Professional Documents
Culture Documents
Respondents contention that the habeas data writ may not issue against STC, it not
being an entity engaged in the gathering, collecting or storing of data or information
regarding the person, family, home and correspondence of the aggrieved party, while
valid to a point, is, nonetheless, erroneous.
To be sure, nothing in the Rule would suggest that the habeas data protection shall be
available only against abuses of a person or entity engaged in the business of gathering,
storing, and collecting of data. As provided under Section 1 of the Rule:
Section 1. Habeas Data. The writ of habeas data is a remedy available to any person
whose right to privacy in life, liberty or security is violated or threatened by an unlawful
act or omission of a public official or employee, or of a private individual or entity
engaged in the gathering, collecting or storing of data or information regarding the
person, family, home and correspondence of the aggrieved party. (emphasis Ours)
Other facets of the right to privacy are protectad in various provisions of the Bill of
Rights, viz: 34
Sec. 1. No person shall be deprived of life, liberty, or property without due process of
law, nor shall any person be denied the equal protection of the laws.
Sec. 2. The right of the people to be secure in their persons, houses papers, and effects
against unreasonable searches and seizures of whatever nature and for any purpose
shall be inviolable, and no search warrant or warrant of arrest shall issue except upon
probable cause to be determined personally by the judge after examination under oath
or affirmation of the complainant and the witnesses he may produce, and particularly
describing the place to be searched and the persons or things to be seized.
Zones of privacy are likewise recognized and protected in our laws. The Civil Code
provides that "[e]very person shall respect the dignity, personality, privacy and peace of
mind of his neighbors and other persons" and punishes as actionable torts several acts
by a person of meddling and prying into the privacy of another. 35 It also holds a public
officer or employee or any private individual liable for damages for any violation of the
rights and liberties of another person, 36 and recognizes the privacy of letters and other
private communications. 37 The Revised Penal Code makes a crime the violation of
secrets by an officer, 38 the revelation of trade and industrial secrets, 39 and trespass to
dwelling. 40 Invasion of privacy is an offense in special laws like the Anti-Wiretapping
Law, 41 the Secrecy of Bank Deposits Act 42 and the Intellectual Property Code. 43 The
Rules of Court on privileged communication likewise recognize the privacy of certain
information.
Ruling:
We can even grant, arguendo, that the computer data file will be limited to the name,
address and other basic personal information about the individual. Even that hospitable
assumption will not save A.O. No. 308 from constitutional infirmity for again said order
does not tell us in clear and categorical terms how these information gathered shall he
handled. It does not provide who shall control and access the data, under what
circumstances and for what purpose. These factors are essential to safeguard the
privacy and guaranty the integrity of the information. Well to note, the computer linkage
It is plain and we hold that A.O. No. 308 falls short of assuring that personal information
which will be gathered about our people will only be processed for unequivocally
specified purposes. 60 The lack of proper safeguards in this regard of A.O. No. 308 may
interfere with the individual's liberty of abode and travel by enabling authorities to track
down his movement; it may also enable unscrupulous persons to access confidential
information and circumvent the right against self-incrimination; it may pave the way for
"fishing expeditions" by government authorities and evade the right against
unreasonable searches and seizures. The possibilities of abuse and misuse of the PRN,
biometrics and computer technology are accentuated when we consider that the
individual lacks control over what can be read or placed on his ID, much less verify the
correctness of the data encoded. They threaten the very abuses that the Bill of Rights
seeks to prevent.
Though A.O. No. 308 is undoubtedly not narrowly drawn, the dissenting opinions would
dismiss its danger to the right to privacy as speculative and hypothetical. Again, we
cannot countenance such a laid back posture. The Court will not be true to its role as the
ultimate guardian of the people's liberty if it would not immediately smother the sparks
that endanger their rights but would rather wait for the fire that could consume them.
In fine, petitioners are entitled to access to the documents evidencing loans granted by
the GSIS, subject to reasonable regulations that the latter may promulgate relating to the
manner and hours of examination, to the end that damage to or loss of the records may
be avoided, that undue interference with the duties of the custodian of the records may
be prevented and that the right of other persons entitled to inspect the records may be
insured [Legaspi v. Civil Service Commission, supra at p. 538, quoting Subido v. Ozaeta,
80 Phil. 383, 387.] The petition, as to the second and third alternative acts sought to be
done by petitioners, is meritorious.
However, the same cannot be said with regard to the first act sought by petitioners, i.e.,
"to furnish petitioners the list of the names of the Batasang Pambansa members
belonging to the UNIDO and PDP-Laban who were able to secure clean loans
immediately before the February 7 election thru the intercession/marginal note of the
then First Lady Imelda Marcos."
Although citizens are afforded the right to information and, pursuant thereto, are entitled
to "access to official records," the Constitution does not accord them a right to compel
It must be stressed that it is essential for a writ of mandamus to issue that the applicant
has a well-defined, clear and certain legal right to the thing demanded and that it is the
imperative duty of defendant to perform the act required. The corresponding duty of the
respondent to perform the required act must be clear and specific [Lemi v. Valencia,
G.R. No. L-20768, November 29,1968,126 SCRA 203; Ocampo v. Subido, G.R. No.
L-28344, August 27, 1976, 72 SCRA 443.] The request of the petitioners fails to meet
this standard, there being no duty on the part of respondent to prepare the list
requested.
Under the present circumstances, the alleged anomalies in the PHILCOMSAT, PHC and
POTC, ranging in millions of pesos, and the conspiratorial participation of the PCGG and
its officials are compelling reasons for the Senate to exact vital information from the
directors and officers of Philcomsat Holdings Corporations, as well as from Chairman
Sabio and his Commissioners to aid it in crafting the necessary legislation to prevent
corruption and formulate remedial measures and policy determination regarding PCGG's
efficacy. There being no reasonable expectation of privacy on the part of those directors
and officers over the subject covered by Senate Res. No. 455, it follows that their right to
privacy has not been violated by respondent Senate Committees.
10
Following the pronouncements of the ECHR in Leander, the fact that the PNP released
information to the Zearosa Commission without prior communication to Gamboa and
without affording her the opportunity to refute the same cannot be interpreted as a
violation or threat to her right to privacy since that act is an inherent and crucial
component of intelligence-gathering and investigation.Additionally, Gamboa herself
admitted that the PNP had a validation system, which was used to update information on
individuals associated with PAGs and to ensure that the data mirrored the situation on
the field.66 Thus, safeguards were put in place to make sure that the information
collected maintained its integrity and accuracy.
However, to accord the right to privacy with the kind of protection established in existing
law and jurisprudence, this Court nonetheless deems it necessary to caution these
investigating entities that information-sharing must observe strict confidentiality.
Intelligence gathered must be released exclusively to the authorities empowered to
receive the relevant information. After all, inherent to the right to privacy is the freedom
from "unwarranted exploitation of ones person or from intrusion into ones private
activities in such a way as to cause humiliation to a persons ordinary sensibilities."67
In this case, respondents admitted the existence of the Report, but emphasized its
confidential nature.1wphi1 That it was leaked to third parties and the media was
regrettable, even warranting reproach. But it must be stressed that Gamboa failed to
establish that respondents were responsible for this unintended disclosure. In any event,
there are other reliefs available to her to address the purported damage to her
reputation, making a resort to the extraordinary remedy of the writ of habeas data
unnecessary and improper.
Finally, this Court rules that Gamboa was unable to prove through substantial evidence
that her inclusion in the list of individuals maintaining PAGs made her and her supporters
susceptible to harassment and to increased police surveillance. In this regard,
respondents sufficiently explained that the investigations conducted against her were in
relation to the criminal cases in which she was implicated. As public officials, they enjoy
the presumption of regularity, which she failed to overcome.
11
It is clear from the foregoing discussion that the state interest of dismantling PAGs far
outweighs the alleged intrusion on the private life of Gamboa, especially when the
collection and forwarding by the PNP of information against her was pursuant to a lawful
mandate. Therefore, the privilege of the writ of habeas data must be denied.
Prejudicial Question
Definition.
A prejudicial question is one based on a fact separate and distinct from the crime but is
so intimately related to it that it determines the guilt or innocence of the accused.
Elements.
1.The previously filed civil action involves an issue which is similar or is intimately
related with an issue raised in the subsequent criminal action
2. The resolution of the issue will determine whether or not the criminal action may
proceed
13