You are on page 1of 20

Rules and Regulations Implementing databases, and the confidentiality,

Republic Act No. 10175, Otherwise integrity, and availability of information


Known as the and data stored therein from all forms of
Cybercrime Prevention Act of 2012 misuse, abuse and illegal access by
making punishable under the law such
Pursuant to the authority of the conduct or conducts.
Department of Justice, Department of
Interior and Local Government, and The State shall adopt sufficient powers
Department of Science and Technology to effectively prevent and combat such
under Republic Act No. 10175, offenses by facilitating their detection,
otherwise known as the Cybercrime investigation and prosecution at both the
Prevention Act of 2012, the following domestic and international levels, and
rules and regulations are hereby by providing arrangements for fast and
promulgated to implement the reliable international cooperation.
provisions of said Act:
Section 3. Definition of Terms. The
RULE 1 following terms are defined as follows:
Preliminary Provisions
a) Access refers to the instruction,
Section 1. Title. These Rules shall be communication with, storing data in,
referred to as the Implementing Rules retrieving data from, or otherwise
and Regulations of Republic Act No. making use of any resources of a
10175, or the Cybercrime Prevention computer system or communication
Act of 2012. network;

Section 2. Declaration of Policy. The b) Act refers to Republic Act No. 10175
State recognizes the vital role of or the Cybercrime Prevention Act of
information and communications 2012;
industries, such as content production,
telecommunications, broadcasting, c) Alteration refers to the modification
electronic commerce and data or change, in form or substance, of an
processing, in the States overall social existing computer data or program;
and economic development.
d) Central Authority refers to the DOJ
The State also recognizes the Office of Cybercrime;
importance of providing an environment
conducive to the development, e) Child Pornography refers to the
acceleration, and rational application unlawful or prohibited acts defined and
and exploitation of information and punishable by Republic Act No. 9775 or
communications technology to attain the Anti-Child Pornography Act of
free, easy, and intelligible access to 2009, committed through a computer
exchange and/or delivery of information; system: Provided, that the penalty to be
and the need to protect and safeguard imposed shall be one (1) degree higher
the integrity of computer, computer and than that provided for in Republic Act
communications systems, networks and No. 9775;
f) Collection refers to gathering and l) Computer system refers to any
receiving information; device or group of interconnected or
related devices, one or more of which,
g) Communication refers to the pursuant to a program, performs
transmission of information through automated processing of data. It covers
information and communication any type of device with data processing
technology (ICT) media, including voice, capabilities, including, but not limited to,
video and other forms of data; computers and mobile phones. The
device consisting of hardware and
h) Competent Authority refers to either software may include input, output and
the Cybercrime Investigation and storage components, which may stand
Coordinating Center or the DOJ Office alone or be connected to a network or
of Cybercrime, as the case may be; other similar devices. It also includes
computer data storage devices or
i) Computer refers to an electronic, media;
magnetic, optical, electrochemical, or
other data processing or m) Content Data refers to the
communications device, or grouping of communication content of the
such devices, capable of performing communication, the meaning or purport
logical, arithmetic, routing or storage of the communication, or the message
functions, and which includes any or information being conveyed by the
storage facility or equipment or communication, other than traffic data.
communications facility or equipment
directly related to or operating in n) Critical infrastructure refers to the
conjunction with such device. It covers computer systems, and/or networks,
any type of computer device, including whether physical or virtual, and/or the
devices with data processing computer programs, computer data
capabilities like mobile phones, smart and/or traffic data that are so vital to this
phones, computer networks and other country that the incapacity or destruction
devices connected to the internet; of or interference with such system and
assets would have a debilitating impact
j) Computer data refers to any on security, national or economic
representation of facts, information, or security, national public health and
concepts in a form suitable for safety, or any combination of those
processing in a computer system, matters;
including a program suitable to cause a
computer system to perform a function, o) Cybersecurity refers to the collection
and includes electronic documents of tools, policies, risk management
and/or electronic data messages approaches, actions, training, best
whether stored in local computer practices, assurance and technologies
systems or online; that can be used to protect the cyber
environment, and organization and
k) Computer program refers to a set of users assets;
instructions executed by the computer to
achieve intended results; p) National Cybersecurity Plan refers
to a comprehensive plan of actions
designed to improve the security and transmitted, stored, processed, retrieved
enhance cyber resilience of or produced electronically;
infrastructures and services. It is a top-
down approach to cybersecurity that v) Forensics refers to the application of
contains broad policy statements and investigative and analytical techniques
establishes a set of national objectives that conform to evidentiary standards,
and priorities that should be achieved and are used in, or appropriate for, a
within a specific timeframe; court of law or other legal context;

q) Cybersex refers to the willful w) Forensic image, also known as


engagement, maintenance, control or a forensic copy, refers to an exact bit-
operation, directly or indirectly, of any by-bit copy of a data carrier, including
lascivious exhibition of sexual organs or slack, unallocated space and unused
sexual activity, with the aid of a space. There are forensic tools available
computer system, for favor or for making these images. Most tools
consideration; produce information, like a hash value,
to ensure the integrity of the image;
r) Cyber refers to a computer or a
computer network, the electronic x) Hash value refers to the
medium in which online communication mathematical algorithm produced
takes place; against digital information (a file, a
physical disk or a logical disk) thereby
s) Database refers to a representation creating a digital fingerprint or digital
of information, knowledge, facts, DNA for that information. It is a one-
concepts or instructions which are being way algorithm and thus it is not possible
prepared, processed or stored, or have to change digital evidence without
been prepared, processed or stored in a changing the corresponding hash
formalized manner, and which are values;
intended for use in a computer system;
y) Identifying information refers to any
t) Digital evidence refers to digital name or number that may be used
information that may be used as alone or in conjunction with any other
evidence in a case. The gathering of the information to identify any specific
digital information may be carried out by individual, including any of the following:
confiscation of the storage media (data
carrier), the tapping or monitoring of 1. Name, date of birth, drivers
network traffic, or the making of digital license number, passport number
copies (e.g., forensic images, file or tax identification number;
copies, etc.), of the data held; 2. Unique biometric data, such as
fingerprint or other unique
u) Electronic evidence refers to physical representation;
evidence, the use of which is sanctioned 3. Unique electronic identification
by existing rules of evidence, in number, address or routing code;
ascertaining in a judicial proceeding, the and
truth respecting a matter of fact, which 4. Telecommunication identifying
evidence is received, recorded, information or access device.
z) Information and communication ff) Service provider refers to:
technology system refers to system
intended for, and capable of, generating, 1. any public or private entity that
sending, receiving, storing or otherwise provides users of its service with
processing electronic data messages or the ability to communicate by
electronic documents, and includes the means of a computer system;
computer system or other similar device and
by or in which data is recorded or 2. any other entity that processes or
stored, and any procedures related to stores computer data on behalf of
the recording or storage of electronic such communication service or
data message or electronic document; users of such service.

aa) Interception refers to listening to, gg) Subscribers information refers to


recording, monitoring or surveillance of any information contained in the form of
the content of communications, computer data or any other form that is
including procurement of the content of held by a service provider, relating to
data, either directly through access and subscribers of its services, other than
use of a computer system, or indirectly traffic or content data, and by which any
through the use of electronic of the following can be established:
eavesdropping or tapping devices, at
the same time that the communication is The type of communication service
occurring; used, the technical provisions taken
thereto and the period of service;
bb) Internet content host refers to a
person who hosts or who proposes to The subscribers identity, postal or
host internet content in the Philippines; geographic address, telephone and
other access number, any assigned
cc) Law enforcement network address, billing and payment
authorities refers to the National information that are available on the
Bureau of Investigation (NBI) and the basis of the service agreement or
Philippine National Police (PNP) under arrangement; or
Section 10 of the Act;
Any other available information on the
dd) Original author refers to the person site of the installation of communication
who created or is the origin of the equipment that is available on the basis
assailed electronic statement or post of the service agreement or
using a computer system; arrangement.

ee) Preservation refers to the keeping hh) Traffic Data or Non-Content


of data that already exists in a stored Data refers to any computer data other
form, protected from anything that would than the content of the communication,
cause its current quality or condition to including, but not limited to the
change or deteriorate. It is the activity communications origin, destination,
that keeps that stored data secure and route, time, date, size, duration, or type
safe; of underlying service; and
ii) Without Right refers to either: (i) communication in the normal
conduct undertaken without or in excess course of employment, while
of authority; or (ii) conduct not covered engaged in any activity that is
by established legal defenses, excuses, necessary to the rendition of
court orders, justifications or relevant service or to the protection of the
principles under the law. rights or property of the service
provider, except that the latter
RULE 2 shall not utilize service observing
Punishable Acts and Penalties or random monitoring other than
for purposes of mechanical or
Cybercrimes service control quality checks.
3. Data Interference The
Section 4. Cybercrime Offenses. intentional or reckless alteration,
The following acts constitute the offense damaging, deletion or
of core cybercrime punishable under the deterioration of computer data,
Act: electronic document or electronic
data message, without right,
A. Offenses against the including the introduction or
confidentiality, integrity and transmission of viruses.
availability of computer data and 4. System Interference The
systems shall be punished with intentional alteration, or reckless
imprisonment of prision mayor or a fine hindering or interference with the
of at least Two Hundred Thousand functioning of a computer or
Pesos (P200,000.00) up to a maximum computer network by inputting,
amount commensurate to the damage transmitting, damaging, deleting,
incurred, or both, except with respect to deteriorating, altering or
number 5 herein: suppressing computer data or
program, electronic document or
1. Illegal Access The access to electronic data message, without
the whole or any part of a right or authority, including the
computer system without right. introduction or transmission of
2. Illegal Interception The viruses.
interception made by technical 5. Misuse of Devices, which shall
means and without right, of any be punished with imprisonment
non-public transmission of of prision mayor, or a fine of not
computer data to, from, or within more than Five Hundred
a computer system, including Thousand Pesos (P500,000.00),
electromagnetic emissions from a or both, is committed through any
computer system carrying such of the following acts:
computer data: Provided,
however, That it shall not be a. The use, production, sale,
unlawful for an officer, employee, procurement, importation, distribution or
or agent of a service provider, otherwise making available, intentionally
whose facilities are used in the and without right, of any of the following:
transmission of communications,
to intercept, disclose or use that
i. A device, including a computer a. The input, alteration or deletion of any
program, designed or adapted primarily computer data without right, resulting in
for the purpose of committing any of the inauthentic data, with the intent that it be
offenses under this rules; or considered or acted upon for legal
purposes as if it were authentic,
ii. A computer password, access code, regardless whether or not the data is
or similar data by which the whole or directly readable and intelligible; or
any part of a computer system is
capable of being accessed with the b. The act of knowingly using computer
intent that it be used for the purpose of data, which is the product of computer-
committing any of the offenses under related forgery as defined herein, for the
this rules. purpose of perpetuating a fraudulent or
dishonest design.
b. The possession of an item referred to
in subparagraphs 5(a)(i) or (ii) above, 2. Computer-related Fraud The
with the intent to use said devices for unauthorized Input, alteration or
the purpose of committing any of the deletion of computer data or program, or
offenses under this section. interference in the functioning of a
computer system, causing damage
Provided, That no criminal liability shall thereby with fraudulent intent: Provided,
attach when the use, production, sale, That if no damage has yet been caused,
procurement, importation, distribution, the penalty imposable shall be one (1)
otherwise making available, or degree lower.
possession of computer devices or data
referred to in this section is for the 3. Computer-related Identity Theft
authorized testing of a computer The intentional acquisition, use, misuse,
system. transfer, possession, alteration or
deletion of identifying information
If any of the punishable acts belonging to another, whether natural or
enumerated in Section 4(A) is juridical, without right: Provided, That if
committed against critical infrastructure, no damage has yet been caused, the
the penalty of reclusion temporal, or a penalty imposable shall be one (1)
fine of at least Five Hundred Thousand degree lower.
Pesos (P500,000.00) up to maximum
amount commensurate to the damage C. Content-related Offenses:
incurred, or both shall be imposed.
1. Any person found guilty of Child
B. Computer-related Offenses, which Pornography shall be punished in
shall be punished with imprisonment accordance with the penalties set forth
of prision mayor, or a fine of at least Two in Republic Act No. 9775 or the Anti-
Hundred Thousand Pesos Child Pornography Act of
(P200,000.00) up to a maximum amount 2009: Provided, That the penalty to be
commensurate to the damage incurred, imposed shall be one (1) degree higher
or both, are as follows: than that provided for in Republic Act
No. 9775 if committed through a
1. Computer-related Forgery computer system.
Section 5. Other Cybercrimes. The exceeding One Million Pesos
following constitute other cybercrime (P1,000,000.00), or both.
offenses punishable under the Act:
Cybersex involving a child shall be
1. Cyber-squatting The acquisition of punished in accordance with the
a domain name over the internet, in bad provision on child pornography of the
faith, in order to profit, mislead, destroy Act.
reputation, and deprive others from
registering the same, if such a domain Where the maintenance, control, or
name is: operation of cybersex likewise
constitutes an offense punishable under
a. Similar, identical, or confusingly Republic Act No. 9208, as amended, a
similar to an existing trademark prosecution under the Act shall be
registered with the appropriate without prejudice to any liability for
government agency at the time of violation of any provision of the Revised
the domain name registration; Penal Code, as amended, or special
b. Identical or in any way similar laws, including R.A. No. 9208,
with the name of a person other consistent with Section 8 hereof.
than the registrant, in case of a
personal name; and 3. Libel The unlawful or prohibited
c. Acquired without right or with acts of libel, as defined in Article 355 of
intellectual property interests in it. the Revised Penal Code, as amended,
committed through a computer system
Cyber-squatting shall be punished with or any other similar means which may
imprisonment of prision mayor, or a fine be devised in the future shall be
of at least Two Hundred Thousand punished with prision correccional in its
Pesos (P200,000.00) up to a maximum maximum period to prision mayor in its
amount commensurate to the damage minimum period or a fine ranging from
incurred, or both: Provided, That if it is Six Thousand Pesos (P6,000.00) up to
committed against critical infrastructure, the maximum amount determined by
the penalty of reclusion temporal, or a Court, or both, in addition to the civil
fine of at least Five Hundred Thousand action which may be brought by the
Pesos (P500,000.00) up to maximum offended party: Provided, That this
amount commensurate to the damage provision applies only to the original
incurred, or both shall be imposed. author of the post or online libel, and not
to others who simply receive the post
2. Cybersex The willful engagement, and react to it.
maintenance, control or operation,
directly or indirectly, of any lascivious 4. Other offenses The following acts
exhibition of sexual organs or sexual shall also constitute an offense which
activity, with the aid of a computer shall be punished with imprisonment of
system, for favor or consideration. Any one (1) degree lower than that of the
person found guilty cybersex shall be prescribed penalty for the offense, or a
punished with imprisonment of prision fine of at least One Hundred Thousand
mayor, or a fine of at least Two Hundred Pesos (P100,000.00) but not exceeding
Thousand Pesos (P200,000.00), but not
Five Hundred Thousand Pesos person referred to and described in the
(P500,000.00), or both: preceding paragraph, for the benefit of
that juridical person by a natural person
A. Aiding or Abetting in the acting under its authority, the juridical
Commission of Cybercrime. person shall be held liable for a fine
Any person who willfully abets, equivalent to at least double the fines
aids, or financially benefits in the imposable in Section 7 up to a
commission of any of the maximum of Five Million Pesos
offenses enumerated in the Act (P5,000,000.00).
shall be held liable, except with
respect to Sections 4(c)(2) on The liability imposed on the juridical
Child Pornography and 4(c)(4) on person shall be without prejudice to the
online Libel. criminal liability of the natural person
B. Attempt to Commit Cybercrime. who has committed the offense.
Any person who willfully attempts
to commit any of the offenses Section 7. Violation of the Revised
enumerated in the Act shall be Penal Code, as Amended, Through
held liable, except with respect to and With the Use of Information and
Sections 4(c)(2) on Child Communication Technology. All
Pornography and 4(c)(4) on crimes defined and penalized by the
online Libel. Revised Penal Code, as amended, and
special criminal laws committed by,
Other Liabilities and Penalties through and with the use of information
and communications technologies shall
Section 6. Corporate Liability. When be covered by the relevant provisions of
any of the punishable acts herein the Act: Provided, That the penalty to be
defined are knowingly committed on imposed shall be one (1) degree higher
behalf of or for the benefit of a juridical than that provided for by the Revised
person, by a natural person acting either Penal Code, as amended, and special
individually or as part of an organ of the laws, as the case may be.
juridical person, who has a leading
position within, based on: (a) a power of Section 8. Liability under Other
representation of the juridical person; (b) Laws. A prosecution under the Act
an authority to take decisions on behalf shall be without prejudice to any liability
of the juridical person; or (c) an authority for violation of any provision of the
to exercise control within the juridical Revised Penal Code, as amended, or
person, the juridical person shall be held special laws: Provided, That this
liable for a fine equivalent to at least provision shall not apply to the
double the fines imposable in Section 7 prosecution of an offender under (1)
up to a maximum of Ten Million Pesos both Section 4(c)(4) of R.A. 10175 and
(P10,000,000.00). Article 353 of the Revised Penal Code;
and (2) both Section 4(c)(2) of R.A.
If the commission of any of the 10175 and R.A. 9775 or the Anti-Child
punishable acts herein defined was Pornography Act of 2009.
made possible due to the lack of
supervision or control by a natural
RULE 3 seizure, evidence preservation
Enforcement and Implementation and forensic recovery of data
from crime scenes and systems
Section 9. Law Enforcement used in crimes, and provide
Authorities. The National Bureau of testimonies;
Investigation (NBI) and the Philippine e. Develop public, private sector,
National Police (PNP) shall be and law enforcement agency
responsible for the efficient and effective relations in addressing
law enforcement of the provisions of the cybercrimes;
Act. The NBI and the PNP shall f. Maintain necessary and relevant
organize a cybercrime division or unit to databases for statistical and/or
be manned by Special Investigators to monitoring purposes;
exclusively handle cases involving g. Develop capacity within their
violations of the Act. organizations in order to perform
such duties necessary for the
The NBI shall create a cybercrime enforcement of the Act;
division to be headed by at least a Head h. Support the formulation and
Agent. The PNP shall create an anti- enforcement of the national
cybercrime unit headed by at least a cybersecurity plan; and
Police Director. i. Perform other functions as may
be required by the Act.
The DOJ Office of Cybercrime (OOC)
created under the Act shall coordinate Section 11. Duties of Law
the efforts of the NBI and the PNP in Enforcement Authorities. To ensure
enforcing the provisions of the Act. that the technical nature of cybercrime
and its prevention is given focus, and
Section 10. Powers and Functions of considering the procedures involved for
Law Enforcement Authorities. The international cooperation, law
NBI and PNP cybercrime unit or division enforcement authorities, specifically the
shall have the following powers and computer or technology crime divisions
functions: or units responsible for the investigation
of cybercrimes, are required to submit
a. Investigate all cybercrimes where timely and regular reports including pre-
computer systems are involved; operation, post-operation and
b. Conduct data recovery and investigation results, and such other
forensic analysis on computer documents as may be required to the
systems and other electronic Department of Justice (DOJ) Office of
evidence seized; Cybercrime for review and monitoring.
c. Formulate guidelines in
investigation, forensic evidence Law enforcement authorities shall act in
recovery, and forensic data accordance with the guidelines,
analysis consistent with industry advisories and procedures issued and
standard practices; promulgated by the competent authority
d. Provide technological support to in all matters related to cybercrime, and
investigating units within the PNP utilize the prescribed forms and
and NBI including the search, templates, including, but not limited to,
preservation orders, chain of custody, with specified communications
consent to search, consent to assume transmitted by means of a computer
account/online identity and request for system.
computer forensic examination.
The court warrant required under this
Section 12. Preservation and section shall be issued or granted upon
Retention of Computer Data. The written application, after the examination
integrity of traffic data and subscriber under oath or affirmation of the applicant
information shall be kept, retained and and the witnesses he may produce, and
preserved by a service provider for a the showing that: (1) there are
minimum period of six (6) months from reasonable grounds to believe that any
the date of the transaction. Content data of the crimes enumerated hereinabove
shall be similarly preserved for six (6) has been committed, is being committed
months from the date of receipt of the or is about to be committed; (2) there
order from law enforcement authorities are reasonable grounds to believe that
requiring its preservation. the evidence that will be obtained is
essential to the conviction of any person
Law enforcement authorities may order for, or to the solution of, or to the
a one-time extension for another six (6) prevention of any such crimes; and (3)
months: Provided, That once computer there are no other means readily
data that is preserved, transmitted or available for obtaining such evidence.
stored by a service provider is used as
evidence in a case, the mere act of Section 14. Disclosure of Computer
furnishing such service provider with a Data. Law enforcement authorities,
copy of the transmittal document to the upon securing a court warrant, shall
Office of the Prosecutor shall be issue an order requiring any person or
deemed a notification to preserve the service provider to disclose or submit,
computer data until the final termination within seventy-two (72) hours from
of the case and/or as ordered by the receipt of such order, subscribers
Court, as the case may be. information, traffic data or relevant data
in his/its possession or control, in
The service provider ordered to relation to a valid complaint officially
preserve computer data shall keep the docketed and assigned for investigation
order and its compliance therewith by law enforcement authorities, and the
confidential. disclosure of which is necessary and
relevant for the purpose of investigation.
Section 13. Collection of Computer
Data. Law enforcement authorities, Law enforcement authorities shall
upon the issuance of a court warrant, record all sworn complaints in their
shall be authorized to collect or record official docketing system for
by technical or electronic means, and investigation.
the service providers are required to
collect or record by technical or Section 15. Search, Seizure and
electronic means and/or to cooperate Examination of Computer
and assist in the collection or recording Data. Where a search and seizure
of computer data that are associated warrant is properly issued, the law
enforcement authorities shall likewise deposited with the court in a sealed
have the following powers and duties: package, and shall be accompanied by
an affidavit of the law enforcement
a. Within the time period specified in the authority executing it, stating the dates
warrant, to conduct interception, as and times covered by the examination,
defined in this Rules, and to: and the law enforcement authority who
may have access to the deposit, among
1. Search and seize computer data; other relevant data. The law
2. Secure a computer system or a enforcement authority shall also certify
computer data storage medium; that no duplicates or copies of the whole
3. Make and retain a copy of those or any part thereof have been made or,
computer data secured; if made, that all such duplicates or
4. Maintain the integrity of the copies are included in the package
relevant stored computer data; deposited with the court. The package
5. Conduct forensic analysis or so deposited shall not be opened, or the
examination of the computer data recordings replayed, or used in
storage medium; and evidence, or their contents revealed,
6. Render inaccessible or remove except upon order of the court, which
those computer data in the shall not be granted except upon
accessed computer or computer motion, with due notice and opportunity
and communications network. to be heard to the person or persons
whose conversation or communications
b. Pursuant thereto, the law have been recorded.
enforcement authorities may order any
person, who has knowledge about the Section 17. Destruction of Computer
functioning of the computer system and Data. Upon expiration of the periods
the measures to protect and preserve as provided in Sections 12 and 15
the computer data therein, to provide, as hereof, or until the final termination of
is reasonable, the necessary information the case and/or as ordered by the Court,
to enable the undertaking of the search, as the case may be, service providers
seizure and examination. and law enforcement authorities, as the
case may be, shall immediately and
c. Law enforcement authorities may completely destroy the computer data
request for an extension of time to that are the subject of a preservation
complete the examination of the and examination order or warrant.
computer data storage medium and to
make a return thereon, but in no case Section 18. Exclusionary Rule. Any
for a period longer than thirty (30) days evidence obtained without a valid
from date of approval by the court. warrant or beyond the authority of the
same shall be inadmissible for any
Section 16. Custody of Computer proceeding before any court or tribunal.
Data. All computer data, including
content and traffic data, that are The Rules of Court shall have
examined under a proper warrant shall, suppletory application in implementing
within forty-eight (48) hours after the the Act.
expiration of the period fixed therein, be
Section 19. Non-compliance. Failure subsisting in or in relation to such
to comply with the provisions of Chapter material;
IV of the Act, and Rules 7 and 8 of 2. The service provider does not
Chapter VII hereof, specifically the knowingly receive a financial
orders from law enforcement authorities, benefit directly attributable to the
shall be punished as a violation of unlawful or infringing activity; and
Presidential Order No. 1829 3. The service provider does not
(entitled Penalizing Obstruction Of directly commit any infringement
Apprehension And Prosecution Of or other unlawful act, does not
Criminal Offenders) with imprisonment induce or cause another person
of prision correccional in its maximum or party to commit any
period, or a fine of One Hundred infringement or other unlawful
Thousand Pesos (P100,000.00), or both act, and/or does not directly
for each and every noncompliance with benefit financially from the
an order issued by law enforcement infringing activity or unlawful act
authorities. of another person or
party: Provided, further, That
Section 20. Extent of Liability of a nothing in this Section shall
Service Provider. Except as affect:
otherwise provided in this Section, no
person or party shall be subject to any i. Any obligation arising from contract;
civil or criminal liability in respect of a
computer data for which the person or ii. The obligation of a service provider as
party acting as a service provider merely such under a licensing or other
provides access if such liability is regulatory regime established under
founded on: law;

a. The obligations and liabilities of the iii. Any obligation imposed under any
parties under a computer data; law; or

b. The making, publication, iv. The civil liability of any party to the
dissemination or distribution of such extent that such liability forms the basis
computer data or any statement made in for injunctive relief issued by a court
such computer data, including possible under any law requiring that the service
infringement of any right subsisting in or provider take or refrain from actions
in relation to such computer necessary to remove, block or deny
data: Provided, That: access to any computer data, or to
preserve evidence of a violation of law.
1. The service provider does not
have actual knowledge, or is not RULE 4
aware of the facts or Jurisdiction
circumstances from which it is
apparent, that the making, Section 21. Jurisdiction. The
publication, dissemination or Regional Trial Court shall have
distribution of such material is jurisdiction over any violation of the
unlawful or infringes any rights provisions of the Act, including any
violation committed by a Filipino national on criminal matters, and arrangements
regardless of the place of commission. agreed on the basis of uniform or
Jurisdiction shall lie if any of the reciprocal legislation and domestic laws
elements was committed within the shall be given full force and effect, to the
Philippines, or committed with the use of widest extent possible for the purposes
any computer system that is wholly or of investigations or proceedings
partly situated in the country, or when by concerning crimes related to computer
such commission any damage is caused systems and data, or for the collection of
to a natural or juridical person who, at electronic evidence of crimes.
the time the offense was committed,
was in the Philippines. The DOJ shall cooperate and render
assistance to other contracting parties,
Section 22. Venue. Criminal action for as well as request assistance from
violation of the Act may be filed with the foreign states, for purposes of detection,
RTC of the province or city where the investigation and prosecution of
cybercrime or any of its elements is offenses referred to in the Act and in the
committed, or where any part of the collection of evidence in electronic form
computer system used is situated, or in relation thereto. The principles
where any of the damage caused to a contained in Presidential Decree No.
natural or juridical person took 1069 and other pertinent laws, as well
place: Provided, That the court where as existing extradition and mutual legal
the criminal action is first filed shall assistance treaties, shall apply. In this
acquire jurisdiction to the exclusion of regard, the central authority shall:
other courts.
a. Provide assistance to a requesting
Section 23. Designation of State in the real-time collection of traffic
Cybercrime Courts. There shall be data associated with specified
designated special cybercrime courts communications in the country
manned by specially trained judges to transmitted by means of a computer
handle cybercrime cases. system, with respect to criminal offenses
defined in the Act for which real-time
Section 24. Designation of Special collection of traffic data would be
Prosecutors and Investigators. The available, subject to the provisions of
Secretary of Justice shall designate Section 13 hereof;
prosecutors and investigators who shall
comprise the prosecution task force or b. Provide assistance to a requesting
division under the DOJ-Office of State in the real-time collection,
Cybercrime, which will handle recording or interception of content data
cybercrime cases in violation of the Act. of specified communications transmitted
by means of a computer system, subject
RULE 5 to the provision of Section 13 hereof;
International Cooperation
c. Allow another State to:
Section 25. International
Cooperation. All relevant international
instruments on international cooperation
1. Access publicly available stored v. That the requesting State shall submit
computer data located in the a request for mutual assistance for the
country or elsewhere; or search or similar access, seizure or
2. Access or receive, through a similar securing, or disclosure of the
computer system located in the stored computer data.
country, stored computer data
located in another country, if the 2. Upon receiving the request from
other State obtains the lawful and another State, the DOJ and law
voluntary consent of the person enforcement agencies shall take all
who has the lawful authority to appropriate measures to expeditiously
disclose the data to said other preserve the specified data, in
State through that computer accordance with the Act and other
system. pertinent laws. For the purposes of
responding to a request for
d. Receive a request of another State preservation, dual criminality shall not
for it to order or obtain the expeditious be required as a condition;
preservation of data stored by means of
a computer system located within the 3. A request for preservation may only
country, relative to which the requesting be refused if:
State shall submit a request for mutual
assistance for the search or similar i. The request concerns an offense that
access, seizure or similar securing, or the Philippine Government considers as
disclosure of the stored computer a political offense or an offense
data: Provided, That: connected with a political offense; or

1. A request for preservation of data ii. The Philippine Government considers


under this section shall specify: the execution of the request to be
prejudicial to its sovereignty, security,
i. The authority seeking the public order or other national interest.
preservation;
4. Where the Philippine Government
ii. The offense that is the subject of a believes that preservation will not
criminal investigation or proceedings ensure the future availability of the data,
and a brief summary of the related facts; or will threaten the confidentiality of, or
otherwise prejudice the requesting
iii. The stored computer data to be States investigation, it shall promptly so
preserved and its relationship to the inform the requesting State. The
offense; requesting State will determine whether
its request should be executed; and
iv. The necessity of the preservation;
and 5. Any preservation effected in response
to the request referred to in paragraph
(d) shall be for a period not less than
sixty (60) days, in order to enable the
requesting State to submit a request for
the search or similar access, seizure or
similar securing, or disclosure of the g. The criminal offenses described
data. Following the receipt of such a under Chapter II of the Act shall be
request, the data shall continue to be deemed to be included as extraditable
preserved pending a decision on that offenses in any extradition treaty where
request. the Philippines is a party: Provided, That
the offense is punishable under the laws
e. Accommodate request from another of both Parties concerned by deprivation
State to search, access, seize, secure, of liberty for a minimum period of at
or disclose data stored by means of a least one year or by a more severe
computer system located within the penalty.
country, including data that has been
preserved under the previous The Secretary of Justice shall designate
subsection. appropriate State Counsels to handle all
matters of international cooperation as
The Philippine Government shall provided in this Rule.
respond to the request through the
proper application of international RULE 6
instruments, arrangements and laws, Competent Authorities
and in accordance with the following
rules: Section 26. Cybercrime Investigation
and Coordinating Center;
1. The request shall be responded to on Composition. The inter-agency body
an expedited basis where: known as the Cybercrime Investigation
and Coordinating Center (CICC), under
i. There are grounds to believe that the administrative supervision of the
relevant data is particularly vulnerable to Office of the President, established for
loss or modification; or policy coordination among concerned
agencies and for the formulation and
ii. The instruments, arrangements and enforcement of the national cyber
laws referred to in paragraph (b) of this security plan, is headed by the
section otherwise provide for expedited Executive Director of the Information
cooperation. and Communications Technology Office
under the Department of Science and
2. The requesting State must maintain Technology (ICTO-DOST) as
the confidentiality of the fact or the Chairperson; the Director of the NBI as
subject of request for assistance and Vice-Chairperson; and the Chief of the
cooperation. It may only use the PNP, the Head of the DOJ Office of
requested information subject to the Cybercrime, and one (1) representative
conditions specified in the grant. each from the private sector, non-
governmental organizations, and the
f. Make a request to any foreign state for academe as members.
assistance for purposes of detection,
investigation and prosecution of The CICC members shall be constituted
offenses referred to in the Act; as an Executive Committee and shall be
supported by Secretariats, specifically
for Cybercrime, Administration, and
Cybersecurity. The Secretariats shall be offenses through a computer
manned from existing personnel or emergency response team
representatives of the participating (CERT);
agencies of the CICC. b. Coordinate the preparation of
appropriate and effective
The CICC may enlist the assistance of measures to prevent and
any other agency of the government suppress cybercrime activities as
including government-owned and provided for in the Act;
-controlled corporations, and the c. Monitor cybercrime cases being
following: handled by participating law
enforcement and prosecution
a. Bureau of Immigration; agencies;
b. Philippine Drug Enforcement d. Facilitate international
Agency; cooperation on intelligence,
c. Bureau of Customs; investigations, training and
d. National Prosecution Service; capacity-building related to
e. Anti-Money Laundering Council; cybercrime prevention,
f. Securities and Exchange suppression and prosecution
Commission; through the DOJ-Office of
g. National Telecommunications Cybercrime;
Commission; and e. Coordinate the support and
h. Such other offices, agencies participation of the business
and/or units, as may be sector, local government units
necessary. and NGOs in cybercrime
prevention programs and other
The DOJ Office of Cybercrime shall related projects;
serve as the Cybercrime Operations f. Recommend the enactment of
Center of the CICC and shall submit appropriate laws, issuances,
periodic reports to the CICC. measures and policies;
g. Call upon any government
Participation and representation in the agency to render assistance in
Secretariat and/or Operations Center the accomplishment of the
does not require physical presence, but CICCs mandated tasks and
may be done through electronic modes functions;
such as email, audio-visual conference h. Establish and perform community
calls, and the like. awareness program on
cybercrime prevention in
Section 27. Powers and coordination with law
Functions. The CICC shall have the enforcement authorities and
following powers and functions: stakeholders; and
i. Perform all other matters related
a. Formulate a national to cybercrime prevention and
cybersecurity plan and extend suppression, including capacity-
immediate assistance for the building and such other functions
suppression of real-time and duties as may be necessary
commission of cybercrime
for the proper implementation of g. Facilitate international
the Act. cooperation with other law
enforcement agencies on
Section 28. Department of Justice intelligence, investigations,
(DOJ); Functions and Duties. The training and capacity-building
DOJ-Office of Cybercrime (OOC), related to cybercrime prevention,
designated as the central authority in all suppression and prosecution;
matters related to international mutual h. Issue and promulgate guidelines,
assistance and extradition, and the advisories, and procedures in all
Cybercrime Operations Center of the matters related to cybercrime
CICC, shall have the following functions investigation, forensic evidence
and duties: recovery, and forensic data
analysis consistent with industry
a. Act as a competent authority for standard practices;
all requests for assistance for i. Prescribe forms and templates,
investigation or proceedings including, but not limited to, those
concerning cybercrimes, facilitate for preservation orders, chain of
the provisions of legal or custody, consent to search,
technical advice, preservation consent to assume
and production of data, collection account/online identity, and
of evidence, giving legal request for computer forensic
information and location of examination;
suspects; j. Undertake the specific roles and
b. Act on complaints/referrals, and responsibilities of the DOJ related
cause the investigation and to cybercrime under the
prosecution of cybercrimes and Implementing Rules and
other violations of the Act; Regulation of Republic Act No.
c. Issue preservation orders 9775 or the Anti-Child
addressed to service providers; Pornography Act of 2009; and
d. Administer oaths, issue k. Perform such other acts
subpoena and summon necessary for the implementation
witnesses to appear in an of the Act.
investigation or proceedings for
cybercrime; Section 29. Computer Emergency
e. Require the submission of timely Response Team (CERT). The DOST-
and regular reports including pre- ICT Office shall establish and operate
operation, post-operation and the Computer Emergency Response
investigation results, and such Team (CERT) that shall serve as
other documents from the PNP coordinator for cybersecurity related
and NBI for monitoring and activities, including but not limited to the
review; following functions and duties:
f. Monitor the compliance of the
service providers with the a. Extend immediate assistance to the
provisions of Chapter IV of the CICC to fulfil its mandate under the Act
Act, and Rules 7 and 8 hereof; with respect to matters related to
cybersecurity and the national a. Preserve the integrity of traffic
cybersecurity plan; data and subscriber information
for a minimum period of six (6)
b. Issue and promulgate guidelines, months from the date of the
advisories, and procedures in all matters transaction;
related to cybersecurity and the national b. Preserve the integrity of content
cybersecurity plan; data for six (6) months from the
date of receipt of the order from
c. Facilitate international cooperation law enforcement or competent
with other security agencies on authorities requiring its
intelligence, training, and capacity- preservation;
building related to cybersecurity; and c. Preserve the integrity of
computer data for an extended
d. Serve as the focal point for all period of six (6) months from the
instances of cybersecurity incidents by: date of receipt of the order from
law enforcement or competent
1. Providing technical analysis of authorities requiring extension on
computer security incidents; its preservation;
2. Assisting users in escalating d. Preserve the integrity of
abuse reports to relevant parties; computer data until the final
3. Conducting research and termination of the case and/or as
development on emerging threats ordered by the Court, as the case
to computer security; may be, upon receipt of a copy of
4. Issuing relevant alerts and the transmittal document to the
advisories on emerging threats to Office of the Prosecutor;
computer security. e. Ensure the confidentiality of the
5. Coordinating cyber security preservation orders and its
incident responses with trusted compliance;
third parties at the national and f. Collect or record by technical or
international levels; and electronic means, and/or
6. Conducting technical training on cooperate and assist law
cyber security and related topics. enforcement or competent
authorities in the collection or
The Philippine National Police and the recording of computer data that
National Bureau of Investigation shall are associated with specified
serve as the field operations arm of the communications transmitted by
CERT. The CERT may also enlist other means of a computer system, in
government agencies to perform CERT relation to Section 13 hereof;
functions. g. Disclose or submit subscribers
information, traffic data or
RULE 7 relevant data in his/its possession
Duties of Service Providers or control to law enforcement or
competent authorities within
Section 30. Duties of a seventy-two (72) hours after
Service Provider. The following are receipt of order and/or copy of
the duties of a service provider: the court warrant;
h. Report to the DOJ Office of of users who gained or attempted
Cybercrime compliance with the to gain access to an internet
provisions of Chapter IV of the address that contains any form of
Act, and Rules 7 and 8 hereof; child pornography. ISPs shall also
i. Immediately and completely preserve customer data records,
destroy the computer data specifically the time, origin, and
subject of a preservation and destination of access, for
examination after the expiration purposes of investigation and
of the period provided in Sections prosecution by relevant
13 and 15 of the Act; and authorities under Sections 9 and
j. Perform such other duties as may 11 of R.A. 9775.
be necessary and proper to carry
into effect the provisions of the RULE 8
Act. Prescribed Forms and Procedures

Section 31. Duties of a Service SEC. 32. Prescribed Forms and


Provider in Child Pornography Procedures. The DOJ Office of
Cases. In line with RA 9775 or the Cybercrime shall issue and promulgate
Anti-Child Pornography Act of 2009, guidelines, advisories, and procedures
the following are the duties of a service in all matters related to cybercrime,
provider in child pornography cases: investigation, forensic evidence
recovery, and forensic data analysis
1. An internet service provider consistent with international best
(ISP)/internet content host shall practices, in accordance with Section
install available technology, 28(h) and (i) hereof.
program or software, such as, but
not limited to, system/technology It shall also prescribe forms and
that produces hash value or any templates such as, but not limited to,
similar calculation, to ensure that preservation orders, chain of custody,
access to or transmittal of any consent to search, consent to assume
form of child pornography will be account/online identity, request for
blocked or filtered; computer forensic assistance, write-
2. Service providers shall blocking device validation and first
immediately notify law responder checklist.
enforcement authorities within
seven (7) days of facts and RULE 9
circumstances relating to any Final Provisions
form child pornography that
passes through or are being SEC. 33. Appropriations. The
committed in their system; and amount of Fifty Million Pesos
3. A service provider or any person (P50,000,000.00) shall be appropriated
in possession of traffic data or annually for the implementation of the
subscribers information, shall, Act under the fiscal management of
upon the request of law DOJ Office of Cybercrime.
enforcement or competent
authorities, furnish the particulars
Section 34. Separability Clause. If Section 36. Effectivity. These rules
any provision of these Rules is held and regulations shall take effect fifteen
invalid, the other provisions not affected (15) days after the completion of its
shall remain in full force and effect. publication in at least two (2)
newspapers of general circulation.
Section 35. Repealing Clause. All
rules and regulations inconsistent with DONE in the City of Manila, this 12th day
these Rules are hereby repealed or of August 2015.
modified accordingly.

You might also like