storage and network capacities of internet cases:
service providers, reduces the efficiency of commerce and
technology, and interferes with the owners peaceful enjoyment of his 1. A private communication made by any person to another in the
property. Transmitting spams amounts to trespass to ones privacy performance of any legal, moral or social duty; and
since the person sending out spams enters the recipients domain
without prior permission. The OSG contends that commercial speech 2. A fair and true report, made in good faith, without any comments
enjoys less protection in law. or remarks, of any judicial, legislative or other official proceedings
which are not of confidential nature, or of any statement, report or
These have never been outlawed as nuisance since people might speech delivered in said proceedings, or of any other act performed
have interest in such ads. What matters is that the recipient has the by public officers in the exercise of their functions.
option of not opening or reading these mail ads. That is true with
spams. Their recipients always have the option to delete or not to Art. 355. Libel means by writings or similar means. A libel committed
read them. by means of writing, printing, lithography, engraving, radio,
phonograph, painting, theatrical exhibition, cinematographic
To prohibit the transmission of unsolicited ads would deny a person exhibition, or any similar means, shall be punished by prision
the right to read his emails, even unsolicited commercial ads correccional in its minimum and medium periods or a fine ranging
addressed to him. Unsolicited advertisements are legitimate forms of from 200 to 6,000 pesos, or both, in addition to the civil action which
expression. may be brought by the offended party.

Hence, void for being unconstitutional. The libel provision of the cybercrime law, on the other hand, merely
incorporates to form part of it the provisions of the RPC on libel.
Articles 353, 354, and 355 of the Penal Code Thus Section 4(c)(4) reads:
posted in cyberspace, facilitated by one-click reply options offered by
Sec. 4. Cybercrime Offenses. The following acts constitute the the networking site as well as by the speed with which such
offense of cybercrime punishable under this Act: reactions are disseminated down the line to other internet users.

xxxx Hence, Section 4(c)(4) penalizing online libel is valid and


constitutional with respect to the original author of the post; but void
(c) Content-related Offenses: and unconstitutional with respect to others who simply receive the
post and react to it; and
xxxx
Section 5 of the Cybercrime Law
(4) Libel. The unlawful or prohibited acts of libel as defined in Article
355 of the Revised Penal Code, as amended, committed through a Section 5 provides:
computer system or any other similar means which may be devised
in the future. Sec. 5. Other Offenses. The following acts shall also constitute an
offense:
Petitioners lament that libel provisions of the penal codeand, in
effect, the libel provisions of the cybercrime law carry with them the (a) Aiding or Abetting in the Commission of Cybercrime. Any person
requirement of "presumed malice" even when the latest who willfully abets or aids in the commission of any of the offenses
jurisprudence already replaces it with the higher standard of "actual enumerated in this Act shall be held liable.
malice" as a basis for conviction.Petitioners argue that inferring
"presumed malice" from the accuseds defamatory statement by (b) Attempt in the Commission of Cybercrime. Any person who
virtue of Article 354 of the penal code infringes on his constitutionally willfully attempts to commit any of the offenses enumerated in this
guaranteed freedom of expression. Act shall be held liable.

Libel is not a constitutionally protected speech and that the Petitioners assail the constitutionality of Section 5 that renders
government has an obligation to protect private individuals from criminally liable any person who willfully abets or aids in the
defamation. Indeed, cyberlibel is actually not a new crime since commission or attempts to commit any of the offenses enumerated
Article 353, in relation to Article 355 of the penal code, already as cybercrimes. It suffers from overbreadth, creating a chilling and
punishes it. In effect, Section 4(c)(4) above merely affirms that online deterrent effect on protected expression.
defamation constitutes "similar means" for committing libel.
The Solicitor General contends, however, that the current body of
But the Courts acquiescence goes only insofar as the cybercrime law jurisprudence and laws on aiding and abetting sufficiently protects
penalizes the author of the libelous statement or article. Cyberlibel the freedom of expression of "netizens," the multitude that avail
brings with it certain intricacies, unheard of when the penal code themselves of the services of the internet. He points out that existing
provisions on libel were enacted. The culture associated with internet laws and jurisprudence sufficiently delineate the meaning of "aiding
media is distinct from that of print. or abetting" a crime as to protect the innocent. The Solicitor General
argues that plain, ordinary, and common usage is at times sufficient
The internet is characterized as encouraging a freewheeling, to guide law enforcement agencies in enforcing the law.
anything-goes writing style. In a sense, they are a world apart in
terms of quickness of the readers reaction to defamatory statements Libel in the cyberspace can of course stain a persons image with just
one click of the mouse. Scurrilous statements can spread and travel stand scrutiny.
fast across the globe like bad news. Moreover, cyberlibel often goes
hand in hand with cyberbullying that oppresses the victim, his But the crime of aiding or abetting the commission of cybercrimes
relatives, and friends, evoking from mild to disastrous reactions. Still, under Section 5 should be permitted to apply to Section 4(a)(1) on
a governmental purpose, which seeks to regulate the use of this Illegal Access, Section 4(a)(2) on Illegal Interception, Section 4(a)(3)
cyberspace communication technology to protect a persons on Data Interference, Section 4(a)(4) on System Interference,
reputation and peace of mind, cannot adopt means that will Section 4(a)(5) on Misuse of Devices, Section 4(a)(6) on Cyber-
unnecessarily and broadly sweep, invading the area of protected squatting, Section 4(b)(1) on Computer-related Forgery, Section
freedoms. Griswold v. Connecticut, 381 U.S. 479 (1965). 4(b)(2) on Computer-related Fraud, Section 4(b)(3) on Computer-
related Identity Theft, and Section 4(c)(1) on Cybersex. None of
If such means are adopted, self-inhibition borne of fear of what these offenses borders on the exercise of the freedom of expression.
sinister predicaments await internet users will suppress otherwise
robust discussion of public issues. Democracy will be threatened and Section 6 of the Cybercrime Law
with it, all liberties. Penal laws should provide reasonably clear
guidelines for law enforcement officials and triers of facts to prevent Section 6 provides:
arbitrary and discriminatory enforcement. (Adonis) G.R. No.
203378The terms "aiding or abetting" constitute broad sweep that Sec. 6. All crimes defined and penalized by the Revised Penal Code,
generates chilling effect on those who express themselves through as amended, and special laws, if committed by, through and with the
cyberspace posts, comments, and other messages. use of information and communications technologies shall be
covered by the relevant provisions of this Act: Provided, That the
Hence, Section 5 of the cybercrime law that punishes "aiding or penalty to be imposed shall be one (1) degree higher than that
abetting" libel on the cyberspace is a nullity. provided for by the Revised Penal Code, as amended, and special
laws, as the case may be.
As already stated, the cyberspace is an incomparable, pervasive
medium of communication. It is inevitable that any government threat Section 6 merely makes commission of existing crimes through the
of punishment regarding certain uses of the medium creates a internet a qualifying circumstance. As the Solicitor General points
chilling effect on the constitutionally-protected freedom of expression out, there exists a substantial distinction between crimes committed
of the great masses that use it. In this case, the particularly complex through the use of information and communications technology and
web of interaction on social media websites would give law enforcers similar crimes committed using other means. In using the technology
such latitude that they could arbitrarily or selectively enforce the law. in question, the offender often evades identification and is able to
reach far more victims or cause greater harm. The distinction,
Section 5 with respect to Section 4(c)(4) is unconstitutional. Its therefore, creates a basis for higher penalties for cybercrimes.
vagueness raises apprehension on the part of internet users
because of its obvious chilling effect on the freedom of expression, Hence, valid and constitutional.
especially since the crime of aiding or abetting ensnares all the
actors in the cyberspace front in a fuzzy way.In the absence of Section 7 of the Cybercrime Law
legislation tracing the interaction of netizens and their level of
responsibility such as in other countries, Section 5, in relation to Section 7 provides:
Section 4(c)(4) on Libel, Section 4(c)(3) on Unsolicited Commercial
Communications, and Section 4(c)(2) on Child Pornography, cannot Sec. 7. Liability under Other Laws. A prosecution under this Act shall
be without prejudice to any liability for violation of any provision of commensurate to the damage incurred or both.
the Revised Penal Code, as amended, or special laws.
Any person found guilty of the punishable act under Section 4(a)(5)
Online libel is different. There should be no question that if the shall be punished with imprisonment of prision mayor or a fine of not
published material on print, said to be libelous, is again posted online more than Five hundred thousand pesos (PhP500,000.00) or both.
or vice versa, that identical material cannot be the subject of two
separate libels. The two offenses, one a violation of Article 353 of the If punishable acts in Section 4(a) are committed against critical
Revised Penal Code and the other a violation of Section 4(c)(4) of infrastructure, the penalty of reclusion temporal or a fine of at least
R.A. 10175 involve essentially the same elements and are in fact Five hundred thousand pesos (PhP500,000.00) up to maximum
one and the same offense. Indeed, the OSG itself claims that online amount commensurate to the damage incurred or both, shall be
libel under Section 4(c)(4) is not a new crime but is one already imposed.
punished under Article 353. Section 4(c)(4) merely establishes the
computer system as another means of publication. Charging the Any person found guilty of any of the punishable acts enumerated in
offender under both laws would be a blatant violation of the Section 4(c)(1) of this Act shall be punished with imprisonment of
proscription against double jeopardy. prision mayor or a fine of at least Two hundred thousand pesos
(PhP200,000.00) but not exceeding One million pesos
The Court RESOLVES to LEAVE THE DETERMINATION of the (PhP1,000,000.00) or both.
correct application of Section 7 that authorizes prosecution of the
offender under both the Revised Penal Code and Republic Act Any person found guilty of any of the punishable acts enumerated in
10175 to actual cases, WITH THE EXCEPTION of the crimes of: Section 4(c)(2) of this Act shall be punished with the penalties as
enumerated in Republic Act No. 9775 or the "Anti-Child Pornography
1. Online libel as to which, charging the offender under both Section Act of 2009:" Provided, That the penalty to be imposed shall be one
4(c)(4) of Republic Act 10175 and Article 353 of the Revised Penal (1) degree higher than that provided for in Republic Act No. 9775, if
Code constitutes a violation of the proscription against double committed through a computer system.
jeopardy; as well as
Any person found guilty of any of the punishable acts enumerated in
2. Child pornography committed online as to which, charging the Section 4(c)(3) shall be punished with imprisonment of arresto mayor
offender under both Section 4(c)(2) of Republic Act 10175 and or a fine of at least Fifty thousand pesos (PhP50,000.00) but not
Republic Act 9775 or the Anti-Child Pornography Act of 2009 also exceeding Two hundred fifty thousand pesos (PhP250,000.00) or
constitutes a violation of the same proscription, and, in respect to both.
these, is void and unconstitutional.
Any person found guilty of any of the punishable acts enumerated in
Section 8 of the Cybercrime Law Section 5 shall be punished with imprisonment one (1) degree lower
than that of the prescribed penalty for the offense or a fine of at least
Section 8 provides: One hundred thousand pesos (PhP100,000.00) but not exceeding
Five hundred thousand pesos (PhP500,000.00) or both.
Sec. 8. Penalties. Any person found guilty of any of the punishable
acts enumerated in Sections 4(a) and 4(b) of this Act shall be The matter of fixing penalties for the commission of crimes is as a
punished with imprisonment of prision mayor or a fine of at least Two rule a legislative prerogative. Here the legislature prescribed a
hundred thousand pesos (PhP200,000.00) up to a maximum amount measure of severe penalties for what it regards as deleterious
cybercrimes. Judges and magistrates can only interpret and apply
them and have no authority to modify or revise their range as Petitioners assail the grant to law enforcement agencies of the power
determined by the legislative department. to collect or record traffic data in real time as tending to curtail civil
liberties or provide opportunities for official abuse. They claim that
The courts should not encroach on this prerogative of the lawmaking data showing where digital messages come from, what kind they are,
body. and where they are destined need not be incriminating to their
senders or recipients before they are to be protected. Petitioners
Hence, valid and constitutional. invoke the right of every individual to privacy and to be protected
from government snooping into the messages or information that
Section 12 of the Cybercrime Law they send to one another.

Section 12 provides: Undoubtedly, the State has a compelling interest in enacting the
cybercrime law for there is a need to put order to the tremendous
Sec. 12. Real-Time Collection of Traffic Data. Law enforcement activities in cyberspace for public good. To do this, it is within the
authorities, with due cause, shall be authorized to collect or record realm of reason that the government should be able to monitor traffic
by technical or electronic means traffic data in real-time associated data to enhance its ability to combat all sorts of cybercrimes.
with specified communications transmitted by means of a computer
system. Informational privacy has two aspects: the right not to have private
information disclosed, and the right to live freely without surveillance
Traffic data refer only to the communications origin, destination, and intrusion.In determining whether or not a matter is entitled to the
route, time, date, size, duration, or type of underlying service, but not right to privacy, this Court has laid down a two-fold test. The first is a
content, nor identities. subjective test, where one claiming the right must have an actual or
legitimate expectation of privacy over a certain matter. The second is
All other data to be collected or seized or disclosed will require a an objective test, where his or her expectation of privacy must be
court warrant. one society is prepared to accept as objectively reasonable. 429
U.S. 589 (1977)
Service providers are required to cooperate and assist law
enforcement authorities in the collection or recording of the above- Since the validity of the cybercrime law is being challenged, not in
stated information. relation to its application to a particular person or group, petitioners
challenge to Section 12 applies to all information and
The court warrant required under this section shall only be issued or communications technology (ICT) users, meaning the large segment
granted upon written application and the examination under oath or of the population who use all sorts of electronic devices to
affirmation of the applicant and the witnesses he may produce and communicate with one another. Consequently, the expectation of
the showing: (1) that there are reasonable grounds to believe that privacy is to be measured from the general publics point of view.
any of the crimes enumerated hereinabove has been committed, or Without reasonable expectation of privacy, the right to it would have
is being committed, or is about to be committed; (2) that there are no basis in fact.
reasonable grounds to believe that evidence that will be obtained is
essential to the conviction of any person for, or to the solution of, or In Whalen v. Roe, 429 U.S. 589 (1977)the United States Supreme
to the prevention of, any such crimes; and (3) that there are no other Court classified privacy into two categories: decisional privacy and
means readily available for obtaining such evidence. informational privacy. Decisional privacy involves the right to
independence in making certain important decisions, while evidence in a case, the mere furnishing to such service provider of
informational privacy refers to the interest in avoiding disclosure of the transmittal document to the Office of the Prosecutor shall be
personal matters. It is the latter rightthe right to informational deemed a notification to preserve the computer data until the
privacythat those who oppose government collection or recording of termination of the case.
traffic data in real-time seek to protect.
The service provider ordered to preserve computer data shall keep
Section 12 does not permit law enforcement authorities to look into confidential the order and its compliance.
the contents of the messages and uncover the identities of the
sender and the recipient. Petitioners in G.R. No. 203391 (Palatino v. Ochoa)claim that Section
13 constitutes an undue deprivation of the right to property. They
Section 12, of course, limits the collection of traffic data to those liken the data preservation order that law enforcement authorities are
"associated with specified communications." But this supposed to issue as a form of garnishment of personal property in civil
limitation is no limitation at all since, evidently, it is the law forfeiture proceedings. Such order prevents internet users from
enforcement agencies that would specify the target communications. accessing and disposing of traffic data that essentially belong to
The power is virtually limitless, enabling law enforcement authorities them.
to engage in "fishing expedition," choosing whatever specified
communication they want. This evidently threatens the right of No doubt, the contents of materials sent or received through the
individuals to privacy. internet belong to their authors or recipients and are to be
considered private communications. But it is not clear that a service
The Court must ensure that laws seeking to take advantage of these provider has an obligation to indefinitely keep a copy of the same as
technologies be written with specificity and definiteness as to ensure they pass its system for the benefit of users. By virtue of Section 13,
respect for the rights that the Constitution guarantees. however, the law now requires service providers to keep traffic data
and subscriber information relating to communication services for at
Hence, void for being unconstitutional least six months from the date of the transaction and those relating
to content data for at least six months from receipt of the order for
Section 13 of the Cybercrime Law their preservation.

Section 13 provides: At any rate, as the Solicitor General correctly points out, the data that
service providers preserve on orders of law enforcement authorities
Sec. 13. Preservation of Computer Data. The integrity of traffic data are not made inaccessible to users by reason of the issuance of
and subscriber information relating to communication services such orders. The process of preserving data will not unduly hamper
provided by a service provider shall be preserved for a minimum the normal transmission or use of the same.
period of six (6) months from the date of the transaction. Content
data shall be similarly preserved for six (6) months from the date of Hence, valid and constitutional
receipt of the order from law enforcement authorities requiring its
preservation. Section 14 of the Cybercrime Law

Law enforcement authorities may order a one-time extension for Section 14 provides:
another six (6) months: Provided, That once computer data
preserved, transmitted or stored by a service provider is used as Sec. 14. Disclosure of Computer Data. Law enforcement authorities,
upon securing a court warrant, shall issue an order requiring any storage medium; and
person or service provider to disclose or submit subscribers
information, traffic data or relevant data in his/its possession or (e) To render inaccessible or remove those computer data in the
control within seventy-two (72) hours from receipt of the order in accessed computer or computer and communications network.
relation to a valid complaint officially docketed and assigned for
investigation and the disclosure is necessary and relevant for the Pursuant thereof, the law enforcement authorities may order any
purpose of investigation. person who has knowledge about the functioning of the computer
system and the measures to protect and preserve the computer data
The process envisioned in Section 14 is being likened to the therein to provide, as is reasonable, the necessary information, to
issuance of a subpoena. enable the undertaking of the search, seizure and examination.

Besides, what Section 14 envisions is merely the enforcement of a Law enforcement authorities may request for an extension of time to
duly issued court warrant, a function usually lodged in the hands of complete the examination of the computer data storage medium and
law enforcers to enable them to carry out their executive functions. to make a return thereon but in no case for a period longer than thirty
The prescribed procedure for disclosure would not constitute an (30) days from date of approval by the court.
unlawful search or seizure nor would it violate the privacy of
communications and correspondence. Disclosure can be made only Petitioners challenge Section 15 on the assumption that it will
after judicial intervention. supplant established search and seizure procedures.

Hence, valid and constitutional. The exercise of these duties do not pose any threat on the rights of
the person from whom they were taken. Section 15 does not appear
Section 15 of the Cybercrime Law to supersede existing search and seizure rules but merely
supplements them.
Section 15 provides:
Hence, valid and constitutional.
Sec. 15. Search, Seizure and Examination of Computer Data. Where
a search and seizure warrant is properly issued, the law enforcement Section 17 of the Cybercrime Law
authorities shall likewise have the following powers and duties.
Section 17 provides:
Within the time period specified in the warrant, to conduct
interception, as defined in this Act, and: Sec. 17. Destruction of Computer Data. Upon expiration of the
periods as provided in Sections 13 and 15, service providers and law
(a) To secure a computer system or a computer data storage enforcement authorities, as the case may be, shall immediately and
medium; completely destroy the computer data subject of a preservation and
examination.
(b) To make and retain a copy of those computer data secured;
Petitioners claim that such destruction of computer data subject of
(c) To maintain the integrity of the relevant stored computer data; previous preservation or examination violates the users right against
deprivation of property without due process of law. But, as already
(d) To conduct forensic analysis or examination of the computer data stated, it is unclear that the user has a demandable right to require
the service provider to have that copy of the data saved indefinitely
for him in its storage system. If he wanted them preserved, he should Section 20 of the Cybercrime Law
have saved them in his computer when he generated the data or
received it. He could also request the service provider for a copy Section 20 provides:
before it is deleted.
Sec. 20. Noncompliance. Failure to comply with the provisions of
Hence, valid and constitutional. Chapter IV hereof specifically the orders from law enforcement
authorities shall be punished as a violation of Presidential Decree
Section 19 of the Cybercrime Law No. 1829 with imprisonment of prision correctional in its maximum
period or a fine of One hundred thousand pesos (Php100,000.00) or
Section 19 empowers the Department of Justice to restrict or block both, for each and every noncompliance with an order issued by law
access to computer data: enforcement authorities.

Sec. 19. Restricting or Blocking Access to Computer Data. When a Petitioners challenge Section 20, alleging that it is a bill of attainder.
computer data is prima facie found to be in violation of the provisions The argument is that the mere failure to comply constitutes a
of this Act, the DOJ shall issue an order to restrict or block access to legislative finding of guilt, without regard to situations where non-
such computer data. compliance would be reasonable or valid.

Petitioners contest Section 19 in that it stifles freedom of expression But since the non-compliance would be punished as a violation of
and violates the right against unreasonable searches and seizures. Presidential Decree (P.D.) 1829,PENALIZING OBSTRUCTION OF
The Solicitor General concedes that this provision may be APPREHENSION AND PROSECUTION OF CRIMINAL
unconstitutional. But since laws enjoy a presumption of OFFENDERS. Section 20 necessarily incorporates elements of the
constitutionality, the Court must satisfy itself that Section 19 indeed offense which are defined therein.
violates the freedom and right mentioned.
Thus, the act of non-compliance, for it to be punishable, must still be
Not only does Section 19 preclude any judicial intervention, but it done "knowingly or willfully." There must still be a judicial
also disregards jurisprudential guidelines established to determine determination of guilt, during which, as the Solicitor General
the validity of restrictions on speech. Restraints on free speech are assumes, defense and justifications for non-compliance may be
generally evaluated on one of or a combination of three tests: the raised. Thus, Section 20 is valid insofar as it applies to the provisions
dangerous tendency doctrine, the balancing of interest test, and the of Chapter IV which are not struck down by the Court.
clear and present danger rule. Section 19, however, merely requires
that the data to be blocked be found prima facie in violation of any Hence, valid and constitutional.
provision of the cybercrime law. Taking Section 6 into consideration,
this can actually be made to apply in relation to any penal provision. Sections 24 and 26(a) of the Cybercrime Law
It does not take into consideration any of the three tests mentioned
above. Sections 24 and 26(a) provide:

The Court is therefore compelled to strike down Section 19 for being Sec. 24. Cybercrime Investigation and Coordinating Center. There is
violative of the constitutional guarantees to freedom of expression hereby created, within thirty (30) days from the effectivity of this Act,
and against unreasonable searches and seizures. an inter-agency body to be known as the Cybercrime Investigation
and Coordinating Center (CICC), under the administrative Further, the formulation of the cybersecurity plan is consistent with
supervision of the Office of the President, for policy coordination the policy of the law to "prevent and combat such [cyber] offenses by
among concerned agencies and for the formulation and enforcement facilitating their detection, investigation, and prosecution at both the
of the national cybersecurity plan. domestic and international levels, and by providing arrangements for
fast and reliable international cooperation." This policy is clearly
Sec. 26. Powers and Functions. The CICC shall have the following adopted in the interest of law and order, which has been considered
powers and functions: as sufficient standard.

(a) To formulate a national cybersecurity plan and extend immediate Hence, Sections 24 and 26(a) are likewise valid and constitutional.
assistance of real time commission of cybercrime offenses through a
computer emergency response team (CERT); x x x.

Petitioners mainly contend that Congress invalidly delegated its


power when it gave the Cybercrime Investigation and Coordinating
Center (CICC) the power to formulate a national cybersecurity plan
without any sufficient standards or parameters for it to follow.

In order to determine whether there is undue delegation of legislative


power, the Court has adopted two tests: the completeness test and
the sufficient standard test. Under the first test, the law must be
complete in all its terms and conditions when it leaves the legislature
such that when it reaches the delegate, the only thing he will have to
do is to enforce it.1avvphi1The second test mandates adequate
guidelines or limitations in the law to determine the boundaries of the
delegates authority and prevent the delegation from running riot.
Gerochi v. Department of Energy, 554 Phil. 563 (2007).

Here, the cybercrime law is complete in itself when it directed the


CICC to formulate and implement a national cybersecurity plan. Also,
contrary to the position of the petitioners, the law gave sufficient
standards for the CICC to follow when it provided a definition of
cybersecurity.

Cybersecurity refers to the collection of tools, policies, risk


management approaches, actions, training, best practices,
assurance and technologies that can be used to protect cyber
environment and organization and users assets.This definition
serves as the parameters within which CICC should work in
formulating the cybersecurity plan.

S-ar putea să vă placă și