Professional Documents
Culture Documents
141
_______________
*
EN BANC.
142
142
143
144
145
145
146
147
_______________
2
148
149
[1927].
9
10
11
13
13
150
[1927].
15
16
17
[1961].
18
Section 17, Article VII of the 1987 Constitution provides: Sec. 17.
20
21
Id., at 234.
151
151
151
Id., at 235.
23
24
25
26
152
153
Cooley on Torts, Sec. 135, vol. 1, 4th ed., [1932]; see also Warren
31
AMENDMENT I [1791]
154
154
AMENDMENT IV [1791]
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable
searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause,
supported by Oath or affirmation, and particularly describing the place to be searched, and the persons
or things to be seized.
AMENDMENT V [1791]
No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment
or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia,
when in actual service in time of War or public danger; nor shall any person be subject for the same
offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a
witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor
shall private property be taken for public use, without just compensation.
xxx
AMENDMENT IX [1791]
The enumeration in the Constitution, of certain rights,shall not be construed to deny or disparage
others retained bythe people.
155
155
156
156
33
157
35
Art. 26. Every person shall respect the dignity, personality, privacy and peace
of mind of his neighbors and other persons. The following and similar acts,
though they may not constitute a criminal offense, shall produce a cause of
action for damages, prevention and other relief:
(1) Prying into the privacy of anothers residence;
(2) Meddling with or disturbing the private life or family relations of
another;
(3) Intriguing to cause another to be alienated from his friends;
(4) Vexing or humiliating another on account of his religious beliefs, lowly
station in life, place of birth, physical defect, or other personal
condition.
36
37
38
39
40
158
R.A. 4200.
42
R.A. 1405.
43
R.A. 8293.
44
45
159
A most common form of biological encoding is fingerscanning where technology scans a fingertip and turns the
unique pattern therein into an individual number which is
called 49a biocrypt. The biocrypt is stored in computer data
banks and becomes a means of identifying an individual
using a service. This technology requires ones fingertip to
50
be scanned every time service or access is provided.
Another method is the retinal scan. Retinal scan technology
employs optical technology to map the capillary pattern of
the retina of the eye. This technology
produces a unique
51
print similar to a fingerprint. Another biometric method is
known as the artificial nose. This device chemically
analyzes the unique
_______________
logical science since mathematical or statistical work is an integral
part of most biological disciplines (The Dictionary of Science [1993]).
Biometric
46
Identification,
Id.
48
Id.
49
50
file:///DI/commentary.html.
51
Biometric
Identification,
http://www.afmc.wpafb.af.mil/-
organizations/HQ-AFMC/LG/LSO/LOA/bio.html.
160
160
161
[1986].
57
162
dled. It does not provide who shall control and access the
data, under what circumstances and for what purpose.
These factors are essential to safeguard58 the privacy and
guaranty the integrity of the information. Well to note, the
computer linkage gives other government agencies access to
the information. Yet, there are no controls to guard against
leakage of information. When the access code of the control
programs of the particular computer system is broken, an
intruder, without fear of sanction or penalty, can make use
of the data for whatever purpose,
or worse, manipulate the
59
data stored within the system.
It is plain and we hold that A.O. No. 308 falls short of
assuring that personal information which will be gathered
about our people will
only be processed for unequivocally
60
specified purposes. The lack of proper safeguards in this
60
60
Ibid., p. 718.
The right to control the collection, maintenance, use, and
163
66
Id.
164
164
_______________
67
Rakas v. Illinois, 439 U.S. 128, 143-144 [1978]; see the decision and
Id.
70
71
165
74
75
76
77
166
Id., at 435.
79
167
168
[1986].
82
169
86
Id.; White v. Davis, 533 P. 2d 222 [Cal. 1975]; City of Sta. Barbara
170
IV
The right to privacy is one of the most threatened rights of
man living in a mass society. The threats emanate from
various sourcesgovernments,
journalists, employers,
88
social scientists, etc. In the case at bar, the threat comes
from the executive branch of government which by issuing
A.O. No. 308 pressures the people to surrender their privacy
by giving information about themselves on the pretext that
it will facilitate delivery of basic services. Given the recordkeeping power of the computer, only the indifferent will fail
to perceive the danger that A.O. No. 308 gives the
government the power to compile a devastating dossier
against unsuspecting citizens. It is timely to take note of the
well-worded warning of Kalvin, Jr., the disturbing result
could be that everyone will live burdened by an unerasable
record of his past and his limitations. In a way, the threat is
that because of its recordkeeping, the society will have lost
89
its benign capacity to forget. Oblivious to this counsel, the
dissents still say we should not be too quick in labelling the
right to privacy as a fundamental right. We close with the
171
SEPARATE OPINION
ROMERO, J.:
What marks off a man from a beast?
Aside from the distinguishing physical characteristics,
man is a rational being, one who is endowed with intellect
which allows him to apply reasoned judgment to problems
at hand; he has the innate spiritual faculty which can tell,
not only what is right but, as well, what is moral and
ethical. Because of his sensibilities, emotions and feelings,
he likewise possesses a sense of shame. In varying degrees
172
3 Genesis 7.
173
174
174
lates due process for failure to accord persons, especially the parties
targeted by it, fair notice of the conduct to avoid; and (2) it leaves
law enforcers unbridled discretion in carrying out its provisions and
2
becomes an arbitrary flexing of the Government muscle.
At p. 195.
175
175
_______________
1
176
177
THE PHILIPPINES.
B. THE APPROPRIATION OF PUBLIC FUNDS BY
THE PRESIDENT FOR THE IMPLEMENTATION
OF A.O. NO. 308 IS AN UNCONSTITUTIONAL
USURPATION OF THE EXCLUSIVE
178
178
The card may also be used for private transactions such as:
1. Opening of bank accounts
2. Encashment of checks
3. Applications for loans, credit cards, water, power,
telephones, pagers, etc.
4. Purchase of stocks
SSS, Primer on the Social Security Card & A.O. No. 308, p. 1.
Id., at 2.
Ibid.
Ibid.
179
179
I
The issue that must first be hurdled is: was the issuance of
A.O. No. 308 an exercise by the President of legislative
power properly belonging to Congress?
_______________
5
Id., at 3.
180
180
It is not.
The Administrative Code of 1987 has unequivocally
vested the President with quasi-legislative powers in the
form of executive orders, administrative orders,
proclamations, memorandum
orders and circulars and
6
general or special orders. An administrative order, like the
one under which the new identification system is embodied,
has its peculiar meaning under the 1987 Administrative
Code:
SEC. 3. Administrative Orders.Acts of the President which relate
to particular aspects of governmental operations in pursuance of his
duties as administrative head shall be promulgated in
administrative orders.
of 1987.
181
181
pp. 78-79.
8
182
182
183
11
Ibid.
12
13
184
Annex E, Petition.
185
185
186
187
Id., at 77.
188
188
may, if its citizens choose, serve as a laboratory; and try novel social
and economic experiments without risk to the rest of the country.
This Court has the power to prevent an experiment. We may strike
down the statute which embodies it on the ground that, in our
opinion, the measure is arbitrary, capricious or unreasonable. We
have power to do this, because the due process clause has been held
by the Court applicable to matters of substantive law as well as to
matters of procedure. But in the exercise of this high power, we
must be ever on our guard, lest we erect our prejudices into legal
principles. If we would be guided by the light of reason, we must let
17
our minds be bold.
transfer of appropriations.
It is not so. The budget for the national identification
system cannot be deemed a transfer of funds since the same
is composed of and will be implemented by the member
government agencies. Moreover, these agencies particularly
the GSIS and SSS have been issuing some form of
identification
_______________
17
189
Department of Health
Government Service Insurance System
Social Security System
National Statistics Office
National Computer Center
create a committee, composed of the heads of the
agencies concerned, to draft rules for the System;
direct the use of the Population Reference Number
(PRN) generated by the National Census and Statistics
Office as the common reference number to link the
participating agencies into an Identification Reference
System, and the adoption by the agencies of standards in
190
190
I do not see how from the bare provisions of the Order, the
full text of which is set forth in the majority opinion,
petitioner and the majority can conclude that the
Identification
Reference
System
establishes
such
comprehensive personal information dossiers that can
destroy individual privacy. So far as the Order provides, all
that is contemplated is an identification system based on
191
192
_______________
6
Palko v. Connecticut, 302 U.S. 319, 327, 82 L.Ed. 288, 293 (1937).
193
193
12
194
194
13
13
provides:
195
195
_______________
SEC. 3. Administrative Orders.Acts of the President which relate to particular
aspects of governmental operation in pursuance of his duties as administrative
head shall be promulgated in administrative orders.
14
See Norton v. Shelby County, 118 U.S. 425, 442, 30 L.Ed. 178, 186
(1886).
15
16
Id., at 532.
196
196
_______________
17
18
19
20
197
198
199
subject to his
_______________
22
SCRA 452 (1990); Raines v. Byrd, No. 96-1671, June 26, 1997 (Legislators
whose votes have been sufficient to defeat [or enact] a specific legislative act
have standing to sue if that legislative action goes into effect [or does not go into
effect], on the ground that their votes have been completely nullified.)
200
200