Disini v. Secretary of Justice
Disini v. Secretary of Justice
Disini v. Secretary of Justice
FACTS:
The present case involves consolidated petitions that assail the constitutionality
of Republic Act 10175 (“RA 10175”) otherwise known as the Cybercrime Prevention Act
of 2012.
Some petitioners also raise the constitutionality of related Articles 353, 354, 361, and
362 of the RPC on the crime of libel.
The petitioners argue that Section 4(a)(1) fails to meet the strict scrutiny standard
required by laws that interfere with the fundamental rights of the people.
The Court held Section 4(a)(1) to be constitutional finding no reason to apply the
strict scrutiny standard since the said section does not involve any fundamental
freedom. The Court held that the accessing the computer system of another without
right is a universally condemned conduct. The Court further stated that the fear of the
petitioner’s that the section will jeopardize the work of ethical hackers is unfounded
since he does his job with prior permission of the client thus insulating him from the
coverage of this section.
SECTION 4(a)(3)
xxxx
The Court held that Section 4(a)(3) does not suffer from overbreadth as it does
not even encroach the freedoms of speech and expression. The Section merely punishes
what essentially is a form of vandalism, the act of willfully destroying without right the
things that belong to others, in this case their computer data, electronic document, or
electronic data message. Such act has no connection to guaranteed freedoms. There is
no freedom to destroy other people’s computer systems and private documents.
Neither is there a chilling or deterrent effect. There exists no chilling effect, since
the section clearly describes the evil that it seeks to punish and creates no tendency to
intimidate the free exercise of one’s rights. The Court also noted that all penal laws have
an inherent chilling effect or the fear of possible prosecution against those who would
violate the law.
SECTION 4(a)(6)
xxxx
The Court held that the challenge raised by the Petitioners is baseless. The law is
reasonable in penalizing those who acquire the domain name in bad faith to profit,
mislead, destroy reputation, or deprive others who are not ill motivated of the rightful
opportunity of registering the same.
SECTION 4(b)(3)
b) Computer-related Offenses:
xxxx
Petitioners assail Section 4(b)(3) for violating the constitutional rights to due
process and to privacy and correspondence, and transgressing the freedom of the press.
The Court held Section 4(b)(3) to be constitutional. According to the Court, the
usual identifying information regarding a person includes his name, his citizenship, his
residence address, his contact number, his place and date of birth, the name of his
spouse if any, his occupation, and similar data. Section 4(b)(3) punishes those who
acquire or use such identifying information without right, implicitly to cause damage
and Petitioners failed to show how it violates the rights to privacy and correspondence
as well as due process of law.
The Court also found that the specific conducts proscribed by Section 4(b)(3) do
not intrude into guaranteed freedoms like speech and that it only regulates specific
actions such as the acquisition, use, misuse or deletion of personal identifying data of
another. There is no fundamental right to acquire another’s personal data.
Neither does Section 4(b)(3) violate the freedom of the press. The theft of identity
information must be intended for an illegitimate purpose. Moreover, acquiring and
disseminating information made public by the user himself cannot be regarded as a
form of theft.
SECTION 4(c)(1)
xxxx
The Court upheld the validity of Section 4(c)(1). The Court found that the
deliberations of the Bicameral Conference Committee of Congress show that there is no
intention to penalize a private showing between two private persons. Rather, the
element of “engaging in a business” is necessary to constitute the illegal cybersex. The
Court will not declare Section 4(c)(1) unconstitutional where it stands a construction
that makes it apply only to persons engaged in the business of maintaining, controlling,
or operating, directly or indirectly, the lascivious exhibition of sexual organs or sexual
activity with the aid of a computer system as Congress has intended.
SECTION 4(c)(2)
xxxx
(c) Content-related Offenses:
xxxx
The above provision merely expands the scope of the Anti-Child Pornography
Act of 2009 (ACPA) to cover identical activities in cyberspace. In theory, nothing
prevents the government from invoking the ACPA when prosecuting persons who
commit child pornography using a computer system.
SECTION 4(c)(3)
xxxx
xxxx
The Court declared Section 4(c)(3) unconstitutional. The Court found that the
Government has shown no basis for claiming that unsolicited commercial ads reduce
the efficiency of computers. Moreover, people have been receiving such ads even before
the advent of computers and these have never been outlawed since people might have
interest in such ads. What is essential is that the recipient has the option of not opening
or reading these ads. The same is true with spam. The recipient has the option to delete
or not to read them.
The prohibition of unsolicited commercial ads would deny a person the right to
read his emails even those which are unsolicited. While commercial speech is a separate
category of speech that is not entitled to the same level of protection given to other
constitutionally guaranteed forms of expression it is nonetheless still entitled to
protection. Unsolicited advertisements are legitimate forms of expression.
SECTION 4(c)(4) in relation to Articles 353,354, and 355 of the Revised Penal Code
xxxx
(4) Libel. — The unlawful or prohibited acts of libel as
defined in Article 355 of the Revised Penal Code, as
amended, committed through a computer system or any
other similar means which may be devised in the
future.”
The Court upheld the constitutionality of Section 4(c)(4) and the Revised
Penal Code provisions on libel. libel is not a constitutionally protected speech
and that the government has an obligation to protect private individuals from
defamation. Indeed, cyberlibel is actually not a new crime since Article 353, in
relation to Article 355 of the penal code, already punishes it. In effect, Section 4(c)
(4) above merely affirms that online defamation constitutes “similar means” for
committing libel.
Neither do the libel laws violate the country’s obligations under the
International Covenant on Civil and Political Rights. Nothing therein enjoins the
Philippines to decriminalize libel. The Covenant even states that although
everyone should enjoy freedom of expression, its exercise carries with it special
duties and responsibilities.
SECTION 5
Section 5 provides:
The Court held that, when it comes to certain cybercrimes, the idea of “aiding or
abetting” becomes muddier and somewhat blurred. In order to illustrate this, the Court
made use of social media sites Facebook and Twitter. The Court posed the query on
whether a person who “Likes”, “Shares” or “Comments” on a defamatory post on
Facebook, may be held liable under Section 5. Similarly, for Twitter, will a person who
replies to or “retweets” a defamatory tweet be liable under Section 5? The Court
characterized such actions as essentially knee-jerk sentiments of readers who may think
little or haphazardly of their response to the original posting.
The Court then went on to state that the concept of “aiding and abetting” when
applied to cyberlibel tends to create a chilling effect since the terms “aiding or abetting”
constitute a broad sweep that generates chilling effect on those who express themselves
through cyberspace posts, comments, and other messages. The particularly complex
web of interaction on social media websites would give law enforcers such latitude that
they could arbitrarily or selectively enforce the law. This same logic applies to Section 5
in relation to child pornography in Section 4(c)(2) and unsolicited commercial
communication under Section 4(c)(3).
The Court likewise noted that libel is a formal crime that is punished only when
consummated. Thus, Section 5(b) does not apply therein.
But the crime of aiding or abetting the commission of cybercrimes under Section
5 should be permitted to apply to Section 4(a)(1) on Illegal Access, Section 4(a)(2) on
Illegal Interception, Section 4(a)(3) on Data Interference, Section 4(a)(4) on System
Interference, Section 4(a)(5) on Misuse of Devices, Section 4(a)(6) on Cyber-squatting,
Section 4(b)(1) on Computer-related Forgery, Section 4(b)(2) on Computer-related
Fraud, Section 4(b)(3) on Computer-related Identity Theft, and Section 4(c)(1) on
Cybersex. None of these offenses borders on the exercise of the freedom of expression.
Moreover, Section 5(b) applies to these offenses because to not do so will allow
those, who were to unsuccessfully commit these offences due to the vigilance of the
offended party, to evade punishment.
SECTION 6
Section 6 provides:
SECTION 7
Section 7 provides:
Sec. 7. Liability under Other Laws. — A prosecution under this Act shall be
without prejudice to any liability for violation of any provision of the Revised
Penal Code, as amended, or special laws.
With the exception of the crimes of online libel and online child pornography,
the Court would rather leave the determination of the correct application of Section 7 to
actual cases.
Section 8 provides for the penalties for the following crimes: Sections 4(a) on
Offenses Against the Confidentiality, Integrity and Availability of Computer Data and
Systems; 4(b) on Computer-related Offenses; 4(a)(5) on Misuse of Devices; when the
crime punishable under 4(a) is committed against critical infrastructure; 4(c)(1) on
Cybersex; 4(c)(2) on Child Pornography; 4(c)(3) on Unsolicited Commercial
Communications; and Section 5 on Aiding or Abetting, and Attempt in the Commission
of Cybercrime.
The fixing of penalties was held to be a legislative prerogative and those imposed
by Section 8 appear to be proportionate to the evil sought to be punished. The Courts
should not encroach upon the legislature’s prerogative in the determination of penalties
for crimes.
SECTION 12
Section 12 provides:
Petitioners argue that the power given to law enforcement to collect and record
data traffic in real time violate the right to privacy.
Section 12 allows law enforcement to collect and record real time traffic data with
“due cause”. However, nothing in the law hints at the meaning of “due cause” and is
akin to the use of a general warrant which is Constitutionally prohibited.
The authority that Section 12 gives law enforcement agencies is too sweeping
and lacks restraint. While it says that traffic data collection should not disclose identities
or content data, such restraint is but an illusion. Admittedly, nothing can prevent law
enforcement agencies holding these data in their hands from looking into the identity of
their sender or receiver and what the data contains. This will unnecessarily expose the
citizenry to leaked information or, worse, to extortion from certain bad elements in
these agencies. The power is virtually limitless, enabling law enforcement authorities to
engage in “fishing expedition,”choosing whatever specified communication they want.
This evidently threatens the right of individuals to privacy. The grant of the power to
track cyberspace communications in real time and determine their sources and
destinations must be narrowly drawn to preclude abuses.
SECTION 13
Section 13 provides:
The Court held Section 13 to be valid. The data that service providers preserve on
orders of law enforcement authorities are not made inaccessible to users by reason of
the issuance of such orders and the process of preserving data will not unduly hamper
the normal transmission or use of the same.
SECTION 14
Section 14 provides:
The court held that Section 14 is valid. The power to issue subpoenas is also
available to executive agencies as an adjunct of their investigatory powers. Moreover,
Section 14 contemplates the enforcement of a duly issued court warrant. There is thus
no unlawful search nor seizure, nor a violation of the privacy of communications and
correspondence.
SECTION 15
Section 15 provides:
The Court held Section 15 to be valid. It only enumerates the duties of law
enforcement authorities which does not pose any threat to the rights of the person from
whom these were taken by virtue of a court warrant. It merely supplements existing
search and seizure rules.
SECTION 17
Section 17 provides:
Section 17 is valid. It is unclear that the user has a demandable right to require
the service provider to have that copy of the data saved indefinitely for him in its
storage system. If he wanted them preserved, he should have saved them in his
computer when he generated the data or received it. He could also request the service
provider for a copy before it is deleted.
SECTION 19
Petitioners assail Section 19 for stifling the freedom of expression and violating
the right against unreasonable searches and seizures.
Section 19 violates the right against unreasonable searches and seizures and
freedom of expression.
SECTION 20
Section 20 provides:
Sec. 20. Noncompliance. — Failure to comply with the provisions of
Chapter IV hereof specifically the orders from law enforcement authorities
shall be punished as a violation of Presidential Decree No.1829 with
imprisonment of prision correctional in its maximum period or a fine of
One hundred thousand pesos (Php100,000.00) or both, for each and every
noncompliance with an order issued by law enforcement authorities.
Sec. 26. Powers and Functions.– The CICC shall have the following
powers and functions:
Petitioner assail the above sections for being an invalid delegation of legislative
power.
Sections 24 and 26(a) are valid as they meet the completeness and sufficient
standards test for a valid delegation. The cybercrime law is complete in itself when it
directed the CICC to formulate and implement a national cybersecurity plan. Also,
contrary to the position of the petitioners, the law gave sufficient standards for the
CICC to follow when it provided a definition of cybersecurity.