Documente Academic
Documente Profesional
Documente Cultură
i
A. 1987 Philippine Constitution ........................................................................ 19
B. Privacy Tort..................................................................................................... 20
C. Special laws have been passed by the Congress regarding privacy of
individuals .............................................................................................................. 21
1. Republic Act 10175 or The Cybercrime Prevention Act of 2012 ........ 21
2. Republic Act 8792 or The E-Commerce Act.......................................... 22
3. Republic Act 10173 or The Data Privacy Act of 2012 .......................... 23
4. Republic Act 9995 or Anti-Photo and Video Voyeurism Act .............. 25
D. Writ of Habeas Data ...................................................................................... 26
E. International legal frameworks on privacy and data protection ............... 27
1. Universal Declaration of Human Rights (UDHR) ................................. 27
2. International Covenant on Civil and Political Rights (ICCPR) ............ 28
3. Convention on Human Rights and American Convention on Human
Rights recognize privacy as a human right.................................................... 28
4. European Convention on Human Rights ................................................ 29
5. European Union Data Protection Directive (Directive 95/45/EC) .... 29
6. Organization for Economic Cooperation and Development (OECD)
30
7. Privacy framework endorsed by APEC nations ..................................... 32
ii
B. Means by which state can assert jurisdiction over data privacy protection
statutes ................................................................................................................... 46
1. Territoriality based on “establishment” ................................................... 46
2. Effects principle .......................................................................................... 47
3. Long-arm Statute ........................................................................................ 48
iii
CHAPTER ONE: INTRODUCTION
The computer technology has advanced rapidly with the global internet
system.4 Such technology intrudes into privacy as personal information,
including evidence of present and past actions or associations may be
disseminated without the individual’s consent. There is also the probability of
introducing inaccurate information that might create erroneous information of
which the individual has no control.5
1
purposes. An information of a privileged character can be fed
in a computer machine, which certainly is an invasion of one’s
privacy.6
6 Supra note 4.
7 Vivares v. St. Theresa’s College , GR No. 202666, (September 29, 20 14).
8 Article 19, The “Right to be Forgottten”: Remembering Freedom of Expression,
https://www.article19.org/data/files/The_right_to_be_forgotten_A5_EHH_H YPERLINKS.
pdf (2016).
9 Carly Nyst, Beyond the hype: The big issues in the European Court’s 'right to be forgotten'
ruling. (11/10/14) viewed at https://www.privacyinternational.org/node/458 (Last accessed
at November 4, 2016).
10 Supra note 8.
11 Supra note 8.
2
consented the posting of the said information before, but individual withdraws
such consent as it is now irrelevant, excessive or inadequate from the reason his
consent and would destroy one’s reputation.
The Right to be Forgotten was made more legally pronounced when the
Court of Justice of the European Union ruled in favor of Mr. Costeja Gonzalez
in Google Spain v. Gonzalez. Mr. Gonzalez was involved in insolvency proceedings
relating to social security debts in the late 1990’s. These proceedings were
reported in a regional newspaper in Spain and the article was later made available
online. Mr. Gonzalez, who was named in the report, asked the newspaper to
delete the piece arguing that the proceedings were concluded and it was no longer
relevant. The newspaper refused this request and prompting Mr. Gonzalez to
Google Spain to remove links to the article in its search results when his name
was entered into the Google search engine. The Spanish Data Protection
Authority, which had refused to order the newspaper to remove the original
article, asked Google Spain and Google Inc to remove the article from Google’s
index of search results.12 The Court of Justice of the European Union recognized
the Right to be Forgotten as a part of the fundamental right to privacy in the
Google Case.13
Google Spain and Inc. v. Agencia Espanola de Proteccion de Datos (AEPD) and Mario Costeja Gonzalez ,
12
3
categorized as a privacy right even though it applies to information that is, at
least to some degree, public.16
The Philippines has been crowned as the social network capital of the
world this is due to the fact that 93% of Internet Filipino users have Facebook.17
Based on a recent survey, the Philippines ranks 6th in the top 10 most engaged
countries for social networking.18 The internet audience’s growth rate shows no
signs of slowing down either. Here is a graph of the Internet growth in the
Philippines for the year 2009-2015:19
16 Supra note 8.
17MST Lifestyle, PH is social networking capital of the world, Manila Standard Today.
manilastandardtoday.com/2013/05/21/ph -is-social-networking-capital-of-the-world (May 21,
2013).
18Statistic Brain, Social Network Statistics, http://www.statisticbrain.com/social -networking-
statistics/.
19 Internet World Stats: Usage and Population Statistics.
http://www.internetworldstats.com/asia.htm#ph.
4
The graph clearly shows that Filipinos are fond of using the Internet, and
according to the statistics, there are fifty-four million Facebook users as of June
2016.20
5
2. Information hinder their employment prospects, hamper their
ability to obtain credit and prevent them from living their lives
with dignity23
For example, A 13 year old boy stole some candy from a candy shop, gets
punished for it, and that information ends up on the Internet. The said
Information will be there as long as such webpage exists, which can easily be
searched. After 8 years, the boy, who is now 21 years old, tries to apply a job in
retail stores. However, due to the past information, the boy gets turned down
everytime, because the HR-department “googles” the name of the boy and finds
the link about him stealing candy. Yes the boy made a mistake when he was
young, but he got punished for it and changed for the better, he became a good
citizen. But the said mistake keeps on haunting him on the Internet, while a
human being would already have forgiven and forgotten such mistake.26
23 Supra note 8.
24E. L. Godkin, The Rights of the Citizen: IV. To His Own Reputation, Scribner’s Magazine
(1890).
25 Supra note 8.
26 Nielsbergervoet. Right to be forgotten is just as important as freedom of speech,
Technologica (2015) https://nielsbergervoet.wordpress.com/2015/09/30/right -to-be-
forgotten/ last visited Jan. 25, 2016.
6
such as dignity or personal autonomy, which are protected by the right to privacy
under international human rights law..27
E. Methodology
27 Supra note 8.
7
regarding the privacy in digital world. The previously mentioned research
materials have been studied, compared, and used as references in order to come
up with this legal article.
8
CHAPTER TWO: HOW THE RIGHT TO BE FORGOTTEN
WORKS
The criteria for accuracy and relevance for example may critically depend
on how much time has passed since the original references to a person. While
some search results linking to content on other webpages may remain relevant
even after a considerable passage of time, others will not be so, and an individual
may legitimately ask to have them deleted.29
9
b. The petitioner, his representative or a third person shall fill up the
form provided by the search engine.
c. The form requires submission of a photo ID of the petitioner.
Further, the representative or third person doing the submission
for the petitioner is required to present the petitioner’s photo ID
and a proof that they have obtained approval of the latter such as a
Special Power of Attorney (SPA).
d. The ID presented should be a government-issued ID.
e. The petitioner shall specify the name (legal name of the petitioner)
in which the information may be delisted.
f. The petitioner shall then be required to list one or more URLs be
removed provided he gives a reasonable explanation on why he
want it dropped.
10
f. However, in case the petition is denied, petitioner or his
representative will be notified and informed that an appeal may be
resorted to the Regional Trial Courts of the Philippines.
4. Final Judgment
If the petition is granted, the search engine shall delist or delink the
domain site petitioned upon the receipt of the notice. Further, the domain site
or publisher shall be given fifteen days from receipt of the notice of question the
validity of the decision of trial judge in granting the petition.
On the other hand, if the petition would be denied, the petitioner shall be
given fifteen days from receipt of the notice to question the validity of the
decision.
C. Factors to be considered
1. Private information
There are two types of information, public or private. However, this study
is concerned with private information, because it is this type of information that
is prone to infringement of privacy. Data subject should have the control of the
flow of information. The following information are inherently private
information:
Details of their intimate or sex life
Information about their health
Bank or payment accounts details (such as card numbers)
Private contact or identification information, including PINs or
passwords, passport or social security numbers
11
Other sensitive information such as trade-union membership, racial or
ethnic origin, political opinions or religious or philosophical belief could
also be considered private.31
There are also information that are sensitive by nature, and would affect
the individual’s private life. Under Section 3 or R.A. No. 10173 or Data privacy
act:
The type of information the request is filed should be taken into account.
When the information belongs to one of the mentioned categories, strong
justification, such as an overriding public interest in the information at issue, will
need to be provided as to why it should remain accessible on the Internet through
a search for a person’s name. 32
31 Supra note 8.
32 Supra note 8.
12
of harm, or information that heightens privacy interest because it is in digital
image or video form.33
Further, the court or other relevant body should assess the impact of the
passage of time on the public interest value of the information at issue and
whether it should remain easily discoverable through a search of someone’s
name.34 Further, as a general rule, recent information is more likely to have public
interest value, and therefore the balance of rights is less likely to be in favor of
delisting the links.35 The request should also be assessed whether applicants have
demonstrated that they have suffered substantial damage or harm due to the
availability of the search results linked to their name.36
13
especially in the media. The public figure doctrine is one area where Philippine
jurisprudence was arguably ahead of its American counterpart, as pointed out by
Chief Justice Fernando.39
The concept of “public figure” and the consequences of being such, the
Court quoted from Prosser and Keeton40:
39 Phil. Comm’l and Indus. Bank v. Philnabank Employees’ Ass’n , GR No. 29630 , (July 2, 1981).
40 Prosser and Keeton on Torts, 5 t h Ed. at 859-861 (1984).
41 Supra note 38.
14
prohibit the publicized role in that historic event, his right to privacy could not
overcome the filmakers’ freedom of expression. On the other hand, Lagunzad
rule in favor of privacy when it addressed another movie about Negros mayoralty
candidate Moises Padilla. This second movie depicted Padilla’s private and family
life, and even including a certain Auring as his girlfriend.
15
3. Interest of the public in having access to that information.
Politics
Public health and safety
Law enforcement and the administration of justice
Consumer and social interests
The environment
Economic issues
The exercises of power
Art and culture
45TshabalalaMsimang & Another v Makhanya and Others , High Court of South Africa, (18656/07)
[2007] ZAGPHC 161 (30 August 2007).
46 Supra note 8.
47 Id.
16
to be Forgotten should be limited to natural persons. The right should be limited
only to natural persons. The purpose of this right should ultimately be to protect
an individual’s dignity and privacy, which only individuals are capable of having.48
17
Further, the Court held that Google Spain’s activity of promoting and
selling advertising space offered by the search engine which made it economically
profitable was processing carried out in the context of the activities of
establishment.57 Search Engines are doing business in a country due to the service
it provides to the individuals.
57 Id para 56.
18
CHAPTER THREE: LEGAL FRAMEWORK OF DATA
PRIVACY IN THE PHILIPPINES
19
B. Privacy Tort
Under the Civil Code of the Philippines, Article 26 and Article 32 protects
personal privacy. To wit:
Some aspects of privacy doctrine are more developed in tort law than in
Constitutional law, yet are readily applicable the moment one replaces the private
sector with a State agent.58 It must further be argued that tort law sheds further
light on values protected by privacy but hardly highlighted in Constitutional law.
Again, Ople59 detailed specific statutory zones of privacy.
In Privacy Tort, the person who invaded the privacy of another must have
a personal gain. A person has an actionable right to be free from the invasion of
privacy. Invasion of privacy is a tort based in common law allowing an aggrieved
party to bring a lawsuit against an individual who unlawfully intrudes into his/her
private affairs, discloses his/her private information, publicizes him/her in a
false light, or appropriates his/her name for personal gain.60 Right to privacy
under tort law confers personal rights on an individual as against other
individuals.
21
The Cybercrime Prevention Act was passed to penalize crimes that are
committed with the use of computer. The said act is divided into 31 sections split
across eight chapters. It penalizes fifteen types of crimes constituting
Cybercrime61 or computer-related offenses such as illegal access (hacking), illegal
interception, data interference, system interference, misuse of devices,
cybersquatting, computer-related forgery, computer-related fraud, computer-
related identity theft and cybersex. The law also punishes and confirms laws that
are already punishable under the Revised Penal Code and other Special laws, such
as child pornography and libel. Moreover, it includes a “catch-all” provision,
which punishes all crimes that are defined and penalized by the Revised Penal
Code, as amended, and special laws, if committed by, through and with the use
of information and communications technologies.
22
R.A. No. 8792 has the following salient features: (1) it provides legal
recognition of electronic data messages, signatures, and documents and their
communication; (2) it penalizes hacking and privacy; (3) it recognizes the vital
role of information and communications technology in nation building; (4) it
facilitates domestic and international dealings, transactions, arrangements,
contracts and exchanges and storage of information; it applies to both
commercial and non-commercial transactions; (5) it made the Department of
Trade and Industry (DTI) the lead agency to direct and supervise the promotion
and development of electronic commerce in the country; and (6) it provides for
the extent of liability of service providers.
23
phones in which watching videos, listening to audios, surfing the Internet are
now possible.
With the new gadgets and technologies invented, the right to privacy in
today’s generation has soared parallel to the expansion of these technologies.
Information may easily be published and republished on the internet with just a
click of a button. Further, it does not only reach local subscribers but subscribers
from all over the world. An individual’s right to privacy is beyond paper-bound
and therefore, the legislature had to enact certain laws that could protect a private
right. Hence the creation of Republic Act No. 10173 or the Data Privacy Act of
2012.68
In its declaration of policy, the law states that, although the free flow of
information promotes innovation and growth, it is essential that personal
information in the government’s and private sector’s information and
communications system are secured and protected. 69
68 The Scope of Privacy in a Digital World under Philippine law and jurisprudence.
https://samfaedchan.wordpress.com/2015/07/03/the -scope-of-privacy-in-a-digital-world-
under-philippine -law-and-jurisprudence/ (last visited January 5, 2017).
69 Raul J. Palabric, Data Privacy Act of 2012, Inquirer.net, August 31, 2012,
http://business.inquirer.net/79534/data -privacy-act-of-2012 (last visited Feb 18, 2017).
70 Id.
24
within international standards of privacy for them to be able to compete in the
global market.71
R.A. No. 9995 contemplates two situations where a person can have a
reasonable expectation of privacy: first, when the person believes that one could
undress in privacy without being concerned that an image of him or her being
taken. Second, when a reasonable man would believe that one’s private would
not be visible regardless of whether the person is in public or private place.73
25
The penalties for any person found guilty of violating any of the
prohibitions enumerated under Section 4 of R.A. 9995 range from an
imprisonment of three to seven years and a fine of P100,000.00 up to
P500,000.00 at the discretion of the court. Additional penalties are meted for the
following violators: juridical persons, public officers or employees, and aliens.
The law provides a penalty for the violators of the said law, however, it does not
provide a remedy for the photos and videos taken in violation of the said law.
Though R.A. No. 9995 provides for the penalty of violators as mentioned
above, it did not provide for the remedy of those photos and videos available
online. These photos and videos are still prone for circulating. Hence, the
proponent submit that the Right to be Forgotten would be the best remedy to
stop the further spreading the said photos and videos.
The Writ of Habeas Data is “a remedy available to any person whose right
to privacy in life, liberty or security is violated or threatened by an unlawful act
or omission of a public official or employee, or of a private individual or entity
engaged in the gathering, collecting or storing of data or information regarding
the person, family, home and correspondence of the aggrieved party”.74 It is a
remedy designed to protect the image, privacy, honor, information, and freedom
of information of an individual, and to provide a forum to enforce one’s right to
the truth and to informational privacy. It seeks to protect a person’s right to
control information regarding oneself, particularly in instances in which such
information is being collected through unlawful means in order to achieve
unlawful ends.75 It is independent and summary.
26
control over sensible personal data, stopping the abuse of such information that
is detrimental to the individuals.77
The writ, however, will not issue on the basis merely of an alleged
unauthorized access to information about a person. The availment of the writ
requires the existence of a nexus between the right to privacy on the one hand,
and the right to life, liberty or security on the other.78 Thus, the existence of a
person’s right to informational privacy and a showing, at least by substantial
evidence, of an actual or threatened violation of the right to privacy in life, liberty
or security of the victim are indispensable before the privilege of the writ may be
extended.79 The two must be present for the writ to be available.
Under this section, the author would like to present the different
international treaties and conventions around the world that would clearly show
that privacy is an important basic human right. With this, the author would
clearly show that Right to be Forgotten, a necessary incident of right to privacy,
should be established in the Philippines.
The legal protection of the right to privacy in general – and of data privacy
in particular – varies greatly around the world. The Universal Declaration of
Human Rights mandates that, “no one shall be subjected to arbitrary interference
with his privacy, family, home or correspondence, nor to attacks upon his honor
and reputation. Everyone has the right to the protection of the law against such
interference or attacks.”80 There is a significant challenge for organizations that
hold sensitive data to achieve and maintain compliance with so many regulations
that have relevance to information privacy.
27
2. International Covenant on Civil and Political Rights (ICCPR)
Article 17
1. No one shall be subjected to arbitrary or unlawful interference
with his privacy, family, home or correspondence, nor to
unlawful attacks on his honour and reputation.
2. Everyone has the right to the protection of the law against
such interference or attacks.
Article 8 of the Convention for the Protection of Human Rights and Fundamental Freedoms,
81
28
of health or morals, or for the protection of the rights and
freedoms of others.
29
The European Union adopted several Directives on data protection.83
Further, its constitutional instruments now recognize that protection of personal
data is in itself a basic human right. One of its Data Protection Directive is
Directive 95/46/EC. It is a directive adopted by the European Union designed
to protect the privacy and protection of all personal data collected for or about
citizen of the EU, especially as it relates to processing, using, or exchanging such
data. Directive 95/46/EC encompasses all key elements from Article 8 of the
European Convention on Human Rights, which states its intention to respect
the rights of privacy in personal and family life, as well as in the home and in
personal correspondence.
30
prerequisite for a free economy84, but such free flow of information is affected
by privacy protection. The OECD Privacy Guidelines broadly influenced policy-
making by introducing broad principles that can harmonize privacy protection
in different states. It set out the following eight basic privacy principles:
Collection Limitation requires that the collection data be limited to
what is RELEVANT and NECESSARY for the purposes for
which they are collected and that it will be obtained by lawful and
fair means with the knowledge of the data subject.
Data Quality – personal data collected should be relevant for the
purpose for which it is to be used, to the extent necessary for these
purposes, and should be accurate and up to date.
Purpose Specification and Notice – the purpose for which personal
data are collected should be specified not later than the time of data
collection. The subsequent use of data is limited to such purposes
and to other purposes not incompatible with such.
Use Limitation – as a general rule, data should not be disclosed,
made available or used for purposes other than those specified for
its collection. The exceptions are when the individual consents or
when the law so requires its disclosure.
Security Safeguard – this requires that personal data be protected
by reasonable security safeguards against risks like loss,
unauthorized access, destruction, use, modification or disclosure of
data.
Openness – this refers to practices and policies regarding personal
data. Means should be readily available for establishing the
existence and nature of personal data, and the main purposes of
their use, as well as identity and usual residence of the data
possessor or collector.
Individual Participation – the individual should have the right to
have reasonable access to data collected, the right to challenge data
relating to him or her and, if the challenge is unsuccessful, to have
the data erased, rectified, completed or amended.
84Tony Lam, An Overview of the Principles Established by the APEC Privacy Framework,
available at http://www.apec.org.
31
Accountability – the data controller is made accountable for giving
effect to these principles by complying with the protection
accorded the individual.
32
Access and Correction – individuals are given the right to access
their personal information, challenge its accuracy, and request
correction when appropriate. However, access need not be
provided if the burden or expense of doing so would be
unreasonable or disproportionate to the risks or disclosure to the
individual would compromise security or the confidentiality of
commercial information.
Accountability – the data controller is accountable for complying
with measures that give effect to the said principles. 86
33
CHAPTER FOUR: CONSTITUTIONAL DIMENSION OF
THE RIGHT TO BE FORGOTTEN
87Universal Declaration of Human Rights Article 12, United Nations Convention on Migrant
Workers Article 14, UN Convention of the Protection of the Child Article 16, International
Covenant on Civil and Political Rights, International Covenant on Civil and Political Rights
Article 17; regional conventions including Article 10 of the African Charter on the Rights and
Welfare of the Child, Article 11 of the American Convention on Human Rights, Article 4 of
the African Union Principles on Freedom of E xpression, Article 5 of the American Declaration
of the Rights and Duties of Man, Article 21 of the Arab Charter on Human Rights, and Article
8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms;
Johannesburg Principles on National Security, Free Expression and Access to Information,
Camden Principles on Freedom of Expression and Equality.
88 Article 12 of the Universal Declaration of Huma n Rights.
34
The United States Supreme Court in the case of Whalen v. Roe established
the two aspects of the right to privacy, decisional privacy and informational
privacy. Decisional privacy, in the case of Roe v. Wade, was described as the right
distinct from liberty, by which an individual is free to make his own choices and
the government is precluded from interfering. Informational privacy, on the
other hand, was described as the ability to control the collection, use, and
disclosure of one’s personal information.89 In Whalen, the Court explained that
informational privacy has two aspects: the right not to have private information
disclosed and the right to live freely without surveillance and intrusion. The right
to informational privacy has been discussed and recognized by Philippine
jurisprudence. In the case of Disini vs. Secretary of Justice, the Supreme Court cited
the very same right as discussed in Whalen in discussing whether the restrictions
imposed by the cybercrime law are constitutional.
In Katz v. United States, the Court laid down a two-fold test in determining
whether a matter is entitled to privacy: the first is a subjective test, where one
claiming the right must have an actual or legitimate expectation of privacy over
a certain matter. The second is an objective test, where his or her expectation of
privacy must be one society is prepared to accept as objectively reasonable.
89 Roger J.R. Levesque, Adolescence, Privacy, and the Law: A Developmental S cience
Perspective,
http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780190460792.001.0001/acpr
of-9780190460792 -chapter-4 (September 2016).
90Alessandro Mantelero, "The EU Proposal for a General Data Protection Regulation and the
roots of the 'rig ht to be forgotten'". Computer Law & Security Review . 29 (3): 229–235 (2013).
91 Supra note 12 para 93.
35
The first test is met. When information becomes irrelevant, inadequate, or
excessive, the individual has an actual expectation of privacy over such
information, because the accuracy of the information is already impaired. While
it is acknowledged that under the third-party doctrine,92 there is no legitimate
expectation of privacy as to information voluntarily offered to a third party, the
proponent submits that the extent that privacy is relinquished under the doctrine
is only as regards the accurate meaning of the information at the time it was
published. When this accuracy or meaning has changed by the passage of time
or the change of circumstances, the expectation of privacy is restored, because
such change is no longer with the consent of the person concerned. Besides, legal
scholars have acknowledged that the third party doctrine is too sweeping a
doctrine to determine the existence of an expectation of privacy, the
restriction/standard proposed above is a fitting way to limit the doctrine and
protect individual privacy rights.
36
also the unsettling thought that these data may be inaccurate, outdated or worse,
misused. There is therefore a pressing need to define the parameters on the use
of electronic files or information, to be properly initiated by a legislative act.95
37
of property, should be entitled to control what it is done with it.”100 Or as V.
Bergelson puts it “in order to protect privacy, individuals must secure control
over their personal information by becoming real owners.”101
In the case of Worcester v. Ocampo,104 the court ruled that the enjoyment
of a private reputation is as much a constitutional right as the possession of life,
liberty or property. It is one of those rights necessary to human society that
underlie the whole scheme of human civilization, the Court in Worcester held:
"The respect and esteem of his fellows are among the highest
rewards of a well-spent life vouchsafed to man in this
existence. The hope of it is the inspiration of youth, and their
possession the solace of later years. A man of affairs, a business
100 J. Litman, Information Privacy/Information Property. In: Stan. L. Rev., Vol. 52, (2000).
101V. Bergelson, It’s Personal but Is It Mine?, Toward Property Rights in Personal Information.
In: U.C. Davis L. Rev., Vol. 37, (2003).
102 Rolf H. Weber, The Right to Be Forgotten : More Than a Pandora’s Box?, (2011).
103 D. J. Solove, The Future of Reputation (New Haven, Conn., 2007).
104 Supra note 1.
38
man, who has been seen and known of his fellowmen in the
active pursuits of life for many years, and who has developed
a great character and an unblemished reputation, has secured a
possession more useful, and more valuable than lands, or
houses, or silver, or gold . . .
"In the ordinary acceptance of the term, malice signifies ill will,
evil intent, or hatred, while it is legal signification is defined to
be "a wrongful act done intentionally, without legal
justification."
The right to reputation and right to privacy are important to achieve the
right to have a good life. The right to privacy is the inalienable right of an
individual to be let alone.105 The right to be forgotten is a necessary incident to
the right to privacy. One type of the right to privacy is the informational privacy.
39
C. Right to be Forgotten does not violate the Freedom of Expression
under Article III, Section 4 of the Constitution
40
Freedom of expression is not absolute. In oft quoted expression of Justice
Holmes:
“the constitutional guarantee obviously was not intended to
give immunity for every possible use of language.”
41
The balance between freedom of expression and right to privacy may
depend on the nature of the information in question, its sensitivity for the
person’s private life and on the public interest in having that information. It may
also depend on the personality in question: the right to be forgotten is certainly
not about making prominent people less prominent or making criminals less
criminal.119 There are also exceptions under the right to be forgotten which
would protect the public at large. Public officers and employees with regard to
their public office are not protected by the right to be forgotten.
Second, the balancing of interest test is any judicial test in which the jurists
weigh the importance of multiple factors in a legal case. The balancing test
weighs the considerations of: (1) private interest affected by an official action
taken by a government agency, official, or non-governmental entity acting as a
governmental agency. (2) the risk of some deprivation being erroneously inflicted
on the respondent through the process used or if no process is used. (3) the
government’s interest in a specific outcome. The test rests on the theory that it
is the Court’s function in cases before it, when it finds public interests served by
legislation on the one hand and guaranteed freedoms affected by it on the other,
to balance one against the other and to arrive at a judgment, where the greater
weight shall be placed.121
42
2. Delisting in search engines does not restrict freedom of
expression
43
CHAPTER FIVE: JURISDICTIONAL ISSUES
A. Cyberspace jurisdiction
Technology, 76 TEX. L. REV. 553, 554 -55 (1998) (describing the regulatory role of
44
Jurisdiction fits within a broader struggle over the respect for the rule of law in
the information society. In effect, jurisdiction over activities on the Internet has
become one of the main battlegrounds for the struggle to establish the rule of
law in the information society.133
With the said struggle and ambiguity, the recognition of foreign judgments
in cases in connection with the cyber world is often problematic. In the Yahoo!
case, public order rules at the place where Internet activity is launched may
conflict with those of the place where the activity has its effects. Even the
international conventions on recognition of foreign judgments provide an
exception to enforcement when there is a conflict with the public order of the
enforcing state.134 There is confusion as to who has jurisdiction, whether the state
where the activity was made or where the activity has its effects.
45
B. Means by which state can assert jurisdiction over data privacy
protection statutes
Under International Law jurisdiction may be based on: (1) the territoriality
principle (objective and subjective); (2) the nationality principle (active or
passive); (3) the effects principle; (4) the protective principle; or (5) the
universality principle.137 As it stands today, territoriality is the primary basis of
jurisdiction138 to regulate persons within its territory139. The discussion becomes
relevant considering that online activities done in the Philippines are processed
elsewhere in the globe. Interestingly, Google Spain applied the principle of
territoriality140 based on Article 4(1)A of Directive 95/46141. Article 4(1)a
provides that Member States must apply their national data protection laws if
“the processing is carried out in the context of the activities of an establishment of the controller
on the territory of the Member State […]”. A closer scrutiny on the provision is
provided, viz:
“The determination of applicable law under article
4(1)a is closely related to the identification of the entity acting
as a “controller” and its” “establishment(s)”. Equally
important, however, is the reference to the “context of
activities”: this criterion implies that the establishment of the
controller must be involved in activities implying the
processing of personal data in question.19 Or rather, the
establishment must be involved in a “real and effective exercise
137See D.J.B. Svantesson, ‘The Extraterritoriality of EU Data Privacy Laws – Its Theoretical
Justification and Its Practical Effect on U.S. Businesses’ (2014), (50)(1) SJIL, 80 et seq.;
Bernhard Maier, ‘How Has the Law Attempted to Tackle the Borderless Nature of the Internet’
(2010) IJLIT (18)(2) 143 and Robert Dover and Justin Frosini, ‘The extraterritorial effects of
legislation and policies in the EU and US’ (2012) Study for the European Parliament's
Committee on Foreign Affairs
<http://www.europarl.europa.eu/RegData/etudes/etudes/joi n/2012/433701/EXPOAFET_
ET%282012%29433701_EN.pdf> (last accessed 19 February 2017) .
138Uta Kohl, Jurisdiction and the Internet – Regulatory Competence of Online Activity,
(Cambridge University Press 2007), p. 20 and Cedric Ryngaert, Jurisdiction in Interna tional
Law (OUP, 2008), 27 et seq. See also The American Law Institute, Restatement (Third) of the
Law of the Foreign Relations Law of the United States (1988) Section 402.
139 Uta Kohl, Id., 89 et seq.
140Bernhard Maier, ‘How Has the Law Attempted to Tackle the Borderless Nature of the
Internet’ (2010) IJLIT (18)(2) 174.
141Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on
the protection of individuals with regard to the processing of personal data and on the free
movement of such data.
46
of activities in the context of which the personal data are being
processed”.142
In that case, the parties did not dispute the status of Google Spain as an
“establishment.” The bone of contention was on Google’s search engine
activities may be viewed as taking place “in the context of the activities” of the
establishment.143 The Court concluded that search engine operator (Google Inc.)
and those of its establishment (Google Spain), which consist of selling
advertising space among others, are “inextricably linked”. The Court ruled, viz:
2. Effects principle
142Brendan Van Alsenoy & Marieke Koekkoek. INTERNET AND JURISDICTION AFTER
GOOGLE SPAIN: THE EXTRA-TERRITORIAL REACH OF THE EU’S “RIGHT TO BE
FORGOTTEN. Working Paper No. 152 – March 2015.
https://ghum.kuleuven.be/ggs/publications/working_pape rs/new_series/wp151-160/wp152-
alsenoy-koekkoek.pdf
143Brendan Van Alsenoy & Marieke Koekkoek. INTERNET AND JURISDICTION AFTER
GOOGLE SPAIN: THE EXTRA-TERRITORIAL REACH OF THE EU’S “RIGHT TO BE
FORGOTTEN. Working Paper No. 152 – March 2015.
https://ghum.kule uven.be/ggs/publications/working_papers/new_series/wp151 -160/wp152-
alsenoy-koekkoek.pdf
144 Supra note 12 para 56.
145The American Law Institute, Restatement (Third) of the Law of the Foreign Relations Law
of the United States (1988) section 402. See also D.J .B. Svantesson, ‘The Extraterritoriality of
EU Data Privacy Laws – Its Theoretical Justification and Its Practical Effect on U.S.
Businesses’ (2014), (50)(1) SJIL, 82; Cedric Ryngaert, Jurisdiction in International Law, United
States and European perspecti ves (2007) PhD. Thesis, 198,
<https://lirias.kuleuven.be/bitstream/1979/911/2/doctoraat.pdf> accessed at 11 December
2014. See also M. Huffman, “A Retrospective of Twenty -Five Years on the Foreign Trade
Antitrust Improvements Act”, Houston Law Review 2007, Vol. 44, p. 285, 298-300.
47
3. Long-arm Statute
48
Philippines by an entity. As long as the said entity has an office in the Philippines.
Google and Yahoo has office in the Philippines.
In fact, Google and Yahoo, the two major search engines have branch
offices here in the Philippines. Google office is located at Net Park Building, 5th
Avenue, Bonifacio Global City, Taguig, 1634 Metro Manila.
Yahoo! Philippines office is located at 20th Floor., Accralaw Tower, 2nd Ave.,
Bonifacio Global City (at 30th St.) 1634 Taguig City Philippines.
49
individuals to have control.149 Google, a business or commercial firm which
profits by advertisement. The company now controls more than 90% of the
Internet search market in the World. It routinely records and stores search
histories and directs advertising based on intimate personal facts. It provides
name-based searches that shape our understanding of others. Further, it reveals
to others information about us that we may wish to keep private.150
The European Court concluded that this is a business, and that it should
comply with the law. The Court also found that because Google targeted Web
users in Spain and gathered information about them, Google was subject to
European law. The European court wisely distinguished between search
companies and news organizations. In the decision, Google was viewed as a
commercial service provider, not a media organization.
149Marc Rotenberg, EU strikes a blow for privacy: Opposing view, USA Today, May 14, 2014,
http://www.usatoday.com/story/opinion/2014/05/14/european -union-google-privacy-epic-
editorials-debates/9104063/ (last visited Feb 27, 2017).
150 Id.
151 Supra note 12.
152 Supra note 9.
153 Chris Sherman, The State of Search Engine Marketing 2006.
http://searchengineland.com/the -state-of-search-engine-marketing-2006-10474.
50
elsewhere with respect to any cause of action arising from these
effects unless the nature of the effects and of the individual's
relationship to the state make the exercise of such jurisdiction
unreasonable."
51
CHAPTER SIX: CONCLUSION
Further, the second test or the objective test, where his or her expectation
of privacy must be one society is prepared to accept as objectively reasonable.
The expectation of privacy involved is one which society is prepared to accept
as objectively reasonable because in the very first place society has no interest in
the private life or information of an individual. Information that concerns him is
his concern alone. This is part of the right to privacy.155
Second, the proponent submits that the Right to be Forgotten does not
violate the freedom of expression and right to information. Freedom of
expression and right to information are both constitutional rights, however they
are not absolute. One of the permitted exception of freedom of expression is
when the said limitation would protect the rights and reputation of others.
Further, removing irrelevant and outdated links in search engines does not
tantamount to deleting content. The individuals’ data may still be accessible but
is no longer ubiquitous. This is enough for the individuals’ privacy to be
respected while balancing the webpages’ freedom of expression.
Lastly, the proponent submits that the Philippine courts have jurisdiction
over search engines located outside the country. There are three ways which the
state can assert jurisdiction over data privacy protection statutes. Territoriality
based on “establishment”, effects principle and long-arm statute proves that
Philippine courts can compel search engines to delist or delink an information
under the Right to be Forgotten.
52
CHAPTER SEVEN: RECOMMENDATION
After studying its viability, the proponent propose that the Legislature
should enact the Right to be Forgotten in the Philippines. There is a need to
update our privacy laws which would satisfy the need of the people. It must be
updated based on the changing circumstances, such as the rapid advancement of
technologies.
Jerry Liao (May 20, 2008). "The Philippines - Social Networking Capital of the World" .
156
Manila Bulletin.
53