Disini v. Secretary of Justice
Disini v. Secretary of Justice
Disini v. Secretary of Justice
validity of several provisions of Republic Act (R.A.) 10175, also known as the
Cybercrime Prevention Act of 2012.
Issue: ssues:
Petitioners challenge the constitutionality of the following provisions
of the cybercrime law that regard certain acts as crimes and impose
penalties for their commission as well as provisions that would
enable the government to track down and penalize violators. These
provisions are:
1.
Section 4(a)(1) on Illegal Access;
2.
Section 4(a)(3) on Data Interference;
3.
Section 4(a)(6) on Cyber-squatting;
4.
Section 4(b)(3) on Identity Theft;
5.
Section 4(c)(1) on Cybersex;
6.
Section 4(c)(2) on Child Pornography;
7.
Section 4(c)(3) on Unsolicited Commercial Communications;
8.
Section 4(c)(4) on Libel;
9.
Section 5 on Aiding or Abetting and Attempt in the
Commission of Cybercrimes;
10. Section 6 on the Penalty of One Degree Higher;
11. Section 7 on the Prosecution under both the Revised
Penal Code (RPC) and R.A. 10175;
12. Section 8 on Penalties;
13. Section 12 on Real-Time Collection of Traffic Data;
14. Section 13 on Preservation of Computer Data;
15. Section 14 on Disclosure of Computer Data;
16. Section 15 on Search, Seizure and Examination of
Computer Data;
17. Section 17 on Destruction of Computer Data;
18. Section 19 on Restricting or Blocking Access to Computer
Data;
19. Section 20 on Obstruction of Justice;
20. Section 24 on Cybercrime Investigation and Coordinating
Center (CICC); and
21. Section 26(a) on CICC’s Powers and Functions.
Some petitioners also raise the constitutionality of related Articles
353, 354, 361, and 362 of the RPC on the crime of libel.
Held:
(1) Illegal Access. – The access to the whole or any part of a computer
system without right.
Petitioner’s Contention
Fails to meet the strict scrutiny standard required of laws that interfere
with the fundamental rights
Constitutional.
The Court finds nothing in Section 4(a)(1) that calls for the application of the
strict scrutiny standard since no fundamental freedom, like speech, is
involved in punishing what is essentially a condemnable act – accessing the
computer system of another without right. It is a universally condemned
conduct.
Sidenote: Ethical hackers are not covered by the provision, and thus, are
not punishable.
Petitioner’s Contention
Suffers from overbreadth as it intrudes into the area of protected speech
and expression
Constitutional.
But Section 4(a)(3) does not encroach on these freedoms at all. It simply
punishes what essentially is a form of vandalism, the act of willfully
destroying without right the things that belong to others, in this case their
computer data, electronic document, or electronic data message. Such act
has no connection to guaranteed freedoms. There is no freedom to destroy
other people’s computer systems and private documents.
xxx
(ii) Identical or in any way similar with the name of a person other than the
registrant, in case of a personal name; and
Petitioner’s contention
Violates equal protection clause in that, not being narrowly tailored, it will
cause a user using his real name to suffer the same fate as those who use
aliases or take the name of another in satire, parody, or any other literary
device.
Constitutional.
The law is reasonable in penalizing <the person> for acquiring the domain
name in bad faith to profit, mislead, destroy reputation, or deprive others
who are not ill-motivated of the rightful opportunity of registering the same.
The challenge to the constitutionality of Section 4(a)(6) on ground of denial
of equal protection is baseless.
b) Computer-related Offenses:
xxxx
Constitutional.
The law punishes those who acquire or use such identifying information
without right, implicitly to cause damage. Petitioners simply fail to show how
government effort to curb computer-related identity theft violates the right
to privacy and correspondence as well as the right to due process of law.
Further, petitioners fear that Section 4(b)(3) violates the freedom of the
press in that journalists would be hindered from accessing the unrestricted
user account of a person in the news to secure information about him that
could be published. But this is not the essence of identity theft that the law
seeks to prohibit and punish. Evidently, the theft of identity information must
be intended for an illegitimate purpose. Moreover, acquiring and
disseminating information made public by the user himself cannot be
regarded as a form of theft.
Sec.4(c)(1) – Cybersex
Constitutional.
The understanding of those who drew up the cybercrime law is that the
element of “engaging in a business” is necessary to constitute the illegal
cybersex. The Act actually seeks to punish cyber prostitution, white slave
trade, and pornography for favor and consideration. This includes interactive
prostitution and pornography, i.e., by webcam.
Sec 4(c)(2) – Child Pornography
Petitioners point out that the provision of ACPA that makes it unlawful for
any person to “produce, direct, manufacture or create any form of child
pornography” clearly relates to the prosecution of persons who aid and abet
the core offenses that ACPA seeks to punish. Petitioners are wary that a
person who merely doodles on paper and imagines a sexual abuse of a 16-
year-old is not criminally liable for producing child pornography but one who
formulates the idea on his laptop would be. Further, if the author bounces off
his ideas on Twitter, anyone who replies to the tweet could be considered
aiding and abetting a cybercrime.
Constitutional.
It seems that the above merely expands the scope of the Anti-Child
Pornography Act of 2009.
Unconstitutional.
But, firstly, the government presents no basis for holding that unsolicited
electronic ads reduce the “efficiency of computers.” Secondly, people, before
the arrival of the age of computers, have already been receiving such
unsolicited ads by mail. These have never been outlawed as nuisance since
people might have interest in such ads. What matters is that the recipient
has the option of not opening or reading these mail ads. That is true with
spams. Their recipients always have the option to delete or not to read them.
To prohibit the transmission of unsolicited ads would deny a person the right
to read his emails, even unsolicited commercial ads addressed to him.
Commercial speech is a separate category of speech which is not accorded
the same level of protection as that given to other constitutionally
guaranteed forms of expression but is nonetheless entitled to protection. The
State cannot rob him of this right without violating the constitutionally
guaranteed freedom of expression. Unsolicited advertisements are legitimate
forms of expression.
Note: RPC Libel requires existence of malice. Where the offended party is a
public individual, actual malice is required to be proven. If the offended
party is a private individual, malice is presumed.
Sec.4(c)(4) Libel. — The unlawful or prohibited acts of libel as defined in
Article 355 of the Revised Penal Code, as amended, committed through a
computer system or any other similar means which may be devised in the
future.
The libel provisions of the cybercrime law carry with them the requirement of
“presumed malice” even when the latest jurisprudence already replaces it
with the higher standard of “actual malice” as a basis for conviction.
Petitioners argue that inferring “presumed malice” from the accused’s
defamatory statement by virtue of Article 354 of the penal code infringes on
his constitutionally guaranteed freedom of expression.
Petitioners would go further. They contend that the laws on libel should be
stricken down as unconstitutional for otherwise good jurisprudence requiring
“actual malice” could easily be overturned as the Court has done in Fermin
v. People even where the offended parties happened to be public figures.
Also, petitioners contend that the laws violate the International Covenant of
Civil and Political Rights to the effect that penal defamation laws should
include defense of truth.
Constitutional.
As to the ICCPR, General Comment 34 does not say that the truth of the
defamatory statement should constitute an all-encompassing defense. As it
happens, Article 361 recognizes truth as a defense but under the condition
that the accused has been prompted in making the statement by good
motives and for justifiable ends. Besides, the UNHRC did not actually enjoin
the Philippines, as petitioners urge, to decriminalize libel. It simply suggested
that defamation laws be crafted with care to ensure that they do not stifle
freedom of expression.
The Court agrees with the Solicitor General that libel is not a constitutionally
protected speech and that the government has an obligation to protect
private individuals from defamation.
The internet is characterized as encouraging a freewheeling, anything-goes
writing style. In a sense, they are a world apart in terms of quickness of the
reader’s reaction to defamatory statements posted in cyberspace, facilitated
by one-click reply options offered by the networking site as well as by the
speed with which such reactions are disseminated down the line to other
internet users. Whether these reactions to defamatory statement posted on
the internet constitute aiding and abetting libel, acts that Section 5 of the
cybercrime law punishes, is another matter that the Court will deal with next
in relation to Section 5 of the law.
The old parameters for enforcing the traditional form of libel would be a
square peg in a round hole when applied to cyberspace libel. Unless the
legislature crafts a cyber libel law that takes into account its unique
circumstances and culture, such law will tend to create a chilling effect on
the millions that use this new medium of communication in violation of their
constitutionally-guaranteed right to freedom of expression. Vague and
overbroad. The severity of criminal sanctions may well cause speakers to
remain silent rather than communicate even arguably unlawful words, ideas,
and images.
The crime of willfully attempting to commit any of these offenses is for the
same reason not objectionable. A hacker may for instance have done all that
is necessary to illegally access another party’s computer system but the
security employed by the system’s lawful owner could frustrate his effort.
Another hacker may have gained access to usernames and passwords of
others but fail to use these because the system supervisor is alerted. If
Section 5 that punishes any person who willfully attempts to commit this
specific offense is not upheld, the owner of the username and password
could not file a complaint against him for attempted hacking. But this is not
right. The hacker should not be freed from liability simply because of the
vigilance of a lawful owner or his supervisor.
Petitioners of course claim that Section 5 lacks positive limits and could
cover the innocent. While this may be true with respect to cybercrimes that
tend to sneak past the area of free expression, any attempt to commit the
other acts specified in Section 4(a)(1), Section 4(a)(2), Section 4(a)(3),
Section 4(a)(4), Section 4(a)(5), Section 4(a)(6), Section 4(b)(1), Section 4(b)
(2), Section 4(b)(3), and Section 4(c)(1) as well as the actors aiding and
abetting the commission of such acts can be identified with some reasonable
certainty through adroit tracking of their works. Absent concrete proof of the
same, the innocent will of course be spared.
Sec.6
Sec. 6. All crimes defined and penalized by the
Revised Penal Code, as amended, and special
laws, if committed by, through and with the use
of information and communications
technologies shall be covered by the relevant
provisions of this Act: Provided, That the
penalty to be imposed shall be one (1) degree
higher than that provided for by the Revised
Penal Code, as amended, and special laws, as
the case may be.
Constitutional.
When two different laws define two crimes, prior jeopardy as to one does not
bar prosecution of the other although both offenses arise from the same fact,
if each crime involves some important act which is not an essential element
of the other. With the exception of the crimes of online libel and online child
pornography, the Court would rather leave the determination of the correct
application of Section 7 to actual cases.
The same is true with child pornography committed online. Section 4(c)(2)
merely expands the ACPA’s scope so as to include identical activities in
cyberspace. As previously discussed, ACPA’s definition of child pornography
in fact already covers the use of “electronic, mechanical, digital, optical,
magnetic or any other means.” Thus, charging the offender under both
Section 4(c)(2) and ACPA would likewise be tantamount to a violation of the
constitutional prohibition against double jeopardy.
Constitutional.
Sec.12
The court warrant required under this section shall only be issued or
granted upon written application and the examination under oath or
affirmation of the applicant and the witnesses he may produce and the
showing: (1) that there are reasonable grounds to believe that any of the
crimes enumerated hereinabove has been committed, or is being committed,
or is about to be committed; (2) that there are reasonable grounds to believe
that evidence that will be obtained is essential to the conviction of any
person for, or to the solution of, or to the prevention of, any such crimes; and
(3) that there are no other means readily available for obtaining such
evidence.
Unconstitutional.
See full text for the discussion regarding the right to privacy, touching the
topics of informational privacy and the technicalities of traffic data and
computer data transferred through the internet.
In much the same way, ICT users must know that they cannot
communicate or exchange data with one another over cyberspace
except through some service providers to whom they must submit
certain traffic data that are needed for a successful cyberspace
communication. The conveyance of this data takes them out of the
private sphere, making the expectation to privacy in regard to them
an expectation that society is not prepared to recognize as
reasonable.
The Court, however, agrees with Justices Carpio and Brion that
when seemingly random bits of traffic data are gathered in bulk,
pooled together, and analyzed, they reveal patterns of activities
which can then be used to create profiles of the persons under
surveillance. With enough traffic data, analysts may be able to
determine a person’s close associations, religious views, political
affiliations, even sexual preferences. Such information is likely
beyond what the public may expect to be disclosed, and clearly falls
within matters protected by the right to privacy.
However, SC struck down the provision as unconstitutional because of the
vagueness of the provision. What constitutes “due cause”? The authority
that Section 12 gives law enforcement agencies is too sweeping and lacks
restraint. While it says that traffic data collection should not disclose
identities or content data, such restraint is but an illusion. Admittedly,
nothing can prevent law enforcement agencies holding these data in their
hands from looking into the identity of their sender or receiver and what the
data contains. This will unnecessarily expose the citizenry to leaked
information or, worse, to extortion from certain bad elements in these
agencies.
Sec. 13. Preservation of Computer Data. — The integrity
of traffic data and subscriber information relating to
communication services provided by a service provider
shall be preserved for a minimum period of six (6)
months from the date of the transaction. Content data
shall be similarly preserved for six (6) months from the
date of receipt of the order from law enforcement
authorities requiring its preservation.
Law enforcement authorities may order a one-time
extension for another six (6) months: Provided, That
once computer data preserved, transmitted or stored by
a service provider is used as evidence in a case, the
mere furnishing to such service provider of the
transmittal document to the Office of the Prosecutor
shall be deemed a notification to preserve the computer
data until the termination of the case.
Constitutional.
(e) To render
inaccessible or remove
those computer data in
the accessed computer
or computer and
communications
network.
Pursuant thereof, the
law enforcement
authorities may order
any person who has
knowledge about the
functioning of the
computer system and
the measures to protect
and preserve the
computer data therein
to provide, as is
reasonable, the
necessary information,
to enable the
undertaking of the
search, seizure and
examination.
Law enforcement
authorities may request
for an extension of time
to complete the
examination of the
computer data storage
medium and to make a
return thereon but in no
case for a period longer
than thirty (30) days
from date of approval
by the court.
Constitutional.
But, as already
stated, it is unclear
that the user has a
demandable right
to require the
service provider to
Petitioners have that copy of
claim that the data saved
Sec. 17. Destruction of such indefinitely for him
Computer Data. — destruction of in its storage
Upon expiration of the computer data system. If he
periods as provided in subject of wanted them
Sections 13 and 15, previous preserved, he
service providers and preservation should have saved
law enforcement or examination them in his
authorities, as the case violates the computer when he
may be, shall user’s right generated the data
immediately and against or received it. He
completely destroy the deprivation of could also request
computer data subject property the service provider
of a preservation and without due for a copy before it
Sec.17 examination. process of law. is deleted.
Constitutional.
Hence,
VOID for being UNCONSTITUTIONAL: