Professional Documents
Culture Documents
Earlier cases:
FACTS:
After arraignment, the accused filed petition for bail. The prosecution
filed opposition except as to accused Catalina Peras, who was then in her
eighth month of pregnancy, and for which the court thereafter fixed bail.
The trial court disallowed the prosecutions request for its witness, a
computer programmer, to print out in open court the material encoded in
certain diskettes seized from the accused by virtue of a search warrant.
According to the trial court the diskettes have been in possession of the
prosecution since the start and anything may happen while they were in
their possession. The court explained that to let the witness operate the
computer is very dangerous, because the witness said that these
diskettes can be manipulated or altered which would be prejudicial to
the rights of the accused.
HELD:
The mere fact that the diskettes had been in the possession of the
prosecution does not necessarily imply that it had altered or tampered
with the evidence to suit its prosecutorial objectives. Indeed, the
presumption that official duty has been regularly performed prevails, in
the absence of any evidence to the contrary.
We, therefore hold that the printing out of data (if any) encoded
in the diskettes should be allowed. Respondent Judge's asserted
apprehension that the witness brought in by the prosecution to
undertake the printing out of the diskettes' contents could himself
"manipulate" said diskettes during the actual printing out in court may
very easily relieved by designating a competent person agreeable to
both parties, and especially to respondent Judge, who can perform the
task of printing out the contents of the diskettes. Respondent Judge's
ostensible lack of confidence in the prosecution witness should not in
any way affect the integrity of the diskettes themselves or the right of
the prosecution to show the contents of the diskettes subject, of course,
to applicable rights of the accused.
FACTS:
Alleging that his dismissal was illegal, Israel filed a complaint with
the Department of Labor and Employment on July 18, 1991. In its
defense, alleged that Israel had unsatisfactory performance in the
company and was given sufficient warning and opportunity to "reform
and improve his attitude toward attendance," but which he never did.
According to IBM, Israel was constantly told of his poor attendance
record and inefficiency through the companys internal electronic mail
(e-mail) system, which allows paperless or "telematic" communication.
HELD:
In Jarcia Machine Shop and Auto Supply, Inc. v. NLRC, this Court
held as incompetent unsigned daily time records presented to prove
that the employee was neglectful of his duties:
Subject:
Angel, have been trying to pin you down for a talk the past couple of
days. Whatever happened to our good discussion 2 weeks ago? I
thought you would make an effort to come in on time from then on? If
you have problems which prevent you from coming in on time, let me
know because I would really like to help if I can. The sum of all your
quotas is less than mine so I really need all of you pitching in. Kindly
take a look at your proofs in-tray as there are some to dos which are
pending. Acts such as St. Louis U. and NEECO should be worth looking
into as theyve been inquiring about upgrading their very old boxes. If
you are too tied up for these accounts do let me know so I can
reassign. By Monday morning please. Lets give it that final push for the
branch!
==============================================
===
Regards from the APPLICATION MNLVM 1 (REYESVV)
SYSTEMS MARKETING group T (832)8192-279
Victor V. Reyes - Marketing Manager
==============================================
===
FACTS:
CONTRARY TO LAW.
HELD:
In Macasaet v. People, G.R. No. 156747, February 23, 2005, 452 SCRA
255, the Court reiterated its earlier pronouncements in Agbayani v.
Sayo, G.R. No. L-47880, April 30, 1979, 89 SCRA 699, which laid out the
rules on venue in libel cases, viz:
For the guidance, therefore, of both the bench and the bar,
this Court finds it appropriate to reiterate our earlier
pronouncement in the case of Agbayani, to wit:
It becomes clear that the venue of libel cases where the complainant is
a private individual is limited to only either of two places, namely: 1)
where the complainant actually resides at the time of the commission of
the offense; or 2) where the alleged defamatory article was printed and
first published. The Amended Information in the present case opted to
lay the venue by availing of the second. Thus, it stated that the
offending article was first published and accessed by the private
complainant in Makati City. In other words, it considered the phrase to
be equivalent to the requisite allegation of printing and first publication.
Before article 360 was amended, the rule was that a criminal
action for libel may be instituted in any jurisdiction where the
libelous article was published or circulated, irrespective of where
it was written or printed (People v. Borja, 43 Phil. 618). Under that
rule, the criminal action is transitory and the injured party has a
choice of venue.
Experience had shown that under that old rule the offended party
could harass the accused in a libel case by laying the venue of the
criminal action in a remote or distant place.
For the Court to hold that the Amended Information sufficiently vested
jurisdiction in the courts of Makati simply because the defamatory
article was accessed therein would open the floodgates to the libel suit
being filed in all other locations where the pepcoalition website is
likewise accessed or capable of being accessed.
Comment:
The new law does not change the definition of the crime of libel under
the Revised Penal Code. However, it does two things.
Under the new law, the penalty is imprisonment for a minimum period
of four years and one day to a maximum of eight years, per offense.
Top 5 cybercrime complaints
Online Libel
Online Scam
Identity Theft
Online Threat
Anti-Photo and Video VoyeurismAct
Rule 1
COVERAGE
Rule 2
DEFINITION OF TERMS AND CONSTRUCTION
Electronic signature refers to any distinctive mark, characteristic
and/or sound in electronic form, representing the identity of a person
and attached to or logically associated with the electronic data message
or electronic document or any methodology or procedure employed or
adopted by a person and executed or adopted by such person with the
intention of authenticating, signing or approving an electronic data
message or electronic document. For purposes of these Rules, an
electronic signature includes digital signatures.
ii. whether the initial electronic document had been altered after
the transformation was made.
Rule 3
ELECTRONIC DOCUMENTS
Rule 4
BEST EVIDENCE RULE
Rule 5
AUTHENTICATION OF ELECTRONIC DOCUMENTS
Rule 6
ELECTRONIC SIGNATURES
Section 1. Electronic signature. An electronic signature or a
digital signature authenticated in the manner prescribed hereunder is
admissible in evidence as the functional equivalent of the signature of a
person on a written document.
(b) The electronic signature was affixed by that person with the
intention of authenticating or approving the electronic document to
which it is related or to indicate such person's consent to the
transaction embodied therein; and
Rule 7
EVIDENTIARY WEIGHT OF ELECTRONIC DOCUMENTS
(d) The familiarity of the witness or the person who made the
entry with the communication and information system;
(e) The nature and quality of the information which went into the
communication and information system upon which the electronic data
message or electronic document was based; or
(f) Other factors which the court may consider as affecting the
accuracy or integrity of the electronic document or electronic data
message.
RULE 8
BUSINESS RECORDS
AS EXCEPTION TO THE HEARSAY RULE
Rule 9
METHOD OF PROOF
Section 1. Affidavit evidence. All matters relating to the
admissibility and evidentiary weight of an electronic document may be
established by an affidavit stating facts of direct personal knowledge of
the affiant or based on authentic records. The affidavit must
affirmatively show the competence of the affiant to testify on the
matters contained therein.
Rule 10
EXAMINATION OF WITNESSES
Rule 11
AUDIO, PHOTOGRAPHIC, VIDEO,
AND EPHEMERAL EVIDENCE
Section 1. Audio, video and similar evidence. Audio,
photographic and video evidence of events, acts or transactions shall
be admissible provided it shall be shown, presented or displayed to the
court and shall be identified, explained or authenticated by the person
who made the recording or by some other person competent to testify
on the accuracy thereof.
RA 10175 was passed on Sept. 12, 2012. The Supreme Court declared it
constitutional last February 18, 2014, except three provisions on the
automatic takedown clause, real-time collection of online data and on
unsolicited commercial communication, like spam. The High Court
upheld the Internet libel provision but limited it to the author of the
libelous statement and clarified that only original authors of libelous
material are covered by the Cybercrime law, and not those who merely
received or reacted to it.
1. The Office of the Cebu City Prosecutor has indicted an American who
allegedly maligned the reputation of his co-worker on Facebook in
2014. Prosecutor Fatima Asjali-Maadil found evidence to charge Andre
Philippe Laflamme with violation of Republic Act 10175, or the
Cybercrime Prevention Act of 2012, before the Regional Trial Court.
In her judicial affidavit, the complainant alleged that the
respondent, a senior manager of their outsourcing firm based in Cebu
City, defamed her on the social networking site, by posting her photo
with the caption, Id do anything for money. According to
complainant In posting that Id do anything for money, respondent
imputed a vice upon me by insinuating that I have a serious character
flaw and he did it publicly through Facebook,
3. On March 13, 2012, an information for libel was filed in the RTC
against a teenager blogger and four others. The group was accused by
complainant of maligning her on a blog posted by one of them on April
6, 2008, on the website Multiply. According to complainant the group
put a Yahoo Messenger conversation between them on a blog by one
of them titled Meet My Backstabber Friend but edited her chat
name into an alias.
Complainant further alleged that several persons commented on the
blog further mocking her with contempt and insults. Worse, details of
confirming complainants identity were placed, like deliberate and
obvious hints in a sarcastic fashion of a futile attempt to cover up. One
of those who commented referred to the object of the blog as a bitch
and other derogatory names.
CASES:
FACTS:
When respondent was asked where the money will go, she
claimed that it will go to a male researcher whose name she refused to
divulge. The researcher was allegedly a lawyer in the CA 5 th Division
where complainants case was pending. She also claimed that she will
not get any part of the money unless the researcher decides to give her
some.
More irony ensued. Respondent actually said that she felt there
were policemen around and she was afraid that once she took hold of
the envelope complainant proffered, she would suddenly be arrested
and handcuffed. At one point, she even said, Ayan o, tapos na silang
kumain, bakit hindi pa sila umaalis?, referring to Banay and Villena at
the next table. To allay respondents suspicion, the two agents stood up
after a few minutes and went near the staircase where they could still
see what was going on.
Question 1: Under the facts of this case, are the text messages (SMS)
admissible in evidence against respondent?
FACTS:
FACTS:
Accused Enojas voluntarily went with the police officers and left
his taxi behind. On reaching the 7-11 convenience store on the Zapote-
Alabang Road, however, they stopped and PO2 Pangilinan went down
to relieve himself there. As he approached the stores door, however, he
came upon two suspected robbers and shot it out with them. PO2
Pangilinan shot one suspect dead and hit the other who still managed
to escape. But someone fired at PO2 Pangilinan causing his death.
PO3 Cambi and PO2 Rosarito testified that they monitored the
messages in accused Enojas mobile phone and, posing as Enojas,
communicated with the other accused. The police then conducted an
entrapment operation that resulted in the arrest of accused Santos and
Jalandoni. Subsequently, the police were also able to capture accused
Enojas and Gomez. The prosecution presented the transcripts of the
mobile phone text messages between Enojas and some of his co-
accused.
Manifesting in open court that they did not want to adduce any
evidence or testify in the case, the accused opted to instead file a trial
memorandum on March 10, 2008 for their defense. They pointed out
that they were entitled to an acquittal since they were all illegally
arrested and since the evidence of the text messages were inadmissible,
not having been properly identified.
Upon review, the Court of Appeals (CA) dismissed the appeal and
affirmed in toto the conviction of the accused. The CA, however, found
the absence of evident premeditation since the prosecution failed to
prove that the several accused planned the crime before committing it.
The accused appealed from the CA to the Supreme Court.
// commentary:
The Supreme Court did not discuss the issue on whether the police
have the right to use the text messages as tools to arrest and prosecute
the accused, or whether or not there was lawful search and seizure of
the mobile phone data. Is it not that under the poisonous tree doctrine
the text messages in the mobile phone, which led to the arrest and
identification of the accused, are inadmissible considering that all
evidence resulting from the unlawful use of the mobile phone must be
excluded?
In a similar case [Riley vs. California, No. 12-132, 25 June 2014], the
U.S. Supreme Court held that, although a mobile phone is not immune
from search, a warrant is generally required before the search. In said
case, the Supreme Court recognized notable circumstances that brings
a mobile phone to a level similar to personal records and documents,
and thus protected by the constitutional right against warrantless
search and seizure, thus:
It must be noted that the terms computer and computer data are
defined in the law as to include mobile phone and mobile phone data.
FACTS:
Answer: No. The fact is that the prosecution did not present in
evidence either the cellphone or the SIM cards that the police officers
seized from him at the time of his arrest. The prosecution did not need
such items to prove its case. Exhibit C for the prosecution was but a
photograph depicting the Sony Ericsson P900 cellphone that was used,
which cellphone Rustan admitted owning during the pre-trial
conference.
Actually, though, the bulk of the evidence against him consisted
in Irishs testimony that she received the obscene picture and malicious
text messages and that the senders cellphone numbers belonged to
Rustan with whom she had been previously in communication. Indeed,
to prove that the cellphone numbers belonged to Rustan, Irish and the
police used such numbers to summon him to come to Lorentess Resort
and he did. Consequently, the prosecution did not have to present the
confiscated cellphone and SIM cards to prove that Rustan sent those
messages.
FACTS:
(a) the loss or destruction of the original without bad faith on the part
of the proponent/offeror which can be shown by circumstantial
evidence of routine practices of destruction of documents; (b) the
proponent must prove by a fair preponderance of evidence as to raise
a reasonable inference of the loss or destruction of the original copy;
and (c) it must be shown that a diligent and bona fide but unsuccessful
search has been made for the document in the proper place or places.
FACTS:
The Chairwoman
Civil Service Commission
Batasan Hills, Quezon City
POLICY
xxxx
No Expectation of Privacy
Passwords
The CSC in this case had implemented a policy that put its
employees on notice that they have no expectation of privacy
in anything they create, store, send or receive on the office computers,
and that the CSC may monitor the use of the computer resources using
both automated or human means. This implies that on-the-spot
inspections may be done to ensure that the computer resources were
used only for such legitimate business purposes.
Question 9: Was the search authorized by the CSC Chair, and the
copying of the contents of the hard drive on petitioners computer
reasonable in its inception and scope?
FACTS:
After trial on the merits, the RTC rendered its Decision on March
24, 2004, in favor of Ssangyong. The trial court ruled that when plaintiff
agreed to sell and defendants agreed to buy the 220MT of steel
products for the price of US$1,860 per MT, the contract was perfected.
The subject transaction was evidenced by Pro Forma Invoice Nos. ST2-
POSTS0401-1 and ST2-POSTS0401-2, which were later amended only in
terms of reduction of volume as well as the price per MT, following Pro
Forma Invoice Nos. ST2-POSTS080-1 and ST2-POSTS080-2.
xxx
xxx
xxx
(e) Electronic Data Message refers to information
generated, sent, received or stored by electronic, optical or
similar means, but not limited to, electronic data
interchange (EDI), electronic mail, telegram, telex or
telecopy. Throughout these Rules, the term electronic data
message shall be equivalent to and be used
interchangeably with electronic document.
xxxx
xxxx
Clearly then, the IRR went beyond the parameters of the law
when it adopted verbatim the UNCITRAL Model Laws definition of
data message, without considering the intention of Congress when
the latter deleted the phrase but not limited to, electronic data
interchange (EDI), electronic mail, telegram, telex or telecopy . The
inclusion of this phrase in the IRR offends a basic tenet in the exercise
of the rule-making power of administrative agencies. After all, the
power of administrative officials to promulgate rules in the
implementation of a statute is necessarily limited to what is found in
the legislative enactment itself. The implementing rules and
regulations of a law cannot extend the law or expand its coverage, as
the power to amend or repeal a statute is vested in the Legislature.
Thus, if a discrepancy occurs between the basic law and
an implementing rule or regulation, it is the former that prevails,
because the law cannot be broadened by a mere administrative
issuance an administrative agency certainly cannot amend an act of
Congress. Had the Legislature really wanted ordinary fax
transmissions to be covered by the mantle of the Electronic
Commerce Act of 2000, it could have easily lifted without a bit of
tatter the entire wordings of the UNCITRAL Model Law.
FACTS:
In Garvida v. Sales, Jr., [G.R. No. 124893, April 18, 1997, 271 SCRA
767.] we found inadmissible in evidence the filing of pleadings through
fax machines and ruled that:
FACTS:
On July 30, 2007, Special Investigator Garry Meez (SI Meez) of the
National Bureau of Investigation (NBI) applied for a search warrant
before the RTC to authorize him and his fellow NBI agents or any peace
officer to search the premises of petitioner Phil-Pacific Outsourcing
Services Corporation (Phil-Pacific) and to seize/confiscate and take into
custody the items/articles/objects enumerated in his application. On
August 3, 2007, after a hearing, the application was granted and the
corresponding Search Warrant was issued, quoted as follows:
SEARCH WARRANT
1. Computer Sets
2. Television Sets
3. Internet Servers
4. Fax Machines
5. Pornographic Films and other Pornographic Materials
6. Web Cameras
7. Telephone Sets
8. Photocopying Machines
9. List of clients and
10. Other tools and materials used or intended to be used in the
commission of the crime.
1. Computer Sets
2. Television Sets
3. Internet Servers
4. Fax Machines
5. Pornographic Films and other Pornographic Materials
6. Web Cameras
7. Telephone Sets
8. Photocopying Machines
9. List of clients and
10. Other tools and materials used or intended to be used in the
commission of the crime.
and bring to this Court the said properties and persons to be dealt with
as the law may direct. You are further directed to submit a return within
ten (10) days from today.
While it may be true that the criminal case for violation of Article
201 of the Revised Penal Code was dismissed as there was no concrete
and strong evidence pointing to them as the direct source of the
subject pornographic materials, it cannot be used as basis to recover
the confiscated hard disks. At the risk of being repetitious, it
appears undisputed that the seized computer units belonging to them
contained obscene materials or pornographic files. Clearly, petitioners
had no legitimate expectation of protection of their supposed property
rights.
The CA is correct in stating that the removal of the hard disk from
the CPU is a reliable way of permanently removing the obscene or
pornographic files. Significantly, Presidential Decree (PD) No. 969 is
explicit. Thus:
Sec. 2. Disposition of the Prohibited Articles. The disposition
of the literature, films, prints, engravings, sculptures,
paintings, or other materials involved in the violation
referred to in Section 1 hereof shall be governed by the
following rules:
Taking into account all the circumstances of this case, the Court
holds that the destruction of the hard disks and the softwares used in
any way in the violation of the subject law addresses the purpose of
minimizing if not totally eradicating pornography. This will serve as a
lesson for those engaged in any way in the proliferation of pornography
or obscenity in this country. The Court is not unmindful of the concerns
of petitioners but their supposed property rights must be balanced with
the welfare of the public in general.
MAYOR EMMANUEL L. MALIKSI v. COMMISSION ON ELECTIONS and
HOMER T. SAQUILAYAN, G.R. No. 203302, March 12, 2013
FACTS:
Section 2 (3) of R.A. No. 9369 defines official ballot where AES is
utilized as the paper ballot, whether printed or generated by the
technology applied, that faithfully captures or represents the votes cast
by a voter recorded or to be recorded in electronic form.
We agree, therefore, with both the HRET and Panotes that the
picture images of the ballots, as scanned and recorded by the PCOS,
are likewise official ballots that faithfully captures (sic) in electronic
form the votes cast by the voter, as defined by Section 2 (3) of R.A. No.
9369. As such, the printouts thereof are the functional equivalent of the
paper ballots filled out by the voters and, thus, may be used for
purposes of revision of votes in an electoral protest.
Hence, the COMELEC First Division did not gravely abuse its
discretion in using the ballot images in the CF cards.
Question 15: Maliksi further argued that the ballot images in the
CF cards should merely be considered as secondary evidence and
should be resorted to only when the physical ballots are not available
or could not be produced. Is the contention valid?
FACTS:
The RTC and the CA, however, ruled that such exhibit cannot be
considered admissible as its authenticity and due execution were not
sufficiently established by petitioner.
xxxx
A: Yes sir, after that Ingtan incident, I went straight to the
Service Agency there and on the left hand side
you will be able to see the name of the person
in-charged [sic] there certifying that really my
card is being blacklisted and there is the
signature there of the agency.
ATTY. NAVARRO:
The witness, your honor, is pointing to the signature over
the handwritten name
of Victrina Elnado Nubi which I pray, your
honor, that the Computer Print Out be marked
as our Exhibit G and the remarks at the left
hand bottom portion
of Victorina Elnado Nubi with her signature
thereon be encircled and be marked as our
Exhibit G-1.
xxxx
ATTY. NERI
Q Now, paragraph 12 also states and I quote: its entry in the
hot list was confirmed to be authentic
Is Aznar correct?
As correctly pointed out by the RTC in its May 29, 1998 Decision,
there appears on the computer print-out the name of a
certain Victrina Elnado Nubi and a signature purportedly belonging to
her, and at the left dorsal side were handwritten the words Sorry for the
delay since the records had to be retrieved. Regards. Darryl Mario. It is
not clear therefore if it was Nubi who encoded the information stated in
the print-out and was the one who printed the same. The handwritten
annotation signed by a certain Darryl Mario even suggests that it was
Mario who printed the same and only handed the print-out
to Nubi. The identity of the entrant, required by the provision above
mentioned, was therefore not established. Neither did petitioner
establish in what professional capacity did Mario or Nubi make the
entries, or whether the entries were made in the performance of their
duty in the ordinary or regular course of business or duty.